Results 71 to 80 of about 353,439 (278)

Stable Imitation of Multigait and Bipedal Motions for Quadrupedal Robots Over Uneven Terrains

open access: yesAdvanced Robotics Research, EarlyView.
How are quadrupedal robots empowered to execute complex navigation tasks, including multigait and bipedal motions? Challenges in stability and real‐world adaptation persist, especially with uneven terrains and disturbances. This article presents an imitation learning framework that enhances adaptability and robustness by incorporating long short‐term ...
Erdong Xiao   +3 more
wiley   +1 more source

Adversarial guided diffusion models for adversarial purification

open access: yesNeural Networks
Diffusion model (DM) based adversarial purification (AP) has proven to be a powerful defense method that can remove adversarial perturbations and generate a purified example without threats. In principle, the pre-trained DMs can only ensure that purified examples conform to the same distribution of the training data, but it may inadvertently compromise
Guang Lin   +4 more
openaire   +2 more sources

Information Transmission Strategies for Self‐Organized Robotic Aggregation

open access: yesAdvanced Robotics Research, EarlyView.
In this review, we discuss how information transmission influences the neighbor‐based self‐organized aggregation of swarm robots. We focus specifically on local interactions regarding information transfer and categorize previous studies based on the functions of the information exchanged.
Shu Leng   +5 more
wiley   +1 more source

Adversarial sample generation algorithm for vertical federated learning

open access: yesTongxin xuebao, 2023
To adapt to the scenario characteristics of vertical federated learning (VFL) applications regarding high communication cost, fast model iteration, and decentralized data storage, a generalized adversarial sample generation algorithm named VFL-GASG was ...
Xiaolin CHEN   +4 more
doaj   +2 more sources

DEEP DETECTOR HEALTH MANAGEMENT UNDER ADVERSARIAL CAMPAIGNS

open access: yesInternational Journal of Prognostics and Health Management, 2019
Machine learning models are vulnerable to adversarial inputs that induce seemingly unjustifiable errors. As automated classifiers are increasingly used in industrial control systems and machinery, these adversarial errors could grow to be a serious ...
Javier Echauz   +6 more
doaj   +1 more source

Continual Learning for Multimodal Data Fusion of a Soft Gripper

open access: yesAdvanced Robotics Research, EarlyView.
Models trained on a single data modality often struggle to generalize when exposed to a different modality. This work introduces a continual learning algorithm capable of incrementally learning different data modalities by leveraging both class‐incremental and domain‐incremental learning scenarios in an artificial environment where labeled data is ...
Nilay Kushawaha, Egidio Falotico
wiley   +1 more source

Benign-salient Region Based End-to-End Adversarial Malware Generation Method [PDF]

open access: yesJisuanji kexue
Malware detection methods combining visualization techniques and deep learning have gained widespread attention due to their high accuracy and low cost.However,deep learning models are vulnerable to adversarial attacks,where intentional small-scale ...
YUAN Mengjiao, LU Tianliang, HUANG Wanxin, HE Houhan
doaj   +1 more source

A State‐Adaptive Koopman Control Framework for Real‐Time Deformable Tool Manipulation in Robotic Environmental Swabbing

open access: yesAdvanced Robotics Research, EarlyView.
This work presents a state‐adaptive Koopman linear quadratic regulator framework for real‐time manipulation of a deformable swab tool in robotic environmental sampling. By combining Koopman linearization, tactile sensing, and centroid‐based force regulation, the system maintains stable contact forces and high coverage across flat and inclined surfaces.
Siavash Mahmoudi   +2 more
wiley   +1 more source

Tsallis-INF: An Optimal Algorithm for Stochastic and Adversarial Bandits

open access: yes, 2020
We derive an algorithm that achieves the optimal (within constants) pseudo-regret in both adversarial and stochastic multi-armed bandits without prior knowledge of the regime and time horizon.
Seldin, Yevgeny, Zimmert, Julian
core  

Adversarial queuing theory [PDF]

open access: yesJournal of the ACM, 1996
We consider packet routing when packets are injected continuously into a network. We develop an adversarial theory of queuing aimed at addressing some of the restrictions inherent in probabilistic analysis and queuing theory based on time-invariant stochastic generation. We examine the stability of queuing networks and policies when the arrival process
Allan Borodin   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy