Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted *** traditional outsourcing computation model forbids communication between p...
详细信息
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted *** traditional outsourcing computation model forbids communication between players,but it has little *** on the game theory,this paper establishes an outsourcing computation model which is more in line with the actual ***,we construct a structural mapping relationship between security outsourcing computation and the optimization ***,by designing the individual potential function and the global potential function,the individual goal is consistent with the global goal to ensure the correctness of the calculation ***,in the information exchange environment between calculators,we construct a Zero-determinant strategy to ensure that the calculator chooses the strategy according to the predetermined target.
Despite the superior performance of large language models to generate natural language texts, it is hard to generate texts with correct logic according to a given task, due to the difficulties for neural models to cap...
In coming up with solutions to real-world problems, humans implicitly adhere to constraints that are too numerous and complex to be specified completely. However, reinforcement learning (RL) agents need these constrai...
详细信息
In coming up with solutions to real-world problems, humans implicitly adhere to constraints that are too numerous and complex to be specified completely. However, reinforcement learning (RL) agents need these constraints to learn the correct optimal policy in these settings. The field of Inverse Constraint Reinforcement Learning (ICRL) deals with this problem and provides algorithms that aim to estimate the constraints from expert demonstrations collected offline. Practitioners prefer to know a measure of confidence in the estimated constraints, before deciding to use these constraints, which allows them to only use the constraints that satisfy a desired level of confidence. However, prior works do not allow users to provide the desired level of confidence for the inferred constraints. This work provides a principled ICRL method that can take a confidence level with a set of expert demonstrations and outputs a constraint that is at least as constraining as the true underlying constraint with the desired level of confidence. Further, unlike previous methods, this method allows a user to know if the number of expert trajectories is insufficient to learn a constraint with a desired level of confidence, and therefore collect more expert trajectories as required to simultaneously learn constraints with the desired level of confidence and a policy that achieves the desired level of performance. Copyright 2024 by the author(s)
This article covers the design, implementation, mathematical modelling, and control of a multivariable, underactuated, low-cost, three-degrees-of-freedom experimental helicopter system (namely a 3-DOF helicopter). The...
详细信息
In our study, we investigate how the brain maps environmental spaces into understandable maps through hippocampal place cells and entorhinal cortex grid cells. We uncover that the hippocampus and entorhinal cortex are...
详细信息
Relationships were discussed in this work between discharge current and electrode moving speed, ionization coefficient, field strength, gas pressure, temperature, humidity and other factors. Gas flow distribution arou...
详细信息
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in tra...
详细信息
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in traditional machine learning algorithms in favor of vector *** embedding methods build an important bridge between social network analysis and data analytics as social networks naturally generate an unprecedented volume of graph data *** social network data not only bring benefit for public health,disaster response,commercial promotion,and many other applications,but also give birth to threats that jeopardize each individual’s privacy and ***,most existing works in publishing social graph embedding data only focus on preserving social graph structure with less attention paid to the privacy issues inherited from social *** be specific,attackers can infer the presence of a sensitive relationship between two individuals by training a predictive model with the exposed social network *** this paper,we propose a novel link-privacy preserved graph embedding framework using adversarial learning,which can reduce adversary’s prediction accuracy on sensitive links while persevering sufficient non-sensitive information such as graph topology and node attributes in graph *** experiments are conducted to evaluate the proposed framework using ground truth social network datasets.
With the rapid development of deep learning, the increasing complexity and scale of parameters make training a new model increasingly resource-intensive. In this paper, we start from the classic convolutional neural n...
This paper studies the fixed-time consensus tracking problem of nonlinear multi-agent systems, where communication links are subjected to denial-of-service (DoS) attacks. The DoS attacks make the communication network...
详细信息
Multi-view semi-supervised classification primarily aims to enhance classification accuracy when dealing with limited labeled samples. Although existing methods have shown impressive performance, significant challenge...
详细信息
暂无评论