Search
Skip to Search Results- 2Reinforcement Learning
- 1Android Malware Detection, Static Analysis, Factorization Machine
- 1Cloud Computing
- 1Cloud-storage Providers
- 1Continuous Action Space
- 1Data Transfer Nodes
-
Fall 2023
With the increasing complexity and capacity of modern Field-Programmable Gate Arrays (FPGAs), there is a growing demand for efficient FPGA computer-aided design (CAD) tools, particularly at the placement stage. While some previous works, such as RLPlace, have explored the efficacy of single-state...
-
Fall 2021
Malware classification is a critical task in cybersecurity. It offers insights on the threats posed to victim devices from different malware and aids in the designing of precautionary measures. In real world applications, due to the vast amount of malware present in the networks, real-time...
-
Fall 2018
With the increasing popularity of Android smart phones in recent years, the amount of Android malware is growing rapidly. Due to its great threat and damage to mobile phone users, Android malware detection has become increasingly important in cyber security. Traditional methods for android...
-
Fall 2016
We provide a case study of current inefficiencies in how traffic to well-known cloud-storage providers (e.g., Dropbox, Google Drive, Microsoft OneDrive) can vary significantly in throughput (e.g., a factor of 5 or more) depending on the location of the source and sink of the data. Our case study...
-
Spring 2020
With the popularity of smart mobile devices, the need to control mobile devices using voice is increasing. Also, there is greater expectation for the accuracy of keyword spotting. Many existing researches have applied neural networks to keyword spotting, and have great performances. However, at...
-
Spring 2020
Natural Language Processing (NLP) and understanding aims to read from unformatted text to accomplish different tasks. As a first step, it is necessary to represent text as a simplified model. Traditionally, Vector Space Model (VSM) is most commonly used, in which text is represented as a bag of...
-
Spring 2019
The development of modern machine learning systems not only provides the opportunity of applications in various fields but also creates many challenges. The core of machine learning is to train a model based on a dataset, which can be posed as solving an optimization problem, usually expressed...
-
On the Application of Continuous Deterministic Reinforcement Learning in Neural Architecture Search
DownloadSpring 2021
Architecture evaluation is a major bottleneck of Neural Architecture Search (NAS). Recent trends have seen a shift in favor of weight-sharing networks capable of superimposing all possible candidate architectures in a search space. Nevertheless, this technique is not beyond reproach, and has...
-
Fall 2017
In recent years fake news has become a more serious problem. This is mainly due to the popularity of social networks, search engines and news ag- gregators that propagate fake news. Classifying news as fake is a hard problem. However it is possible to distinguish between fake and real news, by...
-
Fall 2015
Providing service in cloud is a popular trend nowadays. Users request resources from a shared pool in a framework like Hadoop, and the Hadoop fair scheduler controls the progress of tasks from users. In cloud, usually multiple resource types are available. The heterogeneous user demands and...