Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont...
详细信息
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart contracts often cause huge economic *** it is difficult to repair and update smart contracts,it is necessary to find the vulnerabilities before they are ***,code analysis,which requires traversal paths,and learning methods,which require many features to be trained,are too time-consuming to detect large-scale on-chain ***-based methods will obtain detection models from a feature space compared to code analysis methods such as symbol *** the existing features lack the interpretability of the detection results and training model,even worse,the large-scale feature space also affects the efficiency of *** paper focuses on improving the detection efficiency by reducing the dimension of the features,combined with expert *** this paper,a feature extraction model Block-gram is proposed to form low-dimensional knowledge-based features from ***,the metadata is separated and the runtime code is converted into a sequence of opcodes,which are divided into segments based on some instructions(jumps,etc.).Then,scalable Block-gram features,including 4-dimensional block features and 8-dimensional attribute features,are mined for the learning-based model ***,feature contributions are calculated from SHAP values to measure the relationship between our features and the results of the detection *** addition,six types of vulnerability labels are made on a dataset containing 33,885 contracts,and these knowledge-based features are evaluated using seven state-of-the-art learning algorithms,which show that the average detection latency speeds up 25×to 650×,compared with the features extracted by N-gram,and also can enhance the interpretability of the detection model.
In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its as...
详细信息
In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its associated users on its own *** aim at maximizing the overall common throughput in a finite time *** a problem is a typical mixed integer nonlinear problem,which involves both continuous-variable and combinatorial *** efficiently solve this problem,we propose a two-layer algorithm,which separately tackles continuous-variable and combinatorial ***,in the inner layer given one user association scheme,subproblems of bandwidth allocation,power allocation and trajectory design are solved based on alternating *** the outer layer,a small number of candidate user association schemes are generated from an initial scheme and the best solution can be determined by comparing all the candidate *** particular,a clustering algorithm based on K-means is applied to produce all candidate user association schemes,the successive convex optimization technique is adopted in the power allocation subproblem and a logistic function approximation approach is employed in the trajectory design *** results show that the proposed NOMA scheme outperforms three baseline schemes in downlink common throughput,including one solution proposed in an existing literature.
Learning from demonstration(LfD) allows for the effective transfer of human manipulation skills to a robot by building a model that represents these skills based on a limited number of demonstrated ***,a skilllearning...
详细信息
Learning from demonstration(LfD) allows for the effective transfer of human manipulation skills to a robot by building a model that represents these skills based on a limited number of demonstrated ***,a skilllearning model that can comprehensively satisfy multiple requirements,such as computational complexity,modeling accuracy,trajectory smoothness,and robustness,is still ***,this work aims to provide such a model by employing fuzzy ***,we introduce an LfD model named Takagi-Sugeno-Kang fuzzy system-based movement primitives(TSKFMPs),which exploits the advantages of the fuzzy theory for effective robotic imitation learning of human *** work formulates the TSK fuzzy system and gradient descent(GD) as imitation learning models,leveraging recent advancements in GD-based optimization for fuzzy *** study takes a two-step strategy.(ⅰ) The input-output relationships of the model are established using TSK fuzzy systems based on demonstration *** this way,the skill is encoded by the model parameter in the latent space.(ⅱ) GD is used to optimize the model parameter to increase the modeling accuracy and trajectory *** further explain how learned trajectories are adapted to new task scenarios through local *** conduct multiple tests using an open dataset to validate our method,and the results demonstrate performance comparable with those of other ***,we implement it in a real-world case study.
Due to the adaptable deployment and extensive coverage, autonomous aerial vehicles (AAVs) have gained considerable attention in the field of mobile edge computing (MEC). Nevertheless, meeting the requirements of task ...
详细信息
With the rapid development of civil aviation, flight delays have become increasingly critical. Effectively predicting flight delays has become a research hotspot in recent years. In this paper, we propose a novel flig...
详细信息
The multitasking mechanism between activities and fragments plays a fundamental role in the Android operating system, which involves a wide range of features, including launch modes, intent flags, task affinities, and...
详细信息
The stochastic uncertainty of wind speed presents a great challenge for achieving reliable power control in wind energy conversion system (WECS). Due to the excellence in handling the uncertainties based on probabilis...
详细信息
The advancement of the Industry 5.0 in information technology has led to increased interest in integrating edge-cloud cooperation with Internet of Things (IoT) and cyber-physical system (CPS) designs. This integration...
详细信息
Security of system behavior is a kind of information flow security, which is achieved by confusing the intruders via the indistinguishability of system behaviors. Noninterference is a typical notion to describe inform...
详细信息
Constraint-solving-based program invariant synthesis takes a parametric invariant template and encodes the (inductive) invariant conditions into constraints. The problem of characterizing the set of all valid paramete...
详细信息
暂无评论