The shortest path network interdiction (SPNI) problem poses significant
...
Quantum Machine Learning is an emerging sub-field in machine learning wh...
Despite the increased adoption of open-source cyber threat intelligence
...
Since its introduction in 2006, differential privacy has emerged as a
pr...
With the rapid development of machine learning, improving its explainabi...
Federated Learning (FL) has become a practical and popular paradigm in
m...
The Quantum Approximate Optimization Algorithm (QAOA) is a promising
can...
Combinatorial optimization on near-term quantum devices is a promising p...
To remain aware of the fast-evolving cyber threat landscape, open-source...
Log-based cyber threat hunting has emerged as an important solution to
c...
Log-based cyber threat hunting has emerged as an important solution to
c...
Dialogue policy training for composite tasks, such as restaurant reserva...
The task-oriented spoken dialogue system (SDS) aims to assist a human us...
Contact tracing is an important method to control the spread of an infec...
Although pretrained Transformers such as BERT achieve high accuracy on
i...
Many combinatorial scientific computing problems are NP-hard which in
pr...