CASIA OpenIR

浏览/检索结果: 共46条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A Tutorial on Federated Learning from Theory to Practice: Foundations, Software Frameworks, Exemplary Use Cases, and Selected Trends 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 824-850
作者:  M. Victoria Luzón;  Nuria Rodríguez-Barroso;  Alberto Argente-Garrido;  Daniel Jiménez-López;  Jose M. Moyano;  Javier Del Ser;  Weiping Ding;  Francisco Herrera
Adobe PDF(4602Kb)  |  收藏  |  浏览/下载:18/5  |  提交时间:2024/03/18
Data privacy  distributed machine learning  federated learning  software frameworks  
Advancements in Humanoid Robots: A Comprehensive Review and Future Prospects 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 2, 页码: 301-328
作者:  Yuchuang Tong;  Haotian Liu;  Zhengtao Zhang
Adobe PDF(7587Kb)  |  收藏  |  浏览/下载:72/14  |  提交时间:2024/01/23
Future trends and challenges  humanoid robots  human-robot interaction  key technologies  potential applications  
A Novel Tensor Decomposition-Based Efficient Detector for Low-Altitude Aerial Objects With Knowledge Distillation Scheme 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 2, 页码: 487-501
作者:  Nianyin Zeng;  Xinyu Li;  Peishu Wu;  Han Li;  Xin Luo
Adobe PDF(12478Kb)  |  收藏  |  浏览/下载:55/16  |  提交时间:2024/01/23
Attention mechanism  knowledge distillation (KD)  object detection  tensor decomposition (TD)  unmanned aerial vehicles (UAVs)  
UAV-Assisted Dynamic Avatar Task Migration for Vehicular Metaverse Services: A Multi-Agent Deep Reinforcement Learning Approach 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 2, 页码: 430-445
作者:  Jiawen Kang;  Junlong Chen;  Minrui Xu;  Zehui Xiong;  Yutao Jiao;  Luchao Han;  Dusit Niyato;  Yongju Tong;  Shengli Xie
Adobe PDF(6097Kb)  |  收藏  |  浏览/下载:51/12  |  提交时间:2024/01/23
Avatar  blockchain  metaverses  multi-agent deep reinforcement learning  transformer  UAVs  
Detecting Vulnerability on IoT Device Firmware: A Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 1, 页码: 25-41
作者:  Xiaotao Feng;  Xiaogang Zhu;  Qing-Long Han;  Wei Zhou;  Sheng Wen;  Yang Xiang
Adobe PDF(3134Kb)  |  收藏  |  浏览/下载:492/326  |  提交时间:2023/01/03
Firmware emulation  internet of things (IoT) firmware  network fuzzing  security  static analysis  
Loop Closure Detection via Locality Preserving Matching With Global Consensus 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 2, 页码: 411-426
作者:  Jiayi Ma;  Kaining Zhang;  Junjun Jiang
Adobe PDF(15763Kb)  |  收藏  |  浏览/下载:193/44  |  提交时间:2023/01/16
Feature matching  locality preserving matching  loop closure detection  SLAM  
UltraStar: A Lightweight Simulator of Ultra-Dense LEO Satellite Constellation Networking for 6G 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 3, 页码: 632-645
作者:  Xiaoyu Liu;  Ting Ma;  Zhixuan Tang;  Xiaohan Qin;  Haibo Zhou;  Xuemin (Sherman) Shen
Adobe PDF(6265Kb)  |  收藏  |  浏览/下载:139/52  |  提交时间:2023/03/02
Discrete event simulation (DES)  mega-constellation  network dynamics  performance evaluation  simulation architecture design  
Parallel Learning: Overview and Perspective for Computational Learning Across Syn2Real and Sim2Real 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 3, 页码: 603-631
作者:  Qinghai Miao;  Yisheng Lv;  Min Huang;  Xiao Wang;  Fei-Yue Wang
Adobe PDF(11937Kb)  |  收藏  |  浏览/下载:800/144  |  提交时间:2023/03/02
Machine learning  parallel learning  parallel systems  sim-to-real  syn-to-real  virtual-to-real  
Secure Underwater Distributed Antenna Systems: A Multi-Agent Reinforcement Learning Approach 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 7, 页码: 1622-1624
作者:  Chaofeng Wang;  Zhicheng Bi;  Yaping Wan
Adobe PDF(381Kb)  |  收藏  |  浏览/下载:56/11  |  提交时间:2023/06/14
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:  Li Duan;  Yangyang Sun;  Wei Ni;  Weiping Ding;  Jiqiang Liu;  Wei Wang
Adobe PDF(2148Kb)  |  收藏  |  浏览/下载:96/23  |  提交时间:2023/07/20
Blockchain  cross-chain  defense  distributed private key control  hash-locking  notary  security threats  sidechain/relay