-
Integrating Visuo-tactile Sensing with Haptic Feedback for Teleoperated Robot Manipulation
Authors:
Noah Becker,
Erik Gattung,
Kay Hansel,
Tim Schneider,
Yaonan Zhu,
Yasuhisa Hasegawa,
Jan Peters
Abstract:
Telerobotics enables humans to overcome spatial constraints and allows them to physically interact with the environment in remote locations. However, the sensory feedback provided by the system to the operator is often purely visual, limiting the operator's dexterity in manipulation tasks. In this work, we address this issue by equip** the robot's end-effector with high-resolution visuotactile G…
▽ More
Telerobotics enables humans to overcome spatial constraints and allows them to physically interact with the environment in remote locations. However, the sensory feedback provided by the system to the operator is often purely visual, limiting the operator's dexterity in manipulation tasks. In this work, we address this issue by equip** the robot's end-effector with high-resolution visuotactile GelSight sensors. Using low-cost MANUS-Gloves, we provide the operator with haptic feedback about forces acting at the points of contact in the form of vibration signals. We propose two different methods for estimating these forces; one based on estimating the movement of markers on the sensor surface and one deep-learning approach. Additionally, we integrate our system into a virtual-reality teleoperation pipeline in which a human operator controls both arms of a Tiago robot while receiving visual and haptic feedback. We believe that integrating haptic feedback is a crucial step for dexterous manipulation in teleoperated robotic systems.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Act as a Honeytoken Generator! An Investigation into Honeytoken Generation with Large Language Models
Authors:
Daniel Reti,
Norman Becker,
Tillmann Angeli,
Anasuya Chattopadhyay,
Daniel Schneider,
Sebastian Vollmer,
Hans D. Schotten
Abstract:
With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized…
▽ More
With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized for specific types of honeytokens, and heavily rely on suitable training datasets. To overcome these limitations, this work systematically investigates the approach of utilizing Large Language Models (LLMs) to create a variety of honeytokens. Out of the seven different honeytoken types created in this work, such as configuration files, databases, and log files, two were used to evaluate the optimal prompt. The generation of robots.txt files and honeywords was used to systematically test 210 different prompt structures, based on 16 prompt building blocks. Furthermore, all honeytokens were tested across different state-of-the-art LLMs to assess the varying performance of different models. Prompts performing optimally on one LLMs do not necessarily generalize well to another. Honeywords generated by GPT-3.5 were found to be less distinguishable from real passwords compared to previous methods of automated honeyword generation. Overall, the findings of this work demonstrate that generic LLMs are capable of creating a wide array of honeytokens using the presented prompt structures.
△ Less
Submitted 24 April, 2024;
originally announced April 2024.
-
From Model-Based to Data-Driven Simulation: Challenges and Trends in Autonomous Driving
Authors:
Ferdinand Mütsch,
Helen Gremmelmaier,
Nicolas Becker,
Daniel Bogdoll,
Marc René Zofka,
J. Marius Zöllner
Abstract:
Simulation is an integral part in the process of develo** autonomous vehicles and advantageous for training, validation, and verification of driving functions. Even though simulations come with a series of benefits compared to real-world experiments, various challenges still prevent virtual testing from entirely replacing physical test-drives. Our work provides an overview of these challenges wi…
▽ More
Simulation is an integral part in the process of develo** autonomous vehicles and advantageous for training, validation, and verification of driving functions. Even though simulations come with a series of benefits compared to real-world experiments, various challenges still prevent virtual testing from entirely replacing physical test-drives. Our work provides an overview of these challenges with regard to different aspects and types of simulation and subsumes current trends to overcome them. We cover aspects around perception-, behavior- and content-realism as well as general hurdles in the domain of simulation. Among others, we observe a trend of data-driven, generative approaches and high-fidelity data synthesis to increasingly replace model-based simulation.
△ Less
Submitted 31 July, 2023; v1 submitted 23 May, 2023;
originally announced May 2023.
-
AI at work -- Mitigating safety and discriminatory risk with technical standards
Authors:
Nikolas Becker,
Pauline Junginger,
Lukas Martinez,
Daniel Krupka,
Leonie Beining
Abstract:
The use of artificial intelligence (AI) and AI methods in the workplace holds both great opportunities as well as risks to occupational safety and discrimination. In addition to legal regulation, technical standards will play a key role in mitigating such risk by defining technical requirements for development and testing of AI systems. This paper provides an overview and assessment of existing in…
▽ More
The use of artificial intelligence (AI) and AI methods in the workplace holds both great opportunities as well as risks to occupational safety and discrimination. In addition to legal regulation, technical standards will play a key role in mitigating such risk by defining technical requirements for development and testing of AI systems. This paper provides an overview and assessment of existing international, European and German standards as well as those currently under development. The paper is part of the research project "ExamAI - Testing and Auditing of AI systems" and focusses on the use of AI in an industrial production environment as well as in the realm of human resource management (HR).
△ Less
Submitted 26 August, 2021;
originally announced August 2021.
-
How many degrees of freedom do we need to train deep networks: a loss landscape perspective
Authors:
Brett W. Larsen,
Stanislav Fort,
Nic Becker,
Surya Ganguli
Abstract:
A variety of recent works, spanning pruning, lottery tickets, and training within random subspaces, have shown that deep neural networks can be trained using far fewer degrees of freedom than the total number of parameters. We analyze this phenomenon for random subspaces by first examining the success probability of hitting a training loss sub-level set when training within a random subspace of a…
▽ More
A variety of recent works, spanning pruning, lottery tickets, and training within random subspaces, have shown that deep neural networks can be trained using far fewer degrees of freedom than the total number of parameters. We analyze this phenomenon for random subspaces by first examining the success probability of hitting a training loss sub-level set when training within a random subspace of a given training dimensionality. We find a sharp phase transition in the success probability from $0$ to $1$ as the training dimension surpasses a threshold. This threshold training dimension increases as the desired final loss decreases, but decreases as the initial loss decreases. We then theoretically explain the origin of this phase transition, and its dependence on initialization and final desired loss, in terms of properties of the high-dimensional geometry of the loss landscape. In particular, we show via Gordon's escape theorem, that the training dimension plus the Gaussian width of the desired loss sub-level set, projected onto a unit sphere surrounding the initialization, must exceed the total number of parameters for the success probability to be large. In several architectures and datasets, we measure the threshold training dimension as a function of initialization and demonstrate that it is a small fraction of the total parameters, implying by our theory that successful training with so few dimensions is possible precisely because the Gaussian width of low loss sub-level sets is very large. Moreover, we compare this threshold training dimension to more sophisticated ways of reducing training degrees of freedom, including lottery tickets as well as a new, analogous method: lottery subspaces. Code is available at https://github.com/ganguli-lab/degrees-of-freedom.
△ Less
Submitted 3 February, 2022; v1 submitted 12 July, 2021;
originally announced July 2021.
-
Escape the Fake: Introducing Simulated Container-Escapes for Honeypots
Authors:
Daniel Reti,
Norman Becker
Abstract:
In the field of network security, the concept of honeypots is well established in research as well as in production. Honeypots are used to imitate a legitimate target on the network and to raise an alert on any interaction. This does not only help learning about a breach, but also allows researchers to study the techniques of an attacker. With the rise of cloud computing, container-based virtualiz…
▽ More
In the field of network security, the concept of honeypots is well established in research as well as in production. Honeypots are used to imitate a legitimate target on the network and to raise an alert on any interaction. This does not only help learning about a breach, but also allows researchers to study the techniques of an attacker. With the rise of cloud computing, container-based virtualization gained popularity for application deployment. This paper investigates the possibilities of container-based honeypots and introduces the concept of simulating container escapes as a deception technique.
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
A Non-stationary Service Curve Model for Estimation of Cellular Sleep Scheduling
Authors:
Nico Becker,
Markus Fidler
Abstract:
While steady-state solutions of backlog and delay have been derived for essential wireless systems, the analysis of transient phases still poses significant challenges. Considering the majority of short-lived and interactive flows, transient startup effects, as caused by sleep scheduling in cellular networks, have, however, a substantial impact on the performance. To facilitate reasoning about the…
▽ More
While steady-state solutions of backlog and delay have been derived for essential wireless systems, the analysis of transient phases still poses significant challenges. Considering the majority of short-lived and interactive flows, transient startup effects, as caused by sleep scheduling in cellular networks, have, however, a substantial impact on the performance. To facilitate reasoning about the transient behavior of systems, this paper contributes a notion of non-stationary service curves. Models of systems with sleep scheduling are derived and transient backlogs and delays are analyzed. Further, measurement methods that estimate the service of an unknown system from observations of selected probe traffic are developed. Fundamental limitations of existing measurement methods are explained by the non-convexity of the transient service and further difficulties are shown to be due to the super-additivity of network service processes. A novel two-phase probing technique is devised that first determines the shape of a minimal probe and subsequently obtains an accurate estimate of the unknown service. In a comprehensive measurement campaign, the method is used to evaluate the service of cellular networks with sleep scheduling (2G, 3G, and 4G), revealing considerable transient backlog and delay overshoots that persist for long relaxation times.
△ Less
Submitted 13 August, 2016;
originally announced August 2016.
-
A Non-stationary Service Curve Model for Performance Analysis of Transient Phases
Authors:
Nico Becker,
Markus Fidler
Abstract:
Steady-state solutions for a variety of relevant queueing systems are known today, e.g., from queueing theory, effective bandwidths, and network calculus. The behavior during transient phases, on the other hand, is understood to a much lesser extent as its analysis poses significant challenges. Considering the majority of short-lived flows, transient effects that have diverse causes, such as TCP s…
▽ More
Steady-state solutions for a variety of relevant queueing systems are known today, e.g., from queueing theory, effective bandwidths, and network calculus. The behavior during transient phases, on the other hand, is understood to a much lesser extent as its analysis poses significant challenges. Considering the majority of short-lived flows, transient effects that have diverse causes, such as TCP slow start, sleep scheduling in wireless networks, or signalling in cellular networks, are, however, predominant. This paper contributes a general model of regenerative service processes to characterize the transient behavior of systems. The model leads to a notion of non-stationary service curves that can be conveniently integrated into the framework of the stochastic network calculus. We derive respective models of sleep scheduling and show the significant impact of transient phases on backlogs and delays. We also consider measurement methods that estimate the service of an unknown system from observations of selected probe traffic. We find that the prevailing rate scanning method does not recover the service during transient phases well. This limitation is fundamental as it is explained by the non-convexity of non-stationary service curves. A second key difficulty is proven to be due to the super-additivity of network service processes. We devise a novel two-phase probing technique that first determines a minimal pattern of probe traffic. This probe is used to obtain an accurate estimate of the unknown transient service.
△ Less
Submitted 15 June, 2015;
originally announced June 2015.