当前位置:网站首页>Central South University | through exploration and understanding: find interpretable features with deep reinforcement learning
Central South University | through exploration and understanding: find interpretable features with deep reinforcement learning
2022-07-03 16:28:00 【Zhiyuan community】
【 title 】Understanding via Exploration: Discovery of Interpretable Features With Deep Reinforcement Learning
【 The author team 】Jiawen Wei, Zhifeng Qiu, Fangyuan Wang, Wenwei Lin, Ning Gui, Weihua Gui
【 Date of publication 】2022.6.28
【 Thesis link 】https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9810174
【 Recommended reasons 】 Understanding the environment through interaction has become one of the most important intellectual activities for human beings to master unknown systems . as everyone knows , Deep reinforcement learning (DRL) In many applications, effective control is achieved through human like exploration and utilization . However , Deep neural network (DNN) The opacity of often hides the key information related to control , This is essential for understanding the target system . This paper first proposes a new online feature selection framework , That is, attention feature selection based on two worlds (D-AFS) , To identify the contribution of input to the whole control process . With most DRL The world used in is different ,D-AFS It has both the real world and the distorted virtual world . Newly introduced attention based assessment (AR) The module realizes the dynamic mapping from the real world to the virtual world . The existing DRL The algorithm needs only a little modification , You can learn in the dual world . Through analysis DRL Response in two worlds ,D-AFS It can quantitatively identify the importance of each feature to control .
边栏推荐
- Interviewer: how does the JVM allocate and recycle off heap memory
- Custom plug-in construction and use of QT plug-in
- Getting started with Message Oriented Middleware
- June to - -------
- From the 18th line to the first line, the new story of the network security industry
- PHP二级域名session共享方案
- Is it safe to open an account with tongdaxin?
- PHP secondary domain name session sharing scheme
- 探索Cassandra的去中心化分布式架构
- The difference between calling by value and simulating calling by reference
猜你喜欢

The mixlab editing team is recruiting teammates~~

探索Cassandra的去中心化分布式架构
![[statement] about searching sogk1997 and finding many web crawler results](/img/1a/8ed3ca0030ea227adcd95e8b306aca.png)
[statement] about searching sogk1997 and finding many web crawler results

Mb10m-asemi rectifier bridge mb10m

拼夕夕二面:说说布隆过滤器与布谷鸟过滤器?应用场景?我懵了。。

Google Earth engine (GEE) - daymet v4: daily surface weather data set (1000m resolution) including data acquisition methods for each day

Famous blackmail software stops operation and releases decryption keys. Most hospital IOT devices have security vulnerabilities | global network security hotspot on February 14

2022 love analysis · panoramic report of digital manufacturers of state-owned enterprises

斑马识别成狗,AI犯错的原因被斯坦福找到了

First knowledge of database
随机推荐
Page dynamics [2]keyframes
[combinatorics] combinatorial identity (sum of variable upper terms 1 combinatorial identity | summary of three combinatorial identity proof methods | proof of sum of variable upper terms 1 combinator
Détails du contrôle de la congestion TCP | 3. Espace de conception
Is it safe to open a stock account by mobile registration? Does it need money to open an account
Chinese translation of Tagore's floating birds (1~10)
高等数学(第七版)同济大学 习题2-1 个人解答
uploads-labs靶场(附源码分析)(更新中)
Interviewer: how does the JVM allocate and recycle off heap memory
Is it safe to open an account with tongdaxin?
Data driving of appium framework for mobile terminal automated testing
Register in PHP_ Globals parameter settings
8个酷炫可视化图表,快速写出老板爱看的可视化分析报告
Multithread 02 thread join
"The NTP socket is in use, exiting" appears when ntpdate synchronizes the time
Asemi rectifier bridge umb10f parameters, umb10f specifications, umb10f package
From the 18th line to the first line, the new story of the network security industry
Develop team OKR in the way of "crowdfunding"
1287. Elements that appear more than 25% in an ordered array
EditText request focus - EditText request focus
Top k questions of interview