-
Paper: Oct 12,2024cs.CVRoad crack segmentation is critical for robotic systems tasked with the inspection, maintenance, and monitoring of road infrastructures. Existing deep learning-based methods for crack segmentation are typically trained on specif ... Read More >
-
Paper: Oct 12,2024cs.LGConformal prediction, as an emerging uncertainty quantification technique, typically functions as post-hoc processing for the outputs of trained classifiers. To optimize the classifier for maximum predictive efficiency, Conforma ... Read More >
-
Paper: Oct 12,2024cs.CLWhile server-side Large Language Models (LLMs) demonstrate proficiency in function calling and complex reasoning, deploying Small Language Models (SLMs) directly on devices brings opportunities to improve latency and privacy but ... Read More >
-
Paper: Oct 12,2024eess.IVMagnetic resonance image reconstruction starting from undersampled k-space data requires the recovery of many potential nonlinear features, which is very difficult for algorithms to recover these features. In recent years, the d ... Read More >
-
Paper: Oct 12,2024eess.SYPower system communication networks enable operators to remotely monitor and control field equipment. The sophistication of these networks is also increasing as operators continue the trend towards digitization, which is benefic ... Read More >
-
Paper: Oct 12,2024math.NACombining kernel-based collocation methods with time-stepping methods to solve parabolic partial differential equations can potentially introduce challenges in balancing temporal and spatial discretization errors. Typically, usi ... Read More >
-
Paper: Oct 12,2024cs.AIThe rapid advancement of scientific progress requires innovative tools that can accelerate discovery. While recent AI methods, particularly large language models (LLMs), have shown promise in tasks such as hypothesis generation ... Read More >
-
Paper: Oct 12,2024math.STRecent research shows the susceptibility of machine learning models to adversarial attacks, wherein minor but maliciously chosen perturbations of the input can significantly degrade model performance. In this paper, we theoretic ... Read More >
-
Paper: Oct 12,2024cs.CRWith the rapid advancement of Internet technology, the threat of malware to computer systems and network security has intensified. Malware affects individual privacy and security and poses risks to critical infrastructures of en ... Read More >
-
Paper: Oct 12,2024cs.CVRecently, large-scale diffusion models have made impressive progress in text-to-image (T2I) generation. To further equip these T2I models with fine-grained spatial control, approaches like ControlNet introduce an extra network t ... Read More >
Popular Paper