Results 51 to 60 of about 94,861 (274)

Learning Highly Dynamic Skills Transition for Quadruped Jumping Through Constrained Space

open access: yesAdvanced Robotics Research, EarlyView.
A quadruped robot masters dynamic jumps through constrained spaces with animal‐inspired moves and intelligent vision control. This hierarchical learning approach combines imitation of biological agility with real‐time trajectory planning. Although legged animals are capable of performing explosive motions while traversing confined spaces, replicating ...
Zeren Luo   +6 more
wiley   +1 more source

Practical Attacks Against Graph-based Clustering

open access: yes, 2017
Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks.
Bayer Ulrich   +19 more
core   +1 more source

Adversarial Examples Detection With Bayesian Neural Network

open access: yesIEEE Transactions on Emerging Topics in Computational Intelligence
In this paper, we propose a new framework to detect adversarial examples motivated by the observations that random components can improve the smoothness of predictors and make it easier to simulate the output distribution of a deep neural network. With these observations, we propose a novel Bayesian adversarial example detector, short for BATer, to ...
Yao Li   +3 more
openaire   +2 more sources

Stable Imitation of Multigait and Bipedal Motions for Quadrupedal Robots Over Uneven Terrains

open access: yesAdvanced Robotics Research, EarlyView.
How are quadrupedal robots empowered to execute complex navigation tasks, including multigait and bipedal motions? Challenges in stability and real‐world adaptation persist, especially with uneven terrains and disturbances. This article presents an imitation learning framework that enhances adaptability and robustness by incorporating long short‐term ...
Erdong Xiao   +3 more
wiley   +1 more source

Camouflaged Adversarial Example Generation Method for the Form of Motion Blur in Traffic Scenes [PDF]

open access: yesJisuanji gongcheng
In the domain of autonomous driving perception systems, Convolutional Neural Network(CNN) plays a pivotal role as a fundamental technology in vehicle perception and decision making. However, adversarial attacks pose a substantial threat to the safety and
ZHANG Zhaoxin, HUANG Shize, ZHANG Bingjie, SHEN Tuo
doaj   +1 more source

Adversarial Example Detection and Classification With Asymmetrical Adversarial Training

open access: yes, 2020
The vulnerabilities of deep neural networks against adversarial examples have become a significant concern for deploying these models in sensitive domains.
Kolouri, Soheil   +2 more
core  

Detecting Adversarial Examples

open access: yes
Deep Neural Networks (DNNs) have been shown to be vulnerable to adversarial examples. While numerous successful adversarial attacks have been proposed, defenses against these attacks remain relatively understudied. Existing defense approaches either focus on negating the effects of perturbations caused by the attacks to restore the DNNs' original ...
Mumcu, Furkan, Yilmaz, Yasin
openaire   +2 more sources

Detecting Adversarial Examples Utilizing Pixel Value Diversity

open access: yesACM Transactions on Design Automation of Electronic Systems, 2021
In this article, we introduce two novel methods to detect adversarial examples utilizing pixel value diversity. First, we propose the concept of pixel value diversity (which reflects the spread of pixel values in an image) and two independent metrics (UPVR and RPVR) to assess the pixel value diversity separately.
Jinxin Dong, Pingqiang Zhou
openaire   +1 more source

Information Transmission Strategies for Self‐Organized Robotic Aggregation

open access: yesAdvanced Robotics Research, EarlyView.
In this review, we discuss how information transmission influences the neighbor‐based self‐organized aggregation of swarm robots. We focus specifically on local interactions regarding information transfer and categorize previous studies based on the functions of the information exchanged.
Shu Leng   +5 more
wiley   +1 more source

Trend Detection based Regret Minimization for Bandit Problems

open access: yes, 2016
We study a variation of the classical multi-armed bandits problem. In this problem, the learner has to make a sequence of decisions, picking from a fixed set of choices.
Nakhe, Paresh, Reiffenhäuser, Rebecca
core   +1 more source

Home - About - Disclaimer - Privacy