2010 International Conference on Machine Learning and Cybernetics 2010
DOI: 10.1109/icmlc.2010.5580741
|View full text |Cite
|
Sign up to set email alerts
|

Intra Frame Interpolation with H.264 intra prediction method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Due to the wide adoption of bandit algorithms in practice, increasing amount of research attention has been spent on adversarial attacks against such algorithms to understand their robustness implications. To date, most effort has been focused on data poisoning attacks against stochastic MAB (Jun et al 2018;Liu and Shroff 2019) and linear contextual bandit (Garcelon et al 2020;Wang, Xu, and Wang 2022) algorithms. And these methods follow the same principle: deliberately lower the reward of non-target arms, to deceive the learner to pull the target arm a linear number of times.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the wide adoption of bandit algorithms in practice, increasing amount of research attention has been spent on adversarial attacks against such algorithms to understand their robustness implications. To date, most effort has been focused on data poisoning attacks against stochastic MAB (Jun et al 2018;Liu and Shroff 2019) and linear contextual bandit (Garcelon et al 2020;Wang, Xu, and Wang 2022) algorithms. And these methods follow the same principle: deliberately lower the reward of non-target arms, to deceive the learner to pull the target arm a linear number of times.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, most existing MAB algorithms can be easily protected by such a detection method, with little impact on their regret. This provides a new perspective to examine the robustness or the so-called attackability (Wang, Xu, and Wang 2022) of MAB algorithms under the presence of attack detection methods.…”
Section: Introductionmentioning
confidence: 99%
“…Based on our predictive model and interpretability analysis, we propose a quantitative strategy to enhance companies' digital transformation [48]. Among the eight key features, namely RDeapoinr, Lev, and ATO, adjusting the latter three is relatively easier compared to the remaining features, which are relatively fixed.…”
Section: Improve Quantitative Adjustment Strategies For Digital Trans...mentioning
confidence: 99%
“…To understand teaching, a special case is first considered where the optimal arm k † is known by the server. Then, the goal is to assign adjustments to have the clients pull the pre-specified arm k † as much as possible, which is mathematically the same as the data-poisoning MAB problem [22], [24], [25], [49], where adjustments are phrased as "attacks". In such scenarios, the server can achieve R m (T ) = O(log(T )) and C m (T ) = O(log(T )) for each m ∈ [M ] by adjusting rewards from all arms except arm k † to 0's [26].…”
Section: Two Coupled Tasks and Design Objectivesmentioning
confidence: 99%