In Mobile Edge Computing (MEC), Internet of Things (IoT) devices offload...
Terahertz communication networks and intelligent reflecting surfaces exh...
Meta Computing is a new computing paradigm, which aims to solve the prob...
Recently, machine learning methods have shown the prospects of stock tre...
Multi-Intent Spoken Language Understanding (SLU), a novel and more compl...
Federated Learning (FL) is a new decentralized learning used for trainin...
Spoken Language Understanding (SLU), a core component of the task-orient...
The Stackelberg security game is played between a defender and an attack...
Spoken Language Understanding (SLU), a core component of the task-orient...
With the continuous expansion of Internet of Things (IoT) devices, edge
...
Deepfakes is a branch of malicious techniques that transplant a target f...
Spoken language understanding (SLU), which is a core component of the
ta...
Distantly supervised relation extraction has been widely applied in know...
In classic network security games, the defender distributes defending
re...
Liquify is a common technique for image editing, which can be used for i...
Distant supervision has been a widely used method for neural relation
ex...
Recent studies indicate that current adversarial attack methods are flaw...
Effective long-term predictions have been increasingly demanded in urban...
Crowd flow prediction has been increasingly investigated in intelligent ...
Flow prediction (e.g., crowd flow, traffic flow) with features of
spatia...
Nowadays, time-sync comment (TSC), a new form of interactive comments, h...
The Legal Judgment Prediction (LJP) is to determine judgment results bas...
Time-sync comments reveal a new way of extracting the online video tags....
Time-sync comment (TSC) is a new form of user-interaction review associa...
To disclose overlapped multiple relations from a sentence still keeps
ch...
Extracting relations is critical for knowledge base completion and
const...