Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
GameTrail: Probabilistic Lifecycle Process Model for Deep Game Understanding
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementPages 994–1003https://doi.org/10.1145/3627673.3679736As the mobile gaming market experiences significant growth, there is a continuous emergence of new gaming products such as premium games and video mini-games. Meeting their marketing needs and supporting their business growth is essential for long-term ...
- research-articleOctober 2024
Utilizing Non-click Samples via Semi-supervised Learning for Conversion Rate Prediction
RecSys '24: Proceedings of the 18th ACM Conference on Recommender SystemsPages 350–359https://doi.org/10.1145/3640457.3688151Conversion rate (CVR) prediction is essential in recommender systems, facilitating precise matching between recommended items and users’ preferences. However, the sample selection bias (SSB) and data sparsity (DS) issues pose challenges to accurate ...
- ArticleNovember 2024
- research-articleJuly 2024
fVDB : A Deep-Learning Framework for Sparse, Large Scale, and High Performance Spatial Intelligence
- Francis Williams,
- Jiahui Huang,
- Jonathan Swartz,
- Gergely Klar,
- Vijay Thakkar,
- Matthew Cong,
- Xuanchi Ren,
- Ruilong Li,
- Clement Fuji-Tsang,
- Sanja Fidler,
- Eftychios Sifakis,
- Ken Museth
ACM Transactions on Graphics (TOG), Volume 43, Issue 4Article No.: 133, Pages 1–15https://doi.org/10.1145/3658226We present fVDB, a novel GPU-optimized framework for deep learning on large-scale 3D data. fVDB provides a complete set of differentiable primitives to build deep learning architectures for common tasks in 3D learning such as convolution, pooling, ...
- research-articleJuly 2024
A secure and efficient UAV network defense strategy: Convergence of blockchain and deep learning
AbstractUnmanned Aerial Vehicles (UAVs) are highly versatile and efficient tools utilized across diverse industries for data collection. However, they are vulnerable to wireless communication and data exchange risks, including unauthorized access, data ...
Highlights- A secure UAV network architecture incorporating blockchain and machine learning.
- A UAV identity management module grounded in blockchain and encryption algorithms.
- A real-time security situational awareness system for UAV cluster ...
-
- research-articleJanuary 2024
A Deep Spatiotemporal Trajectory Representation Learning Framework for Clustering
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 7Pages 7687–7700https://doi.org/10.1109/TITS.2024.3350339Learning trajectory representations is essential in many Location Based Services (LBS) applications. Most traditional methods extract trajectory representations based on manually defined features, while deep learning-based methods can reduce part of the ...
- research-articleNovember 2023
Efficient and Privacy-Preserving Feature Importance-Based Vertical Federated Learning
IEEE Transactions on Mobile Computing (ITMV), Volume 23, Issue 6Pages 7238–7255https://doi.org/10.1109/TMC.2023.3333879Vertical Federated Learning (VFL) enables multiple data owners, each holding a different subset of features about a largely overlapping set of data samples, to collaboratively train a global model. The quality of data owners’ local features affects ...
- research-articleJuly 2023
Identifying acute kidney injury subphenotypes using an outcome-driven deep-learning approach
- Yongsen Tan,
- Jiahui Huang,
- Jinhu Zhuang,
- Haofan Huang,
- Song Jiang,
- Miaowen She,
- Mu Tian,
- Yong Liu,
- Xiaxia Yu
Journal of Biomedical Informatics (JOBI), Volume 143, Issue Chttps://doi.org/10.1016/j.jbi.2023.104393Graphical abstractDisplay Omitted
Abstract ObjectiveAcute kidney injury (AKI), a common condition on the intensive-care unit (ICU), is characterized by an abrupt decrease in kidney function within a few hours or days, leading to kidney failure or damage. Although AKI is associated with ...
- research-articleMay 2023
Smart contract watermarking based on code obfuscation
Information Sciences: an International Journal (ISCI), Volume 628, Issue CPages 439–448https://doi.org/10.1016/j.ins.2023.01.126AbstractMost blockchains are entirely open-source software. This gives auditors ability to review the security of cryptocurrencies such as Bitcoin. Because only after the source code of the cryptocurrency has been publicly audited by the market, users ...
- research-articleApril 2023
Real-Time Globally Consistent 3D Reconstruction With Semantic Priors
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 29, Issue 4Pages 1977–1991https://doi.org/10.1109/TVCG.2021.3137912Maintaining global consistency continues to be critical for online 3D indoor scene reconstruction. However, it is still challenging to generate satisfactory 3D reconstruction in terms of global consistency for previous approaches using purely geometric ...
- research-articleJanuary 2023
HADPoS: Improvement of DPoS Consensus Mechanism Based on Heat Attenuation
IT Professional (IEEECS_ITPRO), Volume 25, Issue 1Pages 40–51https://doi.org/10.1109/MITP.2022.3225429Blockchain was known by Satoshi Nakamoto in 2008 because of bitcoin. After more than a decade of development, blockchain has been widely applied in medical, digital finance, and electronic evidence, and others. At present, there are dozens of different ...
- research-articleDecember 2022
zkChain: A privacy‐preserving model based on zk‐SNARKs and hash chain for efficient transfer of assets
Transactions on Emerging Telecommunications Technologies (TETT), Volume 35, Issue 4https://doi.org/10.1002/ett.4709AbstractAs a distributed public ledger technology in a peer‐to‐peer network, blockchain has been widely used in a variety of Internet interaction systems in recent years, such as market supervision, property rights protection, and digital identity. ...
We present a privacy‐preserving model based on zk‐SNARKs and hash chain for efficient exchange of digital assets. The comprehensive experimental results show the practicality of zkChain. image image
- ArticleJanuary 2023
zkChain: An Efficient Blockchain Privacy Protection Scheme Based on zk-SNARKs
AbstractAs a distributed public ledger technology in a peer-to-peer network, blockchain has been significantly adopted in a variety of Internet interaction systems in the past few years, such as market supervision, copyright protection, digital identity, ...
- research-articleNovember 2022
A Neural Galerkin Solver for Accurate Surface Reconstruction
ACM Transactions on Graphics (TOG), Volume 41, Issue 6Article No.: 229, Pages 1–16https://doi.org/10.1145/3550454.3555457To reconstruct meshes from the widely-available 3D point cloud data, implicit shape representation is among the primary choices as an intermediate form due to its superior representation power and robustness in topological optimizations. Although ...
- ArticleOctober 2022
Dynamic 3D Scene Analysis by Point Cloud Accumulation
AbstractMulti-beam LiDAR sensors, as used on autonomous vehicles and mobile robots, acquire sequences of 3D range scans (“frames”). Each frame covers the scene sparsely, due to limited angular scanning resolution and occlusion. The sparsity restricts the ...
- ArticleOctober 2022
CIRCLE: Convolutional Implicit Reconstruction and Completion for Large-Scale Indoor Scene
AbstractWe present CIRCLE, a framework for large-scale scene completion and geometric refinement based on local implicit signed distance functions. It is based on an end-to-end sparse convolutional network, CircNet, which jointly models local geometric ...
- ArticleOctober 2022
Layered Controllable Video Generation
AbstractWe introduce layered controllable video generation, where we, without any supervision, decompose the initial frame of a video into foreground and background layers, with which the user can control the video generation process by simply ...
- research-articleJune 2022
CRFL: A novel federated learning scheme of client reputation assessment via local model inversion
International Journal of Intelligent Systems (IJIS), Volume 37, Issue 8Pages 5457–5471https://doi.org/10.1002/int.22914AbstractFederated learning (FL) is gradually becoming a key learning paradigm in Privacy‐preserving Machine Learning (ML) systems. In FL, a large number of clients cooperate with a central server to learn a shared model without sharing their own data ...
- research-articleJune 2022
Research on nuclear power fault location method based on info-flow SDG model
EPCE '22: Proceedings of the Asia Conference on Electrical, Power and Computer EngineeringArticle No.: 31, Pages 1–8https://doi.org/10.1145/3529299.3530222Rapid and accurate diagnosis of nuclear accident is the primary link of nuclear emergency. Signed directed graph SDG has good completeness as a common method for fault diagnosis, but the traditional SDG model has low diagnosis efficiency. As a ...
- research-articleMarch 2022
Subdivision-based Mesh Convolution Networks
ACM Transactions on Graphics (TOG), Volume 41, Issue 3Article No.: 25, Pages 1–16https://doi.org/10.1145/3506694Convolutionalneural networks (CNNs) have made great breakthroughs in two-dimensional (2D) computer vision. However, their irregular structure makes it hard to harness the potential of CNNs directly on meshes. A subdivision surface provides a hierarchical ...