Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
CSUNet: Contour-Sensitive Underwater Salient Object Detection
MMAsia '24: Proceedings of the 6th ACM International Conference on Multimedia in AsiaArticle No.: 78, Pages 1–7https://doi.org/10.1145/3696409.3700239Underwater Salient Object Detection (USOD) has gradually garnered attention because of its wide range of applications in underwater environments. However, the complexity of underwater conditions often results in poor performance in preserving contour ...
- ArticleNovember 2024
CodeMosaic Patch: Physical Adversarial Attacks Against Infrared Aerial Object Detectors
PRICAI 2024: Trends in Artificial IntelligencePages 54–68https://doi.org/10.1007/978-981-96-0116-5_5AbstractIn recent years, drones illegally spy on military bases and steal military secrets, especially in dark scenes. In the face of illegal detection by drones, physical infrared adversarial patches can play a defensive role. Existing methods are either ...
- research-articleNovember 2024
Temporal Knowledge Graph Reasoning With Dynamic Memory Enhancement
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 36, Issue 11Pages 7115–7128https://doi.org/10.1109/TKDE.2024.3390683Temporal Knowledge Graph (TKG) reasoning involves predicting future facts based on historical information by learning correlations between entities and relations. Recently, many models have been proposed for the TKG reasoning task. However, most existing ...
- research-articleNovember 2024
An approximation to peak detection power using Gaussian random field theory
Journal of Multivariate Analysis (JMUL), Volume 204, Issue Chttps://doi.org/10.1016/j.jmva.2024.105346AbstractWe study power approximation formulas for peak detection using Gaussian random field theory. The approximation, based on the expected number of local maxima above the threshold u, E [ M u ], is proved to work well under three asymptotic scenarios:...
- research-articleOctober 2024
XFashion: Character Animation Generation via Facial-enhanced and Granularly Controlling
HCMA'24: Proceedings of the 5th International Workshop on Human-centric Multimedia AnalysisPages 7–12https://doi.org/10.1145/3688865.3689480Recent research has achieved advancements in animated fashion video synthesis. However, existing methods generate videos only with the guidance of poses, thus resulting in the generated characters appearing stiff and the expressions becoming monotonous. ...
-
- introductionOctober 2024
The ACM Multimedia 2024 Viual Spatial Description Grand Challenge
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 11404–11406https://doi.org/10.1145/3664647.3688989The Visual Spatial Description Challenge (VSD) is the first competition event focused on visual spatial understanding, organized under the auspices of the ACM Multimedia Conference 2024. The goal of the VSD challenge is to assess the the ability of ...
- research-articleOctober 2024
SpeechEE: A Novel Benchmark for Speech Event Extraction
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 10449–10458https://doi.org/10.1145/3664647.3680669Event extraction (EE) is a critical direction in the field of information extraction, laying an important foundation for the construction of structured knowledge bases. EE from text has received ample research and attention for years, yet there can be ...
- research-articleOctober 2024
Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection?
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 1732–1744https://doi.org/10.1145/3691620.3695539Vulnerability detection is garnering increasing attention in software engineering, since code vulnerabilities possibly pose significant security. Recently, reusing various code pre-trained models (e.g., CodeBERT, CodeT5, and CodeGen) has become common ...
- short-paperOctober 2024
MODRL-TA: A Multi-Objective Deep Reinforcement Learning Framework for Traffic Allocation in E-Commerce Search
- Peng Cheng,
- Huimu Wang,
- Jinyuan Zhao,
- Yihao Wang,
- Enqiang Xu,
- Yu Zhao,
- Zhuojian Xiao,
- Songlin Wang,
- Guoyu Tang,
- Lin Liu,
- Sulong Xu
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementPages 3694–3698https://doi.org/10.1145/3627673.3679964Traffic allocation is a process of redistributing natural traffic to products by adjusting their positions in the post-search phase, aimed at effectively fostering merchant growth, precisely meeting customer demands, and ensuring the maximization of ...
- ArticleSeptember 2024
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks
AbstractTrusted Execution Environments (TEEs) have long served as a prominent security measure for ensuring isolation and data privacy in cloud environments. However, their security foundations face challenges from numerous side-channel threats, ...
- research-articleSeptember 2024
Estimating Malmquist-type indices with StoNED
Expert Systems with Applications: An International Journal (EXWA), Volume 250, Issue Chttps://doi.org/10.1016/j.eswa.2024.123877AbstractThe Malmquist index constructed from distance functions is a useful tool for measuring productivity growth. In this paper, we assume the presence of random noise in empirical data and enhance the literature by introducing a panel-data model in ...
Highlights- We propose a stochastic nonparametric estimation of the Malmquist-type indices.
- We establish a consistent estimator for measuring intertemporal efficiencies.
- The proposed approach measures productivity changes under noise.
- The ...
- research-articleSeptember 2024
Feedback-Driven Automated Whole Bug Report Reproduction for Android Apps
- Dingbang Wang,
- Yu Zhao,
- Sidong Feng,
- Zhaoxu Zhang,
- William G. J. Halfond,
- Chunyang Chen,
- Xiaoxia Sun,
- Jiangfan Shi,
- Tingting Yu
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1048–1060https://doi.org/10.1145/3650212.3680341In software development, bug report reproduction is a challenging task. This paper introduces ReBL, a novel feedback-driven approach that leverages GPT-4, a large-scale language model (LLM), to automatically reproduce Android bug reports. Unlike ...
- research-articleSeptember 2024
MAFT-SO: A novel multi-atlas fusion template based on spatial overlap for ASD diagnosis
Journal of Biomedical Informatics (JOBI), Volume 157, Issue Chttps://doi.org/10.1016/j.jbi.2024.104714Graphical abstractDisplay Omitted
AbstractAutism spectrum disorder (ASD) is a common neurological condition. Early diagnosis and treatment are essential for enhancing the life quality of individuals with ASD. However, most existing studies either focus solely on the brain networks of ...
- research-articleAugust 2024
Representation Learning of Temporal Graphs with Structural Roles
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 654–665https://doi.org/10.1145/3637528.3671854Temporal graph representation learning has drawn considerable attention in recent years. Most existing works mainly focus on modeling local structural dependencies of temporal graphs. However, underestimating the inherent global structural role ...
- research-articleNovember 2024
Research on breast ultrasound image segmentation method based on deep learning
IoTML '24: Proceedings of the 2024 4th International Conference on Internet of Things and Machine LearningPages 189–194https://doi.org/10.1145/3697467.3697637In the medical image segmentation task, many studies choose to increase the network depth to achieve higher detection accuracy, but the network parameters of the deep convolutional neural network are too large, and the number of medical images is very ...
- research-articleJuly 2024
ESIE-BERT: Enriching sub-words information explicitly with BERT for intent classification and slot filling
- Yu Guo,
- Zhilong Xie,
- Xingyan Chen,
- Huangen Chen,
- Leilei Wang,
- Huaming Du,
- Shaopeng Wei,
- Yu Zhao,
- Qing Li,
- Gang Wu
AbstractNatural language understanding (NLU) has two core tasks: intent classification and slot filling. The success of pre-training language models resulted in a significant breakthrough in the two tasks. The architecture based on autoencoding (BERT-...
- research-articleOctober 2024
Integrating Entities in Text Summarization: A Review
ICCBD '24: Proceedings of the 2024 International Conference on Cloud Computing and Big DataPages 521–528https://doi.org/10.1145/3695080.3695170Advancements in pretrained and large language models have significantly propelled the development of text summarization in recent years, making the generation of fluent and readable text possible. However, issues related to factuality, faithfulness, and ...
- research-articleJuly 2024
StableMask: refining causal masking in decoder-only transformer
ICML'24: Proceedings of the 41st International Conference on Machine LearningArticle No.: 2354, Pages 57033–57052The decoder-only Transformer architecture with causal masking and relative position encoding (RPE) has become the de facto choice in language modeling. Despite its exceptional performance across various tasks, we have identified two limitations: First, ...
- research-articleJuly 2024
Knowledge-aware reinforced language models for protein directed evolution
- Yuhao Wang,
- Qiang Zhang,
- Ming Qin,
- Xiang Zhuang,
- Xiaotong Li,
- Zhichen Gong,
- Zeyuan Wang,
- Yu Zhao,
- Jianhua Yao,
- Keyan Ding,
- Huajun Chen
ICML'24: Proceedings of the 41st International Conference on Machine LearningArticle No.: 2141, Pages 52260–52273Directed evolution, a cornerstone of protein optimization, is to harness natural mutational processes to enhance protein functionality. Existing Machine Learning-assisted Directed Evolution (MLDE) methodologies typically rely on data-driven strategies ...
- research-articleJuly 2024
Contrast then Memorize: Semantic Neighbor Retrieval-Enhanced Inductive Multimodal Knowledge Graph Completion
SIGIR '24: Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information RetrievalPages 102–111https://doi.org/10.1145/3626772.3657838A large number of studies have emerged for Multimodal Knowledge Graph Completion (MKGC) to predict the missing links in MKGs. However, fewer studies have been proposed to study the inductive MKGC (IMKGC) involving emerging entities unseen during training...