A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Anomaly Detection in Multi-Agent Trajectories for Automated Driving
[article]
2021
arXiv
pre-print
Due to the lack of multi-agent trajectory datasets for anomaly detection in automated driving, we introduce our dataset using a driving simulator for normal and abnormal manoeuvres. ...
To perform anomaly detection, we first estimate a density function of the learned trajectory feature representation and then detect anomalies in low-density regions. ...
The authors would like to thank the consortium for the successful cooperation. ...
arXiv:2110.07922v2
fatcat:zphumc7hqjau5enq2czelaucee
Scanning the Issue
2022
IEEE transactions on intelligent transportation systems (Print)
The authors take into account the integration of blockchain and federated learning in vehicular networks as a direction for future research. ...
This article first presents the state-of-the-art communication technologies, standards, and protocols in vehicular networks (either inter-vehicle networking or in-vehicle networking) along with several ...
Vehicle Trajectory Prediction and Cut-In Collision Warning Model in a Connected
Decentralized Multi-Agent Path Finding for UAV Traffic Management F. Ho, R. Geraldes, A. Gonçalves, B. Rigault, B. ...
doi:10.1109/tits.2022.3141513
fatcat:gvywr655cvgolg7rfjrqmt33b4
Learning Models of Plant Behavior for Anomaly Detection and Condition Monitoring
2007
2007 International Conference on Intelligent Systems Applications to Power Systems
This paper proposes the integration of a newly developed anomaly detection technique with an existing diagnosis system. ...
In dealing with the large volumes of data involved, it is possible that faults may not be noticed until serious damage has occurred. ...
Agents have previously been used for power engineering applications such as feeder automation [1] , substation automation [2] , and microgrid control [3] . ...
doi:10.1109/isap.2007.4441620
fatcat:digdtknttfdrdf7rimpx7menta
Multi-rover testbed for teleconducted and autonomous surveillance, reconnaissance, and exploration
2009
Space Exploration Technologies II
It enables the implementation, field-testing, and validation of algorithms/software and strategies for navigation, exploration, feature extraction, anomaly detection, and target prioritization with applications ...
in planetary exploration, security surveillance, reconnaissance of disaster areas, military reconnaissance, and delivery of lethal force such as explosives for urban warfare. ...
It enables the implementation, field-testing, and validation of algorithms/software and strategies for navigation, exploration, feature extraction, anomaly detection, and target prioritization with applications ...
doi:10.1117/12.819991
fatcat:skiyujkc6fdsfcsuly3kxtvxz4
2019 Index IEEE Transactions on Intelligent Transportation Systems Vol. 20
2019
IEEE transactions on intelligent transportation systems (Print)
., +, TITS Oct. 2019 3688-3699
Deep Reinforcement Learning for Event-Driven Multi-Agent Decision Pro-
cesses. ...
., +, TITS March 2019 1052-1068 Aircraft Deep Reinforcement Learning for Event-Driven Multi-Agent Decision Processes. ...
doi:10.1109/tits.2020.2966388
fatcat:xkvww7uabzhlzgfz3yiecyb75y
Papertitles
2019
2019 International Conference on Control, Automation and Information Sciences (ICCAIS)
for Anomaly Detection in Real Surveillance VideosSpatio-Temporal Correlation based Anomaly Detection and Identification Method for IoT Sensors Stabilizing Control for Cyber-Physical Systems against Energy-Constrained ...
Data The research of energy control strategy of four-wheel drive Vehicle with Series-Parallel hybrid power system Trajectory Tracking Control of a Large Six-DOF Platform Based on Integral-Type Terminal ...
doi:10.1109/iccais46528.2019.9074559
fatcat:srkln5llk5czjgcksdtuhlgwdy
IEEE Access Special Section Editorial: Artificial Intelligence (AI)-Empowered Intelligent Transportation Systems
2021
IEEE Access
In the article "nLSALog: An anomaly detection framework for log sequence in security management," by Yang et al., a general anomaly detection framework is proposed. ...
In the article "A distributed network intrusion detection system for distributed denial of service attacks in vehicular 69492 This work is licensed under a Creative Commons Attribution 4.0 License. ...
He has published over 100 articles, including 20 in IEEE TRANSACTIONS. His work on taxi trajectory data mining was featured in IEEE SPECTRUM in 2011 , 2016 , and 2020. ...
doi:10.1109/access.2021.3074996
fatcat:dfyrghfswff6vmdlpa55jxtkjm
A Flexible System Architecture for Acquisition and Storage of Naturalistic Driving Data
2016
IEEE transactions on intelligent transportation systems (Print)
Anomaly Detection in Driving Behaviour by Road Profiling. 2013 IEEE Intelligent Vehicles Symposium Workshop, Gold Coast, Queensland, Australia: IEEE. ...
The Warrigal dataset: Multi-vehicle trajectories and V2V communications. IEEE Intelligent Transportation Systems Magazine, 6(3), 109-117. ...
doi:10.1109/tits.2016.2524523
fatcat:ycuisqnduzcp5h27sw2vmdlhbm
Deep Reinforcement Learning for Autonomous Driving: A Survey
[article]
2021
arXiv
pre-print
in real world deployment of autonomous driving agents. ...
The role of simulators in training agents, methods to validate, test and robustify existing solutions in RL are discussed. ...
During his 6 years in academic research, he has worked on DNNs for video anomaly detection, online time series anomaly detection, hyperspectral image processing for tumor detection. ...
arXiv:2002.00444v2
fatcat:axj3ohhjwzdrxp6dgpfqvctv2i
A Multi-Agent Approach for Designing Next Generation of Air Traffic Systems
[chapter]
2012
Advances in Air Navigation Services
In addition, an ATC with the role of a central agent should drive air ground negotiation processes in order to provide free of conflict trajectories. ...
One of them drives processes of trajectories negotiation. ...
doi:10.5772/50284
fatcat:fkecjp67nngwnch6lnxn4p52gy
Guest Editorial Introduction to the Special Issue on Deep Learning Models for Safe and Secure Intelligent Transportation Systems
2021
IEEE transactions on intelligent transportation systems (Print)
He served in industry for 18 years at Intel, Bellcore, and Bell Labs, and ten years in academia at Penn State and Northwestern University. ...
named science, engineering and education for sustainability (SEES). ...
In the article entitled "Anomaly detection in automated vehicles using multistage attention-based convolutional neural network," Javed et al. propose a combination of a multi-stage attention mechanism ...
doi:10.1109/tits.2021.3090721
fatcat:c2o2vno6bjbnxdn6y4zm7ztmvq
Table of Contents
2021
IEEE Robotics and Automation Letters
(Contents Continued on Page ix)
(Contents Continued from Page viii)
Circular Fields and Predictive Multi-Agents for Online Global Trajectory Planning . , and T. ...
Arai 2978 A Minimally Supervised Approach Based on Variational Autoencoders for Anomaly Detection in Autonomous Robots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
doi:10.1109/lra.2021.3072707
fatcat:qyphyzqxfrgg7dxdol4qamrdqu
Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection
[article]
2021
arXiv
pre-print
We also develop an anomaly detection technique that uses GPS traces on vehicles to identify malicious/compromised vehicles. ...
That is, these attacks are stealthy to detection. ...
automated driving systems. ...
arXiv:2112.11986v1
fatcat:lghy5cceqjhknjf7gmfxsv7fhi
Towards Modeling the Behavior of Autonomous Systems and Humans for Trusted Operations
[chapter]
2016
Robust Intelligence and Trust in Autonomous Systems
For example, flexible autonomous platforms deployed in a range of environments place a burden on humans to understand evolving behaviors. ...
This paradigm can benefit from novel and intuitive techniques that isolate and predict anomalous situations or state trajectories within complex autonomous systems in terms of mission context to allow ...
Furthermore, anomaly detection is difficult in large, multi-dimensional datasets and is affected by the "curse of dimensionality." ...
doi:10.1007/978-1-4899-7668-0_2
fatcat:t42fhspaqverlb63bollcmriva
Ieee Access Special Section Editorial: Human-Driven Edge Computing
2021
IEEE Access
In the article ''An improved AlexNet for power edge transmission line anomaly detection,'' by Guo et al., proposes an improved AlexNet model for anomaly detection, which extracts the characteristics of ...
The article ''Wearable computing for defence automation: Opportunities and challenges in 5G network,'' by Sharma et al., conducts a study to identify the role of wearable computing for the defense automation ...
doi:10.1109/access.2021.3092476
fatcat:wirzxkbrkfg7jmsk2vl67a7gnu
« Previous
Showing results 1 — 15 out of 2,483 results