**A Bayesian Covariance Graphical And Latent Position Model For Multivariate Financial Time Series**

**Adversarial Examples: Attacks and Defenses for Deep Learning**

**MEBoost: Mixing Estimators with Boosting for Imbalanced Data Classification**

**Accurate Inference for Adaptive Linear Models**

**Approximate Correlation Clustering Using Same-Cluster Queries**

**Any-gram Kernels for Sentence Classification: A Sentiment Analysis Case Study**

**Privacy-Preserving Adversarial Networks**

**Snake: a Stochastic Proximal Gradient Algorithm for Regularized Problems over Large Graphs**

**On Data-Dependent Random Features for Improved Generalization in Supervised Learning**

• A matched filter approach for blind joint detection of galaxy clusters in X-ray and SZ surveys

• Network-complement transitions, symmetries, and cluster synchronization

• Activity and Circadian Rhythm of Sepsis Patients in the Intensive Care Unit

• Fast permutation tests and related methods, for association between rare variants and binary outcomes

• When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time

• Objects that Sound

• Supremum estimates for degenerate, quasilinear stochastic partial differential equations

• Towards the Augmented Pathologist: Challenges of Explainable-AI in Digital Pathology

• Stable Optimal Control and Semicontractive Dynamic Programming

• word representation or word embedding in Persian text

• DecideNet: Counting Varying Density Crowds Through Attention Guided Detection and Density Estimation

• Synthesizing Novel Pairs of Image and Text

• A Partial Entropic Lattice Boltzmann MHD Simulation of the Orszag-Tang Vortex

• A General Technique for Non-blocking Trees

• Pragmatic Primitives for Non-blocking Data Structures

• Experimental Evaluation of Counting Subgraph Isomorphisms in Classes of Bounded Expansion

• Fast Algorithms for Delta-Separated Sparsity Projection

• No truthful mechanism can be better than $n$ approximate for two natural problems

• Game-Theoretic Electric Vehicle Charging Management Resilient to Non-Ideal User Behavior

• Deformable Classifiers

• Statistical Properties of the Keyboard Design with Extension to Drug-Combination Trials

• A multi-criteria approach to approximate solution of multiple-choice knapsack problem

• PixelBNN: Augmenting the PixelCNN with batch normalization and the presentation of a fast architecture for retinal vessel segmentation

• High dimensional Single Index Bayesian Modeling of the Brain Atrophy over time

• Efficient Algorithms for Searching the Minimum Information Partition in Integrated Information Theory

• Joint Maximum Likelihood Estimation for High-dimensional Exploratory Item Response Analysis

• Exploiting Tradeoff Between Transmission Diversity and Content Diversity in Multi-Cell Edge Caching

• HotFlip: White-Box Adversarial Examples for NLP

• Neighbors Do Help: Deeply Exploiting Local Structures of Point Clouds

• MovieGraphs: Towards Understanding Human-Centric Situations from Videos

• A tight lower bound for an online hypercube packing problem and bounds for prices of anarchy of a related game

• Learning Representations from Road Network for End-to-End Urban Growth Simulation

• Tracking objects using 3D object proposals

• Efficient implementations of the Multivariate Decomposition Method for approximating infinite-variate integrals

• A remark on ‘Robust machine learning by median-of-means’

• Docker-Enabled Build and Execution Environment (BEE): an Encapsulated Environment Enabling HPC Applications Running Everywhere

• Two-dimensional Anti-jamming Mobile Communication Based on Reinforcement Learning

• Downlink macro-diversity precoding-aided spatial modulation

• Disorder-Type-Dependent Localization Anomalies in Pseudospin-1 Systems

• Estimation of Individual Micro Data from Aggregated Open Data

• Electrifying the Urban Taxi Fleet: A Data-driven Approach

• Asymptotic Coupling and Its Applications in Information Theory

• Minimax spectral radius and stabilizability of discrete-time linear switching control systems

• The Edge-Wiener Index and the Edge-Hyper-Wiener Index of Phenylenes

• Hierarchical Cross Network for Person Re-identification

• Single Image Deraining using Scale-Aware Multi-Stage Recurrent Network

• Flexible Stereo: Constrained, Non-rigid, Wide-baseline Stereo Vision for Fixed-wing Aerial Platforms

• On Fan-Crossing Graphs

• Graphons, permutons and the Thoma simplex: three mod-Gaussian moduli spaces

• Dimension of nonbinary antiprimitive BCH codes

• MUDA: A Truthful Multi-Unit Double-Auction Mechanism

• Subword and Crossword Units for CTC Acoustic Models

• End-to-end weakly-supervised semantic alignment

• The Error Probability of Sparse Superposition Codes with Approximate Message Passing Decoding

• Heinrich Behmann’s Contributions to Second-Order Quantifier Elimination from the View of Computational Logic

• The Stein Characterization of $M$-Wright Distributions

• Effects of update rules on networked N-player trust game dynamics

• Analogy Mining for Specific Design Needs

• Comparison of fingerprint authentication algorithms for small imaging sensors

• Uplink Sounding Reference Signal Coordination to Combat Pilot Contamination in 5G Massive MIMO

• Many-body localization in the Fock space of natural orbitals

• Wider contours and adaptive contours

• Learning Fixation Point Strategy for Object Detection and Classification

• On the Evaluation of Video Keyframe Summaries using User Ground Truth

• SNR Wall for Cooperative Spectrum Sensing Using Generalized Energy Detector

• Quasi-Cyclic Constructions of Quantum Codes

• Cross-language Framework for Word Recognition and Spotting of Indic Scripts

• ComboGAN: Unrestrained Scalability for Image Domain Translation

• Bipartite Graph Matching for Keyframe Summary Evaluation

• Passive ans Active Observation: Experimetal Design Issues in Big Data

• A Production Oriented Approach for Vandalism Detection in Wikidata – The Buffaloberry Vandalism Detector at WSDM Cup 2017

• Large-Scale Vandalism Detection with Linear Classifiers – The Conkerberry Vandalism Detector at WSDM Cup 2017

• Ensemble Models for Detecting Wikidata Vandalism with Stacking – Team Honeyberry Vandalism Detector at WSDM Cup 2017

• Wikidata Vandalism Detection – The Loganberry Vandalism Detector at WSDM Cup 2017

• Safe Policy Improvement with Baseline Bootstrapping

• Scale-Space Anisotropic Total Variation for Limited Angle Tomography

• Mining Smart Card Data for Travelers’ Mini Activities

• Bayesian Latent-Normal Inference for the Rank Sum Test, the Signed Rank Test, and Spearman’s $ρ$

• Methodological and computational aspects of parallel tempering methods in the infinite swapping limit

• Unsupervised Word Mapping Using Structural Similarities in Monolingual Embeddings

• Scattering diagrams and scattering fans

• Enumerating maximal cliques in link streams with durations

• Nonparametric MANOVA in Mann-Whitney effects

• A Faster Drop-in Implementation for Depth-wise Exact Greedy Induction of Decision Tree Using Pre-sorted Deque

• Fractional Elliptic Quasi-Variational Inequalities: Theory and Numerics

• Bilinear residual Neural Network for the identification and forecasting of dynamical systems

• On Sundaram’s full bijection

• Connection probabilities in the Poisson Miller-Abrahams random resistor network and other Poisson random graphs with bounded edges

• Automatic Renal Segmentation in DCE-MRI using Convolutional Neural Networks

• Homomorphism thresholds for odd cycles

• The NarrativeQA Reading Comprehension Challenge

• The cavity approach for Steiner trees Packing problems

• Pafnucy — A deep neural network for structure-based drug discovery

• PAPR Reduction of OFDM Through Pilot Shifting

• On dominating set polyhedra of circular interval graphs

• A Decoding Algorithm for Rank Metric Codes

• Covert Wireless Communication with a Poisson Field of Interferers

• Generalized Turán problems for disjoint copies of graphs

• Tables, bounds and graphics of short linear codes with covering radius 3 and codimension 4 and 5

• Generalized Turán problems for even cycles

• Column Generation for Interaction Coverage in Combinatorial Software Testing

• Operator-scaling Gaussian random fields via aggregation

• A Reinforcement-Learning Approach to Proactive Caching in Wireless Networks

• Transversals of Longest Paths

• A Collection of Lower Bounds for Online Matching on the Line

• Improving End-to-End Speech Recognition with Policy Learning

• Exploring High-Dimensional Structure via Axis-Aligned Decomposition of Linear Projections

• Improved Regularization Techniques for End-to-End Speech Recognition

• Generalizations of Edge Overlap to Weighted and Directed Networks

• Query-Efficient Black-box Adversarial Examples