Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Enforcing hard constraints with soft barriers: Safe reinforcement learning in unknown stochastic environments
It is quite challenging to ensure the safety of reinforcement learning (RL) agents in an
unknown and stochastic environment under hard constraints that require the system state …
unknown and stochastic environment under hard constraints that require the system state …
Polar-express: Efficient and precise formal reachability analysis of neural-network controlled systems
Neural networks (NNs) playing the role of controllers have demonstrated impressive
empirical performance on challenging control problems. However, the potential adoption of …
empirical performance on challenging control problems. However, the potential adoption of …
Learning representation for anomaly detection of vehicle trajectories
Predicting the future trajectories of surrounding vehicles based on their history trajectories is
a critical task in autonomous driving. However, when small crafted perturbations are …
a critical task in autonomous driving. However, when small crafted perturbations are …
Semi-supervised semantics-guided adversarial training for robust trajectory prediction
Predicting the trajectories of surrounding objects is a critical task for self-driving vehicles and
many other autonomous systems. Recent works demonstrate that adversarial attacks on …
many other autonomous systems. Recent works demonstrate that adversarial attacks on …
Joint differentiable optimization and verification for certified reinforcement learning
Model-based reinforcement learning has been widely studied for controller synthesis in
cyber-physical systems (CPSs). In particular, for safety-critical CPSs, it is important to …
cyber-physical systems (CPSs). In particular, for safety-critical CPSs, it is important to …
Safety-assured speculative planning with adaptive prediction
Recently significant progress has been made in vehicle prediction and planning algorithms
for autonomous driving. However, it remains quite challenging for an autonomous vehicle to …
for autonomous driving. However, it remains quite challenging for an autonomous vehicle to …
ADAssure: Debugging methodology for autonomous driving control algorithms
Autonomous driving (AD) system designers need methods to efficiently debug vulnerabilities
found in control algorithms. Existing methods lack alignment to the requirements of AD …
found in control algorithms. Existing methods lack alignment to the requirements of AD …
Cloud and Edge Computing for Connected and Automated Vehicles
The recent development of cloud computing and edge computing shows great promise for
the Connected and Automated Vehicle (CAV), by enabling CAVs to offload their massive on …
the Connected and Automated Vehicle (CAV), by enabling CAVs to offload their massive on …
Waving the double-edged sword: Building resilient cavs with edge and cloud computing
The rapid advancement of edge and cloud computing platforms, vehicular ad-hoc networks,
and machine learning techniques have brought both opportunities and challenges for next …
and machine learning techniques have brought both opportunities and challenges for next …
Safe-by-construction autonomous vehicle overtaking using control barrier functions and model predictive control
Ensuring safety for vehicle overtaking systems is one of the most fundamental and
challenging tasks in autonomous driving. This task is particularly intricate when the vehicle …
challenging tasks in autonomous driving. This task is particularly intricate when the vehicle …