Generalized Goodness-Of-Fit Tests for Correlated Data

This paper concerns the problem of applying the generalized goodness-of-fit (gGOF) type tests for analyzing correlated data. The gGOF family broadly covers the maximum-based testing procedures by ordered input p-values, such as the false discovery rate procedure, the Kolmogorov-Smirnov type statistics, the \phi-divergence family, etc. Data analysis framework and a novel p-value calculation approach is developed under the Gaussian mean model and the generalized linear model (GLM). We reveal the influence of data transformations to the signal-to-noise ratio and the statistical power under both sparse and dense signal patterns and various correlation structures. In particular, the innovated transformation (IT), which is shown equivalent to the marginal model-fitting under the GLM, is often preferred for detecting sparse signals in correlated data. We propose a testing strategy called the digGOF, which combines a double-adaptation procedure (i.e., adapting to both the statistic’s formula and the truncation scheme of the input p-values) and the IT within the gGOF family. It features efficient computation and robust adaptation to the family-retained advantages for given data. Relevant approaches are assessed by extensive simulations and by genetic studies of Crohn’s disease and amyotrophic lateral sclerosis. Computations have been included into the R package SetTest available on CRAN.

Identifiability in Gaussian Graphical Models

In high-dimensional graph learning problems, some topological properties of the graph, such as bounded node degree or tree structure, are typically assumed to hold so that the sample complexity of recovering the graph structure can be reduced. With bounded degree or separability assumptions, quantified by a measure k, a p-dimensional Gaussian graphical model (GGM) can be learnt with sample complexity \Omega (k \: \text{log} \: p). Our work in this paper aims to do away with these assumptions by introducing an algorithm that can identify whether a GGM indeed has these topological properties without any initial topological assumptions. We show that we can check whether a GGM has node degree bounded by k with sample complexity \Omega (k \: \text{log} \: p). More generally, we introduce the notion of a strongly K-separable GGM, and show that our algorithm can decide whether a GGM is strongly k-separable or not, with sample complexity \Omega (k \: \text{log} \: p). We introduce the notion of a generalized feedback vertex set (FVS), an extension of the typical FVS, and show that we can use this identification technique to learn GGMs with generalized FVSs.

Deep Curiosity Loops in Social Environments

Inspired by infants’ intrinsic motivation to learn, which values informative sensory channels contingent on their immediate social environment, we developed a deep curiosity loop (DCL) architecture. The DCL is composed of a learner, which attempts to learn a forward model of the agent’s state-action transition, and a novel reinforcement-learning (RL) component, namely, an Action-Convolution Deep Q-Network, which uses the learner’s prediction error as reward. The environment for our agent is composed of visual social scenes, composed of sitcom video streams, thereby both the learner and the RL are constructed as deep convolutional neural networks. The agent’s learner learns to predict the zero-th order of the dynamics of visual scenes, resulting in intrinsic rewards proportional to changes within its social environment. The sources of these socially informative changes within the sitcom are predominantly motions of faces and hands, leading to the unsupervised curiosity-based learning of social interaction features. The face and hand detection is represented by the value function and the social interaction optical-flow is represented by the policy. Our results suggest that face and hand detection are emergent properties of curiosity-based learning embedded in social environments.

Generative Adversarial Nets for Information Retrieval: Fundamentals and Advances

Generative adversarial nets (GANs) have been widely studied during the recent development of deep learning and unsupervised learning. With an adversarial training mechanism, GAN manages to train a generative model to fit the underlying unknown real data distribution under the guidance of the discriminative model estimating whether a data instance is real or generated. Such a framework is originally proposed for fitting continuous data distribution such as images, thus it is not straightforward to be directly applied to information retrieval scenarios where the data is mostly discrete, such as IDs, text and graphs. In this tutorial, we focus on discussing the GAN techniques and the variants on discrete data fitting in various information retrieval scenarios. (i) We introduce the fundamentals of GAN framework and its theoretic properties; (ii) we carefully study the promising solutions to extend GAN onto discrete data generation; (iii) we introduce IRGAN, the fundamental GAN framework of fitting single ID data distribution and the direct application on information retrieval; (iv) we further discuss the task of sequential discrete data generation tasks, e.g., text generation, and the corresponding GAN solutions; (v) we present the most recent work on graph/network data fitting with node embedding techniques by GANs. Meanwhile, we also introduce the relevant open-source platforms such as IRGAN and Texygen to help audience conduct research experiments on GANs in information retrieval. Finally, we conclude this tutorial with a comprehensive summarization and a prospect of further research directions for GANs in information retrieval.

Building Bayesian Neural Networks with Blocks: On Structure, Interpretability and Uncertainty

We provide simple schemes to build Bayesian Neural Networks (BNNs), block by block, inspired by a recent idea of computation skeletons. We show how by adjusting the types of blocks that are used within the computation skeleton, we can identify interesting relationships with Deep Gaussian Processes (DGPs), deep kernel learning (DKL), random features type approximation and other topics. We give strategies to approximate the posterior via doubly stochastic variational inference for such models which yield uncertainty estimates. We give a detailed theoretical analysis and point out extensions that may be of independent interest. As a special case, we instantiate our procedure to define a Bayesian {\em additive} Neural network — a promising strategy to identify statistical interactions and has direct benefits for obtaining interpretable models.

Semantic Correspondence: A Hierarchical Approach

Establishing semantic correspondence across images when the objects in the images have undergone complex deformations remains a challenging task in the field of computer vision. In this paper, we propose a hierarchical method to tackle this problem by first semantically targeting the foreground objects to localize the search space and then looking deeply into multiple levels of the feature representation to search for point-level correspondence. In contrast to existing approaches, which typically penalize large discrepancies, our approach allows for significant displacements, with the aim to accommodate large deformations of the objects in scene. Localizing the search space by semantically matching object-level correspondence, our method robustly handles large deformations of objects. Representing the target region by concatenated hypercolumn features which take into account the hierarchical levels of the surrounding context, helps to clear the ambiguity to further improve the accuracy. By conducting multiple experiments across scenes with non-rigid objects, we validate the proposed approach, and show that it outperforms the state of the art methods for semantic correspondence establishment.

Representation Learning on Graphs with Jumping Knowledge Networks

Recent deep learning approaches for representation learning on graphs follow a neighborhood aggregation procedure. We analyze some important properties of these models, and propose a strategy to overcome those. In particular, the range of ‘neighboring’ nodes that a node’s representation draws from strongly depends on the graph structure, analogous to the spread of a random walk. To adapt to local neighborhood properties and tasks, we explore an architecture — jumping knowledge (JK) networks — that flexibly leverages, for each node, different neighborhood ranges to enable better structure-aware representation. In a number of experiments on social, bioinformatics and citation networks, we demonstrate that our model achieves state-of-the-art performance. Furthermore, combining the JK framework with models like Graph Convolutional Networks, GraphSAGE and Graph Attention Networks consistently improves those models’ performance.

A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets

With the world moving towards being increasingly dependent on computers and automation, one of the main challenges in the current decade has been to build secure applications, systems and networks. Alongside these challenges, the number of threats is rising exponentially due to the attack surface increasing through numerous interfaces offered for each service. To alleviate the impact of these threats, researchers have proposed numerous solutions; however, current tools often fail to adapt to ever-changing architectures, associated threats and 0-days. This manuscript aims to provide researchers with a taxonomy and survey of current dataset composition and current Intrusion Detection Systems (IDS) capabilities and assets. These taxonomies and surveys aim to improve both the efficiency of IDS and the creation of datasets to build the next generation IDS as well as to reflect networks threats more accurately in future datasets. To this end, this manuscript also provides a taxonomy and survey or network threats and associated tools. The manuscript highlights that current IDS only cover 25% of our threat taxonomy, while current datasets demonstrate clear lack of real-network threats and attack representation, but rather include a large number of deprecated threats, hence limiting the accuracy of current machine learning IDS. Moreover, the taxonomies are open-sourced to allow public contributions through a Github repository.

Explainable Deterministic MDPs

We present a method for a certain class of Markov Decision Processes (MDPs) that can relate the optimal policy back to one or more reward sources in the environment. For a given initial state, without fully computing the value function, q-value function, or the optimal policy the algorithm can determine which rewards will and will not be collected, whether a given reward will be collected only once or continuously, and which local maximum within the value function the initial state will ultimately lead to. We demonstrate that the method can be used to map the state space to identify regions that are dominated by one reward source and can fully analyze the state space to explain all actions. We provide a mathematical framework to show how all of this is possible without first computing the optimal policy or value function.

Learning Oriented Cross-Entropy Approach to User Association in Load-Balanced HetNet

This letter considers optimizing user association in a heterogeneous network via utility maximization, which is a combinatorial optimization problem due to integer constraints. Different from existing solutions based on convex optimization, we alternatively propose a cross-entropy (CE)-based algorithm inspired by a sampling approach developed in machine learning. Adopting a probabilistic model, we first reformulate the original problem as a CE minimization problem which aims to learn the probability distribution of variables in the optimal association. An efficient solution by stochastic sampling is introduced to solve the learning problem. The integer constraint is directly handled by the proposed algorithm, which is robust to network deployment and algorithm parameter choices. Simulations verify that the proposed CE approach achieves near-optimal performance quite efficiently.

Abstaining Classification When Error Costs are Unequal and Unknown

Abstaining classificaiton aims to reject to classify the easily misclassified examples, so it is an effective approach to increase the clasificaiton reliability and reduce the misclassification risk in the cost-sensitive applications. In such applications, different types of errors (false positive or false negative) usaully have unequal costs. And the error costs, which depend on specific applications, are usually unknown. However, current abstaining classification methods either do not distinguish the error types, or they need the cost information of misclassification and rejection, which are realized in the framework of cost-sensitive learning. In this paper, we propose a bounded-abstention method with two constraints of reject rates (BA2), which performs abstaining classification when error costs are unequal and unknown. BA2 aims to obtain the optimal area under the ROC curve (AUC) by constraining the reject rates of the positive and negative classes respectively. Specifically, we construct the receiver operating characteristic (ROC) curve, and stepwise search the optimal reject thresholds from both ends of the curve, untill the two constraints are satisfied. Experimental results show that BA2 obtains higher AUC and lower total cost than the state-of-the-art abstaining classification methods. Meanwhile, BA2 achieves controllable reject rates of the positive and negative classes.

Hierarchical Clustering with Prior Knowledge

Hierarchical clustering is a class of algorithms that seeks to build a hierarchy of clusters. It has been the dominant approach to constructing embedded classification schemes since it outputs dendrograms, which capture the hierarchical relationship among members at all levels of granularity, simultaneously. Being greedy in the algorithmic sense, a hierarchical clustering partitions data at every step solely based on a similarity / dissimilarity measure. The clustering results oftentimes depend on not only the distribution of the underlying data, but also the choice of dissimilarity measure and the clustering algorithm. In this paper, we propose a method to incorporate prior domain knowledge about entity relationship into the hierarchical clustering. Specifically, we use a distance function in ultrametric space to encode the external ontological information. We show that popular linkage-based algorithms can faithfully recover the encoded structure. Similar to some regularized machine learning techniques, we add this distance as a penalty term to the original pairwise distance to regulate the final structure of the dendrogram. As a case study, we applied this method on real data in the building of a customer behavior based product taxonomy for an Amazon service, leveraging the information from a larger Amazon-wide browse structure. The method is useful when one wants to leverage the relational information from external sources, or the data used to generate the distance matrix is noisy and sparse. Our work falls in the category of semi-supervised or constrained clustering.

Efficient Optimization Algorithms for Robust Principal Component Analysis and Its Variants

Robust PCA has drawn significant attention in the last decade due to its success in numerous application domains, ranging from bio-informatics, statistics, and machine learning to image and video processing in computer vision. Robust PCA and its variants such as sparse PCA and stable PCA can be formulated as optimization problems with exploitable special structures. Many specialized efficient optimization methods have been proposed to solve robust PCA and related problems. In this paper we review existing optimization methods for solving convex and nonconvex relaxations/variants of robust PCA, discuss their advantages and disadvantages, and elaborate on their convergence behaviors. We also provide some insights for possible future research directions including new algorithmic frameworks that might be suitable for implementing on multi-processor setting to handle large-scale problems.

Deterministic Stretchy Regression

An extension of the regularized least-squares in which the estimation parameters are stretchable is introduced and studied in this paper. The solution of this ridge regression with stretchable parameters is given in primal and dual spaces and in closed-form. Essentially, the proposed solution stretches the covariance computation by a power term, thereby compressing or amplifying the estimation parameters. To maintain the computation of power root terms within the real space, an input transformation is proposed. The results of an empirical evaluation in both synthetic and real-world data illustrate that the proposed method is effective for compressive learning with high-dimensional data.

Randomized Prior Functions for Deep Reinforcement Learning

Dealing with uncertainty is essential for efficient reinforcement learning. There is a growing literature on uncertainty estimation for deep learning from fixed datasets, but many of the most popular approaches are poorly-suited to sequential decision problems. Other methods, such as bootstrap sampling, have no mechanism for uncertainty that does not come from the observed data. We highlight why this can be a crucial shortcoming and propose a simple remedy through addition of a randomized untrainable `prior’ network to each ensemble member. We prove that this approach is efficient with linear representations, provide simple illustrations of its efficacy with nonlinear representations and show that this approach scales to large-scale problems far better than previous attempts.

A Tunable Measure for Information Leakage

A tunable measure for information leakage called \textit{maximal \alpha-leakage} is introduced. This measure quantifies the maximal gain of an adversary in refining a tilted version of its prior belief of any (potentially random) function of a dataset conditioning on a disclosed dataset. The choice of \alpha determines the specific adversarial action ranging from refining a belief for \alpha =1 to guessing the best posterior for \alpha = \infty, and for these extremal values this measure simplifies to mutual information (MI) and maximal leakage (MaxL), respectively. For all other \alpha this measure is shown to be the Arimoto channel capacity. Several properties of this measure are proven including: (i) quasi-convexity in the mapping between the original and disclosed datasets; (ii) data processing inequalities; and (iii) a composition property.

Adversarial Meta-Learning

Meta-learning enables a model to learn from very limited data to undertake a new task. In this paper, we study the general meta-learning with adversarial samples. We present a meta-learning algorithm, ADML (ADversarial Meta-Learner), which leverages clean and adversarial samples to optimize the initialization of a learning model in an adversarial manner. ADML leads to the following desirable properties: 1) it turns out to be very effective even in the cases with only clean samples; 2) it is model-agnostic, i.e., it is compatible with any learning model that can be trained with gradient descent; and most importantly, 3) it is robust to adversarial samples, i.e., unlike other meta-learning methods, it only leads to a minor performance degradation when there are adversarial samples. We show via extensive experiments that ADML delivers the state-of-the-art performance on two widely-used image datasets, MiniImageNet and CIFAR100, in terms of both accuracy and robustness.

Data learning from big data

Technology is generating a huge and growing availability of observa tions of diverse nature. This big data is placing data learning as a central scientific discipline. It includes collection, storage, preprocessing, visualization and, essentially, statistical analysis of enormous batches of data. In this paper, we discuss the role of statistics regarding some of the issues raised by big data in this new paradigm and also propose the name of data learning to describe all the activities that allow to obtain relevant knowledge from this new source of information.

Attention Incorporate Network: A network can adapt various data size

In traditional neural networks for image processing, the inputs of the neural networks should be the same size such as 224*224*3. But how can we train the neural net model with different input size A common way to do is image deformation which accompany a problem of information loss (e.g. image crop or wrap). Sequence model(RNN, LSTM, etc.) can accept different size of input like text and audio. But one disadvantage for sequence model is that the previous information will become more fragmentary during the transfer in time step, it will make the network hard to train especially for long sequential data. In this paper we propose a new network structure called Attention Incorporate Network(AIN). It solve the problem of different size of inputs including: images, text, audio, and extract the key features of the inputs by attention mechanism, pay different attention depends on the importance of the features not rely on the data size. Experimentally, AIN achieve a higher accuracy, better convergence comparing to the same size of other network structure

Technique of active phase stabilization for the interferometer with 128 actively selectable paths
Dissipativity Theory for Accelerating Stochastic Variance Reduction: A Unified Analysis of SVRG and Katyusha Using Semidefinite Programs
On the Covariance-Hessian Relation in Evolution Strategies
Sample size calculation and blinded recalculation for analysis of covariance models with multiple random covariates
The Impact of Humanoid Affect Expression on Human Behavior in a Game-Theoretic Setting
Robustness of capture radius with respect to Gromov–Hausdorff distance in Lion and Man game
Bounds for the asymptotic distribution of the likelihood ratio
Conditional Noise-Contrastive Estimation of Unnormalised Models
Incremental Decoding and Training Methods for Simultaneous Translation in Neural Machine Translation
High Performance and Scalable AWG for Superconducting Quantum Computing
Dynamic Modeling of Multivariate Latent Processes and Their Temporal Relationships: Application to Alzheimer’s Disease
SciDTB: Discourse Dependency TreeBank for Scientific Abstracts
Data-Driven Optimal Control Using Perron-Frobenius Operator
Neural Disease Named Entity Extraction with Character-based BiLSTM+CRF in Japanese Medical Text
Determining the dimension of factor structures in non-stationary large datasets
On the Fourier Entropy Influence Conjecture for Extremal Classes
Directional Spatial Channel Estimation For Massive FD-MIMO in Next Generation 5G Networks
Annulus SLE partition functions and martingale-observables
Transformationally Identical and Invariant Convolutional Neural Networks through Symmetric Element Operators
Some Mixed Graphs Determined by Their Spectrum
Matroids with a cyclic arrangement of circuits and cocircuits
Optimal Control of Constrained Stochastic Linear-Quadratic Model with Applications
Learning Acoustic Word Embeddings with Temporal Context for Query-by-Example Speech Search
VoxelAtlasGAN: 3D Left Ventricle Segmentation on Echocardiography with Atlas Guided Generation and Voxel-to-voxel Discrimination
On Commuting Graphs of Generalized Dihedral Groups
CuCoTrack: Cuckoo Filter Based Connection Tracking
UAV-Enabled Communication Using NOMA
ML + FV = $\heartsuit$ A Survey on the Application of Machine Learning to Formal Verification
A spectral characterization of the s-clique extension of the square grid graphs
Cross-Lingual Task-Specific Representation Learning for Text Classification in Resource Poor Languages
Free-Form Image Inpainting with Gated Convolution
A Simplified Active Calibration algorithm for Focal Length Estimation
IVUS-Net: An Intravascular Ultrasound Segmentation Network
A Scalable Framework for Trajectory Prediction
EREL Selection using Morphological Relation
Adaptations of ROUGE and BLEU to Better Evaluate Machine Reading Comprehension Task
Instance Search via Instance Level Segmentation and Feature Representation
Accurate Spectral Super-resolution from Single RGB Image Using Multi-scale CNN
FMHash: Deep Hashing of In-Air-Handwriting for User Identification
Stationary Geometric Graphical Model Selection
On closeness to k-wise uniformity
Explainable Recommendation via Multi-Task Learning in Opinionated Text Data
Local time and Tanaka formula of $G$-martingales
Scanning Test System Prototype of p/sFEB for the ATLAS Phase-I sTGC Trigger Upgrade
The best constant in the Khinchine inequality for slightly dependent random variables
What Knowledge is Needed to Solve the RTE5 Textual Entailment Challenge
Sparse Over-complete Patch Matching
Consistent Position Bias Estimation without Online Interventions for Learning-to-Rank
A fast algorithm for solving linearly recurrent sequences
Quantitative trends in 8 physical properties of 115000 inorganic compounds gained by machine learning
An Estimation and Analysis Framework for the Rasch Model
Linear Spectral Estimators and an Application to Phase Retrieval
Perturbation analysis of sub/super hedging problems
Rational series in the free group and the Connes operator
Computational Complexity of Motion Planning of a Robot through Simple Gadgets
Diachronic word embeddings and semantic shifts: a survey
Cell Detection with Star-convex Polygons
Point-plane incidences and some applications in positive characteristic
A model for random fire induced tree-grass coexistence in savannas
On a Ramsey-Turán variant of the Hajnal-Szemerédi theorem
Learning to Search in Long Documents Using Document Structure
iMAP Beamforming for High Quality High Frame Rate Imaging
Field-weighted Factorization Machines for Click-Through Rate Prediction in Display Advertising
An Optimization View of MUSIC and Its Extension to Missing Data
Feature Pyramid Network for Multi-Class Land Segmentation
Path counting and rank gaps in differential posets
Populations with interaction and environmental dependence: from few, (almost) independent, members into deterministic evolution of high densities
An Overview Of Some Semantic And Syntactic Complexity Classes
Self-Stabilizing and Private Distributed Shared Atomic Memory in Seldomly Fair Message Passing Networks
Generalized Earley Parser: Bridging Symbolic Grammars and Sequence Data for Future Prediction
Robust Lexical Features for Improved Neural Network Named-Entity Recognition
The Age of Information in Networks: Moments, Distributions, and Sampling
Learning to Grasp from a Single Demonstration
Real-Time Equality-Constrained Hybrid State Estimation in Complex Variables
DIR-ST$^2$: Delineation of Imprecise Regions Using Spatio–Temporal–Textual Information
Structural Controllability of a Networked Dynamic System with LFT Perturbed Subsystems
Stein operators, kernels and discrepancies for multivariate continuous distributions
Input Matrix Construction and Approximation Using a Graphic Approach
A new measure of treatment effect for random-effects meta-analysis of comparative binary outcome data
Orthogonal Random Forest for Heterogeneous Treatment Effect Estimation
Robust Semantic Segmentation with Ladder-DenseNet Models
Deza graphs with parameters $(n,k,k-1,a)$ and $β=1$
TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service
On Model Predictive Control of Hybrid Systems
A Preliminary Exploration of Floating Point Grammatical Evolution
Utility-Energy Efficiency Oriented User Association with Power Control in Heterogeneous Networks
Well-posedness conditions in stochastic inversion problems
Word Familiarity and Frequency
BV functions and Besov spaces associated with Dirichlet spaces
Acyclic orientations with degree constraints
Projective geometries arising from Elekes-Szabó problems
Learning Continuous Hierarchies in the Lorentz Model of Hyperbolic Geometry
Joint Stem Detection and Crop-Weed Classification for Plant-specific Treatment in Precision Farming
Fully Convolutional Networks with Sequential Information for Robust Crop and Weed Detection in Precision Farming
Sparse Bayesian Learning-Based Direction Finding Method With Unknown Mutual Coupling Effect
An Optimization Approach to the Langberg-Médard Multiple Unicast Conjecture
A Proof of the Strict Monotone 5-step Conjecture
A 3.8 ps RMS time synchronization implemented in a 20 nm FPGA
The diameter of the fractional matching polytope and its hardness implications
Joint Actuator-sensor Design for Stochastic Linear Systems
A Graph Model with Indirect Co-location Links
Data Synthesis based on Generative Adversarial Networks
CS-VQA: Visual Question Answering with Compressively Sensed Images
Cultural Investment and Urban Socio-Economic Development: A Geo-Social Network Approach
PipeDream: Fast and Efficient Pipeline Parallel DNN Training
Model predictive control for energy-efficient operation of data centers with cold aisle containments
Self-supervisory Signals for Object Discovery and Detection
#SarcasmDetection is soooo general! Towards a Domain-Independent Approach for Detecting Sarcasm
An Exploration of H-1B Visa Applications in the United States
Distributed Algorithms for Minimum Degree Spanning Trees
Kronecker weights for instability analysis of Markov jump linear systems
Unbiased Sampling of Multidimensional Partial Differential Equations with Random Coefficients
A Content-Based Late Fusion Approach Applied to Pedestrian Detection
Measuring Conversational Productivity in Child Forensic Interviews
A note on the equivalence of operator splitting methods
On simple connectivity of random 2-complexes
PyUnfold: A Python Package for Iterative Unfolding
An Optimal Algorithm for Online Unconstrained Submodular Maximization
DSSLIC: Deep Semantic Segmentation-based Layered Image Compression
Resource Allocation for Low-Latency Vehicular Communications with Packet Retransmission
Discovering Signals from Web Sources to Predict Cyber Attacks
Quantum dynamics of disordered spin chains with power-law interactions
The rainbow-spectrum of RNA secondary structures
Full Optical Fiber Link Characterization with the BSS-Lasso
Rigidity with few locations
A large number of $m$-coloured complete infinite subgraphs
From unicellular fatgraphs to trees
Unsupervised Learning for Surgical Motion by Learning to Predict the Future
Similarity Join and Self-Join Size Estimation in a Streaming Environment
Sheep identity recognition, age and weight estimation datasets
Hierarchy of GANs for learning embodied self-awareness model
Fully automated primary particle size analysis of agglomerates on transmission electron microscopy images via artificial neural networks
Rotation Equivariant CNNs for Digital Pathology
Contextual Hourglass Networks for Segmentation and Density Estimation
Hadamard Matrices, Quaternions, and the Pearson Chi-square Statistic
Neonatal EEG Interpretation and Decision Support Framework for Mobile Platforms
Endoscopic navigation in the absence of CT imaging
CapsGAN: Using Dynamic Routing for Generative Adversarial Networks
Real-time coherent diffraction inversion using deep generative networks
Writing Style Invariant Deep Learning Model for Historical Manuscripts Alignment
Quantitative Phase Imaging and Artificial Intelligence: A Review
Rethinking Radiology: An Analysis of Different Approaches to BraTS
Multi-task Learning for Maritime Traffic Surveillance from AIS Data Streams
State Classification with CNN
End to End Brain Fiber Orientation Estimation using Deep Learning
Neural Proximal Gradient Descent for Compressive Imaging
AGIL: Learning Attention from Human for Visuomotor Tasks