no code implementations • 7 May 2022 • Jianping He, Yushan Li, Lin Cai, Xinping Guan
Considering the latest inference attacks that enable stealthy and precise attacks into NDSs with observation-based learning, this article focuses on a new security aspect, i. e., how to protect control mechanism secrets from inference attacks, including state information, interaction structure and control laws.
no code implementations • 30 Apr 2022 • Yushan Li, Jianping He, Lin Cai, Xinping Guan
We focus on the local topology inference problem of MRNs under formation control, where an inference robot with limited observation range can manoeuvre among the formation robots.
no code implementations • 4 Jun 2021 • Yushan Li, Jianping He, Xuda Ding, Lin Cai, Xinping Guan
The security of mobile robotic networks (MRNs) has been an active research topic in recent years.
no code implementations • 1 Aug 2020 • Peiyang Song, Nan Zhang, Lin Cai, Guo Li, Fengkui Gong
With the rapid development of various services in wireless communications, spectrum resource has become increasingly valuable.
no code implementations • 3 Jun 2019 • Yudong Guo, Luo Jiang, Lin Cai, Juyong Zhang
Caricature is an abstraction of a real person which distorts or exaggerates certain features, but still retains a likeness.
1 code implementation • 16 Aug 2018 • Yudong Guo, Lin Cai, Juyong Zhang
Although 3D scanned data contain accurate geometric information of face shapes, the capture system is expensive and such datasets usually contain a small number of subjects.