Zum Hauptinhalt springen

Showing 1–7 of 7 results for author: Trinh, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.08474  [pdf, other

    cs.CR cs.AI

    VulnSense: Efficient Vulnerability Detection in Ethereum Smart Contracts by Multimodal Learning with Graph Neural Network and Language Model

    Authors: Phan The Duy, Nghi Hoang Khoa, Nguyen Huu Quyen, Le Cong Trinh, Vu Trung Kien, Trinh Minh Hoang, Van-Hau Pham

    Abstract: This paper presents VulnSense framework, a comprehensive approach to efficiently detect vulnerabilities in Ethereum smart contracts using a multimodal learning approach on graph-based and natural language processing (NLP) models. Our proposed framework combines three types of features from smart contracts comprising source code, opcode sequences, and control flow graph (CFG) extracted from bytecod… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

  2. arXiv:2103.13059  [pdf, other

    stat.ML cs.LG

    Towards Optimal Algorithms for Multi-Player Bandits without Collision Sensing Information

    Authors: Wei Huang, Richard Combes, Cindy Trinh

    Abstract: We propose a novel algorithm for multi-player multi-armed bandits without collision sensing information. Our algorithm circumvents two problems shared by all state-of-the-art algorithms: it does not need as an input a lower bound on the minimal expected reward of an arm, and its performance does not scale inversely proportionally to the minimal expected reward. We prove a theoretical regret upper… ▽ More

    Submitted 6 June, 2022; v1 submitted 24 March, 2021; originally announced March 2021.

    Comments: 24 pages, COLT 2022

  3. arXiv:2102.10200  [pdf, other

    cs.LG stat.ML

    A High Performance, Low Complexity Algorithm for Multi-Player Bandits Without Collision Sensing Information

    Authors: Cindy Trinh, Richard Combes

    Abstract: Motivated by applications in cognitive radio networks, we consider the decentralized multi-player multi-armed bandit problem, without collision nor sensing information. We propose Randomized Selfish KL-UCB, an algorithm with very low computational complexity, inspired by the Selfish KL-UCB algorithm, which has been abandoned as it provably performs sub-optimally in some cases. We subject Randomize… ▽ More

    Submitted 19 February, 2021; originally announced February 2021.

    Comments: 14 pages

  4. arXiv:2012.02328  [pdf, other

    cs.LG cs.DC

    MLPerf Mobile Inference Benchmark

    Authors: Vijay Janapa Reddi, David Kanter, Peter Mattson, Jared Duke, Thai Nguyen, Ramesh Chukka, Ken Shiring, Koan-Sin Tan, Mark Charlebois, William Chou, Mostafa El-Khamy, Jungwook Hong, Tom St. John, Cindy Trinh, Michael Buch, Mark Mazumder, Relia Markovic, Thomas Atta, Fatih Cakir, Masoud Charkhabi, Xiaodong Chen, Cheng-Ming Chiang, Dave Dexter, Terry Heo, Gunther Schmuelling , et al. (2 additional authors not shown)

    Abstract: This paper presents the first industry-standard open-source machine learning (ML) benchmark to allow perfor mance and accuracy evaluation of mobile devices with different AI chips and software stacks. The benchmark draws from the expertise of leading mobile-SoC vendors, ML-framework providers, and model producers. It comprises a suite of models that operate with standard data sets, quality metrics… ▽ More

    Submitted 6 April, 2022; v1 submitted 3 December, 2020; originally announced December 2020.

  5. arXiv:2007.06884  [pdf, ps, other

    cs.CR

    Lattice Blind Signatures with Forward Security

    Authors: Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran, Viet Cuong Trinh, Josef Pieprzyk, Thomas Plantard

    Abstract: Blind signatures play an important role in both electronic cash and electronic voting systems. Blind signatures should be secure against various attacks (such as signature forgeries). The work puts a special attention to secret key exposure attacks, which totally break digital signatures. Signatures that resist secret key exposure attacks are called forward secure in the sense that disclosure of a… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

    Comments: ACISP 2020

  6. arXiv:1912.03074  [pdf, other

    stat.ML cs.LG

    Solving Bernoulli Rank-One Bandits with Unimodal Thompson Sampling

    Authors: Cindy Trinh, Emilie Kaufmann, Claire Vernade, Richard Combes

    Abstract: Stochastic Rank-One Bandits (Katarya et al, (2017a,b)) are a simple framework for regret minimization problems over rank-one matrices of arms. The initially proposed algorithms are proved to have logarithmic regret, but do not match the existing lower bound for this problem. We close this gap by first proving that rank-one bandits are a particular instance of unimodal bandits, and then providing a… ▽ More

    Submitted 6 December, 2019; originally announced December 2019.

  7. arXiv:1904.02768  [pdf, other

    cs.CV

    Biometric Fish Classification of Temperate Species Using Convolutional Neural Network with Squeeze-and-Excitation

    Authors: Erlend Olsvik, Christian M. D. Trinh, Kristian Muri Knausgård, Arne Wiklund, Tonje Knutsen Sørdalen, Alf Ring Kleiven, Lei Jiao, Morten Goodwin

    Abstract: Our understanding and ability to effectively monitor and manage coastal ecosystems are severely limited by observation methods. Automatic recognition of species in natural environment is a promising tool which would revolutionize video and image analysis for a wide range of applications in marine ecology. However, classifying fish from images captured by underwater cameras is in general very chall… ▽ More

    Submitted 4 April, 2019; originally announced April 2019.