Showing 1–20 of 146 results
/ Date/ Name
Sep 11, 2020Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware DetectionJun 7, 2021Unsupervised Representation Disentanglement of Text: An Evaluation on Synthetic DatasetsFeb 6, 2015A Comparison Study of Coupled and Decoupled Uplink Heterogeneous Cellular NetworksOct 5, 2024Consistent Autoformalization for Constructing Mathematical LibrariesMay 14, 2025The Shape and Mass of the Galactic Dark Matter Halo from the Axisymmetric Jeans ModelJun 12, 2025Beyond Gold Standards: Epistemic Ensemble of LLM Judges for Formal Mathematical ReasoningAug 16, 2022What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation (Extended Version)Jan 30, 2009On the Relationship Between the Multi-antenna Secrecy Communications and Cognitive Radio CommunicationsSep 24, 2008On Gaussian MIMO BC-MAC Duality With Multiple Transmit Covariance ConstraintsOct 24, 2014Cloud-based Privacy Preserving Image Storage, Sharing and SearchJan 3, 2017Chemical Composition of Young Stars in the Leading Arm of the Magellanic SystemFeb 17, 2025Autoformalization in the Wild: Assessing LLMs on Real-World Mathematical DefinitionsMay 5, 2023A Catalog of Distance Determinations for the LAMOST DR8 K Giants in the Galactic HaloOct 14, 2021The Neglected Sibling: Isotropic Gaussian Posterior for VAESep 3, 2012The Gravitational Potential Near the Sun From SEGUE K-dwarf KinematicsOct 24, 2014Enable Portrait Privacy Protection in Photo Capturing and SharingNov 2, 2023Multi-Operational Mathematical Derivations in Latent SpaceJun 9, 2008Robust Cognitive Beamforming With Partial Channel State InformationJul 31, 2012Message in a Sealed Bottle: Privacy Preserving Friending in Social NetworksNov 18, 2004Efficient Estimation of Stochastic Volatility Using Noisy Observations: A Multi-Scale Approach