Zobrazeno 1 - 10
of 8 345
pro vyhledávání: '"ALPTEKIN, A."'
Autor:
Yin, Xunzhao, Barkam, Hamza Errahmouni, Müller, Franz, Jiang, Yuxiao, Imani, Mohsen, Abdulazhanov, Sukhrob, Vardar, Alptekin, Laleni, Nellie, Zhao, Zijian, Duan, Jiahui, Shi, Zhiguo, Joshi, Siddharth, Niemier, Michael, Hu, Xiaobo Sharon, Zhuo, Cheng, Kämpfe, Thomas, Ni, Kai
Neuro-symbolic artificial intelligence (AI) excels at learning from noisy and generalized patterns, conducting logical inferences, and providing interpretable reasoning. Comprising a 'neuro' component for feature extraction and a 'symbolic' component
Externí odkaz:
http://arxiv.org/abs/2410.15296
Computationally challenging combinatorial optimization problems (COPs) play a fundamental role in various applications. To tackle COPs, many Ising machines and Quadratic Unconstrained Binary Optimization (QUBO) solvers have been proposed, which typic
Externí odkaz:
http://arxiv.org/abs/2410.14111
Autor:
Duru, Ant, Temizel, Alptekin
Automated data augmentation methods have significantly improved the performance and generalization capability of deep learning models in image classification. Yet, most state-of-the-art methods are optimized on common benchmark datasets, limiting the
Externí odkaz:
http://arxiv.org/abs/2410.13453
Recently, the centerline has become a popular representation of lanes due to its advantages in solving the road topology problem. To enhance centerline prediction, we have developed a new approach called TopoMask. Unlike previous methods that rely on
Externí odkaz:
http://arxiv.org/abs/2409.11325
Training deep neural networks often requires large-scale datasets, necessitating storage and processing on cloud servers due to computational constraints. The procedures must follow strict privacy regulations in domains like healthcare. Split Learnin
Externí odkaz:
http://arxiv.org/abs/2407.08977
Federated learning (FL) has been introduced to enable a large number of clients, possibly mobile devices, to collaborate on generating a generalized machine learning model thanks to utilizing a larger number of local samples without sharing to offer
Externí odkaz:
http://arxiv.org/abs/2404.06230
The application of game theory in cybersecurity enables strategic analysis, adversarial modeling, and optimal decision-making to address security threats' complex and dynamic nature. Previous studies by Abraham et al. and Bi\c{c}er et al. presented v
Externí odkaz:
http://arxiv.org/abs/2403.19130
Autor:
Raju, Anirudh, Khare, Aparna, He, Di, Sklyar, Ilya, Chen, Long, Alptekin, Sam, Trinh, Viet Anh, Zhang, Zhe, Vaz, Colin, Ravichandran, Venkatesh, Maas, Roland, Rastrow, Ariya
Endpoint (EP) detection is a key component of far-field speech recognition systems that assist the user through voice commands. The endpoint detector has to trade-off between accuracy and latency, since waiting longer reduces the cases of users being
Externí odkaz:
http://arxiv.org/abs/2401.08916
This paper presents a comparative analysis of existing nudity classification techniques for classifying images based on the presence of nudity, with a focus on their application in content moderation. The evaluation focuses on CNN-based models, visio
Externí odkaz:
http://arxiv.org/abs/2312.16338
Autor:
İŞBİLİR, ALPTEKİN CİHANGİR
Publikováno v:
Insight Turkey, 2024 Apr 01. 26(2), 93-116.
Externí odkaz:
https://www.jstor.org/stable/48778419