-
Team NCTU: Toward AI-Driving for Autonomous Surface Vehicles -- From Duckietown to RobotX
Authors:
Yi-Wei Huang,
Tzu-Kuan Chuang,
Ni-Ching Lin,
Yu-Chieh Hsiao,
Pin-Wei Chen,
Ching-Tang Hung,
Shih-Hsing Liu,
Hsiao-Sheng Chen,
Ya-Hsiu Hsieh,
Ching-Tang Hung,
Yen-Hsiang Huang,
Yu-Xuan Chen,
Kuan-Lin Chen,
Ya-Jou Lan,
Chao-Chun Hsu,
Chun-Yi Lin,
Jhih-Ying Li,
Jui-Te Huang,
Yu-Jen Menn,
Sin-Kiat Lim,
Kim-Boon Lua,
Chia-Hung Dylan Tsai,
Chi-Fang Chen,
Hsueh-Cheng Wang
Abstract:
Robotic software and hardware systems of autonomous surface vehicles have been developed in transportation, military, and ocean researches for decades. Previous efforts in RobotX Challenges 2014 and 2016 facilitates the developments for important tasks such as obstacle avoidance and docking. Team NCTU is motivated by the AI Driving Olympics (AI-DO) developed by the Duckietown community, and adopts…
▽ More
Robotic software and hardware systems of autonomous surface vehicles have been developed in transportation, military, and ocean researches for decades. Previous efforts in RobotX Challenges 2014 and 2016 facilitates the developments for important tasks such as obstacle avoidance and docking. Team NCTU is motivated by the AI Driving Olympics (AI-DO) developed by the Duckietown community, and adopts the principles to RobotX challenge. With the containerization (Docker) and uniformed AI agent (with observations and actions), we could better 1) integrate solutions developed in different middlewares (ROS and MOOS), 2) develop essential functionalities of from simulation (Gazebo) to real robots (either miniaturized or full-sized WAM-V), and 3) compare different approaches either from classic model-based or learning-based. Finally, we setup an outdoor on-surface platform with localization services for evaluation. Some of the preliminary results will be presented for the Team NCTU participations of the RobotX competition in Hawaii in 2018.
△ Less
Submitted 31 October, 2019;
originally announced October 2019.
-
Phagocytes: A Holistic Defense and Protection Against Active P2P Worms
Authors:
Ruichuan Chen,
Eng Keong Lua,
Jon Crowcroft,
Liyong Tang,
Zhong Chen
Abstract:
Active Peer-to-Peer (P2P) worms present serious threats to the global Internet by exploiting popular P2P applications to perform rapid topological self-propagation. Active P2P worms pose more deadly threats than normal scanning worms because they do not exhibit easily detectable anomalies, thus many existing defenses are no longer effective.
We propose an immunity system with Phagocytes --- a sm…
▽ More
Active Peer-to-Peer (P2P) worms present serious threats to the global Internet by exploiting popular P2P applications to perform rapid topological self-propagation. Active P2P worms pose more deadly threats than normal scanning worms because they do not exhibit easily detectable anomalies, thus many existing defenses are no longer effective.
We propose an immunity system with Phagocytes --- a small subset of elected P2P hosts that are immune with high probability and specialized in finding and "eating" worms in the P2P overlay. The Phagocytes will monitor their managed P2P hosts' connection patterns and traffic volume in an attempt to detect active P2P worm attacks. Once detected, local isolation, alert propagation and software patching will take place for containment. The Phagocytes further provide the access control and filtering mechanisms for communication establishment between the internal P2P overlay and the external hosts. We design a novel adaptive and interaction-based computational puzzle scheme at the Phagocytes to restrain external worms attacking the P2P overlay, without influencing legitimate hosts' experiences significantly. We implement a prototype system, and evaluate its performance based on realistic massive-scale P2P network traces. The evaluation results illustrate that our Phagocytes are capable of achieving a total defense against active P2P worms.
△ Less
Submitted 5 August, 2011;
originally announced August 2011.
-
Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service
Authors:
Ruichuan Chen,
Eng Keong Lua,
Zhuhua Cai,
Jon Crowcroft,
Zhong Chen
Abstract:
Peer-to-Peer (P2P) content sharing systems are susceptible to the content pollution attack, in which attackers aggressively inject polluted contents into the systems to reduce the availability of authentic contents, thus decreasing the confidence of participating users.
In this paper, we design a pollution-free P2P content sharing system, Green, by exploiting the inherent content-based informati…
▽ More
Peer-to-Peer (P2P) content sharing systems are susceptible to the content pollution attack, in which attackers aggressively inject polluted contents into the systems to reduce the availability of authentic contents, thus decreasing the confidence of participating users.
In this paper, we design a pollution-free P2P content sharing system, Green, by exploiting the inherent content-based information and the social-based reputation. In Green, a content provider (i.e., creator or sharer) publishes the information of his shared contents to a group of content maintainers self-organized in a security overlay for providing the mechanisms of redundancy and reliability, so that a content requestor can obtain and filter the information of his requested content from the associated maintainers. We employ a reputation model to help the requestor better identify the polluted contents, and then utilize the social (friend-related) information to enhance the effectiveness and efficiency of our reputation model. Now, the requestor could easily select an authentic content version for downloading. While downloading, each requestor performs a realtime integrity verification and takes prompt protection to handle the content pollution. To further improve the system performance, we devise a scalable probabilistic verification scheme.
Green is broadly applicable for both structured and unstructured overlay applications, and moreover, it is able to defeat various kinds of content pollution attacks without incurring significant overhead on the participating users. The evaluation in massive-scale networks validates the success of Green against the content pollution.
△ Less
Submitted 5 August, 2011;
originally announced August 2011.
-
An Efficient Inductive Unsupervised Semantic Tagger
Authors:
K T Lua
Abstract:
We report our development of a simple but fast and efficient inductive unsupervised semantic tagger for Chinese words. A POS hand-tagged corpus of 348,000 words is used. The corpus is being tagged in two steps. First, possible semantic tags are selected from a semantic dictionary(Tong Yi Ci Ci Lin), the POS and the conditional probability of semantic from POS, i.e., P(S|P). The final semantic ta…
▽ More
We report our development of a simple but fast and efficient inductive unsupervised semantic tagger for Chinese words. A POS hand-tagged corpus of 348,000 words is used. The corpus is being tagged in two steps. First, possible semantic tags are selected from a semantic dictionary(Tong Yi Ci Ci Lin), the POS and the conditional probability of semantic from POS, i.e., P(S|P). The final semantic tag is then assigned by considering the semantic tags before and after the current word and the semantic-word conditional probability P(S|W) derived from the first step. Semantic bigram probabilities P(S|S) are used in the second step. Final manual checking shows that this simple but efficient algorithm has a hit rate of 91%. The tagger tags 142 words per second, using a 120 MHz Pentium running FOXPRO. It runs about 2.3 times faster than a Viterbi tagger.
△ Less
Submitted 11 June, 1996;
originally announced June 1996.