Alert button
Picture for Wei Bai

Wei Bai

Alert button

Discover the Hidden Attack Path in Multi-domain Cyberspace Based on Reinforcement Learning

Add code
Bookmark button
Alert button
Apr 15, 2021
Lei Zhang, Wei Bai, Wei Li, Shiming Xia, Qibin Zheng

Figure 1 for Discover the Hidden Attack Path in Multi-domain Cyberspace Based on Reinforcement Learning
Figure 2 for Discover the Hidden Attack Path in Multi-domain Cyberspace Based on Reinforcement Learning
Figure 3 for Discover the Hidden Attack Path in Multi-domain Cyberspace Based on Reinforcement Learning
Figure 4 for Discover the Hidden Attack Path in Multi-domain Cyberspace Based on Reinforcement Learning
Viaarxiv icon

Quantitative Evaluations on Saliency Methods: An Experimental Study

Add code
Bookmark button
Alert button
Dec 31, 2020
Xiao-Hui Li, Yuhan Shi, Haoyang Li, Wei Bai, Yuanwei Song, Caleb Chen Cao, Lei Chen

Figure 1 for Quantitative Evaluations on Saliency Methods: An Experimental Study
Figure 2 for Quantitative Evaluations on Saliency Methods: An Experimental Study
Figure 3 for Quantitative Evaluations on Saliency Methods: An Experimental Study
Figure 4 for Quantitative Evaluations on Saliency Methods: An Experimental Study
Viaarxiv icon

Domain-specific Communication Optimization for Distributed DNN Training

Add code
Bookmark button
Alert button
Aug 16, 2020
Hao Wang, Jingrong Chen, Xinchen Wan, Han Tian, Jiacheng Xia, Gaoxiong Zeng, Weiyan Wang, Kai Chen, Wei Bai, Junchen Jiang

Figure 1 for Domain-specific Communication Optimization for Distributed DNN Training
Figure 2 for Domain-specific Communication Optimization for Distributed DNN Training
Figure 3 for Domain-specific Communication Optimization for Distributed DNN Training
Figure 4 for Domain-specific Communication Optimization for Distributed DNN Training
Viaarxiv icon

Weakness Analysis of Cyberspace Configuration Based on Reinforcement Learning

Add code
Bookmark button
Alert button
Jul 09, 2020
Lei Zhang, Wei Bai, Shize Guo, Shiming Xia, Hongmei Li, Zhisong Pan

Figure 1 for Weakness Analysis of Cyberspace Configuration Based on Reinforcement Learning
Figure 2 for Weakness Analysis of Cyberspace Configuration Based on Reinforcement Learning
Figure 3 for Weakness Analysis of Cyberspace Configuration Based on Reinforcement Learning
Figure 4 for Weakness Analysis of Cyberspace Configuration Based on Reinforcement Learning
Viaarxiv icon

Enabling Automatic Certification of Online Auctions

Add code
Bookmark button
Alert button
Apr 03, 2014
Wei Bai, Emmanuel M. Tadjouddine, Yu Guo

Figure 1 for Enabling Automatic Certification of Online Auctions
Viaarxiv icon