Skip to main content

Showing 1–41 of 41 results for author: Clark, A

Searching in archive eess. Search in all archives.
.
  1. arXiv:2406.18914  [pdf, other

    eess.SY cs.RO

    Verification and Synthesis of Compatible Control Lyapunov and Control Barrier Functions

    Authors: Hongkai Dai, Chuanrui Jiang, Hongchao Zhang, Andrew Clark

    Abstract: Safety and stability are essential properties of control systems. Control Barrier Functions (CBFs) and Control Lyapunov Functions (CLFs) have been proposed to ensure safety and stability respectively. However, previous approaches typically verify and synthesize the CBFs and CLFs separately, satisfying their respective constraints, without proving that the CBFs and CLFs are compatible with each oth… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  2. arXiv:2402.18677  [pdf, other

    cs.RO cs.AI eess.SY

    Fault Tolerant Neural Control Barrier Functions for Robotic Systems under Sensor Faults and Attacks

    Authors: Hongchao Zhang, Luyao Niu, Andrew Clark, Radha Poovendran

    Abstract: Safety is a fundamental requirement of many robotic systems. Control barrier function (CBF)-based approaches have been proposed to guarantee the safety of robotic systems. However, the effectiveness of these approaches highly relies on the choice of CBFs. Inspired by the universal approximation power of neural networks, there is a growing trend toward representing CBFs using neural networks, leadi… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

  3. arXiv:2401.11333  [pdf, ps, other

    eess.SP eess.SY

    Error bounds of constant gain least-mean-squares algorithms

    Authors: Chang Liu, Antwan D. Clark

    Abstract: Constant gain least-mean-squares (LMS) algorithms have a wide range of applications in trajectory tracking problems, but the formal convergence of LMS in mean square is not yet fully established. This work provides an upper bound on the constant gain that guarantees a bounded mean-squared error of LMS for a general design vector. These results highlight the role of the fourth-order moment of the d… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

    Comments: 6 pages

  4. arXiv:2305.06547  [pdf, other

    cs.LG eess.SY

    Neural Lyapunov Control for Discrete-Time Systems

    Authors: Junlin Wu, Andrew Clark, Yiannis Kantaros, Yevgeniy Vorobeychik

    Abstract: While ensuring stability for linear systems is well understood, it remains a major challenge for nonlinear systems. A general approach in such cases is to compute a combination of a Lyapunov function and an associated control policy. However, finding Lyapunov functions for general nonlinear systems is a challenging task. To address this challenge, several methods have been proposed that represent… ▽ More

    Submitted 24 December, 2023; v1 submitted 10 May, 2023; originally announced May 2023.

    Comments: NeurIPS 2023

  5. arXiv:2304.02058  [pdf, ps, other

    eess.SY

    A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems

    Authors: Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran

    Abstract: Interconnected systems such as power systems and chemical processes are often required to satisfy safety properties in the presence of faults and attacks. Verifying safety of these systems, however, is computationally challenging due to nonlinear dynamics, high dimensionality, and combinatorial number of possible faults and attacks that can be incurred by the subsystems interconnected within the n… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

  6. arXiv:2304.02005  [pdf, other

    cs.AI cs.MA eess.SY

    Risk-Aware Distributed Multi-Agent Reinforcement Learning

    Authors: Abdullah Al Maruf, Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Radha Poovendran

    Abstract: Autonomous cyber and cyber-physical systems need to perform decision-making, learning, and control in unknown environments. Such decision-making can be sensitive to multiple factors, including modeling errors, changes in costs, and impacts of events in the tails of probability distributions. Although multi-agent reinforcement learning (MARL) provides a framework for learning behaviors through repe… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

  7. arXiv:2302.10308  [pdf, other

    math.OC eess.SP eess.SY

    A Hybrid Submodular Optimization Approach to Controlled Islanding with Post-Disturbance Stability Guarantees

    Authors: Luyao Niu, Dinuka Sahanbandu, Andrew Clark, Radha Poovendran

    Abstract: Disturbances may create cascading failures in power systems and lead to widespread blackouts. Controlled islanding is an effective approach to mitigate cascading failures by partitioning the power system into a set of disjoint islands. To retain the stability of the power system following disturbances, the islanding strategy should not only be minimally disruptive, but also guarantee post-disturba… ▽ More

    Submitted 9 August, 2023; v1 submitted 17 February, 2023; originally announced February 2023.

  8. arXiv:2302.07341  [pdf, other

    eess.SY

    Cooperative Perception for Safe Control of Autonomous Vehicles under LiDAR Spoofing Attacks

    Authors: Hongchao Zhang, Zhouchi Li, Shiyu Cheng, Andrew Clark

    Abstract: Autonomous vehicles rely on LiDAR sensors to detect obstacles such as pedestrians, other vehicles, and fixed infrastructures. LiDAR spoofing attacks have been demonstrated that either create erroneous obstacles or prevent detection of real obstacles, resulting in unsafe driving behaviors. In this paper, we propose an approach to detect and mitigate LiDAR spoofing attacks by leveraging LiDAR scan d… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

  9. arXiv:2211.09887  [pdf, other

    eess.IV cs.LG physics.med-ph

    Spherical convolutional neural networks can improve brain microstructure estimation from diffusion MRI data

    Authors: Leevi Kerkelä, Kiran Seunarine, Filip Szczepankiewicz, Chris A. Clark

    Abstract: Diffusion magnetic resonance imaging is sensitive to the microstructural properties of brain tissue. However, estimating clinically and scientifically relevant microstructural properties from the measured signals remains a highly challenging inverse problem that machine learning may help solve. This study investigated if recently developed rotationally invariant spherical convolutional neural netw… ▽ More

    Submitted 26 February, 2024; v1 submitted 17 November, 2022; originally announced November 2022.

  10. arXiv:2209.00081  [pdf, ps, other

    eess.SY

    A Semi-Algebraic Framework for Verification and Synthesis of Control Barrier Functions

    Authors: Andrew Clark

    Abstract: Safety is a critical property for control systems in medicine, transportation, manufacturing, and other applications, and can be defined as ensuring positive invariance of a predefined safe set. This paper investigates the problems of verifying positive invariance of a semi-algebraic set as well as synthesizing sets that can be made positive invariant through Control Barrier Function (CBF)-based c… ▽ More

    Submitted 14 March, 2024; v1 submitted 31 August, 2022; originally announced September 2022.

    Comments: Submitted to IEEE Transactions on Automatic Control. Currently in second round of review

  11. arXiv:2208.14282  [pdf, ps, other

    eess.SY

    A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint

    Authors: Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran

    Abstract: Cyber-physical systems (CPS) are required to satisfy safety constraints in various application domains such as robotics, industrial manufacturing systems, and power systems. Faults and cyber attacks have been shown to cause safety violations, which can damage the system and endanger human lives. Resilient architectures have been proposed to ensure safety of CPS under such faults and attacks via me… ▽ More

    Submitted 1 September, 2022; v1 submitted 30 August, 2022; originally announced August 2022.

  12. arXiv:2208.10060  [pdf, ps, other

    eess.SY

    Abstraction-Free Control Synthesis to Satisfy Temporal Logic Constraints under Sensor Faults and Attacks

    Authors: Luyao Niu, Zhouchi Li, Andrew Clark

    Abstract: We study the problem of synthesizing a controller to satisfy a complex task in the presence of sensor faults and attacks. We model the task using Gaussian distribution temporal logic (GDTL), and propose a solution approach that does not rely on computing any finite abstraction to model the system. We decompose the GDTL specification into a sequence of reach-avoid sub-tasks. We develop a class of f… ▽ More

    Submitted 22 August, 2022; originally announced August 2022.

  13. arXiv:2208.05944  [pdf, ps, other

    eess.SY

    Barrier Certificate based Safe Control for LiDAR-based Systems under Sensor Faults and Attacks

    Authors: Hongchao Zhang, Shiyu Cheng, Luyao Niu, Andrew Clark

    Abstract: Autonomous Cyber-Physical Systems (CPS) fuse proprioceptive sensors such as GPS and exteroceptive sensors including Light Detection and Ranging (LiDAR) and cameras for state estimation and environmental observation. It has been shown that both types of sensors can be compromised by malicious attacks, leading to unacceptable safety violations. We study the problem of safety-critical control of a Li… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

  14. arXiv:2207.05146  [pdf, ps, other

    eess.SY

    Safe Control for Nonlinear Systems under Faults and Attacks via Control Barrier Functions

    Authors: Hongchao Zhang, Zhouchi Li, Andrew Clark

    Abstract: Safety is one of the most important properties of control systems. Sensor faults and attacks and actuator failures may cause errors in the sensor measurements and system dynamics, which leads to erroneous control inputs and hence safety violations. In this paper, we improve the robustness against sensor faults and actuator failures by proposing a class of Fault-Tolerant Control Barrier Functions (… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

    Comments: 15 pages, 5 figures, submitted to IEEE Transactions on Automatic Control

  15. arXiv:2204.00514  [pdf, other

    eess.SY

    An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee

    Authors: Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran

    Abstract: Cyber-physical systems (CPS) are required to operate safely under fault and malicious attacks. The simplex architecture and the recently proposed cyber resilient architectures, e.g., Byzantine fault tolerant++ (BFT++), provide safety for CPS under faults and malicious cyber attacks, respectively. However, these existing architectures make use of different timing parameters and implementations to p… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

  16. arXiv:2204.00512  [pdf, ps, other

    eess.SY

    A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics

    Authors: Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran

    Abstract: Complex, interconnected Cyber-physical Systems (CPS) are increasingly common in applications including smart grids and transportation. Ensuring safety of interconnected systems whose dynamics are coupled is challenging because the effects of faults and attacks in one sub-system can propagate to other sub-systems and lead to safety violations. In this paper, we study the problem of safety-critical… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

  17. arXiv:2109.13415  [pdf, ps, other

    eess.SY

    Safety-Critical Control Synthesis for Unknown Sampled-Data Systems via Control Barrier Functions

    Authors: Luyao Niu, Hongchao Zhang, Andrew Clark

    Abstract: As the complexity of control systems increases, safety becomes an increasingly important property since safety violations can damage the plant and put the system operator in danger. When the system dynamics are unknown, safety-critical synthesis becomes more challenging. Additionally, modern systems are controlled digitally and hence behave as sampled-data systems, i.e., the system dynamics evolve… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

  18. arXiv:2108.01628  [pdf, other

    eess.SY

    A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries

    Authors: Luyao Niu, Dinuka Sahabandu, Andrew Clark, Radha Poovendran

    Abstract: Controlled islanding effectively mitigates cascading failures by partitioning the power system into a set of disjoint islands. In this paper, we study the controlled islanding problem of a power system under disturbances introduced by a malicious adversary. We formulate the interaction between the grid operator and adversary using a game-theoretic framework. The grid operator first computes a cont… ▽ More

    Submitted 27 September, 2021; v1 submitted 3 August, 2021; originally announced August 2021.

  19. arXiv:2104.14001  [pdf, other

    eess.SY

    Verification and Synthesis of Control Barrier Functions

    Authors: Andrew Clark

    Abstract: Control systems often must satisfy strict safety requirements over an extended operating lifetime. Control Barrier Functions (CBFs) are a promising recent approach to constructing simple and safe control policies. This paper proposes a framework for verifying that a CBF guarantees safety for all time and synthesizing CBFs with verifiable safety in polynomial control systems. Our approach is to sho… ▽ More

    Submitted 28 April, 2021; originally announced April 2021.

  20. arXiv:2104.00540  [pdf, other

    cs.LG cs.AI eess.SY math.OC

    Reinforcement Learning Beyond Expectation

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Radha Poovendran

    Abstract: The inputs and preferences of human users are important considerations in situations where these users interact with autonomous cyber or cyber-physical systems. In these scenarios, one is often interested in aligning behaviors of the system with the preferences of one or more human users. Cumulative prospect theory (CPT) is a paradigm that has been empirically shown to model a tendency of humans t… ▽ More

    Submitted 29 March, 2021; originally announced April 2021.

  21. LQG Reference Tracking with Safety and Reachability Guarantees under Unknown False Data Injection Attacks

    Authors: Zhouchi Li, Luyao Niu, Andrew Clark

    Abstract: We investigate a linear quadratic Gaussian (LQG) tracking problem with safety and reachability constraints in the presence of an adversary who mounts an FDI attack on an unknown set of sensors. For each possible set of compromised sensors, we maintain a state estimator disregarding the sensors in that set, and calculate the optimal LQG control input at each time based on this estimate. We propose… ▽ More

    Submitted 11 July, 2022; v1 submitted 27 February, 2021; originally announced March 2021.

    Comments: 13 pages, 4 figures, extended version of a Transactions on Automatic Control paper

  22. Control Barrier Functions for Abstraction-Free Control Synthesis under Temporal Logic Constraints

    Authors: Luyao Niu, Andrew Clark

    Abstract: Temporal logic has been widely used to express complex task specifications for cyber-physical systems (CPSs). One way to synthesize a controller for CPS under temporal logic constraints is to first abstract the CPS as a discrete transition system, and then apply formal methods. This approach, however, is computationally demanding and its scalability suffers due to the curse of dimensionality. In t… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

    Journal ref: 2020 59th IEEE Conference on Decision and Control (CDC),pp. 816-823

  23. arXiv:2007.13272  [pdf, other

    eess.SY cs.CR cs.LO math.OC

    Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: A cyber-physical system (CPS) is expected to be resilient to more than one type of adversary. In this paper, we consider a CPS that has to satisfy a linear temporal logic (LTL) objective in the presence of two kinds of adversaries. The first adversary has the ability to tamper with inputs to the CPS to influence satisfaction of the LTL objective. The interaction of the CPS with this adversary is m… ▽ More

    Submitted 26 July, 2020; originally announced July 2020.

    Comments: Accepted to the IEEE Conference on Decision and Control (CDC), 2020

  24. arXiv:2007.12501  [pdf, other

    eess.SY cs.CR cs.GT cs.LO

    Secure Control in Partially Observable Environments to Satisfy LTL Specifications

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the synthesis of control policies for an agent that has to satisfy a temporal logic specification in a partially observable environment, in the presence of an adversary. The interaction of the agent (defender) with the adversary is modeled as a partially observable stochastic game. The goal is to generate a defender policy to maximize satisfaction of a given temporal logic speci… ▽ More

    Submitted 4 November, 2020; v1 submitted 22 July, 2020; originally announced July 2020.

    Comments: Provisionally accepted to the IEEE Transactions on Automatic Control. arXiv admin note: text overlap with arXiv:1903.06873

  25. arXiv:2003.12733  [pdf, other

    eess.SY

    Submodular Input Selection for Synchronization in Kuramoto Networks

    Authors: Dinuka Sahabandu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: Synchronization is an essential property of engineered and natural networked dynamical systems. The Kuramoto model of nonlinear synchronization has been widely studied in applications including entrainment of clock cells in brain networks and power system stability. Synchronization of Kuramoto networks has been found to be challenging in the presence of signed couplings between oscillators and whe… ▽ More

    Submitted 31 March, 2020; v1 submitted 28 March, 2020; originally announced March 2020.

    Comments: 9 pages, 3 figures

  26. Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks

    Authors: Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the synthesis of controllers for cyber-physical systems (CPSs) that are required to carry out complex tasks that are time-sensitive, in the presence of an adversary. The task is specified as a formula in metric interval temporal logic (MITL). The adversary is assumed to have the ability to tamper with the control input to the CPS and also manipulate timing information perceived… ▽ More

    Submitted 27 January, 2020; originally announced January 2020.

    Journal ref: 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), Sydney, Australia, 2020, pp. 162-173

  27. arXiv:1910.12282  [pdf, other

    eess.SY cs.GT cs.LO

    Linear Temporal Logic Satisfaction in Adversarial Environments using Secure Control Barrier Certificates

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the satisfaction of a class of temporal properties for cyber-physical systems (CPSs) over a finite-time horizon in the presence of an adversary, in an environment described by discrete-time dynamics. The temporal logic specification is given in safe-LTL_F, a fragment of linear temporal logic over traces of finite length. The interaction of the CPS with the adversary is modeled a… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

    Comments: Proc. of GameSec2019 (to appear). This version corrects a typo in the simulation, and clarifies some ambiguous material from the Proceedings version

  28. arXiv:1909.11646  [pdf, other

    cs.SD cs.LG eess.AS

    High Fidelity Speech Synthesis with Adversarial Networks

    Authors: Mikołaj Bińkowski, Jeff Donahue, Sander Dieleman, Aidan Clark, Erich Elsen, Norman Casagrande, Luis C. Cobo, Karen Simonyan

    Abstract: Generative adversarial networks have seen rapid development in recent years and have led to remarkable improvements in generative modelling of images. However, their application in the audio domain has received limited attention, and autoregressive models, such as WaveNet, remain the state of the art in generative modelling of audio signals such as human speech. To address this paucity, we introdu… ▽ More

    Submitted 26 September, 2019; v1 submitted 25 September, 2019; originally announced September 2019.

  29. arXiv:1907.08823  [pdf, other

    cs.LG cs.AI eess.SY stat.ML

    Potential-Based Advice for Stochastic Policy Learning

    Authors: Baicen Xiao, Bhaskar Ramasubramanian, Andrew Clark, Hannaneh Hajishirzi, Linda Bushnell, Radha Poovendran

    Abstract: This paper augments the reward received by a reinforcement learning agent with potential functions in order to help the agent learn (possibly stochastic) optimal policies. We show that a potential-based reward sha** scheme is able to preserve optimality of stochastic policies, and demonstrate that the ability of an agent to learn an optimal policy is not affected when this scheme is augmented to… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

    Comments: Accepted to the IEEE Conference on Decision and Control, 2019

  30. Optimal Secure Control with Linear Temporal Logic Constraints

    Authors: Luyao Niu, Andrew Clark

    Abstract: Prior work on automatic control synthesis for cyber-physical systems under logical constraints has primarily focused on environmental disturbances or modeling uncertainties, however, the impact of deliberate and malicious attacks has been less studied. In this paper, we consider a discrete-time dynamical system with a linear temporal logic (LTL) constraint in the presence of an adversary, which is… ▽ More

    Submitted 17 July, 2019; originally announced July 2019.

  31. arXiv:1903.06873  [pdf, other

    eess.SY cs.CR cs.LO

    Secure Control under Partial Observability with Temporal Logic Constraints

    Authors: Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the synthesis of control policies for an agent that has to satisfy a temporal logic specification in a partially observable environment, in the presence of an adversary. The interaction of the agent (defender) with the adversary is modeled as a partially observable stochastic game. The search for policies is limited to over the space of finite state controllers, which leads to a… ▽ More

    Submitted 15 March, 2019; originally announced March 2019.

    Comments: To appear at the American Control Conference, 2019

  32. Minimum Violation Control Synthesis on Cyber-Physical Systems under Attacks

    Authors: Luyao Niu, Jie Fu, Andrew Clark

    Abstract: Cyber-physical systems are conducting increasingly complex tasks, which are often modeled using formal languages such as temporal logic. The system's ability to perform the required tasks can be curtailed by malicious adversaries that mount intelligent attacks. At present, however, synthesis in the presence of such attacks has received limited research attention. In particular, the problem of synt… ▽ More

    Submitted 31 August, 2018; originally announced September 2018.

  33. arXiv:1709.02212  [pdf, ps, other

    eess.SY

    Maximizing the Smallest Eigenvalue of a Symmetric Matrix: A Submodular Optimization Approach

    Authors: Andrew Clark, Qiqiang Hou, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the problem of selecting a submatrix of a positive definite matrix in order to achieve a desired bound on the smallest eigenvalue of the submatrix. Maximizing this smallest eigenvalue has applications to selecting input nodes in order to guarantee consensus of networks with negative edges as well as maximizing the convergence rate of distributed systems. We develop a submodular… ▽ More

    Submitted 7 September, 2017; originally announced September 2017.

  34. arXiv:1709.01633  [pdf, ps, other

    eess.SY

    On the Structure and Computation of Random Walk Times in Finite Graphs

    Authors: Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran

    Abstract: We consider random walks in which the walk originates in one set of nodes and then continues until it reaches one or more nodes in a target set. The time required for the walk to reach the target set is of interest in understanding the convergence of Markov processes, as well as applications in control, machine learning, and social sciences. In this paper, we investigate the computational structur… ▽ More

    Submitted 9 January, 2019; v1 submitted 5 September, 2017; originally announced September 2017.

  35. arXiv:1701.05273  [pdf, ps, other

    eess.SY

    Combinatorial Algorithms for Control of Biological Regulatory Networks

    Authors: Andrew Clark, Phillip Lee, Basel Alomair, Linda Bushnell, Radha Poovendran

    Abstract: Biological processes, including cell differentiation, organism development, and disease progression, can be interpreted as attractors (fixed points or limit cycles) of an underlying networked dynamical system. In this paper, we study the problem of computing a minimum-size subset of control nodes that can be used to steer a given biological network towards a desired attractor, when the networked s… ▽ More

    Submitted 18 January, 2017; originally announced January 2017.

  36. arXiv:1605.09465  [pdf, other

    eess.SY

    Submodularity in Input Node Selection for Networked Systems

    Authors: Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran

    Abstract: Networked systems are systems of interconnected components, in which the dynamics of each component are influenced by the behavior of neighboring components. Examples of networked systems include biological networks, critical infrastructures such as power grids, transportation systems, and the Internet, and social networks. The growing importance of such systems has led to an interest in control o… ▽ More

    Submitted 30 May, 2016; originally announced May 2016.

  37. arXiv:1603.04374  [pdf, other

    eess.SY cs.CR

    Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach

    Authors: Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran

    Abstract: Malware propagation poses a growing threat to networked systems such as computer networks and cyber-physical systems. Current approaches to defending against malware propagation are based on patching or filtering susceptible nodes at a fixed rate. When the propagation dynamics are unknown or uncertain, however, the static rate that is chosen may be either insufficient to remove all viruses or too… ▽ More

    Submitted 20 September, 2016; v1 submitted 14 March, 2016; originally announced March 2016.

  38. arXiv:1411.5797  [pdf, other

    eess.SY

    Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework

    Authors: Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran

    Abstract: Synchronization underlies phenomena including memory and perception in the brain, coordinated motion of animal flocks, and stability of the power grid. These synchronization phenomena are often modeled through networks of phase-coupled oscillating nodes. Heterogeneity in the node dynamics, however, may prevent such networks from achieving the required level of synchronization. In order to guarante… ▽ More

    Submitted 30 October, 2015; v1 submitted 21 November, 2014; originally announced November 2014.

  39. arXiv:1312.1397  [pdf, other

    eess.SY cs.CR cs.NI

    A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems

    Authors: Phillip Lee, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: Networked control systems consist of distributed sensors and actuators that communicate via a wireless network. The use of an open wireless medium and unattended deployment leaves these systems vulnerable to intelligent adversaries whose goal is to disrupt the system performance. In this paper, we study the wormhole attack on a networked control system, in which an adversary establishes a link bet… ▽ More

    Submitted 4 December, 2013; originally announced December 2013.

    Comments: 35 pages, 9 figures

  40. arXiv:1306.4949  [pdf, other

    eess.SY

    Minimizing Convergence Error in Multi-Agent Systems via Leader Selection: A Supermodular Optimization Approach

    Authors: Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran

    Abstract: In a leader-follower multi-agent system (MAS), the leader agents act as control inputs and influence the states of the remaining follower agents. The rate at which the follower agents converge to their desired states, as well as the errors in the follower agent states prior to convergence, are determined by the choice of leader agents. In this paper, we study leader selection in order to minimize… ▽ More

    Submitted 3 November, 2013; v1 submitted 20 June, 2013; originally announced June 2013.

    Comments: 33 pages, 4 figures

  41. arXiv:1208.0946  [pdf, other

    eess.SY math.OC

    A Supermodular Optimization Framework for Leader Selection under Link Noise in Linear Multi-Agent Systems

    Authors: Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: In many applications of multi-agent systems (MAS), a set of leader agents acts as a control input to the remaining follower agents. In this paper, we introduce an analytical approach to selecting leader agents in order to minimize the total mean-square error of the follower agent states from their desired value in steady-state in the presence of noisy communication links. We show that the problem… ▽ More

    Submitted 4 August, 2012; originally announced August 2012.