| 1 |
Medical image denoising using convolutional denoising autoencoders
Lovedeep Gondara
|
👻
Ghosted
|
cs.CV
|
623 |
9 years ago |
| 2 |
Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning
Jun Inoue, Yoriyuki Yamagata, ... (+3 more)
|
👻
Ghosted
|
cs.LG
|
277 |
8 years ago |
| 3 |
A Unified Gradient Regularization Family for Adversarial Examples
Chunchuan Lyu, Kaizhu Huang, Hai-Ning Liang
|
👻
Ghosted
|
cs.LG
|
218 |
10 years ago |
| 4 |
Robust PCA via Nonconvex Rank Approximation
Zhao Kang, Chong Peng, Qiang Cheng
|
👻
Ghosted
|
cs.CV
|
180 |
10 years ago |
| 5 |
Principled Multilayer Network Embedding
Weiyi Liu, Pin-Yu Chen, ... (+3 more)
|
👻
Ghosted
|
cs.SI
|
134 |
8 years ago |
| 6 |
Improving the Interpretability of Deep Neural Networks with Knowledge Distillation
Xuan Liu, Xiaoguang Wang, Stan Matwin
|
👻
Ghosted
|
cs.LG
|
112 |
7 years ago |
| 7 |
From Micro to Macro: Uncovering and Predicting Information Cascading Process with Behavioral Dynamics
Linyun Yu, Peng Cui, ... (+3 more)
|
👻
Ghosted
|
cs.SI
|
109 |
10 years ago |
| 8 |
NoPeek: Information leakage reduction to share activations in distributed deep learning
Praneeth Vepakomma, Abhishek Singh, ... (+2 more)
|
👻
Ghosted
|
cs.LG
|
104 |
5 years ago |
| 9 |
Characterizing Entities in the Bitcoin Blockchain
Marc Jourdan, Sebastien Blandin, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
92 |
7 years ago |
| 10 |
Early Warnings of Cyber Threats in Online Discussions
Anna Sapienza, Alessandro Bessi, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
87 |
8 years ago |
| 11 |
Learning Semantic Similarity for Very Short Texts
Cedric De Boom, Steven Van Canneyt, ... (+3 more)
|
👻
Ghosted
|
cs.IR
|
83 |
10 years ago |
| 12 |
Detecting Overlapping Communities from Local Spectral Subspaces
Kun He, Yiwei Sun, ... (+3 more)
|
👻
Ghosted
|
cs.SI
|
74 |
10 years ago |
| 13 |
One-Class SVM with Privileged Information and its Application to Malware Detection
Evgeny Burnaev, Dmitry Smolyakov
|
👻
Ghosted
|
stat.ML
|
72 |
9 years ago |
| 14 |
Privately Fine-Tuning Large Language Models with Differential Privacy
Rouzbeh Behnia, Mohamamdreza Ebrahimi, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
71 |
3 years ago |
| 15 |
Co-training for Demographic Classification Using Deep Learning from Label Proportions
Ehsan Mohammady Ardehaly, Aron Culotta
|
👻
Ghosted
|
cs.CV
|
69 |
8 years ago |
| 16 |
Inferring Uncertain Trajectories from Partial Observations
Prithu Banerjee, Sayan Ranu, Sriram Raghavan
|
👻
Ghosted
|
cs.DB
|
62 |
10 years ago |
| 17 |
EdgeCentric: Anomaly Detection in Edge-Attributed Networks
Neil Shah, Alex Beutel, ... (+6 more)
|
👻
Ghosted
|
cs.SI
|
62 |
10 years ago |
| 18 |
The Truth and Nothing but the Truth: Multimodal Analysis for Deception Detection
Mimansa Jaiswal, Sairam Tabibu, Rajiv Bajpai
|
👻
Ghosted
|
cs.CL
|
57 |
7 years ago |
| 19 |
A Big Data Analysis Framework Using Apache Spark and Deep Learning
Anand Gupta, Hardeo Thakur, ... (+3 more)
|
👻
Ghosted
|
cs.DB
|
52 |
8 years ago |
| 20 |
Fast Low-Rank Matrix Learning with Nonconvex Regularization
Quanming Yao, James T. Kwok, Wenliang Zhong
|
👻
Ghosted
|
math.NA
|
46 |
10 years ago |
| 21 |
Finding Good Itemsets by Packing Data
Nikolaj Tatti, Jilles Vreeken
|
👻
Ghosted
|
cs.DS
|
45 |
7 years ago |
| 22 |
Sparse Hierarchical Tucker Factorization and its Application to Healthcare
Ioakeim Perros, Robert Chen, ... (+2 more)
|
👻
Ghosted
|
cs.LG
|
45 |
9 years ago |
| 23 |
A Collaborative Kalman Filter for Time-Evolving Dyadic Processes
San Gultekin, John Paisley
|
👻
Ghosted
|
stat.ML
|
44 |
11 years ago |
| 24 |
Diamond Sampling for Approximate Maximum All-pairs Dot-product (MAD) Search
Grey Ballard, Ali Pinar, ... (+2 more)
|
👻
Ghosted
|
cs.SI
|
42 |
10 years ago |
| 25 |
DGTN: Dual-channel Graph Transition Network for Session-based Recommendation
Yujia Zheng, Siyi Liu, ... (+2 more)
|
👻
Ghosted
|
cs.IR
|
41 |
5 years ago |
| 26 |
Network Clustering via Maximizing Modularity: Approximation Algorithms and Theoretical Limits
Thang N. Dinh, Xiang Li, My T. Thai
|
👻
Ghosted
|
cs.SI
|
38 |
10 years ago |
| 27 |
BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure
Lukasz Dykcik, Laurent Chuat, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
36 |
7 years ago |
| 28 |
SYNC: A Copula based Framework for Generating Synthetic Data from Aggregated Sources
Zheng Li, Yue Zhao, Jialin Fu
|
👻
Ghosted
|
stat.AP
|
35 |
5 years ago |
| 29 |
Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data
Simon Duque Anton, Lia Ahrens, ... (+2 more)
|
👻
Ghosted
|
cs.LG
|
34 |
7 years ago |
| 30 |
Defect Detection from UAV Images based on Region-Based CNNs
Meng Lan, Yipeng Zhang, ... (+2 more)
|
👻
Ghosted
|
cs.CV
|
32 |
7 years ago |
| 31 |
Maximally Consistent Sampling and the Jaccard Index of Probability Distributions
Ryan Moulton, Yunjiang Jiang
|
👻
Ghosted
|
cs.DS
|
32 |
7 years ago |
| 32 |
The Mean and Median Criterion for Automatic Kernel Bandwidth Selection for Support Vector Data Description
Arin Chaudhuri, Deovrat Kakde, ... (+3 more)
|
👻
Ghosted
|
cs.LG
|
31 |
8 years ago |
| 33 |
EmTaggeR: A Word Embedding Based Novel Method for Hashtag Recommendation on Twitter
Kuntal Dey, Ritvik Shrivastava, ... (+2 more)
|
👻
Ghosted
|
cs.CL
|
30 |
8 years ago |
| 34 |
Time Series Anomaly Detection using Diffusion-based Models
Ioana Pintilie, Andrei Manolache, Florin Brad
|
👻
Ghosted
|
cs.LG
|
30 |
2 years ago |
| 35 |
Significance of Episodes Based on Minimal Windows
Nikolaj Tatti
|
👻
Ghosted
|
cs.DS
|
29 |
7 years ago |
| 36 |
Analyzing users' sentiment towards popular consumer industries and brands on Twitter
Guoning Hu, Preeti Bhargava, ... (+3 more)
|
👻
Ghosted
|
cs.CL
|
29 |
8 years ago |
| 37 |
Mining Brain Networks using Multiple Side Views for Neurological Disorder Identification
Bokai Cao, Xiangnan Kong, ... (+3 more)
|
👻
Ghosted
|
cs.LG
|
29 |
10 years ago |
| 38 |
A budget-constrained inverse classification framework for smooth classifiers
Michael T. Lash, Qihang Lin, ... (+2 more)
|
👻
Ghosted
|
cs.LG
|
27 |
9 years ago |
| 39 |
Scenario-aware and Mutual-based approach for Multi-scenario Recommendation in E-Commerce
Yuting Chen, Yanshi Wang, ... (+3 more)
|
👻
Ghosted
|
cs.IR
|
26 |
5 years ago |
| 40 |
Event detection in Twitter: A keyword volume approach
Ahmad Hany Hossny, Lewis Mitchell
|
👻
Ghosted
|
cs.SI
|
26 |
7 years ago |
| 41 |
Predicting User Roles in Social Networks using Transfer Learning with Feature Transformation
Jun Sun, Jérôme Kunegis, Steffen Staab
|
👻
Ghosted
|
cs.SI
|
26 |
9 years ago |
| 42 |
Automatic City Region Analysis for Urban Routing
Kai Zhao, C Mohan Prasath, Sasu Tarkoma
|
👻
Ghosted
|
cs.SI
|
26 |
10 years ago |
| 43 |
Beyond Classification: Latent User Interests Profiling from Visual Contents Analysis
Longqi Yang, Cheng-Kang Hsieh, Deborah Estrin
|
👻
Ghosted
|
cs.IR
|
25 |
10 years ago |
| 44 |
Catching the head, tail, and everything in between: a streaming algorithm for the degree distribution
Olivia Simpson, C. Seshadhri, Andrew McGregor
|
👻
Ghosted
|
cs.DS
|
23 |
10 years ago |
| 45 |
Tiers for peers: a practical algorithm for discovering hierarchy in weighted networks
Nikolaj Tatti
|
👻
Ghosted
|
cs.DS
|
22 |
7 years ago |
| 46 |
Cross-Device Tracking: Matching Devices and Cookies
Roberto Díaz-Morales
|
👻
Ghosted
|
cs.LG
|
22 |
10 years ago |
| 47 |
Location, Occupation, and Semantics based Socioeconomic Status Inference on Twitter
Jacobo Levy Abitbol, Márton Karsai, Eric Fleury
|
👻
Ghosted
|
cs.SI
|
20 |
7 years ago |
| 48 |
Weighted Spectral Cluster Ensemble
Muhammad Yousefnezhad, Daoqiang Zhang
|
👻
Ghosted
|
cs.LG
|
19 |
9 years ago |
| 49 |
Absorbing random-walk centrality: Theory and algorithms
Charalampos Mavroforakis, Michael Mathioudakis, Aristides Gionis
|
👻
Ghosted
|
cs.SI
|
19 |
10 years ago |
| 50 |
Robust Automated Human Activity Recognition and its Application to Sleep Research
Aarti Sathyanarayana, Ferda Ofli, ... (+5 more)
|
👻
Ghosted
|
cs.LG
|
18 |
9 years ago |