Sciweavers

94
Voted
AAAI
2015
10 years 1 months ago
On Vectorization of Deep Convolutional Neural Networks for Vision Tasks
We recently have witnessed many ground-breaking results in machine learning and computer vision, generated by using deep convolutional neural networks (CNN). While the success mai...
Jimmy S. J. Ren, Li Xu
92
Voted
AAAI
2015
10 years 1 months ago
Learning to Describe Video with Weak Supervision by Exploiting Negative Sentential Information
Most previous work on video description trains individual parts of speech independently. It is more appealing from a linguistic point of view, for word models for all parts of spe...
Haonan Yu, Jeffrey Mark Siskind
AAAI
2015
10 years 1 months ago
Preventing HIV Spread in Homeless Populations Using PSINET
Homeless youth are prone to HIV due to their engagement in high risk behavior. Many agencies conduct interventions to educate/train a select group of homeless youth about HIV prev...
Amulya Yadav, Leandro Soriano Marcolino, Eric Rice...
AAAI
2015
10 years 1 months ago
Optimal Personalized Filtering Against Spear-Phishing Attacks
To penetrate sensitive computer networks, attackers can use spear phishing to sidestep technical security mechanisms by exploiting the privileges of careless users. In order to ma...
Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Kout...
92
Voted
AAAI
2015
10 years 1 months ago
Security Games with Protection Externalities
Stackelberg security games have been widely deployed in recent years to schedule security resources. An assumption in most existing security game models is that one security resou...
Jiarui Gan, Bo An, Yevgeniy Vorobeychik