-
Hacking Predictors Means Hacking Cars: Using Sensitivity Analysis to Identify Trajectory Prediction Vulnerabilities for Autonomous Driving Security
Authors:
Marsalis Gibson,
David Babazadeh,
Claire Tomlin,
Shankar Sastry
Abstract:
Adversarial attacks on learning-based multi-modal trajectory predictors have already been demonstrated. However, there are still open questions about the effects of perturbations on inputs other than state histories, and how these attacks impact downstream planning and control. In this paper, we conduct a sensitivity analysis on two trajectory prediction models, Trajectron++ and AgentFormer. The a…
▽ More
Adversarial attacks on learning-based multi-modal trajectory predictors have already been demonstrated. However, there are still open questions about the effects of perturbations on inputs other than state histories, and how these attacks impact downstream planning and control. In this paper, we conduct a sensitivity analysis on two trajectory prediction models, Trajectron++ and AgentFormer. The analysis reveals that between all inputs, almost all of the perturbation sensitivities for both models lie only within the most recent position and velocity states. We additionally demonstrate that, despite dominant sensitivity on state history perturbations, an undetectable image map perturbation made with the Fast Gradient Sign Method can induce large prediction error increases in both models, revealing that these trajectory predictors are, in fact, susceptible to image-based attacks. Using an optimization-based planner and example perturbations crafted from sensitivity results, we show how these attacks can cause a vehicle to come to a sudden stop from moderate driving speeds.
△ Less
Submitted 20 May, 2024; v1 submitted 18 January, 2024;
originally announced January 2024.
-
Parallel Network Flow Allocation in Repeated Routing Games via LQR Optimal Control
Authors:
Marsalis Gibson,
Yiling You,
Alexandre Bayen
Abstract:
In this article, we study the repeated routing game problem on a parallel network with affine latency functions on each edge. We cast the game setup in a LQR control theoretic framework, leveraging the Rosenthal potential formulation. We use control techniques to analyze the convergence of the game dynamics with specific cases that lend themselves to optimal control. We design proper dynamics para…
▽ More
In this article, we study the repeated routing game problem on a parallel network with affine latency functions on each edge. We cast the game setup in a LQR control theoretic framework, leveraging the Rosenthal potential formulation. We use control techniques to analyze the convergence of the game dynamics with specific cases that lend themselves to optimal control. We design proper dynamics parameters so that the conservation of flow is guaranteed. We provide an algorithmic solution for the general optimal control setup using a multiparametric quadratic programming approach (explicit MPC). Finally we illustrate with numerics the impact of varying system parameters on the solutions.
△ Less
Submitted 29 December, 2021;
originally announced December 2021.
-
Reachability Analysis for FollowerStopper: Safety Analysis and Experimental Results
Authors:
Fang-Chieh Chou,
Marsalis Gibson,
Rahul Bhadani,
Alexandre M. Bayen,
Jonathan Sprinkle
Abstract:
Motivated by earlier work and the developer of a new algorithm, the FollowerStopper, this article uses reachability analysis to verify the safety of the FollowerStopper algorithm, which is a controller designed for dampening stop- and-go traffic waves. With more than 1100 miles of driving data collected by our physical platform, we validate our analysis results by comparing it to human driving beh…
▽ More
Motivated by earlier work and the developer of a new algorithm, the FollowerStopper, this article uses reachability analysis to verify the safety of the FollowerStopper algorithm, which is a controller designed for dampening stop- and-go traffic waves. With more than 1100 miles of driving data collected by our physical platform, we validate our analysis results by comparing it to human driving behaviors. The FollowerStopper controller has been demonstrated to dampen stop-and-go traffic waves at low speed, but previous analysis on its relative safety has been limited to upper and lower bounds of acceleration. To expand upon previous analysis, reachability analysis is used to investigate the safety at the speeds it was originally tested and also at higher speeds. Two formulations of safety analysis with different criteria are shown: distance-based and time headway-based. The FollowerStopper is considered safe with distance-based criterion. However, simulation results demonstrate that the FollowerStopper is not representative of human drivers - it follows too closely behind vehicles, specifically at a distance human would deem as unsafe. On the other hand, under the time headway-based safety analysis, the FollowerStopper is not considered safe anymore. A modified FollowerStopper is proposed to satisfy time-based safety criterion. Simulation results of the proposed FollowerStopper shows that its response represents human driver behavior better.
△ Less
Submitted 28 December, 2021;
originally announced December 2021.
-
Multi-Adversarial Safety Analysis for Autonomous Vehicles
Authors:
Gilbert Bahati,
Marsalis Gibson,
Alexandre Bayen
Abstract:
This work in progress considers reachability-based safety analysis in the domain of autonomous driving in multi-agent systems. We formulate the safety problem for a car following scenario as a differential game and study how different modelling strategies yield very different behaviors regardless of the validity of the strategies in other scenarios. Given the nature of real-life driving scenarios,…
▽ More
This work in progress considers reachability-based safety analysis in the domain of autonomous driving in multi-agent systems. We formulate the safety problem for a car following scenario as a differential game and study how different modelling strategies yield very different behaviors regardless of the validity of the strategies in other scenarios. Given the nature of real-life driving scenarios, we propose a modeling strategy in our formulation that accounts for subtle interactions between agents, and compare its Hamiltonian results to other baselines. Our formulation encourages reduction of conservativeness in Hamilton-Jacobi safety analysis to provide better safety guarantees during navigation.
△ Less
Submitted 28 December, 2021;
originally announced December 2021.
-
Scalable Learning of Safety Guarantees for Autonomous Systems using Hamilton-Jacobi Reachability
Authors:
Sylvia Herbert,
Jason J. Choi,
Suvansh Sanjeev,
Marsalis Gibson,
Koushil Sreenath,
Claire J. Tomlin
Abstract:
Autonomous systems like aircraft and assistive robots often operate in scenarios where guaranteeing safety is critical. Methods like Hamilton-Jacobi reachability can provide guaranteed safe sets and controllers for such systems. However, often these same scenarios have unknown or uncertain environments, system dynamics, or predictions of other agents. As the system is operating, it may learn new k…
▽ More
Autonomous systems like aircraft and assistive robots often operate in scenarios where guaranteeing safety is critical. Methods like Hamilton-Jacobi reachability can provide guaranteed safe sets and controllers for such systems. However, often these same scenarios have unknown or uncertain environments, system dynamics, or predictions of other agents. As the system is operating, it may learn new knowledge about these uncertainties and should therefore update its safety analysis accordingly. However, work to learn and update safety analysis is limited to small systems of about two dimensions due to the computational complexity of the analysis. In this paper we synthesize several techniques to speed up computation: decomposition, warm-starting, and adaptive grids. Using this new framework we can update safe sets by one or more orders of magnitude faster than prior work, making this technique practical for many realistic systems. We demonstrate our results on simulated 2D and 10D near-hover quadcopters operating in a windy environment.
△ Less
Submitted 2 April, 2021; v1 submitted 14 January, 2021;
originally announced January 2021.
-
A Characterization of Consistent Digital Line Segments in Two Dimensions
Authors:
Iffat Chowdhury,
Matt Gibson
Abstract:
Our concern is the digitalization of line segments in two dimensions as considered by Chun et al.[Discrete Comput. Geom., 2009] and Christ et al.[Discrete Comput. Geom., 2012]. The key property that differentiates the research of Chun et al. and Christ et al. from other research in digital line segment construction is that the intersection of any two segments must be connected. Such a system of se…
▽ More
Our concern is the digitalization of line segments in two dimensions as considered by Chun et al.[Discrete Comput. Geom., 2009] and Christ et al.[Discrete Comput. Geom., 2012]. The key property that differentiates the research of Chun et al. and Christ et al. from other research in digital line segment construction is that the intersection of any two segments must be connected. Such a system of segments is called a consistent digital line segments system (CDS). Chun et al. give a construction for all segments in higher dimensions that share a common endpoint (called consistent digital rays (CDR)) that has asymptotically optimal Hausdorff distance, and Christ et al. give a complete CDS in two dimensions with optimal Hausdorff distance. Christ et al. also give a characterization of CDRs in two dimensions, and they leave open the question on how to characterize CDSes in two dimensions. In this paper, we answer the most important open question regarding CDSes in two dimensions by giving the characterization asked for by Christ et al. We obtain the characterization by giving a set of necessary and sufficient conditions that a CDS must satisfy.
△ Less
Submitted 30 April, 2015; v1 submitted 28 April, 2015;
originally announced April 2015.
-
A Characterization of Visibility Graphs for Pseudo-Polygons
Authors:
Matt Gibson,
Erik Krohn,
Qing Wang
Abstract:
In this paper, we give a characterization of the visibility graphs of pseudo-polygons. We first identify some key combinatorial properties of pseudo-polygons, and we then give a set of five necessary conditions based off our identified properties. We then prove that these necessary conditions are also sufficient via a reduction to a characterization of vertex-edge visibility graphs given by O'Rour…
▽ More
In this paper, we give a characterization of the visibility graphs of pseudo-polygons. We first identify some key combinatorial properties of pseudo-polygons, and we then give a set of five necessary conditions based off our identified properties. We then prove that these necessary conditions are also sufficient via a reduction to a characterization of vertex-edge visibility graphs given by O'Rourke and Streinu.
△ Less
Submitted 23 April, 2015;
originally announced April 2015.
-
On Isolating Points Using Disks
Authors:
Matt Gibson,
Gaurav Kanade,
Kasturi Varadarajan
Abstract:
In this paper, we consider the problem of choosing disks (that we can think of as corresponding to wireless sensors) so that given a set of input points in the plane, there exists no path between any pair of these points that is not intercepted by some disk. We try to achieve this separation using a minimum number of a given set of unit disks. We show that a constant factor approximation to this p…
▽ More
In this paper, we consider the problem of choosing disks (that we can think of as corresponding to wireless sensors) so that given a set of input points in the plane, there exists no path between any pair of these points that is not intercepted by some disk. We try to achieve this separation using a minimum number of a given set of unit disks. We show that a constant factor approximation to this problem can be found in polynomial time using a greedy algorithm. To the best of our knowledge we are the first to study this optimization problem.
△ Less
Submitted 19 May, 2011; v1 submitted 26 April, 2011;
originally announced April 2011.
-
Approximation Algorithms for Dominating Set in Disk Graphs
Authors:
Matt Gibson,
Imran A. Pirwani
Abstract:
We consider the problem of finding a lowest cost dominating set in a given disk graph containing $n$ disks. The problem has been extensively studied on subclasses of disk graphs, yet the best known approximation for disk graphs has remained $O(\log n)$ -- a bound that is asymptotically no better than the general case. We improve the status quo in two ways: for the unweighted case, we show how to o…
▽ More
We consider the problem of finding a lowest cost dominating set in a given disk graph containing $n$ disks. The problem has been extensively studied on subclasses of disk graphs, yet the best known approximation for disk graphs has remained $O(\log n)$ -- a bound that is asymptotically no better than the general case. We improve the status quo in two ways: for the unweighted case, we show how to obtain a PTAS using the framework recently proposed (independently)by Mustafa and Ray [SoCG 09] and by Chan and Har-Peled [SoCG 09]; for the weighted case where each input disk has an associated rational weight with the objective of finding a minimum cost dominating set, we give a randomized algorithm that obtains a dominating set whose weight is within a factor $2^{O(\log^* n)}$ of a minimum cost solution, with high probability -- the technique follows the framework proposed recently by Varadarajan [STOC 10].
△ Less
Submitted 19 April, 2010;
originally announced April 2010.
-
Quasi-Polynomial Time Approximation Schemes for Target Tracking
Authors:
Matt Gibson,
Gaurav Kanade,
Erik Krohn,
Kasturi Varadarajan
Abstract:
We consider the problem of tracking $n$ targets in the plane using $2n$ cameras. We can use two cameras to estimate the location of a target. We are then interested in forming $n$ camera pairs where each camera belongs to exactly one pair, followed by forming a matching between the targets and camera pairs so as to best estimate the locations of each of the targets. We consider a special case of…
▽ More
We consider the problem of tracking $n$ targets in the plane using $2n$ cameras. We can use two cameras to estimate the location of a target. We are then interested in forming $n$ camera pairs where each camera belongs to exactly one pair, followed by forming a matching between the targets and camera pairs so as to best estimate the locations of each of the targets. We consider a special case of this problem where each of the cameras are placed along a horizontal line $l$, and we consider two objective functions which have been shown to give good estimates of the locations of the targets when the distances between the targets and the cameras are sufficiently large. In the first objective, the value of an assignment of a camera pair to a target is the tracking angle formed by the assignment. Here, we are interested in maximizing the sum of these tracking angles. A polynomial time 2-approximation is known for this problem. We give a quasi-polynomial time algorithm that returns a solution whose value is at least a $(1-ε)$ factor of the value of an optimal solution for any $ε> 0$. In the second objective, the cost of an assignment of a camera pair to a target is the ratio of the vertical distance between the target and $l$ to the horizontal distance between the cameras in the camera pair. In this setting, we are interested in minimizing the sum of these ratios. A polynomial time 2-approximation is known for this problem. We give a quasi-polynomial time algorithm that returns a solution whose value is at most a $(1+ε)$ factor of the value of an optimal solution for any $ε> 0$.
△ Less
Submitted 6 July, 2009;
originally announced July 2009.
-
Decomposing Coverings and the Planar Sensor Cover Problem
Authors:
Matt Gibson,
Kasturi Varadarajan
Abstract:
We show that a $k$-fold covering using translates of an arbitrary convex polygon can be decomposed into $Ω(k)$ covers (using an efficient algorithm). We generalize this result to obtain a constant factor approximation to the sensor cover problem where the ranges of the sensors are translates of a given convex polygon. The crucial ingredient in this generalization is a constant factor approximati…
▽ More
We show that a $k$-fold covering using translates of an arbitrary convex polygon can be decomposed into $Ω(k)$ covers (using an efficient algorithm). We generalize this result to obtain a constant factor approximation to the sensor cover problem where the ranges of the sensors are translates of a given convex polygon. The crucial ingredient in this generalization is a constant factor approximation algorithm for a one-dimensional version of the sensor cover problem, called the Restricted Strip Cover (RSC) problem, where sensors are intervals of possibly different lengths. Our algorithm for RSC improves on the previous $O(\log \log \log n)$ approximation.
△ Less
Submitted 7 May, 2009;
originally announced May 2009.