Tseng, Kuo-Kun
RoboGSim: A Real2Sim2Real Robotic Gaussian Splatting Simulator
Li, Xinhai, Li, Jialin, Zhang, Ziheng, Zhang, Rui, Jia, Fan, Wang, Tiancai, Fan, Haoqiang, Tseng, Kuo-Kun, Wang, Ruiping
Efficient acquisition of real-world embodied data has been increasingly critical. However, large-scale demonstrations captured by remote operation tend to take extremely high costs and fail to scale up the data size in an efficient manner. Sampling the episodes under a simulated environment is a promising way for large-scale collection while existing simulators fail to high-fidelity modeling on texture and physics. To address these limitations, we introduce the RoboGSim, a real2sim2real robotic simulator, powered by 3D Gaussian Splatting and the physics engine. RoboGSim mainly includes four parts: Gaussian Reconstructor, Digital Twins Builder, Scene Composer, and Interactive Engine. It can synthesize the simulated data with novel views, objects, trajectories, and scenes. RoboGSim also provides an online, reproducible, and safe evaluation for different manipulation policies. The real2sim and sim2real transfer experiments show a high consistency in the texture and physics. Moreover, the effectiveness of synthetic data is validated under the real-world manipulated tasks. We hope RoboGSim serves as a closed-loop simulator for fair comparison on policy learning. More information can be found on our project page https://robogsim.github.io/ .
BRBA: A Blocking-Based Association Rule Hiding Method
Cheng, Peng (Southwest University and Harbin Institute of Technology) | Lee, Ivan (University of South Australia) | Li, Li (Southwest University) | Tseng, Kuo-Kun (Harbin Institute of Technology) | Pan, Jeng-Shyang (Harbin Institute of Technology)
Privacy preserving in association mining is an important research topic in the database security field. This paper has proposed a blocking-based method to solve the association rule hiding problem for data sharing. It aims at reducing undesirable side effects and increasing desirable side effects, while ensuring to conceal all sensitive rules. The candidate transactions are selected for sanitization based on their relations with border rules. Comparative experiments on real datasets demonstrate that the proposed method can achieve its goals.