- Robotic Path Planning Algorithms
- Robotics and Automated Systems
- Cognitive Computing and Networks
- Advanced Image and Video Retrieval Techniques
- Network Security and Intrusion Detection
- Robotics and Sensor-Based Localization
- Vehicle Routing Optimization Methods
- Access Control and Trust
- AI-based Problem Solving and Planning
- Security in Wireless Sensor Networks
- Fault Detection and Control Systems
- Advanced Graph Neural Networks
- UAV Applications and Optimization
- Cryptography and Data Security
- Chaos-based Image/Signal Encryption
- Bayesian Modeling and Causal Inference
- Privacy-Preserving Technologies in Data
National University of Defense Technology
2019-2020
Unmanned ground vehicles (UGVs) and unmanned aerial (UAVs) have been widely used in delivery. In the context of COVID-2019, order to control development epidemic, many places adopted measures isolate close area once a confirmed case is found. While reducing contact between people, it also blocks normal driving vehicles. Only by changing traditional logistics distribution methods can customers who closed isolated for long time be served. Therefore, we use Cooperative UGV-UAV achieve it. this...
With the development of intelligent war, unmanned vehicle plays an more and important role in future war. As part ground system, combat vehicles have been a hot spot for researchers to improve autonomy. knowledge is foundation intelligence great significance improving This paper proposes build graph domain. The firstly uses ontology pattern layer graph. In order fully express uncertainty domain knowledge, probabilistically extended support representation uncertain knowledge. Then reasoning...
In the field of robotics, it is crucial to obtain a comprehensive semantic understanding scene for many applications. Based on behavioral topological map and graph, we propose employ named Topological Scene Map (TSM) representation in indoor environment understanding. The constructed expresses spatial connection relations semantically describes navigation behavior between adjacent nodes. graph promotes TSM record objects that appear objects. addition makes expression more specific, which...
Homomorphic encryption assisted privacy preserving learning has become one powerful technology in actual scenarios and applications. In this paper, we design a novel homomorphic CNN conjunction with to make prediction on encrypted sensor data. We carry out experiments different activation functions evaluate the accuracy MSTAR dataset. Experimental results show models' effectiveness data preserving.
Unmanned ground vehicles (UGVs) have been widely used in security patrol. The existence of two potential opponents, the malicious teammate (cooperative) and hostile observer (adversarial), highlights importance privacy-preserving planning under contested environments. In a cooperative setting, disclosure private information can be restricted to teammates. adversarial obfuscation added control observability observer. this paper, we attempt generate opponent-aware plans, mainly focusing on...