作者:
Xiaoying DaiLiwei ZhangAihui ZhouLSEC
Institute of Computational Mathematics and Scientific/Engineering ComputingAcademy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China School of Mathematical Sciences
University of Chinese Academy of SciencesBeijing 100049China
To obtain convergent numerical approximations without using any orthogonalization operations is of great importance in electronic structure *** this paper,we propose and analyze a class of iteration schemes for the di...
详细信息
To obtain convergent numerical approximations without using any orthogonalization operations is of great importance in electronic structure *** this paper,we propose and analyze a class of iteration schemes for the discretized Kohn-Sham Density Functional Theory model,with which the iterative approximations are guaranteed to converge to the Kohn-Sham orbitals without any orthogonalization as long as the initial orbitals are orthogonal and the time step sizes are given *** addition,we present a feasible and efficient approach to get suitable time step sizes and report some numerical experiments to validate our theory.
Textual sentiment analysis (TSA) has gained significant attention recently for its wide-ranging applications across various research domains and industries. However, most existing research and sentiment analysis tools...
详细信息
Machine Translation (MT) has emerged as an important research area in the computational intelligence domain to translate huge online resources cost-effectively. Among different MT approaches, Neural based Machine Tran...
详细信息
With the availability of high-resolution aerial imagery, we propose an attention-based dual-stream decoder architecture for weakly supervised solar panel mapping with the advantage of both reduced annotation costs and...
详细信息
The prevalence of multilabel aggressive text content on social media has a detrimental societal impact attracting the attention of government agencies and tech corporations to undertake measures against the spread of ...
详细信息
The role of Cyber-physical production systems (CPPSs) as Industry 4.0 enablers has raised the interest to upgrade legacy production systems. However, manufacturers face uncertainty when assessing if the transformation...
详细信息
The human brain has a simple time analyzing and processing images. The brain is able to rapidly deconstruct and distinguish an image's various components when the eye perceives it. With the Convolutional Neural Ne...
详细信息
Fuzzing is a widely-used software vulnerability discovery technology, many of which are optimized using coverage-feedback. Recently, some techniques propose to train deep learning (DL) models to predict the branch cov...
详细信息
Fuzzing is a widely-used software vulnerability discovery technology, many of which are optimized using coverage-feedback. Recently, some techniques propose to train deep learning (DL) models to predict the branch coverage of an arbitrary input owing to its always-available gradients etc. as a guide. Those techniques have proved their success in improving coverage and discovering bugs under different experimental settings. However, DL models, usually as a magic black-box, are notoriously lack of explanation. Moreover, their performance can be sensitive to the collected runtime coverage information for training, indicating potentially unstable performance. In this work, we conduct a systematic empirical study on 4 types of DL models across 6 projects to (1) revisit the performance of DL models on predicting branch coverage (2) demystify what specific knowledge do the models exactly learn, (3) study the scenarios where the DL models can outperform and underperform the traditional fuzzers, and (4) gain insight into the challenges of applying DL models on fuzzing. Our empirical results reveal that existing DL-based fuzzers do not perform well as expected, which is largely affected by the dependencies between branches, unbalanced sample distribution, and the limited model expressiveness. In addition, the estimated gradient information tends to be less helpful in our experiments. Finally, we further pinpoint the research directions based on our summarized challenges. IEEE
Bitcoin is under the threat of fork since it operates with a distributed ledger. Predicting the fork probability in advance is beneficial for taking early action to avoid malicious attacks. In this study, we compose a...
详细信息
Failure of large complex structures such as buildings and bridges can have monumental repercussions such as human mortality, environmental destruction and economic consequences. It is therefore paramount that detectio...
详细信息
暂无评论