Search Results for author: Yaqin Zhou

Found 4 papers, 1 papers with code

LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment through Program Metrics

no code implementations31 Jan 2019 Xiaoning Du, Bihuan Chen, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu, Yu Jiang

The latter needs the prior knowledge of known vulnerabilities and can only identify similar but not new types of vulnerabilities.

Software Engineering

Networked Stochastic Multi-Armed Bandits with Combinatorial Strategies

no code implementations20 Mar 2015 Shaojie Tang, Yaqin Zhou

In particular, we consider the setting of a decision maker over a networked bandits as follows: each time a combinatorial strategy, e. g., a group of arms, is chosen, and the decision maker receives a reward resulting from her strategy and also receives a side bonus resulting from that strategy for each arm's neighbor.

Multi-Armed Bandits

Towards Distribution-Free Multi-Armed Bandits with Combinatorial Strategies

no code implementations20 Jul 2013 Xiang-Yang Li, Shaojie Tang, Yaqin Zhou

At each decision epoch, we select a strategy, i. e., a subset of RVs, subject to arbitrary constraints on constituent RVs.

Multi-Armed Bandits

Cannot find the paper you are looking for? You can Submit a new open access paper.