Skip to main content

Showing 1–12 of 12 results for author: Lucia, W

.
  1. arXiv:2405.18586  [pdf, ps, other

    eess.SY cs.CR

    A Verifiable Computing Scheme for Encrypted Control Systems

    Authors: Francesca Stabile, Walter Lucia, Amr Youssef, Giuseppe Franze

    Abstract: The proliferation of cloud computing technologies has paved the way for deploying networked encrypted control systems, offering high performance, remote accessibility and privacy. However, in scenarios where the control algorithms run on third-party cloud service providers, the control logic might be changed by a malicious agent on the cloud. Consequently, it is imperative to verify the correctnes… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: Preprint of the manuscript submitted to the IEEE Control Systems Letters (L-CSS)

  2. arXiv:2405.01753  [pdf, other

    eess.SY math.OC

    A Feedback Linearized Model Predictive Control Strategy for Input-Constrained Self-Driving Cars

    Authors: Cristian Tiriolo, Walter Lucia

    Abstract: This paper proposes a novel real-time affordable solution to the trajectory tracking control problem for self-driving cars subject to longitudinal and steering angular velocity constraints. To this end, we develop a dual-mode Model Predictive Control (MPC) solution starting from an input-output feedback linearized description of the vehicle kinematics. First, we derive the state-dependent input co… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: Preprint of a manuscript currently under review for TCTS

  3. arXiv:2403.15854  [pdf, other

    eess.SY

    A Modular Safety Filter for Safety-Certified Cyber-Physical Systems

    Authors: Mohammad Bajelani, Walter Lucia, Klaske van Heusden

    Abstract: Nowadays, many control systems are networked and embed communication and computation capabilities. Such control architectures are prone to cyber attacks on the cyberinfrastructure. Consequently, there is an impellent need to develop solutions to preserve the plant's safety against potential attacks. To ensure safety, this paper introduces a modular safety filter approach that is effective for a va… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

  4. arXiv:2403.08987  [pdf, ps, other

    math.OC eess.SY

    A Constrained Tracking Controller for Ramp and Sinusoidal Reference Signals using Robust Positive Invariance

    Authors: Geovana Franca dos Santos, Eugenio B. Castelan, Walter Lucia

    Abstract: This paper proposes an output feedback controller capable of ensuring steady-state offset-free tracking for ramp and sinusoidal reference signals while ensuring local stability and state and input constraints fulfillment. The proposed solution is derived by jointly exploiting the internal model principle, polyhedral robust positively invariant arguments, and the Extended Farkas' Lemma. In particul… ▽ More

    Submitted 14 March, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

    Comments: Preprint of the conference paper submitted to the 2024 American Control Conference

  5. arXiv:2403.08942  [pdf, ps, other

    cs.RO eess.SY

    Collision-Free Platooning of Mobile Robots through a Set-Theoretic Predictive Control Approach

    Authors: Suryaprakash Rajkumar, Cristian Tiriolo, Walter Lucia

    Abstract: This paper proposes a control solution to achieve collision-free platooning control of input-constrained mobile robots. The platooning policy is based on a leader-follower approach where the leader tracks a reference trajectory while followers track the leader's pose with an inter-agent delay. First, the leader and the follower kinematic models are feedback linearized and the platoon's error dynam… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: Paper submitted for publication in the 2024 American Control Conference (ACC)

  6. arXiv:2312.00658  [pdf, ps, other

    eess.SY

    A Data-Driven Safety Preserving Control Architecture for Constrained Cyber-Physical Systems

    Authors: Mehran Attar, Walter Lucia

    Abstract: In this paper, we propose a data-driven networked control architecture for unknown and constrained cyber-physical systems capable of detecting networked false-data-injection attacks and ensuring plant's safety. In particular, on the controller's side, we design a novel robust anomaly detector that can discover the presence of network attacks using a data-driven outer approximation of the expected… ▽ More

    Submitted 21 February, 2024; v1 submitted 1 December, 2023; originally announced December 2023.

    Comments: Preprint submitted to the International Journal of Robust and Nonlinear Control

  7. arXiv:2303.04931  [pdf, ps, other

    eess.SY cs.CR cs.RO

    An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots

    Authors: Amir Mohammad Naseri, Walter Lucia, Amr Youssef

    Abstract: Remotely controlled mobile robots are important examples of Cyber-Physical Systems (CPSs). Recently, these robots are being deployed in many safety critical applications. Therefore, ensuring their cyber-security is of paramount importance. Different control schemes that have been proposed to secure such systems against sophisticated cyber-attacks require the exchange of secret messages between the… ▽ More

    Submitted 23 October, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

    Comments: This preprint has been submitted to the 2023 IFAC World Congress

  8. arXiv:2303.04749  [pdf, ps, other

    eess.SY

    Data-Driven Robust Backward Reachable Sets for Set-Theoretic Model Predictive Control

    Authors: Mehran Attar, Walter Lucia

    Abstract: In this paper, we propose a novel approach for computing robust backward reachable sets from noisy data for unknown constrained linear systems subject to bounded disturbances. In particular, we develop an algorithm for obtaining zonotopic inner approximations that can be used for control purposes. It is shown that such sets, if built on an extended space including states and inputs, can be used to… ▽ More

    Submitted 20 December, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

    Comments: Preprint jointly submitted to IEEE Control Systems Letters (L-CSS) and IEEE Conference on Decision and Control (CDC)

  9. Wyner wiretap-like encoding scheme for cyber-physical systems

    Authors: Walter Lucia, Amr Youssef

    Abstract: In this study, the authors consider the problem of exchanging secrete messages in cyber-physical systems (CPSs) without resorting to cryptographic solutions. In particular, they consider a CPS where the networked controller wants to send a secrete message to the plant. They show that such a problem can be solved by exploiting a Wyner wiretap-like encoding scheme taking advantage of the closed-loop… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

    Journal ref: IET Cyber-Physical Systems: Theory & Applications, Vol. 5, No. 4, pp. 359-365, 2020

  10. arXiv:2104.01011  [pdf, ps, other

    cs.CR eess.SY

    On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments

    Authors: Amir Mohammad Naseri, Walter Lucia, Mohammad Mannan, Amr Youssef

    Abstract: Recently, cloud control systems have gained increasing attention from the research community as a solution to implement networked cyber-physical systems (CPSs). Such an architecture can reduce deployment and maintenance costs albeit at the expense of additional security and privacy concerns. In this paper, first, we discuss state-of-the-art security solutions for cloud control systems and their li… ▽ More

    Submitted 31 March, 2021; originally announced April 2021.

  11. arXiv:1603.07984  [pdf, ps, other

    eess.SY

    Networked Constrained Cyber-Physical Systems subject to malicious attacks: a resilient set-theoretic control approach

    Authors: Walter Lucia, Bruno Sinopoli, Giuseppe Franze'

    Abstract: In this paper a novel set-theoretic control framework for Networked Constrained Cyber-Physical Systems is presented. By resorting to set-theoretic ideas and the physical watermarking concept, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast severe cyber attacks affecting the communication channels. The resulting scheme ensures Uniformly Ul… ▽ More

    Submitted 25 March, 2016; originally announced March 2016.

  12. arXiv:1312.6756  [pdf, other

    cs.SI physics.soc-ph

    Multi-dimensional Conversation Analysis across Online Social Networks

    Authors: William Lucia, Cuneyt Gurcan Akcora, Elena Ferrari

    Abstract: With the advance of the Internet, ordinary users have created multiple personal accounts on online social networks, and interactions among these social network users have recently been tagged with location information. In this work, we observe user interactions across two popular online social networks, Facebook and Twitter, and analyze which factors lead to retweet/like interactions for tweets/po… ▽ More

    Submitted 23 December, 2013; originally announced December 2013.

    Comments: Datasets will be anonymized and published at: http://akcora.wordpress.com/2013/12/24/pointer-for-datasets/

    Journal ref: In Social Computing and its applications (SCA), 2013 Third International Conference on. IEEE