Crafting Textual Adversarial Examples through Second-Order Enhanced Word Saliency | 0 | 0.34 | 2022 |
VULoc: Accurate UWB Localization for Countless Targets without Synchronization. | 0 | 0.34 | 2022 |
OrdinoR: A framework for discovering, evaluating, and analyzing organizational models using event logs | 0 | 0.34 | 2022 |
A Secure Container Placement Strategy Using Deep Reinforcement Learning in Cloud | 0 | 0.34 | 2022 |
PARSE: An Efficient Search Method for Black-box Adversarial Text Attacks. | 0 | 0.34 | 2022 |
Improving Sociable Conversational Recommender Systems via Topic-related Preference Graph | 0 | 0.34 | 2022 |
Knowledge distillation via softmax regression representation learning. | 0 | 0.34 | 2021 |
Fixed-order H ∞ control of an electric power steering system. | 0 | 0.34 | 2021 |
Causal structure learning of nonlinear additive noise model based on streaming feature. | 0 | 0.34 | 2021 |
HARP Pro: Hierarchical Representation Learning based on global and local features for social networks. | 0 | 0.34 | 2021 |
Research on Privacy Protection Technology for Data Publishing. | 0 | 0.34 | 2020 |
Training binary neural networks with real-to-binary convolutions. | 0 | 0.34 | 2020 |
Cost-aware Cascading Bandits. | 0 | 0.34 | 2018 |
The Quest for Reliable Cyber Security. | 0 | 0.34 | 2016 |
Practicality-Based Probabilistic Roadmaps Method | 1 | 0.36 | 2011 |
Value and Relation Display for Interactive Exploration of High Dimensional Datasets. | 0 | 0.34 | 2004 |