Learnings

Build the Autonomous Stack

Hand-picked courses, tutorials, talks, and papers for engineers working on drones, C-UAS, UGVs, stratospheric platforms, defense AI, and RF. Free unless flagged otherwise.

Last updated 1 hr ago

Bridging Perception and Action: A Lightweight Multimodal Meta-Planner Framework for Robust Earth Observation Agents

researchpaper
arXiv

Autonomous Earth Observation (EO) agents are transitioning from passive perception to complex, multi-step task execution. However, current architectures that integrate planning and execution within a single model often struggle with combinatorial complexity and reasoning errors in dynamic EO scenarios. To resolve…

perception
Open →

Learning to Communicate Locally for Large-Scale Multi-Agent Pathfinding

researchpaper
arXiv

Multi-agent pathfinding (MAPF) is a widely used abstraction for multi-robot trajectory planning problems, where multiple homogeneous agents move simultaneously within a shared environment. Although solving MAPF optimally is NP-hard, scalable and efficient solvers are critical for real-world applications such as…

Open →

Sustaining Cooperation in Populations Guided by AI: A Folk Theorem for LLMs

researchpaper
arXiv

Large language models (LLMs) are increasingly used to provide instructions to many agents who interact with one another. Such shared reliance couples agents who appear to act independently: they may in fact be guided by a common model. This coupling can change the prospects for cooperation among agents with…

ros
Open →

Multi-Objective Constraint Inference using Inverse reinforcement learning

researchpaper
arXiv · Cyber

Constraint inference is widely considered essential to align reinforcement learning agents with safety boundaries and operational guidelines by observing expert demonstrations. However, existing approaches typically assume homogeneous demonstrations (i.e., generated by a single expert or multiple experts with…

rlsafety
Open →

HBEE: Human Behavioral Entropy Engine -- Pre-Registered Multi-Agent LLM Simulation of Peer-Suspicion-Based Detection Inversion

researchpaper
arXiv

Insider threat detection assumes that an adaptive insider leaves behavioral residue distinguishing them from legitimate users. We test this assumption against an LLM-driven adaptive insider in a controlled multi-agent simulator. Our pre-registered five-condition study isolates defender mode (cascade vs. blind UEBA)…

Open →
Locked

Sign in to see 264 more

Free accounts see the first 5. Brief ($5/mo) unlocks the full catalog, search across every row, and the weekly Intelligence Brief.