135 research outputs found
A framework to design interaction control of aerial slung load systems: transfer from existing flight control of under-actuated aerial vehicles
This paper establishes a framework within which interaction control is designed for the aerial slung load system composed of an underactuated aerial vehicle, a cable and a load. Instead of developing a new control law for the system, we propose the interaction control scheme by the controllers for under-actuated aerial systems. By selecting the deferentially flat output as the configuration, the equations of motion of the two systems are described in an identical form. The flight control task of the under-actuated aerial vehicle is thus converted into the control of the aerial slung load system. With the help of an admittance filter, the compliant trajectory is generated for the load subject to external interaction force. Moreover, the convergence of the whole system is proved by using the boundedness of the tracking error of vehicle attitude tracking as well as the estimation error of external force. Based on the developed theoretical results, an example is provided to illustrate the design algorithm of interaction controller for the aerial slung load via an existing flight controller directly. The correctness and applicability of the obtained results are demonstrated via the illustrative numerical example
On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method
Robust machine learning is currently one of the most prominent topics which
could potentially help shaping a future of advanced AI platforms that not only
perform well in average cases but also in worst cases or adverse situations.
Despite the long-term vision, however, existing studies on black-box
adversarial attacks are still restricted to very specific settings of threat
models (e.g., single distortion metric and restrictive assumption on target
model's feedback to queries) and/or suffer from prohibitively high query
complexity. To push for further advances in this field, we introduce a general
framework based on an operator splitting method, the alternating direction
method of multipliers (ADMM) to devise efficient, robust black-box attacks that
work with various distortion metrics and feedback settings without incurring
high query complexity. Due to the black-box nature of the threat model, the
proposed ADMM solution framework is integrated with zeroth-order (ZO)
optimization and Bayesian optimization (BO), and thus is applicable to the
gradient-free regime. This results in two new black-box adversarial attack
generation methods, ZO-ADMM and BO-ADMM. Our empirical evaluations on image
classification datasets show that our proposed approaches have much lower
function query complexities compared to state-of-the-art attack methods, but
achieve very competitive attack success rates.Comment: accepted by ICCV 201
- …