Showing 1–20 of 84 results
/ Date/ Name
Jul 16, 2020A Blockchain-based Iterative Double Auction Protocol using Multiparty State ChannelsNov 12, 2021Learning Interpretation with Explainable Knowledge DistillationOct 11, 2021Continual Learning with Differential PrivacySep 18, 2021Groups Influence with Minimum Cost in Social NetworksAug 20, 2018Contract-based Incentive Mechanism for LTE over Unlicensed ChannelsJun 2, 2019Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable RobustnessAug 1, 2019Submodular Cost Submodular Cover with an Approximate OracleJul 19, 2022Optimizing Resource Allocation and VNF Embedding in RAN SlicingMay 17, 2023Linear Query Approximation Algorithms for Non-monotone Submodular Maximization under Knapsack ConstraintFeb 7, 2022Preserving Privacy and Security in Federated LearningJul 16, 2020Denial-of-Service Vulnerability of Hash-based Transaction Sharding: Attack and CountermeasureFeb 3, 2024XTSFormer: Cross-Temporal-Scale Transformer for Irregular-Time Event Prediction in Clinical ApplicationsFeb 2, 2016Network Clustering via Maximizing Modularity: Approximation Algorithms and Theoretical LimitsMay 25, 2016Stop-and-Stare: Optimal Sampling Algorithms for Viral Marketing in Billion-scale NetworksNov 14, 2025PAS : Prelim Attention Score for Detecting Object Hallucinations in Large Vision--Language ModelsMay 28, 2025Stochastic Primal-Dual Double Block-Coordinate for Two-way Partial AUC MaximizationFeb 2, 2026Guaranteeing Privacy in Hybrid Quantum Learning through Theoretical MechanismsFeb 22, 2025NeurFlow: Interpreting Neural Networks through Neuron Groups and Functional InteractionsApr 21, 2026Discovering a Shared Logical Subspace: Steering LLM Logical Reasoning via Alignment of Natural-Language and Symbolic ViewsSep 15, 2020Auditing the Sensitivity of Graph-based Ranking with Visual Analytics