Stories

  1. Article
    How City Portals in China and Western Countries differ?
  2. Article
    Learnable Orthogonal Decomposition for Non-Regressive Prediction for PDE
  3. Article
    Measuring South Africa’s Internet in the Dark: What Blackouts Do to Its Internet Infrastructure
  4. Article
    MMM-fair: An Interactive Toolkit for Exploring and Operationalizing Multi-Fairness Trade-offs
  5. Article
    Similarities, differences, and relationships of comparable self-x system classes
  6. Article
    The Best of Both Worlds: A Universal AI Framework for Predicting What Users Want Next
  7. Article
    Moneywork: bridging fragmented digital payments
  8. Article
    AI That Learns From Your Habits to Improve Your Health Without Exposing Your Data
  9. Article
    SCALE-CCL: A Scalable Collective Communication Library for Wide-Area Distributed Training
  10. Article
    Simplifying Network Analysis in ns-3 with a Linux-style Socket Statistics Tool
  11. Article
    Multi-robot communication isolation with ROS2
  12. Article
    Low HP: Evaluating the Accuracy of Medicine in Video Games
  13. Article
    Survey of Action Recognition, Spotting and Spatio-Temporal Localization in Soccer
  14. Article
    Realizing Corrupted-Shard Tolerance: A Sharding Blockchain with Preserving Global Resilience
  15. Article
    A Decade-long Analysis of Global Trends in Advanced Persistent Threats
  16. Article
    Action is All You Need: Dual-Flow Generative Ranking Network for Recommendation
  17. Article
    Emergency Recovery of Data Stored Privately on the Cloud
  18. Article
    Are Cryptocurrencies Becoming More Decentralized? A 15-Year Study of 7 Major Ecosystems.
  19. Article
    How humans and AI notice what is missing in images and stories
  20. Article
    A Practical System for Understanding and Monitoring Computer Vision AI Models
  21. Article
    AI-Powered Disassembly for Understanding Compiled Software
  22. Article
    BLACKOUT: Making software both memory-safe and free from side-channel leaks
  23. Article
    Hiding in Plain Sight: Disrupting Malware’s Secret Web Dead Drops
  24. Article
    A Marine Wildlife Video Dataset
  25. Article
    WinSpy: Cross-window Side-channel Attacks on Android's Multi-window Mode
  26. Article
    Audio deepfake detection with visual artifacts
  27. Article
    Clearer Ultrasound Scans: Removing Noise Without Human Help
  28. Article
    Creating Realistic Medical Images Without the Need for Human Labels
  29. Article
    Measuring the deployment of DNSSEC Bootstrapping Using Authenticated Signals
  30. Article
    LLM-based Community Search via Dual-agent Collaboration
  31. Article
    Hidden risks: Fake data can manipulate rankings in local privacy systems
  32. Article
    Protecting Smart Voice Assistants from Invisible and Malicious Audio Attacks
  33. Article
    Demo: Split-and-Pipeline: Collaborative Large Model Inference on Edge Devices
  34. Article
    AI Links the Cause of Stroke to the Damage Seen on Brain Scans
  35. Article
    Using AI to Detect Cyberattacks in Cloud Software Pipelines
  36. Article
    Technology and the Future of Tibetan Cultural Preservation