**Theoretical Impediments to Machine Learning With Seven Sparks from the Causal Revolution**

**Cost-Sensitive Convolution based Neural Networks for Imbalanced Time-Series Classification**

**Multivariate LSTM-FCNs for Time Series Classification**

**Brain EEG Time Series Selection: A Novel Graph-Based Approach for Classification**

**A Semi-Parametric Binning Approach to Quickest Change Detection**

**Evaluation of Machine Learning Fameworks on Finis Terrae II**

**Some techniques in density estimation**

**Comparative Study on Generative Adversarial Networks**

**Noisy Expectation-Maximization: Applications and Generalizations**

**Multiple Imputation: A Review of Practical and Theoretical Findings**

**MINE: Mutual Information Neural Estimation**

**How Many Samples Required in Big Data Collection: A Differential Message Importance Measure**

**State Variation Mining: On Information Divergence with Message Importance in Big Data**

**MSDNN: Multi-Scale Deep Neural Network for Salient Object Detection**

**Deep Learning for Sampling from Arbitrary Probability Distributions**

**Fairness in Supervised Learning: An Information Theoretic Approach**

**SuperNeurons: Dynamic GPU Memory Management for Training Deep Neural Networks**

**Non-Parametric Transformation Networks**

**DCDistance: A Supervised Text Document Feature extraction based on class labels**

**tau-FPL: Tolerance-Constrained Learning in Linear Time**

**SPIN: A Fast and Scalable Matrix Inversion Method in Apache Spark**

**An Interpretable Reasoning Network for Multi-Relation Question Answering**

**Deep Metric Learning with BIER: Boosting Independent Embeddings Robustly**

**Building a Conversational Agent Overnight with Dialogue Self-Play**

**Cobra: A Framework for Cost Based Rewriting of Database Applications**

• Formal Dependability Modeling and Optimization of Scrubbed-Partitioned TMR for SRAM-based FPGAs

• LDPC Codes with Local and Global Decoding

• Model-Based Action Exploration

• Resolvability on Continuous Alphabets

• Interactive Learning of Acyclic Conditional Preference Networks

• Extremal $G$-free induced subgraphs of Kneser graphs

• Influence of topology in the mobility enhancement of pulse-coupled oscillator synchronization

• Timely Status Update in Massive IoT Systems: Decentralized Scheduling for Wireless Uplinks

• Fully-Coupled Two-Stream Spatiotemporal Networks for Extremely Low Resolution Action Recognition

• A Brain-Inspired Trust Management Model to Assure Security in a Cloud based IoT Framework for Neuroscience Applications

• On the roots of Wiener polynomials of graphs

• Multi-Task Spatiotemporal Neural Networks for Structured Surface Reconstruction

• Average Power and $λ$-power in Multiple Testing Scenarios when the Benjamini-Hochberg False Discovery Rate Procedure is Used

• Noisy Feedback and Loss Unlimited Private Communication

• Efficient C-RAN Random Access for IoT Devices: Learning Links via Recommendation Systems

• Regularly varying non-stationary Galton–Watson processes with immigration

• Minimax Optimality of Sign Test for Paired Heterogeneous Data

• Adaptive Bit Allocation for OFDM Cognitive Radio Systems with Imperfect Channel Estimation

• Enhancing Underwater Imagery using Generative Adversarial Networks

• Non-Rigid Image Registration Using Self-Supervised Fully Convolutional Networks without Training Data

• Brain Age Prediction Based on Resting-State Functional Connectivity Patterns Using Convolutional Neural Networks

• A Hardware-Friendly Algorithm for Scalable Training and Deployment of Dimensionality Reduction Models on FPGA

• On Partially Overlapping Coexistence for Dynamic Spectrum Access in Cognitive Radio

• Spatio-Temporal Pricing for Ridesharing Platforms

• Did William Shakespeare and Thomas Kyd Write Edward III?

• Application of a semantic segmentation convolutional neural network for accurate automatic detection and mapping of solar photovoltaic arrays in aerial imagery

• Cognitive Non-Orthogonal Multiple Access with Cooperative Relaying: A New Wireless Frontier for 5G Spectrum Sharing

• A Simplified Coding Scheme for the Broadcast Channel with Complementary Receiver Side Information under Individual Secrecy Constraints

• Asymptotic Static Hedge via Symmetrization

• Communication Optimality Trade-offs For Distributed Estimation

• A3T: Adversarially Augmented Adversarial Training

• Emergent memory in cell signaling: Persistent adaptive dynamics in cascades can arise from the diversity of relaxation time-scales

• Deep Stereo Matching with Explicit Cost Aggregation Sub-Architecture

• Content Based Status Updates

• Status Updates in a multi-stream M/G/1/1 preemptive queue

• Controller Synthesis for Safety of Physically-Viable Data-Driven Models

• How to augment a small learning set for improving the performances of a CNN-based steganalyzer?

• Optimal control of an evolution equation with non-smooth dissipation

• How should a fixed budget of dwell time be spent in scanning electron microscopy to optimize image quality?

• On notions of Q-independence and Q-identical distributiveness

• Multivariate stochastic delay differential equations and CAR representations of CARMA processes

• Sensitivity indices for independent groups of variables

• Hierarchical Motion Consistency Constraint for Efficient Geometrical Verification in UAV Image Matching

• Exceptional and modern intervals of the Tamari lattice

• Combinatorics of compactified universal Jacobians

• Planning with Trust for Human-Robot Collaboration

• Spatio-Temporal Linkage over Location Enhanced Services

• Generative Single Image Reflection Separation

• Self-Predicting Boolean Functions

• Multiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack

• Active repositioning of storage units in Robotic Mobile Fulfillment Systems

• Perfect codes in generalized Fibonacci cubes

• Couplings in L^p distance of two Brownian motions and their L{é}vy area

• Clinical and Non-clinical Effects on Surgery Duration: Statistical Modeling and Analysis

• On the goodness-of-fit of generalized linear geostatistical models

• A Game Theoretic Approach to Hyperbolic Consensus Problems

• Improved bounds on the multicolor Ramsey numbers of paths and even cycles

• Interpretation of the vibrational spectra of glassy polymers using coarse-grained simulations

• On Partly Overloaded Spreading Sequences with Variable Spreading Factor

• Deep Episodic Memory: Encoding, Recalling, and Predicting Episodic Experiences for Robot Action Execution

• First-passage times over moving boundaries for asymptotically stable walks

• Cosmic String Detection with Tree-Based Machine Learning

• Local asymptotic self-similarity for heavy tailed harmonizable fractional Lévy motions

• Second order models for optimal transport and cubic splines on the Wasserstein space

• Variational Second-Order Interpolation on the Group of Diffeomorphisms with a Right-Invariant Metric

• Bayesian Quadrature for Multiple Related Integrals

• Can Who-Edits-What Predict Edit Survival?

• QuickNAT: Segmenting MRI Neuroanatomy in 20 seconds

• Arhuaco: Deep Learning and Isolation Based Security for Distributed High-Throughput Computing

• Youla Coding and Computation of Gaussian Feedback Capacity

• Computing permanents of complex diagonally dominant matrices and tensors

• A Simple and Efficient Estimation Method for Models with Nonignorable Missing Data

• Determining Projection Constants of Univariate Polynomial Spaces

• Multinomial logistic model for coinfection diagnosis between arbovirus and malaria in Kedougou

• A unifying Perron-Frobenius theorem for nonnegative tensors via multi-homogeneous maps

• Machine Intelligence Techniques for Next-Generation Context-Aware Wireless Networks

• List Decoding of Locally Repairable Codes

• Optimal Streaming Codes for Channels with Burst and Arbitrary Erasures

• Development of Energy Models for Design Space Exploration of Embedded Many-Core Systems

• Inexact cuts in Deterministic and Stochastic Dual Dynamic Programming applied to linear optimization problems

• Safe Privatization in Transactional Memory

• Graph domination-saturation

• On projective and affine equivalence of sub-Riemannian metrics

• Conditional Probability Models for Deep Image Compression

• Deep saliency: What is learnt by a deep network about saliency?

• A note on Herglotz’s theorem for time series on function spaces

• Real-world Anomaly Detection in Surveillance Videos

• Asynchronous Stochastic Variational Inference

• The Control Toolbox – An Open-Source C++ Library for Robotics, Optimal and Model Predictive Control

• Generalization Error Bounds for Noisy, Iterative Algorithms

• Belief Propagation Decoding of Polar Codes on Permuted Factor Graphs

• A Family of Tractable Graph Distances

• A Workload Analysis of NSF’s Innovative HPC Resources Using XDMoD

• TFisher Tests: Optimal and Adaptive Thresholding for Combining $p$-Values

• A Multi-Hop Framework for Multi-Source, Multi-Relay, All-Cast Channels

• Light Field Super-Resolution using a Low-Rank Prior and Deep Convolutional Neural Networks

• Corner cases, singularities, and dynamic factoring

• Not All Ops Are Created Equal!

• Prototypicality effects in global semantic description of objects

• TieNet: Text-Image Embedding Network for Common Thorax Disease Classification and Reporting in Chest X-rays

• The DCS Theorem

• Estimating the Number of Connected Components in a Graph via Subgraph Sampling

• Predicting Future Lane Changes of Other Highway Vehicles using RNN-based Deep Models

• Combining Symbolic and Function Evaluation Expressions In Neural Programs

• Susceptibility of power grids to input fluctuations

• Engineering Cooperative Smart Things based on Embodied Cognition

• A Computational Model of Commonsense Moral Decision Making

• Comprehensive Optimization of Parametric Kernels for Graphics Processing Units

• On the Capacity Region of the Deterministic Y-Channel with Common and Private Messages

• Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers

• Feature Space Transfer for Data Augmentation

• Coded Cooperative Computation for Internet of Things

• Queue-aware Energy Efficient Control for Dense Wireless Networks

• Estimation in the group action channel

• Is profile likelihood a true likelihood? An argument in favor

• Inverted Residuals and Linear Bottlenecks: Mobile Networks forClassification, Detection and Segmentation

• Cohomology rings of compactifications of toric arrangements

• Distributed Multi-User Secret Sharing

• Phase diagrams of Weyl semimetals with competing diagonal and off-diagonal disorders

• A Context-free Grammar for Peaks and Double Descents of Permutations

• Social Advantage with Mixed Entangled States

• A Survey on Compiler Autotuning using Machine Learning

• On the convergence properties of GAN training

• Towards a more efficient representation of imputation operators in TPOT

• Tight Bounds for $\ell_p$ Oblivious Subspace Embeddings

• LDPC Codes over Gaussian Multiple Access Wiretap Channel

• Asymptotic Distribution of Multilevel Channel Polarization for a Certain Class of Erasure Channels

• Longest Common Prefixes with $k$-Errors and Applications

• Sparse NOMA: A Closed-Form Characterization

• Detecting Offensive Language in Tweets Using Deep Learning

• Aperiodic Sampled-Data Control via Explicit Transmission Mapping: A Set Invariance Approach

• Semi-supervised Fisher vector network

• Variable-Length Resolvability for Mixed Sources and its Application to Variable-Length Source Coding

• Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation

• Scalable De Novo Genome Assembly Using Pregel

• Size-to-depth: A New Perspective for Single Image Depth Estimation

• Boolean functions: noise stability, non-interactive correlation, and mutual information

• A Scalable Belief Propagation Algorithm for Radio Signal Based SLAM

• Lattice Erasure Codes of Low Rank with Noise Margins

• On the Measurement Uncertainty in a Reverberation Chamber Including Frequency Stirring

• EmbedRank: Unsupervised Keyphrase Extraction using Sentence Embeddings

• Not-All-Equal and 1-in-Degree Decompositions: Algorithmic Complexity and Applications

• Channel Whispering: a Protocol for Physical Layer Group Key Generation. Application to IR-UWB through Deconvolution

• Waring’s Theorem for Binary Powers

• Persistence of one-dimensional AR(1)-sequences

• Can Computers Create Art?

• Better Runtime Guarantees Via Stochastic Domination

• A Stochastic Singular Vector Based MIMO Channel Model for MAC Layer Tracking

• On a statistical approach to mate choices in reproduction

• Irreversible investment with fixed adjustment costs: a stochastic impulse control approach

• An Explicit Convergence Rate for Nesterov’s Method from SDP

• Model Predictive Control in Spacecraft Rendezvous and Soft Docking

• Near-optimal approximation algorithm for simultaneous Max-Cut

• Fast Methods for Solving the Cluster Containment Problem for Phylogenetic Networks

• Extinction time of a CB-processes with competition in a Lévy random environment

• Saturated equiangular lines in Euclidean spaces

• Non-Orthogonal Multiple Access for mmWave Drone Networks with Limited Feedback

• Polynomial stability of exact solution and a numerical method for stochastic differential equations with time-dependent delay

• Shrink or Substitute: Handling Process Failures in HPC Systems using In-situ Recovery

• A Bio-inspired Collision Detecotr for Small Quadcopter

• Regularity of stochastic nonlocal diffusion equations

• Compressed Neighbour Discovery using Sparse Kerdock Matrices

• Fix your classifier: the marginal value of training the last weight layer

• Cooperative Multi-Agent Reinforcement Learning for Low-Level Wireless Communication

• Hire the Experts: Combinatorial Auction Based Scheme for Experts Selection in E-Healthcare

• Throughput Maximization for UAV-Enabled Wireless Powered Communication Networks

• Frame Moments and Welch Bound with Erasures

• Properties of non-symmetric Macdonald polynomials at $q=1$ and $q=0$

• Energy-Efficient Resource Allocation in NOMA Heterogeneous Networks

• Remarks on Graphons

• Poisson Cox Point Processes for Vehicular Networks

• On the effect of blockage objects in dense MIMO SWIPT networks

• Asymptotic Enumeration of Graph Classes with Many Components

• Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions

• Fully Quantum Arbitrarily Varying Channels: Random Coding Capacity and Capacity Dichotomy

• Distributed dynamic load balancing for task parallel programming

• The method of hypergraph containers

• A Bayesian Evidence Synthesis Approach to Estimate Disease Prevalence in Hard-To-Reach Populations: Hepatitis C in New York City

• Deep Reinforcement Fuzzing

• Frame-Recurrent Video Super-Resolution

• On the shape factor of interaction laws for a non-local approximation of the Sobolev norm and the total variation

• On Identifying a Massive Number of Distributions

• Stochastic quantization of an Abelian gauge theory

• New Perspectives on Multi-Prover Interactive Proofs

• Deep Reinforcement Learning of Cell Movement in the Early Stage of C. elegans Embryogenesis

• PACER: Peripheral Activity Completion Estimation and Recognition

• A functional limit theorem for the profile of random recursive trees

• Algorithmic Polynomials

• Some Generalizations of Good Integers and Their Applications in the Study of Self-Dual Negacyclic Codes

• Some remarks on biased recursive trees

• Hierarchical Memory Management for Mutable State

• Top k Memory Candidates in Memory Networks for Common Sense Reasoning

• Theorems About Integration Order Replacement in Multiple Ito Stochastic Integrals

• An Elementary Dyadic Riemann Hypothesis

• Strategies for Stable Merge Sorting

• Generalized Lambert Series Identities and Applications in Rank Differences

• Renewal in Hawkes processes with self-excitation and inhibition

• Non-Orthogonal Multiple Access For Cooperative Communications: Challenges, Opportunities, And Trends

• Deep Net Triage: Assessing the Criticality of Network Layers by Structural Compression

• Hyperspectral recovery from RGB images using Gaussian Processes

• Information Geometric Approach to Bayesian Lower Error Bounds

• The Circular Law for Random Matrices with Intra-row Dependence

• Efficient Trimmed Convolutional Arithmetic Encoding for Lossless Image Compression

• The decoding failure probability of MDPC codes

• Fault-Tolerant Hotelling Games

• Partial geodesics on symmetric groups endowed with breakpoint distance

• Approximation of Excessive Backlog Probabilities of Two Tandem Queues

• Efficient arithmetic regularity and removal lemmas for induced bipartite patterns

• Hierarchical Coding for Distributed Computing

• Asymptotic Correlation Structure of Discounted Incurred But Not Reported Claims under Fractional Poisson Arrival Process

• Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks

• Sparsity-based Defense against Adversarial Attacks on Linear Classifiers

• Robust capacitated trees and networks with uniform demands

• Searching for Maximum Out-Degree Vertices in Tournaments

• Inclusion-exclusion by ordering-free cancellation

• Sensitivity analysis for multiscale stochastic reaction networks using hybrid approximations

• Robust Inference for Seemingly Unrelated Regression Models

• Combining Stereo Disparity and Optical Flow for Basic Scene Flow

• Spectral engineering and tunable thermoelectric behavior in a quasiperiodic ladder network

• The Communication-Hiding Conjugate Gradient Method with Deep Pipelines

• Full Wafer Redistribution and Wafer Embedding as Key Technologies for a Multi-Scale Neuromorphic Hardware Cluster

• Secure Adaptive Group Testing

• Mixing Time on the Kagome Lattice

• Distributionally Robust Optimization for Sequential Decision Making

• Directed Strongly Regular Cayley Graphs on Dihedral groups

• SAR Image Despeckling Using Quadratic-Linear Approximated L1-Norm

• On the Distribution of Random Geometric Graphs

• A Tight Converse to the Spectral Resolution Limit via Convex Programming

• Two High-performance Schemes of Transmit Antenna Selection for Secure Spatial Modulation

• Detecting dynamic spatial correlation patterns with generalized wavelet coherence and non-stationary surrogate data

• Block-coordinate primal-dual method for the nonsmooth minimization over linear constraints

• Subpolynomial trace reconstruction for random strings and arbitrary deletion probability

• Approximating the Incremental Knapsack Problem

• New LMRD bounds for constant dimension codes and improved constructions

• A partial order on Motzkin paths

• Predicting Movie Genres Based on Plot Summaries

• Robots as Powerful Allies for the Study of Embodied Cognition from the Bottom Up

• Improving Communication Patterns in Polyhedral Process Networks

• Mixing Time for Square Tilings

• Empirical $L^2$-distance test statistics for ergodic diffusions

• System-Aware Compression

• Improving Orbit Prediction Accuracy through Supervised Machine Learning

• Randomized projection methods for convex feasibility problems: conditioning and convergence rates

• Classification of histopathological breast cancer images using iterative VMD aided Zernike moments & textural signatures

• Coding over Sets for DNA Storage

• Unsupervised Cipher Cracking Using Discrete GANs

• Non-Orthogonal Multiple Access for Mobile VLC Networks with Random Receiver Orientation

• Sending Information Through Status Updates