-
Self-Supervised Traversability Prediction by Learning to Reconstruct Safe Terrain
Authors:
Robin Schmid,
Deegan Atha,
Frederik Schöller,
Sharmita Dey,
Seyed Fakoorian,
Kyohei Otsu,
Barry Ridge,
Marko Bjelonic,
Lorenz Wellhausen,
Marco Hutter,
Ali-akbar Agha-mohammadi
Abstract:
Navigating off-road with a fast autonomous vehicle depends on a robust perception system that differentiates traversable from non-traversable terrain. Typically, this depends on a semantic understanding which is based on supervised learning from images annotated by a human expert. This requires a significant investment in human time, assumes correct expert classification, and small details can lea…
▽ More
Navigating off-road with a fast autonomous vehicle depends on a robust perception system that differentiates traversable from non-traversable terrain. Typically, this depends on a semantic understanding which is based on supervised learning from images annotated by a human expert. This requires a significant investment in human time, assumes correct expert classification, and small details can lead to misclassification. To address these challenges, we propose a method for predicting high- and low-risk terrains from only past vehicle experience in a self-supervised fashion. First, we develop a tool that projects the vehicle trajectory into the front camera image. Second, occlusions in the 3D representation of the terrain are filtered out. Third, an autoencoder trained on masked vehicle trajectory regions identifies low- and high-risk terrains based on the reconstruction error. We evaluated our approach with two models and different bottleneck sizes with two different training and testing sites with a fourwheeled off-road vehicle. Comparison with two independent test sets of semantic labels from similar terrain as training sites demonstrates the ability to separate the ground as low-risk and the vegetation as high-risk with 81.1% and 85.1% accuracy.
△ Less
Submitted 2 August, 2022;
originally announced August 2022.
-
Towards Robust State Estimation by Boosting the Maximum Correntropy Criterion Kalman Filter with Adaptive Behaviors
Authors:
Seyed Fakoorian,
Angel Santamaria-Navarro,
Brett T. Lopez,
Dan Simon,
Ali-akbar Agha-mohammadi
Abstract:
This work proposes a resilient and adaptive state estimation framework for robots operating in perceptually-degraded environments. The approach, called Adaptive Maximum Correntropy Criterion Kalman Filtering (AMCCKF), is inherently robust to corrupted measurements, such as those containing jumps or general non-Gaussian noise, and is able to modify filter parameters online to improve performance. T…
▽ More
This work proposes a resilient and adaptive state estimation framework for robots operating in perceptually-degraded environments. The approach, called Adaptive Maximum Correntropy Criterion Kalman Filtering (AMCCKF), is inherently robust to corrupted measurements, such as those containing jumps or general non-Gaussian noise, and is able to modify filter parameters online to improve performance. Two separate methods are developed -- the Variational Bayesian AMCCKF (VB-AMCCKF) and Residual AMCCKF (R-AMCCKF) -- that modify the process and measurement noise models in addition to the bandwidth of the kernel function used in MCCKF based on the quality of measurements received. The two approaches differ in computational complexity and overall performance which is experimentally analyzed. The method is demonstrated in real experiments on both aerial and ground robots and is part of the solution used by the COSTAR team participating at the DARPA Subterranean Challenge.
△ Less
Submitted 29 March, 2021;
originally announced March 2021.
-
NeBula: Quest for Robotic Autonomy in Challenging Environments; TEAM CoSTAR at the DARPA Subterranean Challenge
Authors:
Ali Agha,
Kyohei Otsu,
Benjamin Morrell,
David D. Fan,
Rohan Thakker,
Angel Santamaria-Navarro,
Sung-Kyun Kim,
Amanda Bouman,
Xianmei Lei,
Jeffrey Edlund,
Muhammad Fadhil Ginting,
Kamak Ebadi,
Matthew Anderson,
Torkom Pailevanian,
Edward Terry,
Michael Wolf,
Andrea Tagliabue,
Tiago Stegun Vaquero,
Matteo Palieri,
Scott Tepsuporn,
Yun Chang,
Arash Kalantari,
Fernando Chavez,
Brett Lopez,
Nobuhiro Funabiki
, et al. (47 additional authors not shown)
Abstract:
This paper presents and discusses algorithms, hardware, and software architecture developed by the TEAM CoSTAR (Collaborative SubTerranean Autonomous Robots), competing in the DARPA Subterranean Challenge. Specifically, it presents the techniques utilized within the Tunnel (2019) and Urban (2020) competitions, where CoSTAR achieved 2nd and 1st place, respectively. We also discuss CoSTAR's demonstr…
▽ More
This paper presents and discusses algorithms, hardware, and software architecture developed by the TEAM CoSTAR (Collaborative SubTerranean Autonomous Robots), competing in the DARPA Subterranean Challenge. Specifically, it presents the techniques utilized within the Tunnel (2019) and Urban (2020) competitions, where CoSTAR achieved 2nd and 1st place, respectively. We also discuss CoSTAR's demonstrations in Martian-analog surface and subsurface (lava tubes) exploration. The paper introduces our autonomy solution, referred to as NeBula (Networked Belief-aware Perceptual Autonomy). NeBula is an uncertainty-aware framework that aims at enabling resilient and modular autonomy solutions by performing reasoning and decision making in the belief space (space of probability distributions over the robot and world states). We discuss various components of the NeBula framework, including: (i) geometric and semantic environment map**; (ii) a multi-modal positioning system; (iii) traversability analysis and local planning; (iv) global motion planning and exploration behavior; (i) risk-aware mission planning; (vi) networking and decentralized reasoning; and (vii) learning-enabled adaptation. We discuss the performance of NeBula on several robot types (e.g. wheeled, legged, flying), in various environments. We discuss the specific results and lessons learned from fielding this solution in the challenging courses of the DARPA Subterranean Challenge competition.
△ Less
Submitted 18 October, 2021; v1 submitted 21 March, 2021;
originally announced March 2021.
-
State Estimation-Based Robust Optimal Control of Influenza Epidemics in an Interactive Human Society
Authors:
Vahid Azimi,
Mojtaba Sharifi,
Seyed Fakoorian,
Thang Tien Nguyen,
Van Van Huynh
Abstract:
This paper presents a state estimation-based robust optimal control strategy for influenza epidemics in an interactive human society in the presence of modeling uncertainties. Interactive society is influenced by the random entrance of individuals from other human societies whose effects can be modeled as a non-Gaussian noise. Since only the number of exposed and infected humans can be measured, s…
▽ More
This paper presents a state estimation-based robust optimal control strategy for influenza epidemics in an interactive human society in the presence of modeling uncertainties. Interactive society is influenced by the random entrance of individuals from other human societies whose effects can be modeled as a non-Gaussian noise. Since only the number of exposed and infected humans can be measured, states of the influenza epidemics are first estimated by an extended maximum correntropy Kalman filter (EMCKF) to provide a robust state estimation in the presence of the non-Gaussian noise. An online quadratic program (QP) optimization is then synthesized subject to a robust control Lyapunov function (RCLF) to minimize susceptible and infected humans, while minimizing and bounding the rates of vaccination and antiviral treatment. The joint QP-RCLF-EMCKF meets multiple design specifications such as state estimation, tracking, pointwise control optimality, and robustness to parameter uncertainty and state estimation errors that have not been achieved simultaneously in previous studies. The uniform ultimate boundedness (UUB)/convergence of error trajectories is guaranteed using a Lyapunov stability argument. The soundness of the proposed approach is validated on the influenza epidemics of an interactive human society with a population of 16000. Simulation results show that the QP-RCLF-EMCKF achieves appropriate tracking and state estimation performance. The robustness of the proposed controller is finally illustrated in the presence of modeling error and non-Gaussian noise.
△ Less
Submitted 11 November, 2020; v1 submitted 26 May, 2020;
originally announced May 2020.
-
Full Rank Solutions for the MIMO Gaussian Wiretap Channel with an Average Power Constraint
Authors:
S. Ali A. Fakoorian,
A. Lee Swindlehurst
Abstract:
This paper considers a multiple-input multiple-output (MIMO) Gaussian wiretap channel model, where there exists a transmitter, a legitimate receiver and an eavesdropper, each equipped with multiple antennas. In this paper, we first revisit the rank property of the optimal input covariance matrix that achieves the secrecy capacity of the multiple antenna MIMO Gaussian wiretap channel under the aver…
▽ More
This paper considers a multiple-input multiple-output (MIMO) Gaussian wiretap channel model, where there exists a transmitter, a legitimate receiver and an eavesdropper, each equipped with multiple antennas. In this paper, we first revisit the rank property of the optimal input covariance matrix that achieves the secrecy capacity of the multiple antenna MIMO Gaussian wiretap channel under the average power constraint. Next, we obtain necessary and sufficient conditions on the MIMO wiretap channel parameters such that the optimal input covariance matrix is full-rank, and we fully characterize the resulting covariance matrix as well. Numerical results are presented to illustrate the proposed theoretical findings.
△ Less
Submitted 17 October, 2012;
originally announced October 2012.
-
Solutions for the MIMO Gaussian Wiretap Channel with a Cooperative Jammer
Authors:
S. Ali. A. Fakoorian,
A. Lee Swindlehurst
Abstract:
We study the Gaussian MIMO wiretap channel with a transmitter, a legitimate receiver, an eavesdropper and an external helper, each equipped with multiple antennas. The transmitter sends confidential messages to its intended receiver, while the helper transmits jamming signals independent of the source message to confuse the eavesdropper. The jamming signal is assumed to be treated as noise at both…
▽ More
We study the Gaussian MIMO wiretap channel with a transmitter, a legitimate receiver, an eavesdropper and an external helper, each equipped with multiple antennas. The transmitter sends confidential messages to its intended receiver, while the helper transmits jamming signals independent of the source message to confuse the eavesdropper. The jamming signal is assumed to be treated as noise at both the intended receiver and the eavesdropper. We obtain a closed-form expression for the structure of the artificial noise covariance matrix that guarantees no decrease in the secrecy capacity of the wiretap channel. We also describe how to find specific realizations of this covariance matrix expression that provide good secrecy rate performance, even when there is no non-trivial null space between the helper and the intended receiver. Unlike prior work, our approach considers the general MIMO case, and is not restricted to SISO or MISO scenarios.
△ Less
Submitted 23 January, 2011;
originally announced January 2011.
-
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
Authors:
Amitav Mukherjee,
S. A. A. Fakoorian,
**g Huang,
A. Lee Swindlehurst
Abstract:
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secr…
▽ More
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.
△ Less
Submitted 20 January, 2014; v1 submitted 16 November, 2010;
originally announced November 2010.
-
Optimal Power Allocation for GSVD-Based Beamforming in the MIMO Wiretap Channel
Authors:
S. Ali. A. Fakoorian,
A. Lee Swindlehurst
Abstract:
This paper considers a multiple-input multiple-output (MIMO) Gaussian wiretap channel model, where there exists a transmitter, a legitimate receiver and an eavesdropper, each equipped with multiple antennas. Perfect secrecy is achieved when the transmitter and the legitimate receiver can communicate at some positive rate, while ensuring that the eavesdropper gets zero bits of information. In this…
▽ More
This paper considers a multiple-input multiple-output (MIMO) Gaussian wiretap channel model, where there exists a transmitter, a legitimate receiver and an eavesdropper, each equipped with multiple antennas. Perfect secrecy is achieved when the transmitter and the legitimate receiver can communicate at some positive rate, while ensuring that the eavesdropper gets zero bits of information. In this paper, the perfect secrecy capacity of the multiple antenna MIMO wiretap channel is found for aribtrary numbers of antennas under the assumption that the transmitter performs beamforming based on the generalized singular value decomposition (GSVD). More precisely, the optimal allocation of power for the GSVD-based precoder that achieves the secrecy capacity is derived. This solution is shown to have several advantages over prior work that considered secrecy capacity for the general MIMO Gaussian wiretap channel under a high SNR assumption. Numerical results are presented to illustrate the proposed theoretical findings.
△ Less
Submitted 9 June, 2010;
originally announced June 2010.