The Challenges and Opportunities of Artificial Intelligence for Trustworthy Robots and Autonomous Systems
暂无分享,去创建一个
Angelo Cangelosi | Qinggang Meng | Jorn Mehnen | Hongmei He | T. M. McGinnity | John Gray | A. Cangelosi | Hongmei He | T. McGinnity | J. Mehnen | Q. Meng | J. Gray
[1] Chang Nho Cho,et al. Neural Network Based Adaptive Actuator Fault Detection Algorithm for Robot Manipulators , 2019, J. Intell. Robotic Syst..
[2] Erik Cambria,et al. Recent Trends in Deep Learning Based Natural Language Processing , 2017, IEEE Comput. Intell. Mag..
[3] Wei Xu,et al. Toward human-centered AI , 2019, Interactions.
[4] Bernt Schiele,et al. Computer vision systems , 2003, Machine Vision and Applications.
[5] Sahin Yildirim,et al. Fault detection on robot manipulators using artificial neural networks , 2011 .
[6] Ouarda Hachour. Neural path planning for mobile robots , 2011 .
[7] Jagadish Chandra Mohanta,et al. A knowledge based fuzzy-probabilistic roadmap method for mobile robot navigation , 2019, Appl. Soft Comput..
[8] Jay Lee,et al. Industrial Artificial Intelligence for industry 4.0-based manufacturing systems , 2018, Manufacturing Letters.
[9] Gang Xu,et al. Recognition of speed signs in uncertain and dynamic environments , 2019 .
[10] Xiang Yang Xu,et al. Adaptive control of the shifting process in automatic transmissions , 2017 .
[11] Nils Ole Tippenhauer,et al. The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR , 2019, USENIX Security Symposium.
[12] Ping Wu,et al. Vision-Based Robot Path Planning with Deep Learning , 2017, ICVS.
[13] Devesh Bhatt,et al. Considerations in Assuring Safety of Increasingly Autonomous Systems [STUB] , 2018 .
[14] Yue Li,et al. PathMarker: protecting web contents against inside crawlers , 2019, Cybersecur..
[15] Colin Potts,et al. Design of Everyday Things , 1988 .
[16] Rajkumar Roy,et al. A Design Approach to IoT Endpoint Security for Production Machinery Monitoring , 2019, Sensors.
[17] Xukai Zou,et al. A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[18] Manuela Veloso. A Few Issues on Human-Robot Interaction for Multiple Persistent Service Mobile Robots , 2014, AAAI Fall Symposia.
[19] Xianbin Wang,et al. Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement , 2019, IEEE Network.
[20] Stefan Katzenbeisser,et al. Security in Autonomous Systems , 2019, 2019 IEEE European Test Symposium (ETS).
[21] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[22] Virender Ranga,et al. Machine Learning Based Intrusion Detection Systems for IoT Applications , 2019, Wireless Personal Communications.
[23] Spencer Rugaber,et al. Using knowledge representation to understand interactive systems , 1997, Proceedings Fifth International Workshop on Program Comprehension. IWPC'97.
[24] Guang-Zhong Yang,et al. Normalization in Training U-Net for 2-D Biomedical Semantic Segmentation , 2018, IEEE Robotics and Automation Letters.
[25] Bo Lang,et al. Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey , 2019, Applied Sciences.
[26] Zhang Qingta. Design of a Smart Visual Sensor Based on Fast Template Matching , 2013 .
[27] Steven X. Ding,et al. A Survey of Fault Diagnosis and Fault-Tolerant Techniques—Part I: Fault Diagnosis With Model-Based and Signal-Based Approaches , 2015, IEEE Transactions on Industrial Electronics.
[28] 陈佳佳,et al. Lidar Based Dynamic Obstacle Detection, Tracking and Recognition , 2016 .
[29] Michael Fisher,et al. Probabilistic Model Checking of Robots Deployed in Extreme Environments , 2018, AAAI.
[30] David D. Coleman,et al. CWNA: Certified Wireless Network Administrator Study Guide (Exam PW0-100) , 2006 .
[31] Hajime Asama,et al. A system for self-diagnosis of an autonomous mobile robot using an internal state sensory system: fault detection and coping with the internal condition , 2003, Adv. Robotics.
[32] Jason Weston,et al. Natural Language Processing (Almost) from Scratch , 2011, J. Mach. Learn. Res..
[33] T. Martin McGinnity,et al. Linguistic Decision Making for Robot Route Learning , 2014, IEEE Transactions on Neural Networks and Learning Systems.
[34] Lyazzat Atymtayeva. Automation of HCI Engineering processes: System Architecture and Knowledge Representation , 2015 .
[35] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[36] Markus Vincze,et al. Computer Vision Systems , 2003, Lecture Notes in Computer Science.
[37] Ashutosh Tiwari,et al. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).
[38] Shady Elbassuoni,et al. Website Navigation Behavior Analysis for Bot Detection , 2017, 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA).
[39] Masafumi Hashimoto,et al. A multi-model based fault detection and diagnosis of internal sensors for mobile robot , 2003, Proceedings 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2003) (Cat. No.03CH37453).
[40] Roberto Baldoni,et al. Survey on the Usage of Machine Learning Techniques for Malware Analysis , 2017, Comput. Secur..
[41] Yifan Zhao,et al. Online Anomaly Detection of Time Series at Scale , 2019, 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA).
[42] Syed S. H. Rizvi,et al. A Threat to Vehicular Cyber Security and the Urgency for Correction , 2017 .
[43] Steven X. Ding,et al. A Survey of Fault Diagnosis and Fault-Tolerant Techniques—Part II: Fault Diagnosis With Knowledge-Based and Hybrid/Active Approaches , 2015, IEEE Transactions on Industrial Electronics.