读书笔记
Cindy has a Way
这个作者很懒,什么都没留下…
展开
-
Seurat R 安装及单细胞数据处理
Seurat of single-cell data processing原创 2022-11-01 21:25:33 · 763 阅读 · 1 评论 -
Efficient and Effective Express via Contextual Cooperative Reinforcement Learning
原创 2021-07-20 14:34:06 · 161 阅读 · 0 评论 -
Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor net
原创 2021-06-08 20:04:24 · 87 阅读 · 0 评论 -
A Taxi Order Dispatch Model based On Combinatorial Optimization
这里为什么不适用神经网络呢?![在这里插入图片描述](https://img-blog.csdnimg.cn/20210608195356600.png原创 2021-06-08 19:54:52 · 195 阅读 · 0 评论 -
Exploiting big data in logistics risk assessment via bayesian nonparametrics[J]
原创 2021-06-08 19:46:43 · 74 阅读 · 0 评论 -
Combinatorial Optimization by Graph Pointer Networks and Hierarchical Reinforcement Learning
下面的图和文章描述有点出入???作者的TSP写成了TPS。。。原创 2021-06-08 19:41:28 · 245 阅读 · 2 评论 -
Addressing the minimum fleet problem in on-demand urban mobility
原创 2021-06-08 19:36:32 · 211 阅读 · 0 评论 -
看李宏毅老师PPO笔记
参考学习:https://github.com/datawhalechina/easy-rl在强化学习里面,环境跟奖励函数不是你可以控制的,环境跟奖励函数是在开始学习之前,就已经事先给定的。你唯一能做的事情是调整Policy Network里面的策略(policy),使得可以得到最大的奖励。Policy Network里面会有一个策略, 这个策略决定了Policy Network的行为。策略就是给一个外界的输入,然后它会输出Policy Network现在应该要执行的行为。网络的输入就是现在机器看.原创 2021-06-07 14:37:17 · 363 阅读 · 2 评论 -
读书笔记(九)-- Ethereum contract attack
Atzei, Nicola, Massimo Bartoletti, and Tiziana Cmoli. "A survey ofattacks on Ethereum smart contracts."IACR Cryptology ePrintArchive 2016 (2016): 1007.A. Problem StatementThe paper targets the p...原创 2019-10-26 23:35:12 · 850 阅读 · 1 评论 -
读书笔记(八)--多平台IoT
Hernández-Serrano, Juan, et al. “On the road to secure and privacypreserving IoT Ecosystems.” International Workshop on Interoperability and Open-Source Solutions. Springer, Cham, 2016.A. Problem S...原创 2019-08-30 02:23:13 · 295 阅读 · 0 评论 -
读书笔记(七)--IoT Security
Li, Chao, and Balaji Palanisamy. “Privacy in Internet of Things: from Principles to Technologies.” IEEE Internet of Things Journal (2018).A. Problem StatementThe paper targets the problem of priva...原创 2019-08-30 01:48:49 · 667 阅读 · 0 评论 -
读书笔记(六)--Catena
Ali, Muneeb, et al. “Blockstack: A global naming and storage system secured by blockchains.” 2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16). 2016.A. Problem StatementThe paper target...原创 2019-08-18 13:09:12 · 468 阅读 · 0 评论 -
读书笔记(五)--Blockstack
Ali, Muneeb, et al. “Blockstack: A global naming and storage system secured by blockchains.” 2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16). 2016.A. Problem StatementThe paper target...原创 2019-08-22 20:00:48 · 859 阅读 · 0 评论 -
小白初学AFL(American Fuzzy Lop)
有幸从一位师哥那里知道这个软件,但是由于实习刚刚结束,终于有时间一探当前最为强大而有效的漏洞挖掘技术。首先我的电脑系统是WINDOWS10,而AFL支持的是Linux系统,当然大家如果不想安装双系统或者是虚拟机,可以下载WINAFL:下载地址我正好想更熟悉Linux系统就下了个虚拟机,开始了我的探索旅程。安装AFL在指定目录下检查LLVM和CLANG是否安装:sudo apt-get i...原创 2019-08-18 17:31:50 · 14898 阅读 · 4 评论 -
读书笔记(四)--PBFT
Castro, Miguel, and Barbara Liskov. “Practical Byzantine fault tolerance.” OSDI.Vol.99.1999.A. Problem StatementThe paper targets the problem of the original Byzantine fault-tolerant algorithm is ...原创 2019-08-01 21:15:11 · 333 阅读 · 0 评论 -
读书笔记(三)--拜占庭问题
Lamport, Leslie, Robert Shostak, and Marshall Pease. “The Byzantine generals problem.” ACM Transactions on Programming Languages and Systems (TOPLAS) 4.3 (1982): 382-401A. Problem StatementThe pap...原创 2019-08-01 21:09:51 · 394 阅读 · 0 评论