HUMAN-IN-THE-LOOP TASK AND MOTION PLANNING FOR IMITATION LEARNING

    公开(公告)号:US20250068966A1

    公开(公告)日:2025-02-27

    申请号:US18456030

    申请日:2023-08-25

    Abstract: In various examples, systems and methods are disclosed relating to training machine learning models using human demonstration of segments of a task, where other segments of the task are performed by a planning method, such as a Task and Motion Planning (TAMP) system. A method may include segmenting a task to be performed by a robot into segments, determining a first set of instructions of a plurality of sets of instructions for operating the robot to perform a first objective of a first segment, determining that the plurality of sets of instructions is inadequate to perform a second objective of a second segment, receiving from a user device a second set of instructions for operating the robot for the second segment following an end of the first segment, and updating a machine learning model for controlling the robot using the second set of instructions for the second segment.

    REFINING MACHINE LEARNING MODELS TO MITIGATE ADVERSARIAL ATTACKS IN AUTONOMOUS SYSTEMS AND APPLICATIONS

    公开(公告)号:US20250068960A1

    公开(公告)日:2025-02-27

    申请号:US18003289

    申请日:2022-11-11

    Inventor: Chong YU

    Abstract: In various examples, a technique for processing sensor data includes generating, using a machine learning model and based on a first sensor data instance, a first set of confidences for a set of output types and a first adversarial confidence that represents a likelihood that the first sensor data instance is adversarial. The technique also includes determining that the first sensor data instance is adversarial based on the first adversarial confidence. The technique further includes transmitting a first indication that the first sensor data instance is adversarial to one or more downstream components such that the one or more downstream components perform one or more operations based at least on the indication.

    TELEOPERATION ARCHITECTURES FOR AUTONOMOUS SYSTEMS AND APPLICATIONS

    公开(公告)号:US20250068160A1

    公开(公告)日:2025-02-27

    申请号:US18519760

    申请日:2023-11-27

    Abstract: In various examples, teleoperation architectures for safe control of machines are described. Systems and methods are disclosed that use an end-to-end safety architecture that covers both a vehicle or machine and a remote system providing a control center, where the vehicle or machine is at least partly or temporarily configured for control by the remote system. In some examples, the end-to-end architecture uses a layered safety policy monitoring system, where the remote system uses first policies to ensure that operator commands are viable and the vehicle uses second policies to ensure that the operator commands are safe to perform (e.g., will not cause collisions with other objects). Additionally, in some examples, the end-to-end architecture allows for the vehicle to perform minimum risk maneuvers, also referred to as “control fallbacks,” if problems were to occur.

    USER AUTHENTICATION FOR VEHICLE ACCESS AND IN-CABIN EXPERIENCE USING INFRARED IMAGING

    公开(公告)号:US20250065844A1

    公开(公告)日:2025-02-27

    申请号:US18453963

    申请日:2023-08-22

    Abstract: In various examples, infrared image data may be used to detect a subcutaneous characteristic(s) (e.g., a palm vein topology) of a person (e.g., a person requesting entry to a vehicle, a vehicle occupant) and authenticate the user based on the detected subcutaneous characteristic(s). For example, infrared image data representing one or more acquired subcutaneous characteristics (e.g., a topology of veins and/or other blood vessels in a region of the authenticating user's palm, hand, neck, forearm, face, fingertip, eye, etc.) may be generated. Hand and/or palm detection may be applied to detect a region depicting the user's hand or palm, and that region (or some subset thereof) may be segmented to generate a representation of an acquired vein topology. The acquired vein topology may be compared with one or more reference vein topologies stored in a database to determine whether the acquired vein topology matches one of the reference vein topologies.

    Software code verification using call graphs for autonomous systems and applications

    公开(公告)号:US12236218B2

    公开(公告)日:2025-02-25

    申请号:US17879447

    申请日:2022-08-02

    Abstract: In various examples, techniques for performing software code verification are described. Systems and methods are disclosed for generating, using intermediate code and user input, a call graph that represents source code for software. For instance, the call graph represents at least functions (e.g., internal functions, external functions, etc.) associated with the software, calls (e.g., direct calls, call pointers, etc.) between the functions, and register information associated with the functions (e.g., variables used by the functions, assembly code used by the functions, etc.). The systems and methods may further use the call graph to perform software code verification by verifying rules from design specifications for the software and/or rules from various certification standards.

    NEURAL NETWORKS TO PREDICT QUALITY OF WIRELESS SIGNALS

    公开(公告)号:US20250062843A1

    公开(公告)日:2025-02-20

    申请号:US18235794

    申请日:2023-08-18

    Inventor: Xingqin Lin

    Abstract: Apparatuses, systems, processors, circuits, and techniques to use one or more neural networks to predict a quality of one or more wireless signals based, at least in part, on one or more reference signals. In at least one embodiment, apparatuses, systems, processors, circuits, and techniques are to use one or more neural networks to determine that a radio link will be unstable or stable for a period of time or a number of frames (e.g., 10 consecutive frames).

    PROBABILISTIC GENERATION OF SPEAKER DIARIZATION DATA

    公开(公告)号:US20250061883A1

    公开(公告)日:2025-02-20

    申请号:US18526600

    申请日:2023-12-01

    Abstract: In various examples, a technique for generating a simulated multi-speaker recording includes determining a first rate at which a first speech-based attribute occurs within a first portion of the simulated multi-speaker recording. The technique also includes computing a first difference between the first rate and a first target rate for the first speech-based attribute. The technique further includes determining, based at least on the first difference, a second rate at which the first speech-based attribute is to occur within a second portion of the simulated multi-speaker recording and generating the second portion of the simulated multi-speaker recording based at least on the second rate.

Patent Agency Ranking