interferer
Fast Collective Evasion in Self-Localized Swarms of Unmanned Aerial Vehicles
Novák, Filip, Walter, Viktor, Petráček, Pavel, Báča, Tomáš, Saska, Martin
A novel approach for achieving fast evasion in self-localized swarms of Unmanned Aerial Vehicles (UAVs) threatened by an intruding moving object is presented in this paper. Motivated by natural self-organizing systems, the presented approach of fast and collective evasion enables the UAV swarm to avoid dynamic objects (interferers) that are actively approaching the group. The main objective of the proposed technique is the fast and safe escape of the swarm from an interferer ~discovered in proximity. This method is inspired by the collective behavior of groups of certain animals, such as schools of fish or flocks of birds. These animals use the limited information of their sensing organs and decentralized control to achieve reliable and effective group motion. The system presented in this paper is intended to execute the safe coordination of UAV swarms with a large number of agents. Similar to natural swarms, this system propagates a fast shock of information about detected interferers throughout the group to achieve dynamic and collective evasion. The proposed system is fully decentralized using only onboard sensors to mutually localize swarm agents and interferers, similar to how animals accomplish this behavior. As a result, the communication structure between swarm agents is not overwhelmed by information about the state (position and velocity) of each individual and it is reliable to communication dropouts. The proposed system and theory were numerically evaluated and verified in real-world experiments.
- Europe > Czechia > Prague (0.04)
- North America > United States > New York > New York County > New York City (0.04)
- Information Technology > Robotics & Automation (0.72)
- Aerospace & Defense > Aircraft (0.72)
Algorithm for AGC index management against crowded radio environment
Joly, Morgane, Rivière, Fabian, Renault, Éric
Connected devices are part of everyday life. The proliferation of connected portable devices such as mobile phones, laptop, smart watches, tablets, or non-portable connected devices such as TV, video game console saturates the environment with RF signals. In parallel to the reception of desired data from its communication partner(s), such connected devices receive also unwanted signals, so called interferers. The interferers, especially from Wi-Fi signals, can occur in a random manner in the form of a signal burst of variable duration and have a signal strength possibly much higher than the desired signal. Interferers with a high signal strength can cause saturation of the receiver preventing proper reception of the desired data. Some techniques tackle this issue by continuously monitoring the received signal strength and adjust immediately the receiver gain to avoid saturation whilst still maintaining the highest sensitivity level. However, when operating popular wireless communication protocols such as Wireless PAN (Bluetooth, BLE, Zigbee...), the receiver is not allowed to adjust the gain during the data payload. RF receivers for these communication protocols adjust then the gain during a time interval prior to the payload reception based on the real-time received signal and freeze the gain just before switching to the payload reception period. This is illustrated in figure 1. Due to the random nature in occurrence and strength level, interferers may appear during the data payload, receiver may saturate causing data loss.
- Leisure & Entertainment > Games > Computer Games (0.54)
- Information Technology > Smart Houses & Appliances (0.35)
Adversarial Perturbations of Physical Signals
Bassett, Robert L., Van Dellen, Austin, Austin, Anthony P.
We investigate the vulnerability of computer-vision-based signal classifiers to adversarial perturbations of their inputs, where the signals and perturbations are subject to physical constraints. We consider a scenario in which a source and interferer emit signals that propagate as waves to a detector, which attempts to classify the source by analyzing the spectrogram of the signal it receives using a pre-trained neural network. By solving PDE-constrained optimization problems, we construct interfering signals that cause the detector to misclassify the source even though the perturbations to the spectrogram of the received signal are nearly imperceptible. Though such problems can have millions of decision variables, we introduce methods to solve them efficiently. Our experiments demonstrate that one can compute effective and physically realizable adversarial perturbations for a variety of machine learning models under various physical conditions.
- Europe > United Kingdom > England > Cambridgeshire > Cambridge (0.14)
- North America > United States > New York (0.05)
- North America > United States > California > Monterey County > Monterey (0.04)
- Europe > Netherlands > South Holland > Dordrecht (0.04)
AV2Wav: Diffusion-Based Re-synthesis from Continuous Self-supervised Features for Audio-Visual Speech Enhancement
Chou, Ju-Chieh, Chien, Chung-Ming, Livescu, Karen
Speech enhancement systems are typically trained using pairs of clean and noisy speech. In audio-visual speech enhancement (AVSE), there is not as much ground-truth clean data available; most audio-visual datasets are collected in real-world environments with background noise and reverberation, hampering the development of AVSE. In this work, we introduce AV2Wav, a resynthesis-based audio-visual speech enhancement approach that can generate clean speech despite the challenges of real-world training data. We obtain a subset of nearly clean speech from an audio-visual corpus using a neural quality estimator, and then train a diffusion model on this subset to generate waveforms conditioned on continuous speech representations from AV-HuBERT with noise-robust training. We use continuous rather than discrete representations to retain prosody and speaker information. With this vocoding task alone, the model can perform speech enhancement better than a masking-based baseline. We further fine-tune the diffusion model on clean/noisy utterance pairs to improve the performance. Our approach outperforms a masking-based baseline in terms of both automatic metrics and a human listening test and is close in quality to the target speech in the listening test. Audio samples can be found at https://home.ttic.edu/~jcchou/demo/avse/avse_demo.html.
Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning
In a federated learning (FL) system, distributed clients upload their local models to a central server to aggregate into a global model. Malicious clients may plant backdoors into the global model through uploading poisoned local models, causing images with specific patterns to be misclassified into some target labels. Backdoors planted by current attacks are not durable, and vanish quickly once the attackers stop model poisoning. In this paper, we investigate the connection between the durability of FL backdoors and the relationships between benign images and poisoned images (i.e., the images whose labels are flipped to the target label during local training). Specifically, benign images with the original and the target labels of the poisoned images are found to have key effects on backdoor durability. Consequently, we propose a novel attack, Chameleon, which utilizes contrastive learning to further amplify such effects towards a more durable backdoor. Extensive experiments demonstrate that Chameleon significantly extends the backdoor lifespan over baselines by $1.2\times \sim 4\times$, for a wide range of image datasets, backdoor types, and model architectures.
- Asia > China > Guangdong Province > Guangzhou (0.04)
- Asia > China > Hong Kong (0.04)
- North America > United States > Hawaii > Honolulu County > Honolulu (0.04)
Learning to Coordinate for a Worker-Station Multi-robot System in Planar Coverage Tasks
Tang, Jingtao, Gao, Yuan, Lam, Tin Lun
For massive large-scale tasks, a multi-robot system (MRS) can effectively improve efficiency by utilizing each robot's different capabilities, mobility, and functionality. In this paper, we focus on the multi-robot coverage path planning (mCPP) problem in large-scale planar areas with random dynamic interferers in the environment, where the robots have limited resources. We introduce a worker-station MRS consisting of multiple workers with limited resources for actual work, and one station with enough resources for resource replenishment. We aim to solve the mCPP problem for the worker-station MRS by formulating it as a fully cooperative multi-agent reinforcement learning problem. Then we propose an end-to-end decentralized online planning method, which simultaneously solves coverage planning for workers and rendezvous planning for station. Our method manages to reduce the influence of random dynamic interferers on planning, while the robots can avoid collisions with them. We conduct simulation and real robot experiments, and the comparison results show that our method has competitive performance in solving the mCPP problem for worker-station MRS in metric of task finish time.
- Asia > China > Guangdong Province > Shenzhen (0.05)
- Asia > Middle East > Republic of Türkiye > Aksaray Province > Aksaray (0.04)
- Asia > China > Hong Kong (0.04)
Resource Allocation for a Wireless Coexistence Management System Based on Reinforcement Learning
Soeffker, Philip, Block, Dimitri, Wiebusch, Nico, Meier, Uwe
In industrial environments, an increasing amount of wireless devices are used, which utilize license-free bands. As a consequence of these mutual interferences of wireless systems might decrease the state of coexistence. Therefore, a central coexistence management system is needed, which allocates conflict-free resources to wireless systems. To ensure a conflict-free resource utilization, it is useful to predict the prospective medium utilization before resources are allocated. This paper presents a self-learning concept, which is based on reinforcement learning. A simulative evaluation of reinforcement learning agents based on neural networks, called deep Q-networks and double deep Q-networks, was realized for exemplary and practically relevant coexistence scenarios. The evaluation of the double deep Q-network showed that a prediction accuracy of at least 98 % can be reached in all investigated scenarios.