How To Read Research Papers

Resolving 3D Human Pose Ambiguities with 3D Scene Constraints. (arXiv:1908.06963v1 [cs.CV])
To understand and analyze human behavior, we need to capture humans moving in, and interacting with, the world. Most existing...

PPT: New Low Complexity Deterministic Primality Tests Leveraging Explicit and Implicit Non-Residues. A Set of Three Companion Manuscripts. (arXiv:1908.06964v1 [cs.CR])
In this set of three companion manuscripts/articles, we unveil our new results on primality testing and reveal new primality testing...

Learning Fixed Points in Generative Adversarial Networks: From Image-to-Image Translation to Disease Detection and Localization. (arXiv:1908.06965v1 [eess.IV])
Generative adversarial networks (GANs) have ushered in a revolution in image-to-image translation. The development and proliferation of GANs raises an...

Improve variational autoEncoder with auxiliary softmax multiclassifier. (arXiv:1908.06966v1 [stat.ML])
As a general-purpose generative model architecture, VAE has been widely used in the field of image and natural language processing....

Detection of Shilling Attack Based on T-distribution on the Dynamic Time Intervals in Recommendation Systems. (arXiv:1908.06967v1 [cs.CR])
With the development of information technology and the Internet, recommendation systems have become an important means to solve the problem...

A Novel Kalman Filter Based Shilling Attack Detection Algorithm. (arXiv:1908.06968v1 [cs.CR])
Collaborative filtering has been widely used in recommendation systems to recommend items that users might like. However, collaborative filtering based...

Music Transcription Based on Bayesian Piece-Specific Score Models Capturing Repetitions. (arXiv:1908.06969v1 [cs.SD])
Most work on models for music transcription has focused on describing local sequential dependence of notes in musical scores and...

Agent-based (BDI) modeling for automation of penetration testing. (arXiv:1908.06970v1 [cs.CR])
Penetration testing (or pentesting) is one of the widely used and important methodologies to assess the security of computer systems...

ChainNet: Learning on Blockchain Graphs with Topological Features. (arXiv:1908.06971v1 [cs.LG])
With emergence of blockchain technologies and the associated cryptocurrencies, such as Bitcoin, understanding network dynamics behind Blockchain graphs has become...

PrivFT: Private and Fast Text Classification with Homomorphic Encryption. (arXiv:1908.06972v1 [cs.CR])
Privacy and security have increasingly become a concern for computing services in recent years. In this work, we present an...

Reinforcement Learning Applications. (arXiv:1908.06973v1 [cs.LG])
We start with a brief introduction to reinforcement learning (RL), about its successful stories, basics, an example, issues, the ICML...

Filletting Quador Lattice Structures. (arXiv:1908.06974v1 [cs.GR])
Gupta et al. [1, 2] describe a very beautiful application of algebraic geometry to lattice structures composed of quadric of...

A survey on intrinsic motivation in reinforcement learning. (arXiv:1908.06976v1 [cs.LG])
Despite numerous research work in reinforcement learning (RL) and the recent successes obtained by combining it with deep learning, deep...

Joint Embedding of 3D Scan and CAD Objects. (arXiv:1908.06989v1 [cs.CV])
3D scan geometry and CAD models often contain complementary information towards understanding environments, which could be leveraged through establishing a...

Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries. (arXiv:1908.07000v1 [cs.CR])
In a black-box setting, the adversary only has API access to the target model and each query is expensive. Prior...

On Regularization Properties of Artificial Datasets for Deep Learning. (arXiv:1908.07005v1 [cs.LG])
The paper discusses regularization properties of artificial data for deep learning. Artificial datasets allow to train neural networks in the...

Boundless: Generative Adversarial Networks for Image Extension. (arXiv:1908.07007v1 [cs.CV])
Image extension models have broad applications in image editing, computational photography and computer graphics. While image inpainting has been extensively...

Learning Fair Classifiers in Online Stochastic Settings. (arXiv:1908.07009v1 [cs.LG])
In many real life situations, including job and loan applications, gatekeepers must make justified, real-time decisions about a person's fitness...

The Natural Selection of Words: Finding the Features of Fitness. (arXiv:1908.07013v1 [cs.CL])
We introduce a dataset for studying the evolution of words, constructed from WordNet and the Google Books Ngram Corpus. The...

The Topological Complexity of Spaces of Digital Jordan Curves. (arXiv:1908.07015v1 [math.AT])
This research is motivated by studying image processing algorithms through a topological lens. The images we focus on here are...


Source: RSS news feeds for arXiv updates