![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
159 Result(s)
-
Chapter and Conference Paper
LSN: Long-Term Spatio-Temporal Network for Video Recognition
Although recurrent neural networks (RNNs) are widely leveraged to process temporal or sequential data, they have attracted too little attention in current video action recognition applications. Therefore, this...
-
Chapter and Conference Paper
A Dynamic QoS Routing Mechanism for Deep Space Network Based on SDN Architecture
Some characteristics of deep space communication network are well known, such as nodes limited resources, long communication delay and nearly no guarantee for the transmission quality, this paper proposes a dy...
-
Chapter and Conference Paper
Efficient Dual-Process Cognitive Recommender Balancing Accuracy and Diversity
In this paper, we propose a dual-process cognitive recommendation system for sequential recommendations. The framework includes an intuitive representation module (System 1) and an inference module (System 2)....
-
Chapter and Conference Paper
KCUBE: A Knowledge Graph University Curriculum Framework for Student Advising and Career Planning
Knowledge representations and interactions are at the forefront of teaching, learning, and career planning activities in all endeavors of education and career development. University students are increasingly ...
-
Chapter and Conference Paper
SEIHAI: A Sample-Efficient Hierarchical AI for the MineRL Competition
The MineRL competition is designed for the development of reinforcement learning and imitation learning algorithms that can efficiently leverage human demonstrations to drastically reduce the number of environ...
-
Chapter and Conference Paper
You Already Have It: A Generator-Free Low-Precision DNN Training Framework Using Stochastic Rounding
Stochastic rounding is a critical technique used in low-precision deep neural networks (DNNs) training to ensure good model accuracy. However, it requires a large number of random numbers generated on the fly....
-
Chapter and Conference Paper
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator
Public-key cryptography, including conventional cryptosystems and post-quantum cryptography, involves computation-intensive workloads. With noticing the extraordinary computing power of AI accelerators, in thi...
-
Chapter and Conference Paper
CLOSE: Curriculum Learning on the Sharing Extent Towards Better One-Shot NAS
One-shot Neural Architecture Search (NAS) has been widely used to discover architectures due to its efficiency. However, previous studies reveal that one-shot performance estimations of architectures might not...
-
Chapter and Conference Paper
Deep Hierarchical App Recommendation with Dynamic Behaviors
Many app recommendation models have been proposed to provide mobile users with the apps that meet their individual needs. However, three main drawbacks limit their performance: (1) Neglect the dynamic change o...
-
Chapter and Conference Paper
Efficient Generation of Speech Adversarial Examples with Generative Model
Deep neural network-based keyword spotting (KWS) have embraced the tremendous success in smart speech assistant applications. However, the neural network-based KWS have been demonstrated susceptible to be atta...
-
Chapter and Conference Paper
An Efficient Teaching Method for Physiological Basic Course of Online and Offline Integration
High efficiency teaching method of traditional physiology basic course, and students’ interest in learning gray relevance, and online teaching resources utilization rate is low. Therefore, an efficient teachin...
-
Chapter and Conference Paper
VeriDL: Integrity Verification of Outsourced Deep Learning Services
Deep neural networks (DNNs) are prominent due to their superior performance in many fields. The deep-learning-as-a-service (DLaaS) paradigm enables individuals and organizations (clients) to outsource their DN...
-
Chapter and Conference Paper
COVID Edge-Net: Automated COVID-19 Lung Lesion Edge Detection in Chest CT Images
Coronavirus Disease 2019 (COVID-19) has been spreading rapidly, threatening global health. Computer-aided screening on chest computed tomography (CT) images using deep learning, especially, lesion segmentation...
-
Chapter and Conference Paper
Research on In-Vehicle Haptic Interactions as Crucial Resources for Driver Perceptions
Multiple resource theory is currently commonly applied in human–machine interactions in vehicle design. Haptic interaction is a crucial resource for driver perceptions. This paper reviews haptic research relat...
-
Chapter and Conference Paper
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the preimage resistance of many hash functions, including but not limited to the full MD5, HAVAL, and Tiger, and reduced SHA-0/1/2. It...
-
Chapter and Conference Paper
VisDrone-SOT2020: The Vision Meets Drone Single Object Tracking Challenge Results
The Vision Meets Drone (VisDrone2020) Single Object Tracking is the third annual UAV tracking evaluation activity organized by the VisDrone team, in conjunction with European Conference on Computer Vision (ECC...
-
Chapter and Conference Paper
The Eighth Visual Object Tracking VOT2020 Challenge Results
The Visual Object Tracking challenge VOT2020 is the eighth annual tracker benchmarking activity organized by the VOT initiative. Results of 58 trackers are presented; many are state-of-the-art trackers publish...
-
Chapter and Conference Paper
VisDrone-DET2020: The Vision Meets Drone Object Detection in Image Challenge Results
The Vision Meets Drone Object Detection in Image Challenge (VisDrone-DET 2020) is the third annual object detector benchmarking activity. Compared with the previous VisDrone-DET 2018 and VisDrone-DET 2019 chal...
-
Chapter and Conference Paper
Learning Route Planning from Experienced Drivers Using Generalized Value Iteration Network
Traffic congestion has long been a serious problem in cities, and route planning can improve traffic efficiency. The existing route planning approach relies on current and future traffic status. However, becau...
-
Chapter and Conference Paper
Research on Database Anomaly Access Detection Based on User Profile Construction
As a platform for data storage and administration, database contains private and large information, which makes it a target of malicious personnel attacks. To prevent attacks from outsiders, database administr...