Results 51 to 60 of about 94,861 (274)
Learning Highly Dynamic Skills Transition for Quadruped Jumping Through Constrained Space
A quadruped robot masters dynamic jumps through constrained spaces with animal‐inspired moves and intelligent vision control. This hierarchical learning approach combines imitation of biological agility with real‐time trajectory planning. Although legged animals are capable of performing explosive motions while traversing confined spaces, replicating ...
Zeren Luo +6 more
wiley +1 more source
Practical Attacks Against Graph-based Clustering
Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks.
Bayer Ulrich +19 more
core +1 more source
Adversarial Examples Detection With Bayesian Neural Network
In this paper, we propose a new framework to detect adversarial examples motivated by the observations that random components can improve the smoothness of predictors and make it easier to simulate the output distribution of a deep neural network. With these observations, we propose a novel Bayesian adversarial example detector, short for BATer, to ...
Yao Li +3 more
openaire +2 more sources
Stable Imitation of Multigait and Bipedal Motions for Quadrupedal Robots Over Uneven Terrains
How are quadrupedal robots empowered to execute complex navigation tasks, including multigait and bipedal motions? Challenges in stability and real‐world adaptation persist, especially with uneven terrains and disturbances. This article presents an imitation learning framework that enhances adaptability and robustness by incorporating long short‐term ...
Erdong Xiao +3 more
wiley +1 more source
Camouflaged Adversarial Example Generation Method for the Form of Motion Blur in Traffic Scenes [PDF]
In the domain of autonomous driving perception systems, Convolutional Neural Network(CNN) plays a pivotal role as a fundamental technology in vehicle perception and decision making. However, adversarial attacks pose a substantial threat to the safety and
ZHANG Zhaoxin, HUANG Shize, ZHANG Bingjie, SHEN Tuo
doaj +1 more source
Adversarial Example Detection and Classification With Asymmetrical Adversarial Training
The vulnerabilities of deep neural networks against adversarial examples have become a significant concern for deploying these models in sensitive domains.
Kolouri, Soheil +2 more
core
Detecting Adversarial Examples
Deep Neural Networks (DNNs) have been shown to be vulnerable to adversarial examples. While numerous successful adversarial attacks have been proposed, defenses against these attacks remain relatively understudied. Existing defense approaches either focus on negating the effects of perturbations caused by the attacks to restore the DNNs' original ...
Mumcu, Furkan, Yilmaz, Yasin
openaire +2 more sources
Detecting Adversarial Examples Utilizing Pixel Value Diversity
In this article, we introduce two novel methods to detect adversarial examples utilizing pixel value diversity. First, we propose the concept of pixel value diversity (which reflects the spread of pixel values in an image) and two independent metrics (UPVR and RPVR) to assess the pixel value diversity separately.
Jinxin Dong, Pingqiang Zhou
openaire +1 more source
Information Transmission Strategies for Self‐Organized Robotic Aggregation
In this review, we discuss how information transmission influences the neighbor‐based self‐organized aggregation of swarm robots. We focus specifically on local interactions regarding information transfer and categorize previous studies based on the functions of the information exchanged.
Shu Leng +5 more
wiley +1 more source
Trend Detection based Regret Minimization for Bandit Problems
We study a variation of the classical multi-armed bandits problem. In this problem, the learner has to make a sequence of decisions, picking from a fixed set of choices.
Nakhe, Paresh, Reiffenhäuser, Rebecca
core +1 more source

