Search Results for author: Xiang Zheng

Found 7 papers, 3 papers with code

IMAP: Intrinsically Motivated Adversarial Policy

no code implementations4 May 2023 Xiang Zheng, Xingjun Ma, Shengjie Wang, Xinyu Wang, Chao Shen, Cong Wang

Our experiments validate the effectiveness of the four types of adversarial intrinsic regularizers and BR in enhancing black-box adversarial policy learning across a variety of environments.

Reinforcement Learning (RL)

A Learning-based Adaptive Compliance Method for Symmetric Bi-manual Manipulation

no code implementations27 Mar 2023 Yuxue Cao, Shengjie Wang, Xiang Zheng, Wenke Ma, Tao Zhang

Symmetric bi-manual manipulation is essential for various on-orbit operations due to its potent load capacity.

Motion Planning

A Policy Optimization Method Towards Optimal-time Stability

no code implementations2 Jan 2023 Shengjie Wang, Fengbo Lan, Xiang Zheng, Yuxue Cao, Oluwatosin Oseni, Haotian Xu, Tao Zhang, Yang Gao

In current model-free reinforcement learning (RL) algorithms, stability criteria based on sampling methods are commonly utilized to guide policy optimization.

Reinforcement Learning (RL)

CIM: Constrained Intrinsic Motivation for Sparse-Reward Continuous Control

no code implementations28 Nov 2022 Xiang Zheng, Xingjun Ma, Cong Wang

Intrinsic motivation is a promising exploration technique for solving reinforcement learning tasks with sparse or absent extrinsic rewards.

Continuous Control Efficient Exploration

Reinforcement Learning with Prior Policy Guidance for Motion Planning of Dual-Arm Free-Floating Space Robot

1 code implementation3 Sep 2022 Yuxue Cao, Shengjie Wang, Xiang Zheng, Wenke Ma, Xinru Xie, Lei Liu

However, due to the increase in planning dimension and the intensification of system dynamics coupling, the motion planning of dual-arm free-floating space robots remains an open challenge.

Motion Planning Object

Clean-Label Backdoor Attacks on Video Recognition Models

1 code implementation CVPR 2020 Shihao Zhao, Xingjun Ma, Xiang Zheng, James Bailey, Jingjing Chen, Yu-Gang Jiang

We propose the use of a universal adversarial trigger as the backdoor trigger to attack video recognition models, a situation where backdoor attacks are likely to be challenged by the above 4 strict conditions.

Backdoor Attack backdoor defense +2

Cannot find the paper you are looking for? You can Submit a new open access paper.