当前位置:网站首页>Central South University | through exploration and understanding: find interpretable features with deep reinforcement learning
Central South University | through exploration and understanding: find interpretable features with deep reinforcement learning
2022-07-03 16:28:00 【Zhiyuan community】
【 title 】Understanding via Exploration: Discovery of Interpretable Features With Deep Reinforcement Learning
【 The author team 】Jiawen Wei, Zhifeng Qiu, Fangyuan Wang, Wenwei Lin, Ning Gui, Weihua Gui
【 Date of publication 】2022.6.28
【 Thesis link 】https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9810174
【 Recommended reasons 】 Understanding the environment through interaction has become one of the most important intellectual activities for human beings to master unknown systems . as everyone knows , Deep reinforcement learning (DRL) In many applications, effective control is achieved through human like exploration and utilization . However , Deep neural network (DNN) The opacity of often hides the key information related to control , This is essential for understanding the target system . This paper first proposes a new online feature selection framework , That is, attention feature selection based on two worlds (D-AFS) , To identify the contribution of input to the whole control process . With most DRL The world used in is different ,D-AFS It has both the real world and the distorted virtual world . Newly introduced attention based assessment (AR) The module realizes the dynamic mapping from the real world to the virtual world . The existing DRL The algorithm needs only a little modification , You can learn in the dual world . Through analysis DRL Response in two worlds ,D-AFS It can quantitatively identify the importance of each feature to control .
边栏推荐
- 2022爱分析· 国央企数字化厂商全景报告
- NSQ source code installation and operation process
- Page dynamics [2]keyframes
- Netease UI automation test exploration: airtest+poco
- uploads-labs靶场(附源码分析)(更新中)
- [proteus simulation] 8 × 8LED dot matrix screen imitates elevator digital scrolling display
- Visual SLAM algorithms: a survey from 2010 to 2016
- Mongodb installation and basic operation
- 面试之 top k问题
- Famous blackmail software stops operation and releases decryption keys. Most hospital IOT devices have security vulnerabilities | global network security hotspot on February 14
猜你喜欢

Record windows10 installation tensorflow-gpu2.4.0

Data driving of appium framework for mobile terminal automated testing

The mixlab editing team is recruiting teammates~~

消息队列消息丢失和消息重复发送的处理策略

Uploads labs range (with source code analysis) (under update)

Visual SLAM algorithms: a survey from 2010 to 2016

There are several APIs of airtest and poco that are easy to use wrong in "super". See if you have encountered them

关于视觉SLAM的最先进技术的调查-A survey of state-of-the-art on visual SLAM

于文文、胡夏等明星带你玩转派对 皮皮APP点燃你的夏日

The accept attribute of the El upload upload component restricts the file type (detailed explanation of the case)
随机推荐
[combinatorics] combinatorial identity (sum of combinatorial identity products 1 | sum of products 1 proof | sum of combinatorial identity products 2 | sum of products 2 proof)
Stm32f103c8t6 firmware library lighting
Construction practice camp - graduation summary of phase 6
Slam learning notes - build a complete gazebo multi machine simulation slam from scratch (II)
PyTorch 1.12发布,正式支持苹果M1芯片GPU加速,修复众多Bug
A survey of state of the art on visual slam
初试scikit-learn库
Page dynamics [2]keyframes
NSQ source code installation and operation process
Netease UI automation test exploration: airtest+poco
Slam learning notes - build a complete gazebo multi machine simulation slam from scratch (III)
Threejs Part 2: vertex concept, geometry structure
Mysql 将逗号隔开的属性字段数据由列转行
How to set up SVN server on this machine
Embedded development: seven reasons to avoid open source software
Svn usage specification
Chinese translation of Tagore's floating birds (1~10)
Nine ways to define methods in scala- Nine ways to define a method in Scala?
Explore Netease's large-scale automated testing solutions see here see here
From the 18th line to the first line, the new story of the network security industry