Visual Language Navigation (VLN) is the grand goal of AI, which enables the agent to act by the language instructions from humans. In VLN task, the agent learns to search for a specific region described by the instruc...
详细信息
Learning expressive stochastic policies instead of deterministic ones has been proposed to achieve better stability, sample complexity, and robustness. Notably, in Maximum Entropy Reinforcement Learning (MaxEnt RL), t...
详细信息
Ethereum blockchain is a new internetware with tens of millions of smart contracts running on *** from general programs,smart contracts are decentralized,tamper-resistant and permanently ***,to avoid resource abuse,Et...
详细信息
Ethereum blockchain is a new internetware with tens of millions of smart contracts running on *** from general programs,smart contracts are decentralized,tamper-resistant and permanently ***,to avoid resource abuse,Ethereum charges users for deploying and invoking smart contracts according to the size of contract and the operations executed by *** is necessary to optimize smart contracts to save ***,since developers are not familiar with the operating environment of smart contracts(i.e.,Ethereum virtual machine)or do not pay attention to resource consumption during development,there are many optimization opportunities for smart *** fill this gap,this paper defines six gas-inefficient patterns from more than 25,000 posts and proposes an optimization approach at the source code level to let users know clearly where the contract is *** evaluate the prevalence and economic benefits of gas-inefficient patterns,this paper conducts an empirical study on more than 160,000 real smart *** promising experimental results demonstrate that 52.75%of contracts contain at least one gas-inefficient pattern proposed in this *** these patterns are removed from the contract,at least 0.30 can be saved per contract.
Agriculture gained great interest in the last decade due to high demands from international societies and organizations. World countries are threatened by upcoming fountains due to secrecy, diseases, climate change, a...
详细信息
ISBN:
(数字)9798350343427
ISBN:
(纸本)9798350343434
Agriculture gained great interest in the last decade due to high demands from international societies and organizations. World countries are threatened by upcoming fountains due to secrecy, diseases, climate change, and leakage of water resources. Greenhouses are the key factor in mitigating climate change's effect on agriculture. However, it has some challenges that require a smart system to control and manage it effectively. The most erotic issues are environmental parameters, infections, irrigation control, and fertilizer control. This paper proposes a smart greenhouse prototype utilizing the Internet of Things and edge computing to maximize productivity and minimize losses. The results proved the willingness of the proposed system to solve the related issues at a low cost.
We consider convex optimization with non-smooth objective function and log-concave sampling with non-smooth potential (negative log density). In particular, we study two specific settings where the convex objective/po...
详细信息
Convolution is the fundamental unit of operation in convolutional neural networks. However, traditional static convolution is subject to two significant limitations: a weak ability to effectively integrate global and ...
详细信息
In this paper, we propose a novel architecture for a multi-layer active-passive cascade transmitting reconfigurable intelligent surface (RIS)-aided receiver. We aim at enhancing the scalability of antenna dimensions a...
详细信息
Automatic recognition of facial expressions is a common problem in human-computer interaction. While humans can recognize facial expressions very easily, machines cannot do it as easily as humans. Analyzing facial cha...
详细信息
Recommender systems, which make precise recommendations through historical interaction data of users and items, have been widely used in real life. But at the same time, because of the open nature of the systems, they...
详细信息
ISBN:
(数字)9798350359145
ISBN:
(纸本)9798350359152
Recommender systems, which make precise recommendations through historical interaction data of users and items, have been widely used in real life. But at the same time, because of the open nature of the systems, they are vulnerable to malicious attacks. To explore the robustness of recommender systems, researchers have proposed various attack methods and analyzed their adverse effects. Although the current attack methods can make good results on rating-based recommender systems, they lack thinking about an attack for a social recommendation. Social relationships have a non-negligible role in recommender systems, but there is still little related research, which only constructs fake rating profiles and fake relationship profiles with simple rules, without considering the mutual influence of rating and social information. To address the above problem, we study the attack method with deeply hidden features and propose a hybrid attack method based on sensitive users. It can further enhance the hidden features of fake users, and then use social attacks to assist in attacking social recommendation methods. Empirical results on three public datasets show that our method outperforms traditional methods in terms of attack effectiveness and has excellent anti-detection capability. Ultimately, we hope that our method could enable more analysis for such a hybrid attack and guides for investigating effective prevention measures.
暂无评论