677 research outputs found
Bidirectional-Convolutional LSTM Based Spectral-Spatial Feature Learning for Hyperspectral Image Classification
This paper proposes a novel deep learning framework named
bidirectional-convolutional long short term memory (Bi-CLSTM) network to
automatically learn the spectral-spatial feature from hyperspectral images
(HSIs). In the network, the issue of spectral feature extraction is considered
as a sequence learning problem, and a recurrent connection operator across the
spectral domain is used to address it. Meanwhile, inspired from the widely used
convolutional neural network (CNN), a convolution operator across the spatial
domain is incorporated into the network to extract the spatial feature.
Besides, to sufficiently capture the spectral information, a bidirectional
recurrent connection is proposed. In the classification phase, the learned
features are concatenated into a vector and fed to a softmax classifier via a
fully-connected operator. To validate the effectiveness of the proposed
Bi-CLSTM framework, we compare it with several state-of-the-art methods,
including the CNN framework, on three widely used HSIs. The obtained results
show that Bi-CLSTM can improve the classification performance as compared to
other methods
EASYFLOW: Keep Ethereum Away From Overflow
While Ethereum smart contracts enabled a wide range of blockchain
applications, they are extremely vulnerable to different forms of security
attacks. Due to the fact that transactions to smart contracts commonly involve
cryptocurrency transfer, any successful attacks can lead to money loss or even
financial disorder. In this paper, we focus on the overflow attacks in Ethereum
, mainly because they widely rooted in many smart contracts and comparatively
easy to exploit. We have developed EASYFLOW , an overflow detector at Ethereum
Virtual Machine level. The key insight behind EASYFLOW is a taint analysis
based tracking technique to analyze the propagation of involved taints.
Specifically, EASYFLOW can not only divide smart contracts into safe contracts,
manifested overflows, well-protected overflows and potential overflows, but
also automatically generate transactions to trigger potential overflows. In our
preliminary evaluation, EASYFLOW managed to find potentially vulnerable
Ethereum contracts with little runtime overhead.Comment: Proceedings of the 41st International Conference on Software
Engineering: Companion Proceedings. IEEE Press, 201
A Block-Ring connected Topology of Parameterized Quantum Circuits
It is essential to select efficient topology of parameterized quantum
circuits (PQCs) in variational quantum algorithms (VQAs). However, there are
problems in current circuits, i.e. optimization difficulties caused by too many
parameters or performance is hard to guarantee. How to reduce the number of
parameters (number of single-qubit rotation gates and 2-qubit gates) in PQCs
without reducing the performance has become a new challenge. To solve this
problem, we propose a novel topology, called Block-Ring (BR) topology, to
construct the PQCs. This topology allocate all qubits to several blocks,
all-to-all mode is adopt inside each block and ring mode is applied to connect
different blocks. Compared with the pure all-to-all topology circuits which own
the best power, BR topology have similar performance and the number of
parameters and 2-qubit gate reduced from 0(n^2) to 0(mn) , m is a
hyperparameter set by ourselves. Besides, we compared BR topology with other
topology circuits in terms of expressibility and entangling capability.
Considering the effects of different 2-qubit gates on circuits, we also make a
distinction between controlled X-rotation gates and controlled Z-rotation
gates. Finally, the 1- and 2-layer configurations of PQCs are taken into
consideration as well, which shows the BR's performance improvement in the
condition of multilayer circuits.Comment: 9 pages, 12 figure
- …