Jie Fu’s research while affiliated with University of Florida and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (9)


Simultaneously Search and Localize Semantic Objects in Unknown Environments
  • Article

December 2024

·

20 Reads

IEEE Robotics and Automation Letters

Zhentian Qian

·

Jie Fu

·

Jing Xiao

For a robot in an unknown environment to find a target semantic object, it must perform simultaneous localization and mapping (SLAM) at both geometric and semantic levels using its onboard sensors while planning and executing its motion based on the ever-updated SLAM results. In other words, the robot must simultaneously conduct localization, semantic mapping, motion planning, and execution online in the presence of sensing and motion uncertainty. This is an open problem as it intertwines semantic SLAM and adaptive online motion planning and execution under uncertainty based on perception. Moreover, the goals of the robot's motion change on the fly depending on whether and how the robot can detect the target object. We propose a novel approach to tackle the problem, leveraging semantic SLAM, Bayesian Networks, and online probabilistic motion planning. The results demonstrate our approach's effectiveness and efficiency.


Fig. 3: Segmented geometric rooms at time t. The two segmented rooms are encoded in different colors.
Autonomous Search of Semantic Objects in Unknown Environments
  • Preprint
  • File available

February 2023

·

54 Reads

This paper addresses the problem of enabling a robot to search for a semantic object in an unknown and GPS-denied environment. For the robot in the unknown environment to detect and find the target object, it must perform simultaneous localization and mapping (SLAM) at both geometric and semantic levels using its onboard sensors while planning and executing its motion based on the ever-updated SLAM results. In other words, the robot must be able to conduct simultaneous localization, semantic mapping, motion planning, and execution in real-time in the presence of sensing and motion uncertainty. This is an open problem as it combines semantic SLAM based on perception and real-time motion planning and execution under uncertainty. Moreover, the goals of robot motion change on the fly depending on whether and how the robot can detect the target object. We propose a novel approach to tackle the problem, leveraging semantic SLAM, Bayesian Networks, Markov Decision Process, and real-time dynamic planning. The results demonstrate the effectiveness and efficiency of our approach.

Download

On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers

February 2023

·

9 Reads

·

3 Citations

Lecture Notes in Computer Science

Intention deception involves computing a strategy which deceives the opponent into a wrong belief about the agent’s intention or objective. This paper studies a class of probabilistic planning problems with intention deception and investigates how a defender’s limited sensing modality can be exploited by an attacker to achieve its attack objective almost surely (with probability one) while hiding its intention. In particular, we model the attack planning in a stochastic system modeled as a Markov decision process (MDP). The attacker is to reach some target states while avoiding unsafe states in the system and knows that his behavior is monitored by a defender with partial observations. Given partial state observations for the defender, we develop qualitative intention deception planning algorithms that construct attack strategies to play against an action-visible defender and an action-invisible defender, respectively. The synthesized attack strategy not only ensures the attack objective is satisfied almost surely but also deceives the defender into believing that the observed behavior is generated by a normal/legitimate user and thus failing to detect the presence of an attack. We show the proposed algorithms are correct and complete and illustrate the deceptive planning methods with examples.


Fig. 3: The augmented MDP for attack planning against an action-invisible defender. The red nodes are the attacker's ASW region for intention deception.
Fig. 6: The evolving belief of the defender over time in a single run under the attacker's ASW deception strategy for different sensor configurations.
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers

September 2022

·

26 Reads

Intention deception involves computing a strategy which deceives the opponent into a wrong belief about the agent's intention or objective. This paper studies a class of probabilistic planning problems with intention deception and investigates how a defender's limited sensing modality can be exploited by an attacker to achieve its attack objective almost surely (with probability one) while hiding its intention. In particular, we model the attack planning in a stochastic system modeled as a Markov decision process (MDP). The attacker is to reach some target states while avoiding unsafe states in the system and knows that his behavior is monitored by a defender with partial observations. Given partial state observations for the defender, we develop qualitative intention deception planning algorithms that construct attack strategies to play against an action-visible defender and an action-invisible defender, respectively. The synthesized attack strategy not only ensures the attack objective is satisfied almost surely but also deceives the defender into believing that the observed behavior is generated by a normal/legitimate user and thus failing to detect the presence of an attack. We show the proposed algorithms are correct and complete and illustrate the deceptive planning methods with examples.


Towards Accurate Loop Closure Detection in Semantic SLAM With 3D Semantic Covisibility Graphs

April 2022

·

19 Reads

·

28 Citations

IEEE Robotics and Automation Letters

Loop closure is necessary for correcting errors accumulated in simultaneous localization and mapping (SLAM) in unknown environments. However, conventional loop closure methods based on low-level geometric or image features may cause high ambiguity by not distinguishing similar scenarios. Thus, incorrect loop closures can occur. Though semantic 2D image information is considered in some literature to detect loop closures, there is little work that compares 3D scenes as an integral part of a semantic SLAM system. This letter introduces an approach, called SmSLAM+LCD, integrated into a semantic SLAM system to combine high-level 3D semantic information and low-level feature information to conduct accurate loop closure detection and effective drift reduction. The effectiveness of our approach is demonstrated in testing results.



Semantic SLAM with Autonomous Object-Level Data Association

November 2020

·

41 Reads

It is often desirable to capture and map semantic information of an environment during simultaneous localization and mapping (SLAM). Such semantic information can enable a robot to better distinguish places with similar low-level geometric and visual features and perform high-level tasks that use semantic information about objects to be manipulated and environments to be navigated. While semantic SLAM has gained increasing attention, there is little research on semanticlevel data association based on semantic objects, i.e., object-level data association. In this paper, we propose a novel object-level data association algorithm based on bag of words algorithm, formulated as a maximum weighted bipartite matching problem. With object-level data association solved, we develop a quadratic-programming-based semantic object initialization scheme using dual quadric and introduce additional constraints to improve the success rate of object initialization. The integrated semantic-level SLAM system can achieve high-accuracy object-level data association and real-time semantic mapping as demonstrated in the experiments. The online semantic map building and semantic-level localization capabilities facilitate semantic-level mapping and task planning in a priori unknown environment.



A Receding-Horizon MDP Approach for Performance Evaluation of Moving Target Defense in Networks

February 2020

·

10 Reads

In this paper, we study the problem of assessing the effectiveness of a proactive defense-by-detection policy with a network-based moving target defense. We model the network system using a probabilistic attack graph--a graphical security model. Given a network system with a proactive defense strategy, an intelligent attacker needs to repeatedly perform reconnaissance to learn about the locations of intrusion detection systems and re-plan optimally to reach the target while avoiding detection. To compute the attacker's strategy for security evaluation, we develop a receding-horizon planning algorithm in a risk-sensitive Markov decision process with a time-varying reward function. Finally, we implement both defense and attack strategies in a synthetic network and analyze how the frequency of network randomization and the number of detection systems can influence the success rate of the attacker. This study provides insights for designing proactive defense strategies against online and multi-stage attacks carried out by a resourceful attacker.

Citations (3)


... This information-flow security synthesis problem has also been addressed more recently within the general framework of controller synthesis for hyper-properties Clarkson andSchneider (2010), Finkbeiner et al. (2015), Bonakdarpour and Finkbeiner (2020), Wang et al. (2020), Bonnah et al. (2023), Zhao et al. (2024). Additionally, many works are investigating the formal synthesis problem for controllers that remain robust against attackers attempting to actively hack into the control or observation channels Niu et al. (2020a), Yao et al. (2020), Kulkarni et al. (2021), Cai (2021, 2022), Fu (2022), Udupa et al. (2022), Yao et al. (2024). ...

Reference:

Formal Synthesis of Controllers for Safety-Critical Autonomous Systems: Developments and Challenges
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers
  • Citing Chapter
  • February 2023

Lecture Notes in Computer Science

... Similarly, Liu et al. [55] utilize spatial priors to construct RWDs. To reduce false matches between nodes, some approaches [56] explicitly construct edge descriptors to verify geometric consistency among matched nodes. Along the same lines, Julia et al. [57] employ node triplets to validate the correctness of matched nodes. ...

Towards Accurate Loop Closure Detection in Semantic SLAM With 3D Semantic Covisibility Graphs
  • Citing Article
  • April 2022

IEEE Robotics and Automation Letters

... Therefore, some works have proposed object-oriented semantic mapping approaches. In contrast, objectoriented semantic maps 41,42 contain semantic information of object instances, and the semantic information is independent of the map in a clustered manner. Therefore, robots can be allowed to operate and maintain the semantics of each entity in the map. ...

Semantic SLAM with Autonomous Object-Level Data Association
  • Citing Conference Paper
  • May 2021