Skip to main content

Showing 1–50 of 55 results for author: Sinopoli, B

.
  1. arXiv:2406.10418  [pdf, other

    eess.SY

    An Adaptive Method for Non-Stationary Stochastic Multi-armed Bandits with Rewards Generated by a Linear Dynamical System

    Authors: Jonathan Gornet, Mehdi Hosseinzadeh, Bruno Sinopoli

    Abstract: Online decision-making can be formulated as the popular stochastic multi-armed bandit problem where a learner makes decisions (or takes actions) to maximize cumulative rewards collected from an unknown environment. A specific variant of the bandit problem is the non-stationary stochastic multi-armed bandit problem, where the reward distributions\textemdash which are unknown to the learner\textemda… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  2. arXiv:2405.09584  [pdf, other

    stat.ML cs.LG eess.SY

    Restless Bandit Problem with Rewards Generated by a Linear Gaussian Dynamical System

    Authors: Jonathan Gornet, Bruno Sinopoli

    Abstract: Decision-making under uncertainty is a fundamental problem encountered frequently and can be formulated as a stochastic multi-armed bandit problem. In the problem, the learner interacts with an environment by choosing an action at each round, where a round is an instance of an interaction. In response, the environment reveals a reward, which is sampled from a stochastic process, to the learner. Th… ▽ More

    Submitted 22 May, 2024; v1 submitted 15 May, 2024; originally announced May 2024.

  3. arXiv:2311.09386  [pdf, other

    cs.LG cs.IT

    Beyond PCA: A Probabilistic Gram-Schmidt Approach to Feature Extraction

    Authors: Bahram Yaghooti, Netanel Raviv, Bruno Sinopoli

    Abstract: Linear feature extraction at the presence of nonlinear dependencies among the data is a fundamental challenge in unsupervised learning. We propose using a probabilistic Gram-Schmidt (GS) type orthogonalization process in order to detect and map out redundant dimensions. Specifically, by applying the GS process over a family of functions which presumably captures the nonlinear dependencies in the d… ▽ More

    Submitted 5 February, 2024; v1 submitted 15 November, 2023; originally announced November 2023.

  4. arXiv:2310.13901  [pdf, other

    cs.LG eess.SY

    Towards Hyperparameter-Agnostic DNN Training via Dynamical System Insights

    Authors: Carmel Fiscko, Aayushya Agarwal, Yihan Ruan, Soummya Kar, Larry Pileggi, Bruno Sinopoli

    Abstract: We present a stochastic first-order optimization method specialized for deep neural networks (DNNs), ECCO-DNN. This method models the optimization variable trajectory as a dynamical system and develops a discretization algorithm that adaptively selects step sizes based on the trajectory's shape. This provides two key insights: designing the dynamical system for fast continuous-time convergence and… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

    Comments: 25 pages, 11 figures

  5. arXiv:2305.14061  [pdf, other

    math.OC eess.SY

    An Equivalent Circuit Workflow for Unconstrained Optimization

    Authors: Aayushya Agarwal, Carmel Fiscko, Soummya Kar, Larry Pileggi, Bruno Sinopoli

    Abstract: We introduce a new workflow for unconstrained optimization whereby objective functions are mapped onto a physical domain to more easily design algorithms that are robust to hyperparameters and achieve fast convergence rates. Specifically, we represent optimization problems as an equivalent circuit that are then solved solely as nonlinear circuits using robust solution methods. The equivalent circu… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  6. arXiv:2304.12458  [pdf, other

    eess.SY cs.AI cs.LG

    Model-Free Learning and Optimal Policy Design in Multi-Agent MDPs Under Probabilistic Agent Dropout

    Authors: Carmel Fiscko, Soummya Kar, Bruno Sinopoli

    Abstract: This work studies a multi-agent Markov decision process (MDP) that can undergo agent dropout and the computation of policies for the post-dropout system based on control and sampling of the pre-dropout system. The controller's objective is to find an optimal policy that maximizes the value of the expected system given a priori knowledge of the agents' dropout probabilities. Finding an optimal poli… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

    Comments: 22 pages, 4 figures

  7. arXiv:2302.02297  [pdf, other

    eess.SY

    Corrected: On Confident Policy Evaluation for Factored Markov Decision Processes with Node Dropouts

    Authors: Carmel Fiscko, Soummya Kar, Bruno Sinopoli

    Abstract: In this work we investigate an importance sampling approach for evaluating policies for a structurally time-varying factored Markov decision process (MDP), i.e. the policy's value is estimated with a high-probability confidence interval. In particular, we begin with a multi-agent MDP controlled by a known policy but with unknown transition dynamics. One agent is then removed from the system - i.e.… ▽ More

    Submitted 4 February, 2023; originally announced February 2023.

    Comments: 7 pages, 2 figures

  8. arXiv:2301.05688  [pdf, other

    math.OC cs.NI eess.SY

    CANE: A Cascade-Control Approach for Network-Assisted Video QoE Management

    Authors: Mehdi Hosseinzadeh, Karthick Shankar, Maria Apostolaki, Jay Ramachandran, Steven Adams, Vyas Sekar, Bruno Sinopoli

    Abstract: Prior efforts have shown that network-assisted schemes can improve the Quality-of-Experience (QoE) and QoE fairness when multiple video players compete for bandwidth. However, realizing network-assisted schemes in practice is challenging, as: i) the network has limited visibility into the client players' internal state and actions; ii) players' actions may nullify or negate the network's actions;… ▽ More

    Submitted 13 January, 2023; originally announced January 2023.

  9. arXiv:2211.08478  [pdf, other

    eess.SY

    ECCO: Equivalent Circuit Controlled Optimization

    Authors: Aayushya Agarwal, Carmel Fiscko, Soummya Kar, Larry Pileggi, Bruno Sinopoli

    Abstract: We propose an adaptive optimization algorithm for solving unconstrained scaled gradient flow problems that achieves fast convergence by controlling the optimization trajectory shape and the discretization step sizes. Under a broad class of scaling functions, we establish convergence of the proposed approach to critical points of smooth objective functions, while demonstrating its flexibility and r… ▽ More

    Submitted 19 February, 2023; v1 submitted 15 November, 2022; originally announced November 2022.

    Comments: 16 pages

  10. arXiv:2209.06760  [pdf, other

    math.OC eess.SY

    Optimal Active Fault Detection in Inverter-Based Grids

    Authors: Mohammad Pirani, Mehdi Hosseinzadeh, Joshua A. Taylor, Bruno Sinopoli

    Abstract: Ground faults in converter-based grids can be difficult to detect because, unlike in grids with synchronous machines, they often do not result in large currents. One recent strategy is for each converter to inject a perturbation that makes faults easier to distinguish from normal operation. In this paper, we construct optimal perturbation sequences for use with the Multiple Model Kalman Filter. Th… ▽ More

    Submitted 14 September, 2022; originally announced September 2022.

  11. arXiv:2208.00146  [pdf, other

    eess.SY

    Reducing Attack Opportunities Through Decentralized Event-Triggered Control

    Authors: Paul Griffioen, Raffaele Romagnoli, Bruce H. Krogh, Bruno Sinopoli

    Abstract: Decentralized control systems are widely used in a number of situations and applications. In order for these systems to function properly and achieve their desired goals, information must be propagated between agents, which requires connecting to a network. To reduce opportunities for attacks that may be carried out through the network, we design an event-triggered mechanism for network connection… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

  12. arXiv:2207.05224  [pdf, other

    eess.SY cs.MA

    Cluster-Based Control of Transition-Independent MDPs

    Authors: Carmel Fiscko, Soummya Kar, Bruno Sinopoli

    Abstract: This work studies efficient solution methods for cluster-based control policies of transition-independent Markov decision processes (TI-MDPs). We focus on control of multi-agent systems, whereby a central planner (CP) influences agents to select desirable group behavior. The agents are partitioned into disjoint clusters whereby agents in the same cluster receive the same controls but agents in dif… ▽ More

    Submitted 26 January, 2023; v1 submitted 11 July, 2022; originally announced July 2022.

    Comments: 21 pages, 4 figures

  13. arXiv:2205.00372  [pdf, other

    eess.SY

    Ensuring Resilience Against Stealthy Attacks on Cyber-Physical Systems

    Authors: Paul Griffioen, Bruce H. Krogh, Bruno Sinopoli

    Abstract: This article provides a tool for analyzing mechanisms that aim to achieve resilience against stealthy, or undetectable, attacks on cyber-physical systems (CPSs). We consider attackers who are able to corrupt all of the inputs and outputs of the system. To counter such attackers, a response scheme must be implemented that keeps the attacker from corrupting the inputs and outputs of the system for c… ▽ More

    Submitted 30 April, 2022; originally announced May 2022.

  14. arXiv:2204.05782  [pdf, other

    cs.LG eess.SY

    Stochastic Multi-armed Bandits with Non-stationary Rewards Generated by a Linear Dynamical System

    Authors: Jonathan Gornet, Mehdi Hosseinzadeh, Bruno Sinopoli

    Abstract: The stochastic multi-armed bandit has provided a framework for studying decision-making in unknown environments. We propose a variant of the stochastic multi-armed bandit where the rewards are sampled from a stochastic linear dynamical system. The proposed strategy for this stochastic multi-armed bandit variant is to learn a model of the dynamical system while choosing the optimal action based on… ▽ More

    Submitted 6 April, 2022; originally announced April 2022.

  15. arXiv:2204.05405  [pdf, other

    math.OC

    MPC-Based Emergency Vehicle-Centered Multi-Intersection Traffic Control

    Authors: Mehdi Hosseinzadeh, Bruno Sinopoli, Ilya Kolmanovsky, Sanjoy Baruah

    Abstract: This paper proposes a traffic control scheme to alleviate traffic congestion in a network of interconnected signaled lanes/roads. The proposed scheme is emergency vehicle-centered, meaning that it provides an efficient and timely routing for emergency vehicles. In the proposed scheme, model predictive control is utilized to control inlet traffic flows by means of network gates, as well as configur… ▽ More

    Submitted 11 April, 2022; originally announced April 2022.

  16. arXiv:2203.05745  [pdf, other

    math.OC

    Implementing Optimization-Based Control Tasks in Cyber-Physical Systems With Limited Computing Capacity

    Authors: Mehdi Hosseinzadeh, Bruno Sinopoli, Ilya Kolmanovsky, Sanjoy Baruah

    Abstract: A common aspect of today's cyber-physical systems is that multiple optimization-based control tasks may execute in a shared processor. Such control tasks make use of online optimization and thus have large execution times; hence, their sampling periods must be large as well to satisfy real-time schedulability condition. However, larger sampling periods may cause worse control performance. The goal… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

  17. arXiv:2202.00743  [pdf, other

    eess.SY

    Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems

    Authors: Dario Stabili, Raffaele Romagnoli, Mirco Marchetti, Bruno Sinopoli, Michele Colajanni

    Abstract: This paper proposes a novel approach for the study of cyber-attacks against the powertrain of a generic vehicle. The proposed model is composed by a a generic Internal Combustion engine and a speed controller, that communicate through a Controller Area Network (CAN) bus. We consider a threat model composed by three representative attack scenarios designed to modify the output of the model, thus af… ▽ More

    Submitted 1 February, 2022; originally announced February 2022.

  18. arXiv:2201.02856  [pdf, other

    math.OC

    ROTEC: Robust to Early Termination Command Governor for Systems with Limited Computing Capacity

    Authors: Mehdi Hosseinzadeh, Bruno Sinopoli, Ilya Kolmanovsky, Sanjoy Baruah

    Abstract: A Command Governor (CG) is an optimization-based add-on scheme to a nominal closed-loop system. It is used to enforce state and control constraints by modifying reference commands. This paper considers the implementation of a CG on embedded processors that have limited computing resources and must execute multiple control and diagnostics functions; consequently, the time available for CG computati… ▽ More

    Submitted 8 January, 2022; originally announced January 2022.

  19. arXiv:2110.07771  [pdf, other

    cs.CR cs.CY

    Assessing Risks and Modeling Threats in the Internet of Things

    Authors: Paul Griffioen, Bruno Sinopoli

    Abstract: Threat modeling and risk assessments are common ways to identify, estimate, and prioritize risk to national, organizational, and individual operations and assets. Several threat modeling and risk assessment approaches have been proposed prior to the advent of the Internet of Things (IoT) that focus on threats and risks in information technology (IT). Due to shortcomings in these approaches and the… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

  20. arXiv:2107.08457  [pdf, other

    math.OC eess.SY

    Reference Governor-Based Fault-Tolerant Constrained Control

    Authors: Mehdi Hosseinzadeh, Ilya Kolmanovsky, Sanjoy Baruah, Bruno Sinopoli

    Abstract: This paper presents a fault-tolerant control scheme for constrained linear systems. First, a new variant of the Reference Governor (RG) called At Once Reference Governor (AORG) is introduced. The AORG is distinguished from the conventional RG by computing the Auxiliary Reference (AR) sequence so that to optimize performance over a prescribed time interval instead of only at the current time instan… ▽ More

    Submitted 18 July, 2021; originally announced July 2021.

  21. arXiv:2103.00790  [pdf, other

    eess.SY

    Physical Watermarking for Replay Attack Detection in Continuous-time Systems

    Authors: Bahram Yaghooti, Raffaele Romagnoli, Bruno Sinopoli

    Abstract: Physical watermarking is a well established technique for replay attack detection in cyber-physical systems (CPSs). Most of the watermarking methods proposed in the literature are designed for discrete-time systems. In general, real physical systems evolve in continuous time. In this paper, we analyze the effect of watermarking on sampled-data continuous-time systems controlled via a Zero-Order Ho… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

    Comments: 2021 European Control Conference (ECC)

  22. arXiv:2102.05144  [pdf, ps, other

    cs.RO eess.SY

    Toward Safe and Efficient Human-Robot Interaction via Behavior-Driven Danger Signaling

    Authors: Mehdi Hosseinzadeh, Bruno Sinopoli, Aaron F. Bobick

    Abstract: This paper introduces the notion of danger awareness in the context of Human-Robot Interaction (HRI), which decodes whether a human is aware of the existence of the robot, and illuminates whether the human is willing to engage in enforcing the safety. This paper also proposes a method to quantify this notion as a single binary variable, so-called danger awareness coefficient. By analyzing the effe… ▽ More

    Submitted 10 February, 2021; v1 submitted 9 February, 2021; originally announced February 2021.

  23. arXiv:2101.09885  [pdf, ps, other

    eess.SY

    Active Attack Detection and Control in Constrained Cyber-Physical Systems Under Prevented Actuation Attack

    Authors: Mehdi Hosseinzadeh, Bruno Sinopoli

    Abstract: This paper proposes an active attack detection scheme for constrained cyber-physical systems. Despite passive approaches where the detection is based on the analysis of the input-output data, active approaches interact with the system by designing the control input so to improve detection. This paper focuses on the prevented actuation attack, where the attacker prevents the exchange of information… ▽ More

    Submitted 24 January, 2021; originally announced January 2021.

  24. arXiv:1905.02922  [pdf, other

    math.OC

    Attack Resilient Interconnected Second Order Systems: A Game-Theoretic Approach

    Authors: Mohammad Pirani, Joshua A. Taylor, Bruno Sinopoli

    Abstract: This paper studies the resilience of second-order networked dynamical systems to strategic attacks. We discuss two widely used control laws, which have applications in power networks and formation control of autonomous agents. In the first control law, each agent receives pure velocity feedback from its neighbor. In the second control law, each agent receives its velocity relative to its neighbors… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

  25. A Moving Target Defense for Securing Cyber-Physical Systems

    Authors: Paul Griffioen, Sean Weerakkody, Bruno Sinopoli

    Abstract: This article considers the design and analysis of multiple moving target defenses for recognizing and isolating attacks on cyber-physical systems. We consider attackers who perform integrity attacks on a set of sensors and actuators in a control system. In such cases, a model aware adversary can carefully design attack vectors to bypass bad data detection and identification filters while causing d… ▽ More

    Submitted 7 July, 2020; v1 submitted 4 February, 2019; originally announced February 2019.

    Journal ref: IEEE Transactions on Automatic Control, 2020

  26. arXiv:1811.08070  [pdf, ps, other

    physics.soc-ph

    Optimizing Robustness against Cascading Failures under Max-Load Targeted Attack

    Authors: Omur Ozel, Bruno Sinopoli, Osman Yagan

    Abstract: Motivated by reliability of networks in critical infrastructures, we consider optimal robustness of a class of flow networks against a \textit{targeted} attack, namely max-load targeted attack, that triggers cascading failures due to removal of largest load carrying portion of lines. The setup involves a network of $N$ lines with initial loads $L_1, \ldots, L_N$, drawn from independent and identic… ▽ More

    Submitted 26 March, 2019; v1 submitted 19 November, 2018; originally announced November 2018.

  27. arXiv:1810.10484  [pdf, other

    eess.SY

    Design of Software Rejuvenation for CPS Security Using Invariant Sets

    Authors: Raffaele Romagnoli, Bruce H. Krogh, Bruno Sinopoli

    Abstract: Software rejuvenation has been proposed as a strategy to protect cyber-physical systems (CSPs) against unanticipated and undetectable cyber attacks. The basic idea is to refresh the system periodically with a secure and trusted copy of the online software so as to eliminate all effects of malicious modifications to the run-time code and data. Following each software refresh a safety controller ass… ▽ More

    Submitted 24 October, 2018; originally announced October 2018.

  28. arXiv:1810.10468  [pdf, other

    eess.SY

    Software Rejuvenation for Secure Tracking Control

    Authors: Raffaele Romagnoli, Bruce H. Krogh, Dionisio de Niz, Bruno Sinopoli

    Abstract: Software rejuvenation protects cyber-physical systems (CSPs) against cyber attacks on the run-time code by periodically refreshing the system with an uncorrupted software image. The system is vulnerable to attacks when it is communicating with other agents. Security is guaranteed during the software refresh and re-initialization by turning off all communication. Although the effectiveness of softw… ▽ More

    Submitted 24 October, 2018; originally announced October 2018.

  29. arXiv:1807.01533  [pdf, ps, other

    eess.SY eess.SP

    Distributed Estimation Via a Roaming Token

    Authors: Lucas Balthazar, João Xavier, Bruno Sinopoli

    Abstract: We present an algorithm for the problem of linear distributed estimation of a parameter in a network where a set of agents are successively taking measurements. The approach considers a roaming token in a network that carries the estimate, and jumps from one agent to another in its vicinity according to the probabilities of a Markov chain. When the token is at an agent it records the agent's local… ▽ More

    Submitted 4 July, 2018; originally announced July 2018.

  30. Robustness of flow networks against cascading failures under partial load redistribution

    Authors: Omur Ozel, Bruno Sinopoli, Osman Yagan

    Abstract: We study the robustness of flow networks against cascading failures under a partial load redistribution model. In particular, we consider a flow network of $N$ lines with initial loads $L_1, \ldots, L_N$ and free-spaces (i.e., redundant space) $S_1, \ldots, S_N$ that are independent and identically distributed with joint distribution $P_{LS}(x,y)=\mathbb{P}(L \leq x, S \leq y)$. The capacity… ▽ More

    Submitted 8 October, 2018; v1 submitted 21 February, 2018; originally announced February 2018.

    Journal ref: Phys. Rev. E 98, 042306 (2018)

  31. arXiv:1710.01105  [pdf, ps, other

    eess.SY

    A Bernoulli-Gaussian Physical Watermark for Detecting Integrity Attacks in Control Systems

    Authors: Sean Weerakkody, Omur Ozel, Bruno Sinopoli

    Abstract: We examine the merit of Bernoulli packet drops in actively detecting integrity attacks on control systems. The aim is to detect an adversary who delivers fake sensor measurements to a system operator in order to conceal their effect on the plant. Physical watermarks, or noisy additive Gaussian inputs, have been previously used to detect several classes of integrity attacks in control systems. In t… ▽ More

    Submitted 8 October, 2017; v1 submitted 3 October, 2017; originally announced October 2017.

    Comments: Appearing in 55th Annual Allerton Conference on Communication, Control, and Computing

  32. arXiv:1708.07036  [pdf, other

    cs.PF

    Optimal Threshold Policies for Robust Data Center Control

    Authors: Paul Weng, Zeqi Qiu, John Costanzo, Xiaoqi Yin, Bruno Sinopoli

    Abstract: With the simultaneous rise of energy costs and demand for cloud computing, efficient control of data centers becomes crucial. In the data center control problem, one needs to plan at every time step how many servers to switch on or off in order to meet stochastic job arrivals while trying to minimize electricity consumption. This problem becomes particularly challenging when servers can be of vari… ▽ More

    Submitted 23 January, 2018; v1 submitted 23 August, 2017; originally announced August 2017.

    Comments: Long version of paper accepted at AETA 2017

  33. arXiv:1706.08182  [pdf, other

    eess.SY

    Detecting Integrity Attacks on Control Systems using a Moving Target Approach

    Authors: Sean Weerakkody, Bruno Sinopoli

    Abstract: Maintaining the security of control systems in the presence of integrity attacks is a significant challenge. In literature, several possible attacks against control systems have been formulated including replay, false data injection, and zero dynamics attacks. The detection and prevention of these attacks may require the defender to possess a particular subset of trusted communication channels. Al… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

    Comments: Appeared in 54th IEEE Conference on Decision and Control, errors in original manuscript are corrected here

    Journal ref: 54th IEEE Conference on Decision and Control. IEEE, 2015, pp. 5820 - 5826

  34. arXiv:1612.08478  [pdf, other

    eess.SY

    Joint attack detection and secure state estimation of cyber-physical systems

    Authors: Nicola Forti, Giorgio Battistelli, Luigi Chisci, Bruno Sinopoli

    Abstract: This paper deals with secure state estimation of cyber-physical systems subject to switching (on/off) attack signals and injection of fake packets (via either packet substitution or insertion of extra packets). The random set paradigm is adopted in order to model, via Random Finite Sets (RFSs), the switching nature of both system attacks and the injection of fake measurements. The problem of detec… ▽ More

    Submitted 24 February, 2019; v1 submitted 26 December, 2016; originally announced December 2016.

    Comments: 27 pages, 12 figures

  35. arXiv:1609.09043  [pdf, ps, other

    eess.SY

    A Moving Target Approach for Identifying Malicious Sensors in Control Systems

    Authors: Sean Weerakkody, Bruno Sinopoli

    Abstract: In this paper, we consider the problem of attack identification in cyber-physical systems (CPS). Attack identification is often critical for the recovery and performance of a CPS that is targeted by malicious entities, allowing defenders to construct algorithms which bypass harmful nodes. Previous work has characterized limitations in the perfect identification of adversarial attacks on determinis… ▽ More

    Submitted 13 March, 2017; v1 submitted 28 September, 2016; originally announced September 2016.

    Comments: Appearing in 54th Annual Allerton Conference on Communication, Control and Computing

  36. arXiv:1608.08469  [pdf, other

    cs.MM cs.NI eess.SY

    On the Efficiency and Fairness of Multiplayer HTTP-based Adaptive Video Streaming

    Authors: Xiaoqi Yin, Mihovil Bartulović, Vyas Sekar, Bruno Sinopoli

    Abstract: User-perceived quality-of-experience (QoE) is critical in internet video delivery systems. Extensive prior work has studied the design of client-side bitrate adaptation algorithms to maximize single-player QoE. However, multiplayer QoE fairness becomes critical as the growth of video traffic makes it more likely that multiple players share a bottleneck in the network. Despite several recent propos… ▽ More

    Submitted 29 August, 2016; originally announced August 2016.

  37. arXiv:1603.07984  [pdf, ps, other

    eess.SY

    Networked Constrained Cyber-Physical Systems subject to malicious attacks: a resilient set-theoretic control approach

    Authors: Walter Lucia, Bruno Sinopoli, Giuseppe Franze'

    Abstract: In this paper a novel set-theoretic control framework for Networked Constrained Cyber-Physical Systems is presented. By resorting to set-theoretic ideas and the physical watermarking concept, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast severe cyber attacks affecting the communication channels. The resulting scheme ensures Uniformly Ul… ▽ More

    Submitted 25 March, 2016; originally announced March 2016.

  38. arXiv:1603.05710  [pdf, ps, other

    eess.SY

    Information Flow for Security in Control Systems

    Authors: Sean Weerakkody, Bruno Sinopoli, Soummya Kar, Anupam Datta

    Abstract: This paper considers the development of information flow analyses to support resilient design and active detection of adversaries in cyber physical systems (CPS). The area of CPS security, though well studied, suffers from fragmentation. In this paper, we consider control systems as an abstraction of CPS. Here, we extend the notion of information flow analysis, a well established set of methods de… ▽ More

    Submitted 17 March, 2016; originally announced March 2016.

  39. arXiv:1510.04712  [pdf, other

    eess.SY

    A Graph Theoretic Characterization of Perfect Attackability and Detection in Distributed Control Systems

    Authors: Sean Weerakkody, Xiaofei Liu, Sang H. Son, Bruno Sinopoli

    Abstract: This paper is concerned with the analysis and design of secure Distributed Control Systems in the face of integrity attacks on sensors and controllers by external attackers or insiders. In general a DCS consists of many heterogenous components and agents including sensors, actuators, controllers. Due to its distributed nature, some agents may start misbehaving to disrupt the system. This paper fir… ▽ More

    Submitted 15 October, 2015; originally announced October 2015.

    Comments: 8 pages, 1 figure

  40. arXiv:1507.07205  [pdf, other

    math.OC eess.SY

    Minimum Sensor Placement for Robust Observability of Structured Complex Networks

    Authors: Xiaofei Liu, Sergio Pequito, Soummya Kar, Bruno Sinopoli, A. Pedro Aguiar

    Abstract: This paper addresses problems on the robust structural design of complex networks. More precisely, we address the problem of deploying the minimum number of dedicated sensors, i.e., those measuring a single state variable, that ensure the network to be structurally observable under disruptive scenarios. The disruptive scenarios considered are as follows: (i) the malfunction/loss of one arbitrary s… ▽ More

    Submitted 10 June, 2016; v1 submitted 26 July, 2015; originally announced July 2015.

  41. arXiv:1506.05541  [pdf, other

    cs.NI

    Analyzing TCP Throughput Stability and Predictability with Implications for Adaptive Video Streaming

    Authors: Yi Sun, Xiaoqi Yin, Nanshu Wang, Junchen Jiang, Vyas Sekar, Yun **, Bruno Sinopoli

    Abstract: Recent work suggests that TCP throughput stability and predictability within a video viewing session can inform the design of better video bitrate adaptation algorithms. Despite a rich tradition of Internet measurement, however, our understanding of throughput stability and predictability is quite limited. To bridge this gap, we present a measurement study of throughput stability using a large-sca… ▽ More

    Submitted 17 June, 2015; originally announced June 2015.

  42. Distributed inference over directed networks: Performance limits and optimal design

    Authors: Dragana Bajović, José M. F. Moura, João Xavier, Bruno Sinopoli

    Abstract: We find large deviations rates for consensus-based distributed inference for directed networks. When the topology is deterministic, we establish the large deviations principle and find exactly the corresponding rate function, equal at all nodes. We show that the dependence of the rate function on the stochastic weight matrix associated with the network is fully captured by its left eigenvector cor… ▽ More

    Submitted 28 April, 2015; originally announced April 2015.

    Comments: 35 pages, submitted to Transactions on Signal Processing

  43. arXiv:1502.03068  [pdf, ps, other

    cs.IT

    Multi-Sensor Scheduling for State Estimation with Event-Based, Stochastic Triggers

    Authors: Sean Weerakkody, Yilin Mo, Bruno Sinopoli, Duo Han, Ling Shi

    Abstract: In networked systems, state estimation is hampered by communication limits. Past approaches, which consider scheduling sensors through deterministic event-triggers, reduce communication and maintain estimation quality. However, these approaches destroy the Gaussian property of the state, making it computationally intractable to obtain an exact minimum mean squared error estimate. We propose a stoc… ▽ More

    Submitted 10 February, 2015; originally announced February 2015.

    Comments: 8 pages, 2 figures

  44. Stochastic Event-triggered Sensor Schedule for Remote State Estimation

    Authors: Duo Han, Yilin Mo, Junfeng Wu, Sean Weerakkody, Bruno Sinopoli, Ling Shi

    Abstract: We propose an open-loop and a closed-loop stochastic event-triggered sensor schedule for remote state estimation. Both schedules overcome the essential difficulties of existing schedules in recent literature works where, through introducing a deterministic event-triggering mechanism, the Gaussian property of the innovation process is destroyed which produces a challenging nonlinear filtering probl… ▽ More

    Submitted 3 February, 2014; originally announced February 2014.

    Journal ref: IEEE Trans. Autom. Control, pp. 2661 - 2675, vol 60, issue 10, 2015

  45. arXiv:1202.6389  [pdf, other

    math.PR cs.IT cs.SI

    Consensus and Products of Random Stochastic Matrices: Exact Rate for Convergence in Probability

    Authors: Dragana Bajovic, Joao Xavier, Jose M. F. Moura, Bruno Sinopoli

    Abstract: Distributed consensus and other linear systems with system stochastic matrices $W_k$ emerge in various settings, like opinion formation in social networks, rendezvous of robots, and distributed inference in sensor networks. The matrices $W_k$ are often random, due to, e.g., random packet dropouts in wireless sensor networks. Key in analyzing the performance of such systems is studying convergence… ▽ More

    Submitted 28 February, 2012; originally announced February 2012.

  46. Large Deviations Performance of Consensus+Innovations Distributed Detection with Non-Gaussian Observations

    Authors: Dragana Bajovic, Dusan Jakovetic, Jose M. F. Moura, Joao Xavier, Bruno Sinopoli

    Abstract: We establish the large deviations asymptotic performance (error exponent) of consensus+innovations distributed detection over random networks with generic (non-Gaussian) sensor observations. At each time instant, sensors 1) combine theirs with the decision variables of their neighbors (consensus) and 2) assimilate their new observations (innovations). This paper shows for general non-Gaussian dist… ▽ More

    Submitted 15 April, 2012; v1 submitted 19 November, 2011; originally announced November 2011.

    Comments: 30 pages, journal, submitted Nov 17, 2011; revised Apr 3, 2012

  47. Stochastic Sensor Scheduling for Energy Constrained Estimation in Multi-Hop Wireless Sensor Networks

    Authors: Yilin Mo, Emanuele Garone, Alessandro Casavola, Bruno Sinopoli

    Abstract: Wireless Sensor Networks (WSNs) enable a wealth of new applications where remote estimation is essential. Individual sensors simultaneously sense a dynamic process and transmit measured information over a shared channel to a central fusion center. The fusion center computes an estimate of the process state by means of a Kalman filter. In this paper we assume that the WSN admits a tree topology wit… ▽ More

    Submitted 8 July, 2011; originally announced July 2011.

    Comments: 7 pages, 2 figures, complete version of a technical note for the IEEE transactions on automatic control

  48. arXiv:1012.4668  [pdf, other

    cs.IT

    Distributed Detection over Random Networks: Large Deviations Performance Analysis

    Authors: Dragana Bajovic, Dusan Jakovetic, Joao Xavier, Bruno Sinopoli, Jose M. F. Moura

    Abstract: We study the large deviations performance, i.e., the exponential decay rate of the error probability, of distributed detection algorithms over random networks. At each time step $k$ each sensor: 1) averages its decision variable with the neighbors' decision variables; and 2) accounts on-the-fly for its new observation. We show that distributed detection exhibits a "phase change" behavior. When the… ▽ More

    Submitted 21 December, 2010; originally announced December 2010.

    Comments: 30 pages, journal, submitted on December 3rd, 2010

  49. Sensor Selection for Event Detection in Wireless Sensor Networks

    Authors: Dragana Bajovic, Bruno Sinopoli, Joao Xavier

    Abstract: We consider the problem of sensor selection for event detection in wireless sensor networks (WSNs). We want to choose a subset of p out of n sensors that yields the best detection performance. As the sensor selection optimality criteria, we propose the Kullback-Leibler and Chernoff distances between the distributions of the selected measurements under the two hypothesis. We formulate the maxmin ro… ▽ More

    Submitted 22 November, 2010; originally announced November 2010.

    Comments: 30 pages, journal, submitted

  50. arXiv:1010.5163  [pdf, ps, other

    cs.IT

    Distributed Detection over Time Varying Networks: Large Deviations Analysis

    Authors: Dragana Bajovic, Dusan Jakovetic, Joao Xavier, Bruno Sinopoli, Jose M. F. Moura

    Abstract: We apply large deviations theory to study asymptotic performance of running consensus distributed detection in sensor networks. Running consensus is a stochastic approximation type algorithm, recently proposed. At each time step k, the state at each sensor is updated by a local averaging of the sensor's own state and the states of its neighbors (consensus) and by accounting for the new observation… ▽ More

    Submitted 25 October, 2010; originally announced October 2010.

    Comments: 8 pages, in 48th Allerton Conference on Communication, Control, and Computing, Oct. 2010