Deep reinforcement learning models are vulnerable to adversarial attacks that can decrease the cumulative expected reward of a victim by manipulating its observations. Despite the efficiency of previous optimization-b...
详细信息
Deep reinforcement learning models are vulnerable to adversarial attacks that can decrease the cumulative expected reward of a victim by manipulating its observations. Despite the efficiency of previous optimization-based methods for generating adversarial noise in supervised learning, such methods might not achieve the lowest cumulative reward since they do not generally explore the environmental ***, a framework is provided to better understand the existing methods by reformulating the problem of adversarial attacks on reinforcement learning in the function space. The reformulation approach adopted herein generates an optimal adversary in the function space of targeted attacks, repelling them via a generic two-stage framework. In the first stage, a deceptive policy is trained by hacking the environment and discovering a set of trajectories routing to the lowest reward or the worst-case performance. Next, the adversary misleads the victim to imitate the deceptive policy by perturbing the observations. Compared to existing approaches, it is theoretically shown that our adversary is strong under an appropriate noise level. Extensive experiments demonstrate the superiority of the proposed method in terms of efficiency and effectiveness, achieving state-of-the-art performance in both Atari and MuJoCo environments.
International trade heavily relies on shipping, yet container mobility and its varying demand create imbalances in container stocks, this results in frequent scheduling of empty containers by shipping companies, leadi...
详细信息
Graph sampling is a very effective method to deal with scalability issues when analyzing largescale graphs. Lots of sampling algorithms have been proposed, and sampling qualities have been quantified using explicit pr...
详细信息
Graph sampling is a very effective method to deal with scalability issues when analyzing largescale graphs. Lots of sampling algorithms have been proposed, and sampling qualities have been quantified using explicit properties(e.g., degree distribution) of the sample. However, the existing sampling techniques are inadequate for the current sampling task: sampling the clustering structure, which is a crucial property of the current networks. In this paper, using different expansion strategies, two novel top-leader sampling methods(i.e., TLS-e and TLS-i) are proposed to obtain representative samples, and they are capable of effectively preserving the clustering structure. The rationale behind them is to select top-leader nodes of most clusters into the sample and then heuristically incorporate peripheral nodes into the sample using specific expansion strategies. Extensive experiments are conducted to investigate how well sampling techniques preserve the clustering structure of graphs. Our empirical results show that the proposed sampling algorithms can preserve the population's clustering structure well and provide feasible solutions to sample the clustering structure from large-scale graphs.
作者:
Hong, YifanJoint Quantum Institute
Joint Center for Quantum Information and Computer Science NIST University of Maryland College ParkMD20742 United States
quantum error correction is a fundamental primitive of fault-tolerant quantum computing. But in order for error correction to proceed, one must first prepare the codespace of the underlying error-correcting code. A po...
详细信息
Cloud computingmakes dynamic resource provisioning more *** a functioning service is crucial,and changes are made when particular criteria are *** research explores the decentralized multi-cloud environment for alloca...
详细信息
Cloud computingmakes dynamic resource provisioning more *** a functioning service is crucial,and changes are made when particular criteria are *** research explores the decentralized multi-cloud environment for allocating resources and ensuring the Quality of Service(QoS),estimating the required resources,and modifying allotted resources depending on workload and parallelism due to *** allocation is a complex challenge due to the versatile service providers and resource *** engagement of different service and resource providers needs a cooperation strategy for a sustainable quality of *** objective of a coherent and rational resource allocation is to attain the quality of *** also includes identifying critical parameters to develop a resource allocation mechanism.A framework is proposed based on the specified parameters to formulate a resource allocation process in a decentralized multi-cloud *** three main parameters of the proposed framework are data accessibility,optimization,and *** an optimization technique,these three segments are further divided into subsets for resource allocation and long-term service *** CloudSim simulator has been used to validate the suggested *** experiments have been conducted to find the best configurations suited for enhancing collaboration and resource allocation to achieve sustained *** results support the suggested structure for a decentralized multi-cloud environment and the parameters that have been determined.
The Smart Power Grid (SPG) is pivotal in orchestrating and managing demand response in contemporary smart cities, leveraging the prowess of information and Communication Technologies (ICTs). Within the immersive SPG e...
详细信息
Recently, pre-trained language models (PTM) have achieved great success on ad hoc search. However, the performance decline in low-resource scenarios demonstrates the capability of PTM has not been inspired fully. As a...
详细信息
Cloud computing is a dynamic and rapidly evolving field,where the demand for resources fluctuates *** paper delves into the imperative need for adaptability in the allocation of resources to applications and services ...
详细信息
Cloud computing is a dynamic and rapidly evolving field,where the demand for resources fluctuates *** paper delves into the imperative need for adaptability in the allocation of resources to applications and services within cloud computing *** motivation stems from the pressing issue of accommodating fluctuating levels of user demand *** adhering to the proposed resource allocation method,we aim to achieve a substantial reduction in energy *** reduction hinges on the precise and efficient allocation of resources to the tasks that require those most,aligning with the broader goal of sustainable and eco-friendly cloud computing *** enhance the resource allocation process,we introduce a novel knowledge-based optimization *** this study,we rigorously evaluate its efficacy by comparing it to existing algorithms,including the Flower Pollination Algorithm(FPA),Spark Lion Whale Optimization(SLWO),and Firefly *** findings reveal that our proposed algorithm,Knowledge Based Flower Pollination Algorithm(KB-FPA),consistently outperforms these conventional methods in both resource allocation efficiency and energy consumption *** paper underscores the profound significance of resource allocation in the realm of cloud *** addressing the critical issue of adaptability and energy efficiency,it lays the groundwork for a more sustainable future in cloud computing *** contribution to the field lies in the introduction of a new resource allocation strategy,offering the potential for significantly improved efficiency and sustainability within cloud computing infrastructures.
It is well known that quantum, randomized and deterministic (sequential) query complexities are polynomially related for total boolean functions. We find that significantly larger separations between the parallel gene...
详细信息
Image steganography is a technology that embed secret information within a cover image to obtain a stego-image for covert communication. The transmission of undetectable stego-images via social media can facilitate se...
详细信息
暂无评论