- Game Theory and Applications
- Advanced Bandit Algorithms Research
- Metabolomics and Mass Spectrometry Studies
- Reinforcement Learning in Robotics
- Blockchain Technology Applications and Security
- Machine Learning and Data Classification
- UAV Applications and Optimization
- Cognitive Radio Networks and Spectrum Sensing
- Gambling Behavior and Treatments
- Military Defense Systems Analysis
- Artificial Intelligence in Games
- Distributed Control Multi-Agent Systems
- Sports Analytics and Performance
- Metabolism and Genetic Disorders
- Wireless Communication Security Techniques
- Guidance and Control Systems
- Advanced MIMO Systems Optimization
- Opportunistic and Delay-Tolerant Networks
- Domain Adaptation and Few-Shot Learning
- Human Pose and Action Recognition
- Military Strategy and Technology
- Genomics and Rare Diseases
Children's Hospital of Zhejiang University
2024
National University of Defense Technology
2021-2024
How to rapidly adapt new tasks and improve model generalization through few-shot learning remains a significant challenge in meta-learning. Model-Agnostic Meta-Learning (MAML) has become powerful approach, with offers simple framework excellent generality. However, the requirement compute second-order derivatives retain lengthy calculation graph poses considerable computational memory burdens, limiting practicality of MAML. To address this issue, we propose Evolving MAML (Evo-MAML), an...
This study addressed a problem of rapid velocity consensus within swarm unmanned aerial vehicles. Our analytical framework was based on tools using matrix theory and algebraic graph theory. We established connections between connectivity the speed converging velocity. The relationship communication cost established. To deal with trade-off among connectivity, convergence cost, we propose distributed small world network construction method. characteristics expedite toward in vehicle swarm....
Satellite communication systems are increasingly facing serious environmental challenges such as malicious jamming, monitoring, and intercepting. As a current development of artificial intelligence, intelligent jammers with learning ability can effectively perceive the surrounding spectrum environment to dynamically change their jamming strategies. result, mainstream satellite anti-jamming technology based on wide interval high-speed frequency hopping is unable deal this problem effectively....
In strategic decision-making tasks, determining how to assign limited costly resource towards the defender and attacker is a central problem. However, it hard for pre-allocated assignment adapt dynamic fighting scenarios, exists situations where scenario rule of Colonel Blotto (CB) game are too restrictive in real world. To address these issues, support stage added as supplementary results, which novel two-stage competitive problem formulated based on CB stochastic Lanchester equation (SLE)....
In incomplete information games with large state space like Texas Hold'em, Nash equilibrium computing and opponent exploiting are two ways for decision-making. While the way has achieved superhuman feats, online exploitation method challenges in accurately modeling opponents online. order to compare fairly games, we take Hold'em as an example, propose a new based on explicit modeling, hidden cards inference, winrate evaluation. Experiment results show that matches against different...
In cognitive radio systems, there are cases where malicious users transmit interference power to prevent secondary from transmitting information. Due the destructive behavior of users, spectrum utilization efficiency will be reduced. The applications game theory study this confrontation relationship reasonable. Based on Continuous Blotto Game (CBG) model under condition one-shot perfect information confrontation, paper constructs an anti-jamming for allocation between and simulates...
Knowing the enemy and yourself, you can fight a hundred battles win them all. For an unknown opponent, nash equilibrium may be useful strategy to not lose on worst-case situation. However, when we have opponent's estimated model, developing exploitive counter-strategy wins far beyond equilibrium. But how take performance maximizing keep least best response value, is critical compute robust counter strategy. In this paper, try achieve higher expected payoff by modeling stationary opponent...