Diffusion Policy Attacker: Crafting Adversarial Attacks for Diffusion-based Policies

Y Chen, H Xue, Y Chen - arxiv preprint arxiv:2405.19424, 2024 - arxiv.org
Diffusion models (DMs) have emerged as a promising approach for behavior cloning (BC).
Diffusion policies (DP) based on DMs have elevated BC performance to new heights …

Rethinking the Intermediate Features in Adversarial Attacks: Misleading Robotic Models via Adversarial Distillation

K Zhao, H Huang, M Li, Y Wu - arxiv preprint arxiv:2411.15222, 2024 - arxiv.org
Language-conditioned robotic learning has significantly enhanced robot adaptability by
enabling a single model to execute diverse tasks in response to verbal commands. Despite …

Learning from Suboptimal Demonstration via Trajectory-Ranked Adversarial Imitation

L Chen, S **e, T Pang, H Yu, X Luo… - 2022 IEEE 34th …, 2022 - ieeexplore.ieee.org
Robots trained by Imitation Learning (IL) are used in many tasks (eg, autonomous vehicle
manipulation). Generative Adversarial Imitation Learning (GAIL) assumes that the …

Secure Development of Machine Learning Against Poisoning Attacks

G Jares, C Lane - 2024 AIAA DATC/IEEE 43rd Digital Avionics …, 2024 - ieeexplore.ieee.org
Machine learning classifiers are known to be vulnerable to adversarial attacks which seek to
induce undesired behavior or extract sensitive information from the model. One such class of …

AutoNav: A Lane and Object Detection Model for Self-Driving Cars

SS Madhumitha, R Sailesh, A Sirish… - … Methods and Data …, 2022 - Springer
The area of autonomous vehicles is of huge research interest and much has been
accomplished in this area. This study involves three aspects: lane detection, object …

Explainability with Semantic Concept Composition and Zero-Shot Learning for Anomaly Detection

NS Bendre - 2021 - search.proquest.com
Video analytics, an important research problem, has been well-studied within diverse
research areas and application domains like anomaly detection, safety and explainability …

Attention-Based Audio Driven Facial Animation

N Zand - 2022 - search.proquest.com
In the virtual world, the human digital twin is the digital representation of the real-world coun-
terpart or twin. By using these digital equivalent, the performance of products can be …

Robust Countermeasures for Adversarial Attacks on Deep Learning, Deep Reinforcement Learning, and Deepfake

SH Silva - 2021 - search.proquest.com
Abstract Machine Learning (ML) algorithms are in demand in almost every field. Yet, even as
they become commonplace, they are hardly understood. Their complex architecture makes …