Alert button
Picture for Xiang Zheng

Xiang Zheng

Alert button

IMAP: Intrinsically Motivated Adversarial Policy

Add code
Bookmark button
Alert button
May 04, 2023
Xiang Zheng, Xingjun Ma, Shengjie Wang, Xinyu Wang, Chao Shen, Cong Wang

Figure 1 for IMAP: Intrinsically Motivated Adversarial Policy
Figure 2 for IMAP: Intrinsically Motivated Adversarial Policy
Figure 3 for IMAP: Intrinsically Motivated Adversarial Policy
Figure 4 for IMAP: Intrinsically Motivated Adversarial Policy
Viaarxiv icon

A Learning-based Adaptive Compliance Method for Symmetric Bi-manual Manipulation

Add code
Bookmark button
Alert button
Mar 27, 2023
Yuxue Cao, Shengjie Wang, Xiang Zheng, Wenke Ma, Tao Zhang

Figure 1 for A Learning-based Adaptive Compliance Method for Symmetric Bi-manual Manipulation
Figure 2 for A Learning-based Adaptive Compliance Method for Symmetric Bi-manual Manipulation
Figure 3 for A Learning-based Adaptive Compliance Method for Symmetric Bi-manual Manipulation
Figure 4 for A Learning-based Adaptive Compliance Method for Symmetric Bi-manual Manipulation
Viaarxiv icon

A RL-based Policy Optimization Method Guided by Adaptive Stability Certification

Add code
Bookmark button
Alert button
Jan 02, 2023
Shengjie Wang, Fengbo Lan, Xiang Zheng, Yuxue Cao, Oluwatosin Oseni, Haotian Xu, Yang Gao, Tao Zhang

Figure 1 for A RL-based Policy Optimization Method Guided by Adaptive Stability Certification
Figure 2 for A RL-based Policy Optimization Method Guided by Adaptive Stability Certification
Figure 3 for A RL-based Policy Optimization Method Guided by Adaptive Stability Certification
Figure 4 for A RL-based Policy Optimization Method Guided by Adaptive Stability Certification
Viaarxiv icon

CIM: Constrained Intrinsic Motivation for Sparse-Reward Continuous Control

Add code
Bookmark button
Alert button
Nov 28, 2022
Xiang Zheng, Xingjun Ma, Cong Wang

Figure 1 for CIM: Constrained Intrinsic Motivation for Sparse-Reward Continuous Control
Figure 2 for CIM: Constrained Intrinsic Motivation for Sparse-Reward Continuous Control
Figure 3 for CIM: Constrained Intrinsic Motivation for Sparse-Reward Continuous Control
Figure 4 for CIM: Constrained Intrinsic Motivation for Sparse-Reward Continuous Control
Viaarxiv icon

Reinforcement Learning with Prior Policy Guidance for Motion Planning of Dual-Arm Free-Floating Space Robot

Add code
Bookmark button
Alert button
Sep 03, 2022
Yuxue Cao, Shengjie Wang, Xiang Zheng, Wenke Ma, Xinru Xie, Lei Liu

Figure 1 for Reinforcement Learning with Prior Policy Guidance for Motion Planning of Dual-Arm Free-Floating Space Robot
Figure 2 for Reinforcement Learning with Prior Policy Guidance for Motion Planning of Dual-Arm Free-Floating Space Robot
Figure 3 for Reinforcement Learning with Prior Policy Guidance for Motion Planning of Dual-Arm Free-Floating Space Robot
Figure 4 for Reinforcement Learning with Prior Policy Guidance for Motion Planning of Dual-Arm Free-Floating Space Robot
Viaarxiv icon

A Learning System for Motion Planning of Free-Float Dual-Arm Space Manipulator towards Non-Cooperative Object

Add code
Bookmark button
Alert button
Jul 06, 2022
Shengjie Wang, Yuxue Cao, Xiang Zheng, Tao Zhang

Figure 1 for A Learning System for Motion Planning of Free-Float Dual-Arm Space Manipulator towards Non-Cooperative Object
Figure 2 for A Learning System for Motion Planning of Free-Float Dual-Arm Space Manipulator towards Non-Cooperative Object
Figure 3 for A Learning System for Motion Planning of Free-Float Dual-Arm Space Manipulator towards Non-Cooperative Object
Figure 4 for A Learning System for Motion Planning of Free-Float Dual-Arm Space Manipulator towards Non-Cooperative Object
Viaarxiv icon

Clean-Label Backdoor Attacks on Video Recognition Models

Add code
Bookmark button
Alert button
Mar 06, 2020
Shihao Zhao, Xingjun Ma, Xiang Zheng, James Bailey, Jingjing Chen, Yu-Gang Jiang

Figure 1 for Clean-Label Backdoor Attacks on Video Recognition Models
Figure 2 for Clean-Label Backdoor Attacks on Video Recognition Models
Figure 3 for Clean-Label Backdoor Attacks on Video Recognition Models
Figure 4 for Clean-Label Backdoor Attacks on Video Recognition Models
Viaarxiv icon