We recently have witnessed many ground-breaking results in machine learning and computer vision, generated by using deep convolutional neural networks (CNN). While the success mai...
Most previous work on video description trains individual parts of speech independently. It is more appealing from a linguistic point of view, for word models for all parts of spe...
Homeless youth are prone to HIV due to their engagement in high risk behavior. Many agencies conduct interventions to educate/train a select group of homeless youth about HIV prev...
Amulya Yadav, Leandro Soriano Marcolino, Eric Rice...
To penetrate sensitive computer networks, attackers can use spear phishing to sidestep technical security mechanisms by exploiting the privileges of careless users. In order to ma...
Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Kout...
Stackelberg security games have been widely deployed in recent years to schedule security resources. An assumption in most existing security game models is that one security resou...