[PDF][PDF] Security Testing of Visual Perception Module in Autonomous Driving System

W Hao, W Hao, S Xing, L Minghao… - Journal of Computer …, 2021 - suxnju.github.io
… We also design a failure analyzer to profile the cause of security issues automatically. We …
-searched scenes, respectively, which cause security issues in the CIL and CILRS system's …

[PDF][PDF] The rise of smart courts in China: opportunities and challenges to the judiciary in a digital age

J Peng, W Xiang - Nordic J Law Soc Res (NNJLSR), 2019 - tidsskrift.dk
… data, cloud computing, artificial intelligence and hightech equipment. Digitalization of courts
is considered to help to improve judicial efficiency, contribute to judicial disclosures, provide …

[PDF][PDF] Testimony before the US-China Economic and Security Review Commission: Chinese Advances in Unmanned Systems and the Military Applications of Artificial …

EB Kania - … ” Warfare,” US-China Economic and Security Review …, 2017 - uscc.gov
The Chinese People’s Liberation Army (PLA) is actively advancing its unmanned weapons
systems, while capitalizing upon the military applications of artificial intelligence, in order to …

[PDF][PDF] Downrange: A Survey of China's Cyber Ranges

D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… This report examines five of these 19 facilities that have demonstrable ties to the military
or security services. China’s investment in these facilities is in line with what is known about …

China's National Defense Mobilization System: Foundation for Military Logistics

E Richter, B Rosen - PLA Logistics and Sustainment: PLA Conference 2022, 2023 - JSTOR
The People’s Republic of China’s (PRC’s) national defense mobilization system is a vital
component of its national defense strategy. The national defense mobilization system touches …

[PDF][PDF] The Regional Collaboration Search Algorithm of UAV Swarm Based on Rules

J Zhang - Journal of computer science and application, 2019 - pdf.hanspub.org
Regional search is a very important application direction for UAV swarms, and adopting
scientific and reasonable control algorithm is the most effective way to improve the efficiency of …

[HTML][HTML] Present situation and prospect of intelligent demolition technology for long-span prestressed concrete bridge

YJ Liu, ZW Tang, J Xiao, J LIU, B GONG… - J Archit Civil …, 2022 - jace.chd.edu.cn
In order to achieve the safety and controllability of the demolition of long-span prestressed
concrete bridges, the concept of intelligent bridge demolition based on digital twin technology …

Deep learning in driverless vehicles

W Kejun, Z Yandong, X Xianglei - CAAI Transactions on Intelligent …, 2018 - tis.hrbeu.edu.cn
… the unmanned vehicle and analyze the current technology and key problems of driverless …
design of driverless cars and identify their key problems. Lastly, we describe the development …

[引用][C] Architecture and key technologies of cyberspace security

JZ Luo, M Yang, Z Ling, WJ Wu, XD Gu - SCIENTIA SINICA Information, 2016

[引用][C] Framework of the new generation of smart highway

Y Du, C Liu, D Wu, C Zhao - China Journal of Highway and Transport, 2022