Abstract: As cyber-attack techniques become increasingly sophisticated, cyber threat intelligence has emerged as a crucial resource for cybersecurity defense. However, the vast and fragmented nature ...
Abstract: This paper considers the multi-robot active graph exploration problem, where robots need to collaboratively cover a graph environment while maintaining reliable pose estimation in ...