Diffusion Policy Attacker: Crafting Adversarial Attacks for Diffusion-based Policies
Diffusion models (DMs) have emerged as a promising approach for behavior cloning (BC).
Diffusion policies (DP) based on DMs have elevated BC performance to new heights …
Diffusion policies (DP) based on DMs have elevated BC performance to new heights …
Rethinking the Intermediate Features in Adversarial Attacks: Misleading Robotic Models via Adversarial Distillation
Language-conditioned robotic learning has significantly enhanced robot adaptability by
enabling a single model to execute diverse tasks in response to verbal commands. Despite …
enabling a single model to execute diverse tasks in response to verbal commands. Despite …
Learning from Suboptimal Demonstration via Trajectory-Ranked Adversarial Imitation
Robots trained by Imitation Learning (IL) are used in many tasks (eg, autonomous vehicle
manipulation). Generative Adversarial Imitation Learning (GAIL) assumes that the …
manipulation). Generative Adversarial Imitation Learning (GAIL) assumes that the …
Secure Development of Machine Learning Against Poisoning Attacks
G Jares, C Lane - 2024 AIAA DATC/IEEE 43rd Digital Avionics …, 2024 - ieeexplore.ieee.org
Machine learning classifiers are known to be vulnerable to adversarial attacks which seek to
induce undesired behavior or extract sensitive information from the model. One such class of …
induce undesired behavior or extract sensitive information from the model. One such class of …
AutoNav: A Lane and Object Detection Model for Self-Driving Cars
SS Madhumitha, R Sailesh, A Sirish… - … Methods and Data …, 2022 - Springer
The area of autonomous vehicles is of huge research interest and much has been
accomplished in this area. This study involves three aspects: lane detection, object …
accomplished in this area. This study involves three aspects: lane detection, object …
Explainability with Semantic Concept Composition and Zero-Shot Learning for Anomaly Detection
NS Bendre - 2021 - search.proquest.com
Video analytics, an important research problem, has been well-studied within diverse
research areas and application domains like anomaly detection, safety and explainability …
research areas and application domains like anomaly detection, safety and explainability …
Attention-Based Audio Driven Facial Animation
N Zand - 2022 - search.proquest.com
In the virtual world, the human digital twin is the digital representation of the real-world coun-
terpart or twin. By using these digital equivalent, the performance of products can be …
terpart or twin. By using these digital equivalent, the performance of products can be …
Robust Countermeasures for Adversarial Attacks on Deep Learning, Deep Reinforcement Learning, and Deepfake
SH Silva - 2021 - search.proquest.com
Abstract Machine Learning (ML) algorithms are in demand in almost every field. Yet, even as
they become commonplace, they are hardly understood. Their complex architecture makes …
they become commonplace, they are hardly understood. Their complex architecture makes …