Data is an important aspect of modern deep learning research, particularly in Place Recognition, which plays a pivotal role in various applications such as robotics, augmented reality, and autonomous navigation. In th...
详细信息
This paper studies the formation of final opinions for the Friedkin-Johnsen (FJ) model with a community of partially stubborn agents. The underlying network of the FJ model is symmetric and generated from a random gra...
详细信息
This paper studies fault-tolerant control of the spacecraft attitude control system with prescribed performance under the coexistence of actuator faults, disturbances and uncertainties. First, a flexible appointed-tim...
详细信息
Path planning is crucial for various robots, including manipulators, that autonomously perform non-repetitive tasks in obstacle-rich environments. In this paper we focus on path planning for an n-DoF (degrees of ...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
Deep neural networks, especially face recognition models, have been shown to be vulnerable to adversarial examples. However, existing attack methods for face recognition systems either cannot attack black-box models, ...
详细信息
The adaptive practical prescribed-time (PPT) neural control is studied for multiinput multioutput (MIMO) nonlinear systems with unknown nonlinear functions and unknown input gain matrices. Unlike existing PPT design s...
详细信息
Edge video analytics enables agile responses of machine-centric applications by streaming videos from end devices to edge servers (ESs) for resource-intensive deep neural network (DNN) inference. Quality of Inference ...
详细信息
To overcome the limitations of conventional echo state networks (ESN), such as redundant connections and insufficient frequency-domain feature extraction, this paper proposes a frequency-domain feature architecture se...
详细信息
Air density plays an important role in assessing wind *** density significantly fluctuates both spatially and *** literature typically used standard air density or local annual average air density to assess wind *** p...
详细信息
Air density plays an important role in assessing wind *** density significantly fluctuates both spatially and *** literature typically used standard air density or local annual average air density to assess wind *** present study investigates the estimation errors of the potential and fluctuation of wind resource caused by neglecting the spatial-temporal variation features of air density in *** air density at 100 m height is accurately calculated by using air temperature,pressure,and *** spatial-temporal variation features of air density are firstly *** the wind power generation is modeled based on a 1.5 MW wind turbine model by using the actual air density,standard air densityρst,and local annual average air densityρsite,***ρstoverestimates the annual wind energy production(AEP)in 93.6%of the study *** significantly affects AEP in central and southern China *** more than 75%of the study area,the winter to summer differences in AEP are underestimated,but the intra-day peak-valley differences and fluctuation rate of wind power are ***ρsitesignificantly reduces the estimation error in *** AEP is still overestimated(0-8.6%)in summer and underestimated(0-11.2%)in *** for southwest China,it is hard to reduce the estimation errors of winter to summer differences in AEP by usingρ***ρsitedistinctly reduces the estimation errors of intra-day peak-valley differences and fluctuation rate of wind power,but these estimation errors cannot be ignored as *** impacts of air density on assessing wind resource are almost independent of the wind turbine types.
暂无评论