源自:信息与控制
作者:王淳浩 闭家铭 阮利 魏彤羽 任宇翔 黄镇 刘云韬 纪岳天思 SAW Yinxuan 肖利民
"人工智能技术与咨询" 发布
摘 要
安全关键场景生成是自动驾驶的重要方向,在自动驾驶测试、汽车安全性评估和汽车安全标准构建等领域都有着很高的应用价值,是关系自动驾驶应用落地的关键。现有研究缺乏重点围绕安全关键场景生成技术的综述,因此本文对安全关键场景生成技术进行了系统性综述。首先,分析了安全关键场景生成技术的综述相关研究;其次,对安全关键场景生成模型进行了对比分析;再次,分类总结了基于聚类、贝叶斯网络和对抗网络的安全关键场景生成方法的进展;最后,对安全关键场景生成方法研究趋势进行了展望。
关键词
自动驾驶汽车 / 安全关键场景 / 场景生成 / 深度生成模型
引言



1 现有综述研究进展分析




2 安全关键场景生成模型概述





3 安全关键场景指标提取技术




4 基于聚类的安全关键场景生成技术进展






5 基于贝叶斯网络的安全关键场生成技术进展




6 基于对抗生成的安全关键场景生成方法















7 研究展望



8 总结

**声明:**公众号转载的文章及图片出于非商业性的教育和科研目的供大家参考和探讨,并不意味着支持其观点或证实其内容的真实性。版权归原作者所有,如转载稿涉及版权等问题,请立即联系我们删除。
"人工智能技术与咨询" 发布