The well-known Gumbel-Max Trick for sampling elements from a categorical...
Counting the number of distinct elements distributed over multiple data
...
Graphs are widely used to represent the relations among entities. When o...
By coordinating terminal smart devices or microprocessors to engage in
c...
By enabling the nodes or agents to solve small-sized subproblems to achi...
Aggregated stochastic characteristics of geographically distributed wind...
In this paper, we study covert communications between a pair of legitima...
Facing the sparsity of user attributes on social networks, attribute
inf...
With the rapid growth of Android malware, many machine learning-based ma...
We study the problem of node classification on graphs with few-shot nove...
In commercial buildings, about 40
is attributed to Heating, Ventilation,...
Semi-supervised graph embedding methods represented by graph convolution...
Music tone quality evaluation is generally performed by experts. It coul...
The well-known Gumbel-Max Trick for sampling elements from a categorical...
Machine Learning systems are vulnerable to adversarial attacks and will
...
Estimating set similarity and detecting highly similar sets are fundamen...
Despite significant progress, deep reinforcement learning (RL) suffers f...
Many real-world networks such as Twitter and YouTube are given as fully
...
Recently, considerable efforts have been devoted to approximately comput...
Online monitoring user cardinalities (or degrees) in graph streams is
fu...
Security surveillance is one of the most important issues in smart citie...