2018
DOI: 10.3390/app8050676
|View full text |Cite
|
Sign up to set email alerts
|

Improved Deep Belief Networks (IDBN) Dynamic Model-Based Detection and Mitigation for Targeted Attacks on Heavy-Duty Robots

Abstract: Featured Application: The research is mainly used for heavy-duty robots to detect and mitigate target attacks, which come from both the cyber-domain and the physical-domain. Abstract:In recent years, the robots, especially heavy-duty robots, have become the hardest-hit areas for targeted attacks. These attacks come from both the cyber-domain and the physical-domain. In order to improve the security of heavy-duty robots, this paper proposes a detection and mitigation mechanism which based on improved deep belie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…The first CNN architecture presented was LeNet (Li et al 2018) in 1998. This architecture has a pooling layer, a backpropagation network for training, and only two convolutional layers.…”
Section: Deep-learning Based Person Detection Methodsmentioning
confidence: 99%
“…The first CNN architecture presented was LeNet (Li et al 2018) in 1998. This architecture has a pooling layer, a backpropagation network for training, and only two convolutional layers.…”
Section: Deep-learning Based Person Detection Methodsmentioning
confidence: 99%
“…The first CNN architecture to be introduced was LeNet by [29] [29] ImageNet 15.4% ZFNet [30] ImageNet 11.2% VGGNet [30] MNIST 7.2% Google Inception [31] ImageNet 6.7% network with VGGNet ResNet [32] ImageNet 3.57% Fast R-CNN [34] MS COCO 3.1% Faster R-CNN [35] MS COCO 2.75% Mask R-CNN [32] MS COCO 2.67%…”
Section: Deep-learning Based Pedestrian Detection Methodsmentioning
confidence: 99%
“…For instance, Guerrero-Higueras et al [36] attended attacks to real time location systems for autonomous mobile robots. Li et al [46] proposed to upload the analysis of attack detection and mitigation to a cloud server in the improved deep belief networks. Our Shade and Remit differ from aforementioned approaches in that they detect attacks within the computational resources of an autonomous service robot and, furthermore, mitigate attacks without badly losing the robot's work efficacy.…”
Section: Related Workmentioning
confidence: 99%