Search Results

Block Chain based Intelligent Industrial Network (DSDIN)

1 code implementation18 Sep 2018

This paper introduces an Intelligent Industrial Network (DSDIN), which provides a fully distributed manufacturing network where everyone can participate in manufacturing due to decentralization and no intermediate links, allowing them to quickly get the products or services they want and also to be authorized, recognized and get returns in a low-cost way due to their efforts (such as providing creative ideas, designs or equipment, raw materials or physical strength).

Computers and Society

Trojan Source: Invisible Vulnerabilities

3 code implementations30 Oct 2021

This attack exploits subtleties in text-encoding standards such as Unicode to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers.

Cryptography and Security Programming Languages

LadderNet: Multi-path networks based on U-Net for medical image segmentation

3 code implementations17 Oct 2018

A LadderNet has more paths for information flow because of skip connections and residual blocks, and can be viewed as an ensemble of Fully Convolutional Networks (FCN).

Image Segmentation Retinal Vessel Segmentation +2

Skeleton-Aware Networks for Deep Motion Retargeting

1 code implementation12 May 2020

In other words, our operators form the building blocks of a new deep motion processing framework that embeds the motion into a common latent space, shared by a collection of homeomorphic skeletons.

motion retargeting Motion Synthesis

Fraud Proofs: Maximising Light Client Security and Scaling Blockchains with Dishonest Majorities

1 code implementation24 Sep 2018

Light clients, also known as Simple Payment Verification (SPV) clients, are nodes which only download a small portion of the data in a blockchain, and use indirect means to verify that a given chain is valid.

Cryptography and Security

Neural Video Compression with Feature Modulation

1 code implementation27 Feb 2024

This results in a better learning of the quantization scaler and helps our NVC support about 11. 4 dB PSNR range.

Blocking Quantization +1

Transaction Fees on a Honeymoon: Ethereum's EIP-1559 One Month Later

4 code implementations10 Oct 2021

EIP-1559 utilizes an algorithmic update rule with a constant learning rate to estimate a base fee.

Computer Science and Game Theory Multiagent Systems Social and Information Networks Dynamical Systems 91A80, 91-10, 91B26

Tensor network simulation of chains of non-Markovian open quantum systems

1 code implementation14 Jan 2022

We introduce a general numerical method to compute dynamics and multi-time correlations of chains of quantum systems, where each system may couple strongly to a structured environment.

Quantum Physics Mesoscale and Nanoscale Physics

CubeFlow: Money Laundering Detection with Coupled Tensors

1 code implementation23 Mar 2021

Money laundering (ML) is the behavior to conceal the source of money achieved by illegitimate activities, and always be a fast process involving frequent and chained transactions.

Computers and Society