**Paranom: A Parallel Anomaly Dataset Generator**

**Greenhouse: A Zero-Positive Machine Learning System for Time-Series Anomaly Detection**

**Precision and Recall for Range-Based Anomaly Detection**

**Multivariate Bayesian Structural Time Series Model**

**BigRoots: An Effective Approach for Root-cause Analysis of Stragglers in Big Data System**

**Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications**

**‘Robust-squared’ Imputation Models Using BART**

**Adaptive Graph Convolutional Neural Networks**

**eCommerceGAN : A Generative Adversarial Network for E-commerce**

**Expected Policy Gradients for Reinforcement Learning**

**Reasoning about Unforeseen Possibilities During Policy Learning**

**A Polynomial Algorithm for Balanced Clustering via Graph Partitioning**

**Blessing of dimensionality: mathematical foundations of the statistical physics of data**

**Net2Vec: Quantifying and Explaining how Concepts are Encoded by Filters in Deep Neural Networks**

• Existence and continuity of solution trajectories of generalized equations with application in electronics

• A detailed treatment of Doob’s theorem

• Recognizing Material Properties from Images

• Robust Propensity Score Computation Method based on Machine Learning with Label-corrupted Data

• Convergence Analysis of Gradient Descent Algorithms with Proportional Updates

• Deep In-GPU Experience Replay

• Comparing heterogeneous entities using artificial neural networks of trainable weighted structural components and machine-learned activation functions

• Visual and Semantic Knowledge Transfer for Large Scale Semi-supervised Object Detection

• Moments in Time Dataset: one million videos for event understanding

• A New Coding Paradigm for the Primitive Relay Channel

• A Formalization of Kant’s Second Formulation of the Categorical Imperative

• $\mathcal{NP}$-Completeness and Inapproximability of the Virtual Network Embedding Problem and Its Variants

• Sufficient Conditions for the Tightness of Shannon’s Capacity Bounds for Two-Way Channels

• Algebraic differential formulas for the shuffle, stuffle and duality relations of iterated integrals

• Optimal Allocation of Series FACTS Devices in Large Scale Systems

• A Benchmark for Breast Ultrasound Image Segmentation (BUSIS)

• Known Boundary Emulation of Complex Computer Models

• A note on strict functional covariate overlap in causal inference problems with high-dimensional covariates

• Measure-valued spline curves: an optimal transport viewpoint

• Risk-Averse Matchings over Uncertain Graph Databases

• The Hypothesis About Expansion of Multiple Stratonovich Stochastic Integrals of Arbitrary Multiplicity

• An Entropy Lower Bound for Non-Malleable Extractors

• Stochastic global maximum principle for general mean-field forward backward control systems with jumps

• Many-Body Localization in a finite-range Sachdev-Ye-Kitaev model

• Fano Resonances in Flat Band Networks

• A counterexample to De Pierro’s conjecture on the convergence of under-relaxed cyclic projections

• Reduced critical processes for small populations

• Replica symmetry breaking in trajectory space for diffusion in logarithmically correlated random potentials

• FWLBP: A Scale Invariant Descriptor for Texture Classification

• Supervised and Unsupervised Tumor Characterization in the Deep Learning Era

• Eliciting Worker Preference for Task Completion

• Combating Error Propagation in Window Decoding of Braided Convolutional Codes

• Symmetry reduction for dynamic programming

• Generalized Linear Models with Linear Constraints for Microbiome Compositional Data

• Instance Map based Image Synthesis with a Denoising Generative Adversarial Network

• FPT algorithms for embedding into low complexity graphic metrics

• When Exploiting Individual User Preference Is Beneficial for Caching at Base Stations?

• Translating Pro-Drop Languages with Reconstruction Models

• Exploiting structure of chance constrained programs via submodularity

• Asymptotically Optimal Scheduling Algorithm for Compute-and-Forward

• More Adaptive Algorithms for Adversarial Bandits

• Improved Time of Arrival measurement model for non-convex optimization

• Single-photon quantum filtering with multiple measurements

• Markovian tricks for non-Markovian tree: contour processes, extinction and scaling limits

• A Composition Theorem via Conflict Complexity

• Convergence of Pascal-Like Triangles in Parry-Bertrand Numeration Systems

• Simultaneous Tensor Completion and Denoising by Noise Inequality Constrained Convex Optimization

• Shapley effects for sensitivity analysis with dependent inputs: bootstrap and kriging-based algorithms

• Probabilistic performance estimators for computational chemistry methods: the empirical cumulative distribution function of absolute errors

• On minimal actions of countable groups

• No eigenvalues outside the limiting support of the spectral distribution of general sample covariance matrices

• Weakly Supervised One-Shot Detection with Attention Siamese Networks

• Gaussian fluctuations for linear spectral statistics of Wigner beta ensembles

• Applications of deep learning to relativistic hydrodynamics

• BSDE formulation of combined regular and singular stochastic control problems

• Distribution of the absolute indicator of random Boolean functions

• Fooling End-to-end Speaker Verification by Adversarial Examples

• The critical 1-arm exponent for the ferromagnetic Ising model on the Bethe lattice

• Optimal functional supervised classification with separation condition

• Statistical Blockage Modeling and Robustness of Beamforming in Millimeter Wave Systems

• Side Disks of a Spherical Great Polygon

• Mean-field backward stochastic differential equations and applications

• A triple comparison between anticipating stochastic integrals in financial modeling

• Planning with Pixels in (Almost) Real Time

• Axiomatizations of inconsistency indices for triads

• Multicanonical Sampling of the Space of States of H(2,n)-Vector Models

• Mean-Field Delayed BSDEs with Jumps

• Effects of heterogeneous social interactions on flocking dynamics

• Data-driven forecasting of solar irradiance

• On Maximally Recoverable Codes for Product Topologies

• Asymptotics of the density of parabolic Anderson random fields

• Characterizing subclasses of cover-incomparability graphs by forbidden subposets

• Age of Information: Whittle Index for Scheduling Stochastic Arrivals

• A Smoothed Analysis of the Greedy Algorithm for the Linear Contextual Bandit Problem

• Inferring a Third Spatial Dimension from 2D Histological Images

• On the determinants and permanents of matrices with restricted entries over prime fields

• Approximation beats concentration? An approximation view on inference with smooth radial kernels

• A class of $L_1$-to-$L_1$ and $L_\infty$-to-$L_\infty$ interval observers for (delayed) Markov jump linear systems

• Unsupervised Real-to-Virtual Domain Unification for End-to-End Highway Driving

• Sequential decomposition of dynamic games with asymmetric information and dependent states

• MilkQA: a Dataset of Consumer Questions for the Task of Answer Selection

• Online Maximum Matching with Recourse

• Stability analysis and state-feedback control of LPV systems with piecewise constant parameters subject to spontaneous Poissonian jumps

• Strong existence and uniqueness for stable stochastic differential equations with distributional drift

• Gaussian Latent Factor Analysis under Graphical Constraints

• Buying Online – A Characterization of Rational Buying Procedures

• Focus: Querying Large Video Datasets with Low Latency and Low Cost

• On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT