Front-running attacks have been a major concern on the blockchain. Attackers launch front-running attacks by inserting additional transactions before upcoming victim transactions to manipulate victim transaction execu...
详细信息
Front-running attacks have been a major concern on the blockchain. Attackers launch front-running attacks by inserting additional transactions before upcoming victim transactions to manipulate victim transaction executions and make profits. Recent studies have shown that front-running attacks are prevalent on the Ethereum blockchain and have caused millions of US dollars loss. It is the vulnerabilities in smart contracts, which are blockchain programs invoked by transactions, that enable the front-running attack opportunities. Although techniques to detect front-running vulnerabilities have been proposed, their performance on real-world vulnerable contracts is unclear. There is no large-scale benchmark based on real attacks to evaluate their capabilities. We make four contributions in this paper. First, we design an effective algorithm to mine real-world attacks in the blockchain history. The evaluation shows that our mining algorithm is more effective and comprehensive, achieving higher recall in finding real attacks than the previous study. Second, we propose an automated and scalable vulnerability localization approach to localize code snippets in smart contracts that enable front-running attacks. The evaluation also shows that our localization approaches are effective in achieving higher precision in pinpointing vulnerabilities compared to the baseline technique. Third, we build a benchmark consisting of 513 real-world attacks with vulnerable code labeled in 235 distinct smart contracts, which is useful to help understand the nature of front-running attacks, vulnerabilities in smart contracts, and evaluate vulnerability detection techniques. Last but not least, we conduct an empirical evaluation of seven state-of-the-art vulnerability detection techniques on our benchmark. The evaluation experiment reveals the inadequacy of existing techniques in detecting front-running vulnerabilities, with a low recall of ≤ 6.04%. Our further analysis identifies four common li
One major challenge for autonomous attitude takeover control for on-orbit servicing of spacecraft is that an accurate dynamic motion model of the combined vehicles is highly nonlinear, complex and often costly to iden...
详细信息
Considering the attacks against the power grid, one of the most effective approaches could be the attack to the transmission lines that leads to large cascading failures. Hence, the problem of locating the most critic...
详细信息
In this paper we deal with stochastic optimization problems where the data distributions change in response to the decision variables. Traditionally, the study of optimization problems with decision-dependent distribu...
详细信息
Discovering the semantics of multimodal utterances is essential for understanding human language and enhancing human-machine interactions. Existing methods manifest limitations in leveraging nonverbal information for ...
详细信息
Natural language processing has seen exponential growth since deep learning has been used for various tasks. Deep learning has replaced the old rule-based methods by providing better performance on almost all the task...
详细信息
Natural language processing has seen exponential growth since deep learning has been used for various tasks. Deep learning has replaced the old rule-based methods by providing better performance on almost all the tasks in NLP, as deep learning basically looks into the hidden patterns and structures in the data which were sometimes not detected and at other-times overlooked by the rule-based systems. The research and development in NLP have been however focused on some handful languages of the world given their financial importance and a huge number of speakers. This has left out most of the other languages unexplored. The other reason for the lack of research in these languages is the unavailability of properly annotated and the required amount of datasets which is very important for training deep learning neural networks. The situation looks grim. When we look at the world language tree, thankfully we see that most of the unexplored languages have other well-explored languages nearby which basically means that both the languages are kind of similar. So if we could somehow adapt research and development from one language to another, it could be really helpful for both the languages. The goal of this thesis work is to explore transfer learning for the task of Part-of-speech(POS) tagging between Hindi and Nepali languages which are part of the Indo-Aryan language family with very high similarity. We have tried to explore the possibility of jointly training a model for the task of POS tagging in both Hindi and Nepali language and see if it helps in improving the performance of the model. We also try to explore if multitask learning in the Hindi language can be helpful for the task of POS tagging with auxiliary tasks of the gender tagging and singularity/plurality tagging. The deep learning architecture used for this work is BLSTM-CNN-CRF. The model is trained with monolingual word embeddings, vector mapped embeddings, and also with jointly trained Hindi-Nepali word emb
The notion of a metaverse seems hard to define but encourages the impression that it can be considered as a new virtual metaphysical landscape that somehow goes beyond our geographical locations and understanding (i.e...
详细信息
We are interested in predicting failures of learning-enabled systems during their operation. Particularly, we consider stochastic learning-enabled systems and signal temporal logic specifications, and we want to calcu...
We are interested in predicting failures of learning-enabled systems during their operation. Particularly, we consider stochastic learning-enabled systems and signal temporal logic specifications, and we want to calculate the probability that the current system trajectory will violate the specification. The paper presents two predictive runtime verification algorithms that predict future system states from the current observed system trajectory. As these predictions may not be accurate, we construct prediction regions that quantify prediction uncertainty by using conformal prediction, a statistical tool for uncertainty quantification. Our first algorithm directly constructs a prediction region for the satisfaction measure of the specification so that we can predict specification violations with a desired confidence. The second algorithm constructs prediction regions for future system states first, and uses these to obtain a prediction region for the satisfaction measure. To the best of our knowledge, these are the first formal guarantees for a predictive runtime verification algorithm that applies to widely used trajectory predictors such as RNNs and LSTMs, while being computationally simple and making no assumptions on the underlying distribution. We present numerical experiments of an F-16 aircraft and a self-driving car.
Effectively summarizing dense 3D point cloud data and extracting motion information of moving objects (moving object segmentation, MOS) is crucial to autonomous driving and robotics applications. How to effectively ut...
详细信息
ISBN:
(数字)9798331509644
ISBN:
(纸本)9798331509651
Effectively summarizing dense 3D point cloud data and extracting motion information of moving objects (moving object segmentation, MOS) is crucial to autonomous driving and robotics applications. How to effectively utilize motion and semantic features and avoid information loss during 3D-to-2D projection is still a key challenge. In this paper, we propose a novel multi-view MOS model (MV-MOS) by fusing motion-semantic features from different 2D representations of point clouds. To effectively exploit complementary information, the motion branches of the proposed model combines motion features from both bird's eye view (BEV) and range view (RV) representations. In addition, a semantic branch is introduced to provide supplementary semantic features of moving objects. Finally, a Mamba module is utilized to fuse the semantic features with motion features and provide effective guidance for the motion branches. We validated the effectiveness of the proposed multi-branch fusion MOS framework via comprehensive experiments, and our proposed model outperforms existing state-of-the-art models on the SemanticKITTI benchmark. The implementation codes are available at https://***/Chengjt1999/MV-MOS.
We study causal effect estimation from a mixture of observational and interventional data in a confounded linear regression model with multivariate treatments. We show that the statistical efficiency in terms of expec...
详细信息
暂无评论