This paper addresses carrier aircraft landing scheduling considering bolting and aerial refueling. It defines fuel and wake ...
Cybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon smart contracts to silently service its infrastructure and bypass ...
Stop deploying AI models with inflated performance scores. Sleuth detects hidden bias caused by tweaking hyperparameters, prompts, or datasets during evaluation—breaking circular reasoning in AI ...
Abstract: To address the limitations of existing object detection algorithms in complex backgrounds, small target recognition, and occluded target detection, this paper proposes an improved BPS-YOLO ...
Abstract: This paper conducts a content safety analysis based on a multimodal dataset of COVID-19-related social media samples. A joint model of multimodal images and long texts is employed to perform ...