-
Communication-efficient and Differentially-private Distributed Nash Equilibrium Seeking with Linear Convergence
Authors:
Xiaomeng Chen,
Wei Huo,
Kemi Ding,
Subhrakanti Dey,
Ling Shi
Abstract:
The distributed computation of a Nash equilibrium (NE) for non-cooperative games is gaining increased attention recently. Due to the nature of distributed systems, privacy and communication efficiency are two critical concerns. Traditional approaches often address these critical concerns in isolation. This work introduces a unified framework, named CDP-NES, designed to improve communication effici…
▽ More
The distributed computation of a Nash equilibrium (NE) for non-cooperative games is gaining increased attention recently. Due to the nature of distributed systems, privacy and communication efficiency are two critical concerns. Traditional approaches often address these critical concerns in isolation. This work introduces a unified framework, named CDP-NES, designed to improve communication efficiency in the privacy-preserving NE seeking algorithm for distributed non-cooperative games over directed graphs. Leveraging both general compression operators and the noise adding mechanism, CDP-NES perturbs local states with Laplacian noise and applies difference compression prior to their exchange among neighbors. We prove that CDP-NES not only achieves linear convergence to a neighborhood of the NE in games with restricted monotone map**s but also guarantees $ε$-differential privacy, addressing privacy and communication efficiency simultaneously. Finally, simulations are provided to illustrate the effectiveness of the proposed method.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Compression-based Privacy Preservation for Distributed Nash Equilibrium Seeking in Aggregative Games
Authors:
Wei Huo,
Xiaomeng Chen,
Kemi Ding,
Subhrakanti Dey,
Ling Shi
Abstract:
This paper explores distributed aggregative games in multi-agent systems. Current methods for finding distributed Nash equilibrium require players to send original messages to their neighbors, leading to communication burden and privacy issues. To jointly address these issues, we propose an algorithm that uses stochastic compression to save communication resources and conceal information through r…
▽ More
This paper explores distributed aggregative games in multi-agent systems. Current methods for finding distributed Nash equilibrium require players to send original messages to their neighbors, leading to communication burden and privacy issues. To jointly address these issues, we propose an algorithm that uses stochastic compression to save communication resources and conceal information through random errors induced by compression. Our theoretical analysis shows that the algorithm guarantees convergence accuracy, even with aggressive compression errors used to protect privacy. We prove that the algorithm achieves differential privacy through a stochastic quantization scheme. Simulation results for energy consumption games support the effectiveness of our approach.
△ Less
Submitted 5 May, 2024;
originally announced May 2024.
-
Soil Fertility Prediction Using Combined USB-microscope Based Soil Image, Auxiliary Variables, and Portable X-Ray Fluorescence Spectrometry
Authors:
Shubhadip Dasgupta,
Satwik Pate,
Divya Rathore,
L. G. Divyanth,
Ayan Das,
Anshuman Nayak,
Subhadip Dey,
Asim Biswas,
David C. Weindorf,
Bin Li,
Sergio Henrique Godinho Silva,
Bruno Teixeira Ribeiro,
Sanjay Srivastava,
Somsubhra Chakraborty
Abstract:
This study explored the application of portable X-ray fluorescence (PXRF) spectrometry and soil image analysis to rapidly assess soil fertility, focusing on critical parameters such as available B, organic carbon (OC), available Mn, available S, and the sulfur availability index (SAI). Analyzing 1,133 soil samples from various agro-climatic zones in Eastern India, the research combined color and t…
▽ More
This study explored the application of portable X-ray fluorescence (PXRF) spectrometry and soil image analysis to rapidly assess soil fertility, focusing on critical parameters such as available B, organic carbon (OC), available Mn, available S, and the sulfur availability index (SAI). Analyzing 1,133 soil samples from various agro-climatic zones in Eastern India, the research combined color and texture features from microscopic soil images, PXRF data, and auxiliary soil variables (AVs) using a Random Forest model. Results indicated that integrating image features (IFs) with auxiliary variables (AVs) significantly enhanced prediction accuracy for available B (R^2 = 0.80) and OC (R^2 = 0.88). A data fusion approach, incorporating IFs, AVs, and PXRF data, further improved predictions for available Mn and SAI with R^2 values of 0.72 and 0.70, respectively. The study demonstrated how these integrated technologies have the potential to provide quick and affordable options for soil testing, opening up access to more sophisticated prediction models and a better comprehension of the fertility and health of the soil. Future research should focus on the application of deep learning models on a larger dataset of soil images, developed using soils from a broader range of agro-climatic zones under field condition.
△ Less
Submitted 17 April, 2024;
originally announced April 2024.
-
Score-Based Diffusion Models for Photoacoustic Tomography Image Reconstruction
Authors:
Sreemanti Dey,
Snigdha Saha,
Berthy T. Feng,
Manxiu Cui,
Laure Delisle,
Oscar Leong,
Lihong V. Wang,
Katherine L. Bouman
Abstract:
Photoacoustic tomography (PAT) is a rapidly-evolving medical imaging modality that combines optical absorption contrast with ultrasound imaging depth. One challenge in PAT is image reconstruction with inadequate acoustic signals due to limited sensor coverage or due to the density of the transducer array. Such cases call for solving an ill-posed inverse reconstruction problem. In this work, we use…
▽ More
Photoacoustic tomography (PAT) is a rapidly-evolving medical imaging modality that combines optical absorption contrast with ultrasound imaging depth. One challenge in PAT is image reconstruction with inadequate acoustic signals due to limited sensor coverage or due to the density of the transducer array. Such cases call for solving an ill-posed inverse reconstruction problem. In this work, we use score-based diffusion models to solve the inverse problem of reconstructing an image from limited PAT measurements. The proposed approach allows us to incorporate an expressive prior learned by a diffusion model on simulated vessel structures while still being robust to varying transducer sparsity conditions.
△ Less
Submitted 30 March, 2024;
originally announced April 2024.
-
Policy Gradient-based Model Free Optimal LQG Control with a Probabilistic Risk Constraint
Authors:
Arunava Naha,
Subhrakanti Dey
Abstract:
In this paper, we investigate a model-free optimal control design that minimizes an infinite horizon average expected quadratic cost of states and control actions subject to a probabilistic risk or chance constraint using input-output data. In particular, we consider linear time-invariant systems and design an optimal controller within the class of linear state feedback control. Three different po…
▽ More
In this paper, we investigate a model-free optimal control design that minimizes an infinite horizon average expected quadratic cost of states and control actions subject to a probabilistic risk or chance constraint using input-output data. In particular, we consider linear time-invariant systems and design an optimal controller within the class of linear state feedback control. Three different policy gradient (PG) based algorithms, natural policy gradient (NPG), Gauss-Newton policy gradient (GNPG), and deep deterministic policy gradient (DDPG), are developed, and compared with the optimal risk-neutral linear-quadratic regulator (LQR) and a scenario-based model predictive control (MPC) technique via numerical simulations. The convergence properties and the accuracy of all the algorithms are compared numerically. We also establish analytical convergence properties of the NPG and GNPG algorithms under the known model scenario, while the proof of convergence for the unknown model scenario is part of our ongoing work.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Could We Generate Cytology Images from Histopathology Images? An Empirical Study
Authors:
Soumyajyoti Dey,
Sukanta Chakraborty,
Utso Guha Roy,
Nibaran Das
Abstract:
Automation in medical imaging is quite challenging due to the unavailability of annotated datasets and the scarcity of domain experts. In recent years, deep learning techniques have solved some complex medical imaging tasks like disease classification, important object localization, segmentation, etc. However, most of the task requires a large amount of annotated data for their successful implemen…
▽ More
Automation in medical imaging is quite challenging due to the unavailability of annotated datasets and the scarcity of domain experts. In recent years, deep learning techniques have solved some complex medical imaging tasks like disease classification, important object localization, segmentation, etc. However, most of the task requires a large amount of annotated data for their successful implementation. To mitigate the shortage of data, different generative models are proposed for data augmentation purposes which can boost the classification performances. For this, different synthetic medical image data generation models are developed to increase the dataset. Unpaired image-to-image translation models here shift the source domain to the target domain. In the breast malignancy identification domain, FNAC is one of the low-cost low-invasive modalities normally used by medical practitioners. But availability of public datasets in this domain is very poor. Whereas, for automation of cytology images, we need a large amount of annotated data. Therefore synthetic cytology images are generated by translating breast histopathology samples which are publicly available. In this study, we have explored traditional image-to-image transfer models like CycleGAN, and Neural Style Transfer. Further, it is observed that the generated cytology images are quite similar to real breast cytology samples by measuring FID and KID scores.
△ Less
Submitted 16 March, 2024;
originally announced March 2024.
-
Distributed Average Consensus via Noisy and Non-Coherent Over-the-Air Aggregation
Authors:
Huiwen Yang,
Xiaomeng Chen,
Lingying Huang,
Subhrakanti Dey,
Ling Shi
Abstract:
Over-the-air aggregation has attracted widespread attention for its potential advantages in task-oriented applications, such as distributed sensing, learning, and consensus. In this paper, we develop a communication-efficient distributed average consensus protocol by utilizing over-the-air aggregation, which exploits the superposition property of wireless channels rather than combat it. Noisy chan…
▽ More
Over-the-air aggregation has attracted widespread attention for its potential advantages in task-oriented applications, such as distributed sensing, learning, and consensus. In this paper, we develop a communication-efficient distributed average consensus protocol by utilizing over-the-air aggregation, which exploits the superposition property of wireless channels rather than combat it. Noisy channels and non-coherent transmission are taken into account, and only half-duplex transceivers are required. We prove that the system can achieve average consensus in mean square and even almost surely under the proposed protocol. Furthermore, we extend the analysis to the scenarios with time-varying topology. Numerical simulation shows the effectiveness of the proposed protocol.
△ Less
Submitted 11 March, 2024;
originally announced March 2024.
-
Exploring Adversarial Threat Models in Cyber Physical Battery Systems
Authors:
Shanthan Kumar Padisala,
Shashank Dhananjay Vyas,
Satadru Dey
Abstract:
Technological advancements like the Internet of Things (IoT) have facilitated data exchange across various platforms. This data exchange across various platforms has transformed the traditional battery system into a cyber physical system. Such connectivity makes modern cyber physical battery systems vulnerable to cyber threats where a cyber attacker can manipulate sensing and actuation signals to…
▽ More
Technological advancements like the Internet of Things (IoT) have facilitated data exchange across various platforms. This data exchange across various platforms has transformed the traditional battery system into a cyber physical system. Such connectivity makes modern cyber physical battery systems vulnerable to cyber threats where a cyber attacker can manipulate sensing and actuation signals to bring the battery system into an unsafe operating condition. Hence, it is essential to build resilience in modern cyber physical battery systems (CPBS) under cyber attacks. The first step of building such resilience is to analyze potential adversarial behavior, that is, how the adversaries can inject attacks into the battery systems. However, it has been found that in this under-explored area of battery cyber physical security, such an adversarial threat model has not been studied in a systematic manner. In this study, we address this gap and explore adversarial attack generation policies based on optimal control framework. The framework is developed by performing theoretical analysis, which is subsequently supported by evaluation with experimental data generated from a commercial battery cell.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
An Efficient Distributed Nash Equilibrium Seeking with Compressed and Event-triggered Communication
Authors:
Xiaomeng Chen,
Wei Huo,
Yuchi Wu,
Subhrakanti Dey,
Ling Shi
Abstract:
Distributed Nash equilibrium (NE) seeking problems for networked games have been widely investigated in recent years. Despite the increasing attention, communication expenditure is becoming a major bottleneck for scaling up distributed approaches within limited communication bandwidth between agents. To reduce communication cost, an efficient distributed NE seeking (ETC-DNES) algorithm is proposed…
▽ More
Distributed Nash equilibrium (NE) seeking problems for networked games have been widely investigated in recent years. Despite the increasing attention, communication expenditure is becoming a major bottleneck for scaling up distributed approaches within limited communication bandwidth between agents. To reduce communication cost, an efficient distributed NE seeking (ETC-DNES) algorithm is proposed to obtain an NE for games over directed graphs, where the communication efficiency is improved by event-triggered exchanges of compressed information among neighbors. ETC-DNES saves communication costs in both transmitted bits and rounds of communication. Furthermore, our method only requires the row-stochastic property of the adjacency matrix, unlike previous approaches that hinged on doubly-stochastic communication matrices. We provide convergence guarantees for ETC-DNES on games with restricted strongly monotone map**s and testify its efficiency with no sacrifice on the accuracy. The algorithm and analysis are extended to a compressed algorithm with stochastic event-triggered mechanism (SETC-DNES). In SETC-DNES, we introduce a random variable in the triggering condition to further enhance algorithm efficiency. We demonstrate that SETC-DNES guarantees linear convergence to the NE while achieving even greater reductions in communication costs compared to ETC-DNES. Finally, numerical simulations illustrate the effectiveness of the proposed algorithms.
△ Less
Submitted 14 June, 2024; v1 submitted 23 November, 2023;
originally announced November 2023.
-
On Distinguishability of Anomalies as Physical Faults or Actuation Cyberattacks
Authors:
Tanushree Roy,
Satadru Dey
Abstract:
Increased automation has created an impetus to integrate infrastructure with wide-spread connectivity in order to improve efficiency, sustainability, autonomy, and security. Nonetheless, this reliance on connectivity and the inevitability of complexity in this system increases the vulnerabilities to physical faults or degradation and external cyber-threats. However, strategies to counteract faults…
▽ More
Increased automation has created an impetus to integrate infrastructure with wide-spread connectivity in order to improve efficiency, sustainability, autonomy, and security. Nonetheless, this reliance on connectivity and the inevitability of complexity in this system increases the vulnerabilities to physical faults or degradation and external cyber-threats. However, strategies to counteract faults and cyberattacks would be widely different and thus it is vital to not only detect but also to identify the nature of the anomaly that is present in these systems. In this work, we propose a mathematical framework to distinguish between physical faults and cyberattack using a sliding mode based unknown input observer. Finally, we present simulation case studies to distinguish between physical faults and cyberattacks using the proposed Distinguishability metric and criterion. The simulation results show that the proposed framework successfully distinguishes between faults and cyberattacks.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Over-the-air Federated Policy Gradient
Authors:
Huiwen Yang,
Lingying Huang,
Subhrakanti Dey,
Ling Shi
Abstract:
In recent years, over-the-air aggregation has been widely considered in large-scale distributed learning, optimization, and sensing. In this paper, we propose the over-the-air federated policy gradient algorithm, where all agents simultaneously broadcast an analog signal carrying local information to a common wireless channel, and a central controller uses the received aggregated waveform to updat…
▽ More
In recent years, over-the-air aggregation has been widely considered in large-scale distributed learning, optimization, and sensing. In this paper, we propose the over-the-air federated policy gradient algorithm, where all agents simultaneously broadcast an analog signal carrying local information to a common wireless channel, and a central controller uses the received aggregated waveform to update the policy parameters. We investigate the effect of noise and channel distortion on the convergence of the proposed algorithm, and establish the complexities of communication and sampling for finding an $ε$-approximate stationary point. Finally, we present some simulation results to show the effectiveness of the algorithm.
△ Less
Submitted 25 February, 2024; v1 submitted 25 October, 2023;
originally announced October 2023.
-
Wavelet Scattering Transform for Improving Generalization in Low-Resourced Spoken Language Identification
Authors:
Spandan Dey,
Premjeet Singh,
Goutam Saha
Abstract:
Commonly used features in spoken language identification (LID), such as mel-spectrogram or MFCC, lose high-frequency information due to windowing. The loss further increases for longer temporal contexts. To improve generalization of the low-resourced LID systems, we investigate an alternate feature representation, wavelet scattering transform (WST), that compensates for the shortcomings. To our kn…
▽ More
Commonly used features in spoken language identification (LID), such as mel-spectrogram or MFCC, lose high-frequency information due to windowing. The loss further increases for longer temporal contexts. To improve generalization of the low-resourced LID systems, we investigate an alternate feature representation, wavelet scattering transform (WST), that compensates for the shortcomings. To our knowledge, WST is not explored earlier in LID tasks. We first optimize WST features for multiple South Asian LID corpora. We show that LID requires low octave resolution and frequency-scattering is not useful. Further, cross-corpora evaluations show that the optimal WST hyper-parameters depend on both train and test corpora. Hence, we develop fused ECAPA-TDNN based LID systems with different sets of WST hyper-parameters to improve generalization for unknown data. Compared to MFCC, EER is reduced upto 14.05% and 6.40% for same-corpora and blind VoxLingua107 evaluations, respectively.
△ Less
Submitted 3 October, 2023; v1 submitted 1 October, 2023;
originally announced October 2023.
-
On Incremental Stability of Interconnected Switched Systems
Authors:
Bhabani Shankar Dey,
Indra Narayan Kar,
Pushpak Jagtap
Abstract:
In this letter, the incremental stability of interconnected systems is discussed. In particular, we consider an interconnection of switched nonlinear systems. The incremental stability of the switched interconnected system is a stronger property as compared to conventional stability. Guaranteeing such a notion of stability for an overall interconnected nonlinear system is challenging, even if indi…
▽ More
In this letter, the incremental stability of interconnected systems is discussed. In particular, we consider an interconnection of switched nonlinear systems. The incremental stability of the switched interconnected system is a stronger property as compared to conventional stability. Guaranteeing such a notion of stability for an overall interconnected nonlinear system is challenging, even if individual subsystems are incrementally stable. Here, preserving incremental stability for the interconnection is ensured with a set of sufficient conditions. Contraction theory is used as a tool to achieve incremental convergence. For the feedback interconnection, the small gain characterisation is presented for the overall system's incremental stability. The results are derived for a special case of feedback, i.e., cascade interconnection. Matrix-measure-based conditions are presented, which are computationally tractable. Two numerical examples are demonstrated and supported with simulation results to verify the theoretical claims.
△ Less
Submitted 24 August, 2023;
originally announced August 2023.
-
Exploiting the Brain's Network Structure for Automatic Identification of ADHD Subjects
Authors:
Soumyabrata Dey,
Ravishankar Rao,
Mubarak Shah
Abstract:
Attention Deficit Hyperactive Disorder (ADHD) is a common behavioral problem affecting children. In this work, we investigate the automatic classification of ADHD subjects using the resting state Functional Magnetic Resonance Imaging (fMRI) sequences of the brain. We show that the brain can be modeled as a functional network, and certain properties of the networks differ in ADHD subjects from cont…
▽ More
Attention Deficit Hyperactive Disorder (ADHD) is a common behavioral problem affecting children. In this work, we investigate the automatic classification of ADHD subjects using the resting state Functional Magnetic Resonance Imaging (fMRI) sequences of the brain. We show that the brain can be modeled as a functional network, and certain properties of the networks differ in ADHD subjects from control subjects. We compute the pairwise correlation of brain voxels' activity over the time frame of the experimental protocol which helps to model the function of a brain as a network. Different network features are computed for each of the voxels constructing the network. The concatenation of the network features of all the voxels in a brain serves as the feature vector. Feature vectors from a set of subjects are then used to train a PCA-LDA (principal component analysis-linear discriminant analysis) based classifier. We hypothesized that ADHD-related differences lie in some specific regions of the brain and using features only from those regions is sufficient to discriminate ADHD and control subjects. We propose a method to create a brain mask that includes the useful regions only and demonstrate that using the feature from the masked regions improves classification accuracy on the test data set. We train our classifier with 776 subjects and test on 171 subjects provided by The Neuro Bureau for the ADHD-200 challenge. We demonstrate the utility of graph-motif features, specifically the maps that represent the frequency of participation of voxels in network cycles of length 3. The best classification performance (69.59%) is achieved using 3-cycle map features with masking. Our proposed approach holds promise in being able to diagnose and understand the disorder.
△ Less
Submitted 15 June, 2023;
originally announced June 2023.
-
Concealing CAN Message Sequences to Prevent Schedule-based Bus-off Attacks
Authors:
Sunandan Adhikary,
Ipsita Koley,
Arkaprava Sain,
Soumyadeep das,
Shuvam Saha,
Soumyajit Dey
Abstract:
This work focuses on eliminating timing-side channels in real-time safety-critical cyber-physical network protocols like Controller Area Networks (CAN). Automotive Electronic Control Units (ECUs) implement predictable scheduling decisions based on task level response time estimation. Such levels of determinism exposes timing information about task executions and therefore corresponding message tra…
▽ More
This work focuses on eliminating timing-side channels in real-time safety-critical cyber-physical network protocols like Controller Area Networks (CAN). Automotive Electronic Control Units (ECUs) implement predictable scheduling decisions based on task level response time estimation. Such levels of determinism exposes timing information about task executions and therefore corresponding message transmissions via the network buses (that connect the ECUs and actuators). With proper analysis, such timing side channels can be utilized to launch several schedule-based attacks that can lead to eventual denial-of-service or man-in-the-middle-type attacks. To eliminate this determinism, we propose a novel schedule obfuscation strategy by skip** certain control task executions and related data transmissions along with random shifting of the victim task instance. While doing this, our strategy contemplates the performance of the control task as well by bounding the number of control execution skips. We analytically demonstrate how the attack success probability (ASP) is reduced under this proposed attack-aware skip** and randomization. We also demonstrate the efficacy and real-time applicability of our attack-aware schedule obfuscation strategy Hide-n-Seek by applying it to synthesized automotive task sets in a real-time Hardware-in-loop (HIL) setup.
△ Less
Submitted 15 June, 2023;
originally announced June 2023.
-
Deterministic policy gradient based optimal control with probabilistic constraints
Authors:
Arunava Naha,
Subhrakanti Dey
Abstract:
This paper studies a deep deterministic policy gradient (DDPG) based actor critic (AC) reinforcement learning (RL) technique to control a linear discrete-time system with a quadratic control cost while ensuring a constraint on the probability of potentially risky or undesirable events. The proposed methodology can be applied to both known and unknown system models with minor adjustments to the rew…
▽ More
This paper studies a deep deterministic policy gradient (DDPG) based actor critic (AC) reinforcement learning (RL) technique to control a linear discrete-time system with a quadratic control cost while ensuring a constraint on the probability of potentially risky or undesirable events. The proposed methodology can be applied to both known and unknown system models with minor adjustments to the reward structure (negative cost). The problem is formulated by considering the average expected quadratic cost of the states and inputs over an infinite time horizon. Risky or undesirable events are represented as functions of the states at the next time step exceeding a user-defined limit. Two strategies are employed to manage the probabilistic constraint in scenarios of known and unknown system models. In the case of a known system model, the probabilistic constraint is replaced with an upper bound, such as the Chernoff bound. For unknown system models, the expected value of the indicator function of the occurrence of the risky or undesirable event is used. We have adopted a deterministic policy gradient (DPG) based AC method to derive a parameterised optimal policy. Extensive numerical simulations are performed using a second- and a fourth-order system, and the proposed method is compared with the standard risk-neutral linear quadratic regulator (LQR) and a chance-constrained model predictive control (MPC) method. The results demonstrate the effectiveness of the proposed approach in both known and unknown system model scenarios.
△ Less
Submitted 21 December, 2023; v1 submitted 25 May, 2023;
originally announced May 2023.
-
Q-SHED: Distributed Optimization at the Edge via Hessian Eigenvectors Quantization
Authors:
Nicolò Dal Fabbro,
Michele Rossi,
Luca Schenato,
Subhrakanti Dey
Abstract:
Edge networks call for communication efficient (low overhead) and robust distributed optimization (DO) algorithms. These are, in fact, desirable qualities for DO frameworks, such as federated edge learning techniques, in the presence of data and system heterogeneity, and in scenarios where internode communication is the main bottleneck. Although computationally demanding, Newton-type (NT) methods…
▽ More
Edge networks call for communication efficient (low overhead) and robust distributed optimization (DO) algorithms. These are, in fact, desirable qualities for DO frameworks, such as federated edge learning techniques, in the presence of data and system heterogeneity, and in scenarios where internode communication is the main bottleneck. Although computationally demanding, Newton-type (NT) methods have been recently advocated as enablers of robust convergence rates in challenging DO problems where edge devices have sufficient computational power. Along these lines, in this work we propose Q-SHED, an original NT algorithm for DO featuring a novel bit-allocation scheme based on incremental Hessian eigenvectors quantization. The proposed technique is integrated with the recent SHED algorithm, from which it inherits appealing features like the small number of required Hessian computations, while being bandwidth-versatile at a bit-resolution level. Our empirical evaluation against competing approaches shows that Q-SHED can reduce by up to 60% the number of communication rounds required for convergence.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
Optimal Vehicle Charging in Bilevel Power-Traffic Networks via Charging Demand Function
Authors:
Yufan Zhang,
Sujit Dey,
Yuanyuan Shi
Abstract:
Electric vehicle (EV) charging couples the operation of power and traffic networks. Specifically, the power network determines the charging price at various locations, while EVs on the traffic network optimize the charging power given the price, acting as price-takers. We model such decision-making processes by a bilevel program, with the power network at the upper-level and the traffic network at…
▽ More
Electric vehicle (EV) charging couples the operation of power and traffic networks. Specifically, the power network determines the charging price at various locations, while EVs on the traffic network optimize the charging power given the price, acting as price-takers. We model such decision-making processes by a bilevel program, with the power network at the upper-level and the traffic network at the lower-level. However, since the two networks are managed by separate entities and the charging expense term, calculated as the product of charging price and charging demand, is nonlinear. Solving the bilevel program is nontrivial. To overcome these challenges, we derive the charging demand function using multiparametric programming theory. This function establishes a piecewise linear relationship between the charging price and the optimal charging power, enabling the power network operator to manage EV charging power independently while accounting for the coupling between the two networks. With the derived function, we are also able to replace the nonlinear charging expense term with a piecewise quadratic one, thus guaranteeing solution optimality. Our numerical studies demonstrate that different traffic demands can have an impact on charging patterns and the power network can effectively incentivize charging at low-price nodes through price setting.
△ Less
Submitted 5 September, 2023; v1 submitted 21 April, 2023;
originally announced April 2023.
-
LQG Control Over SWIPT-enabled Wireless Communication Network
Authors:
Huiwen Yang,
Lingying Huang,
Yuzhe Li,
Subhrakanti Dey,
Ling Shi
Abstract:
In this paper, we consider using simultaneous wireless information and power transfer (SWIPT) to recharge the sensor in the LQG control, which provides a new approach to prolonging the network lifetime. We analyze the stability of the proposed system model and show that there exist two critical values for the power splitting ratio α. Then, we propose an optimization problem to derive the optimal v…
▽ More
In this paper, we consider using simultaneous wireless information and power transfer (SWIPT) to recharge the sensor in the LQG control, which provides a new approach to prolonging the network lifetime. We analyze the stability of the proposed system model and show that there exist two critical values for the power splitting ratio α. Then, we propose an optimization problem to derive the optimal value of α. This problem is non-convex but its numerical solution can be derived by our proposed algorithm efficiently. Moreover, we provide the feasible condition of the proposed optimization problem. Finally, simulation results are presented to verify and illustrate the main theoretical results.
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
STEP: Stochastic Traversability Evaluation and Planning for Risk-Aware Off-road Navigation; Results from the DARPA Subterranean Challenge
Authors:
Anushri Dixit,
David D. Fan,
Kyohei Otsu,
Sharmita Dey,
Ali-Akbar Agha-Mohammadi,
Joel W. Burdick
Abstract:
Although autonomy has gained widespread usage in structured and controlled environments, robotic autonomy in unknown and off-road terrain remains a difficult problem. Extreme, off-road, and unstructured environments such as undeveloped wilderness, caves, rubble, and other post-disaster sites pose unique and challenging problems for autonomous navigation. Based on our participation in the DARPA Sub…
▽ More
Although autonomy has gained widespread usage in structured and controlled environments, robotic autonomy in unknown and off-road terrain remains a difficult problem. Extreme, off-road, and unstructured environments such as undeveloped wilderness, caves, rubble, and other post-disaster sites pose unique and challenging problems for autonomous navigation. Based on our participation in the DARPA Subterranean Challenge, we propose an approach to improve autonomous traversal of robots in subterranean environments that are perceptually degraded and completely unknown through a traversability and planning framework called STEP (Stochastic Traversability Evaluation and Planning). We present 1) rapid uncertainty-aware map** and traversability evaluation, 2) tail risk assessment using the Conditional Value-at-Risk (CVaR), 3) efficient risk and constraint-aware kinodynamic motion planning using sequential quadratic programming-based (SQP) model predictive control (MPC), 4) fast recovery behaviors to account for unexpected scenarios that may cause failure, and 5) risk-based gait adaptation for quadrupedal robots. We illustrate and validate extensive results from our experiments on wheeled and legged robotic platforms in field studies at the Valentine Cave, CA (cave environment), Kentucky Underground, KY (mine environment), and Louisville Mega Cavern, KY (final competition site for the DARPA Subterranean Challenge with tunnel, urban, and cave environments).
△ Less
Submitted 2 March, 2023;
originally announced March 2023.
-
Cross-Corpora Spoken Language Identification with Domain Diversification and Generalization
Authors:
Spandan Dey,
Md Sahidullah,
Goutam Saha
Abstract:
This work addresses the cross-corpora generalization issue for the low-resourced spoken language identification (LID) problem. We have conducted the experiments in the context of Indian LID and identified strikingly poor cross-corpora generalization due to corpora-dependent non-lingual biases. Our contribution to this work is twofold. First, we propose domain diversification, which diversifies the…
▽ More
This work addresses the cross-corpora generalization issue for the low-resourced spoken language identification (LID) problem. We have conducted the experiments in the context of Indian LID and identified strikingly poor cross-corpora generalization due to corpora-dependent non-lingual biases. Our contribution to this work is twofold. First, we propose domain diversification, which diversifies the limited training data using different audio data augmentation methods. We then propose the concept of maximally diversity-aware cascaded augmentations and optimize the augmentation fold-factor for effective diversification of the training data. Second, we introduce the idea of domain generalization considering the augmentation methods as pseudo-domains. Towards this, we investigate both domain-invariant and domain-aware approaches. Our LID system is based on the state-of-the-art emphasized channel attention, propagation, and aggregation based time delay neural network (ECAPA-TDNN) architecture. We have conducted extensive experiments with three widely used corpora for Indian LID research. In addition, we conduct a final blind evaluation of our proposed methods on the Indian subset of VoxLingua107 corpus collected in the wild. Our experiments demonstrate that the proposed domain diversification is more promising over commonly used simple augmentation methods. The study also reveals that domain generalization is a more effective solution than domain diversification. We also notice that domain-aware learning performs better for same-corpora LID, whereas domain-invariant learning is more suitable for cross-corpora generalization. Compared to basic ECAPA-TDNN, its proposed domain-invariant extensions improve the cross-corpora EER up to 5.23%. In contrast, the proposed domain-aware extensions also improve performance for same-corpora test scenarios.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
Can't Touch This: Real-Time, Safe Motion Planning and Control for Manipulators Under Uncertainty
Authors:
Jonathan Michaux,
Patrick Holmes,
Bohao Zhang,
Che Chen,
Baiyue Wang,
Shrey Sahgal,
Tiancheng Zhang,
Sidhartha Dey,
Shreyas Kousik,
Ram Vasudevan
Abstract:
Ensuring safe, real-time motion planning in arbitrary environments requires a robotic manipulator to avoid collisions, obey joint limits, and account for uncertainties in the mass and inertia of objects and the robot itself. This paper proposes Autonomous Robust Manipulation via Optimization with Uncertainty-aware Reachability (ARMOUR), a provably-safe, receding-horizon trajectory planner and trac…
▽ More
Ensuring safe, real-time motion planning in arbitrary environments requires a robotic manipulator to avoid collisions, obey joint limits, and account for uncertainties in the mass and inertia of objects and the robot itself. This paper proposes Autonomous Robust Manipulation via Optimization with Uncertainty-aware Reachability (ARMOUR), a provably-safe, receding-horizon trajectory planner and tracking controller framework for robotic manipulators to address these challenges. ARMOUR first constructs a robust controller that tracks desired trajectories with bounded error despite uncertain dynamics. ARMOUR then uses a novel recursive Newton-Euler method to compute all inputs required to track any trajectory within a continuum of desired trajectories. Finally, ARMOUR over-approximates the swept volume of the manipulator; this enables one to formulate an optimization problem that can be solved in real-time to synthesize provably-safe motions. This paper compares ARMOUR to state of the art methods on a set of challenging manipulation examples in simulation and demonstrates its ability to ensure safety on real hardware in the presence of model uncertainty without sacrificing performance. Project page: https://roahmlab.github.io/armour/.
△ Less
Submitted 1 November, 2023; v1 submitted 30 January, 2023;
originally announced January 2023.
-
An Overview of Indian Spoken Language Recognition from Machine Learning Perspective
Authors:
Spandan Dey,
Md Sahidullah,
Goutam Saha
Abstract:
Automatic spoken language identification (LID) is a very important research field in the era of multilingual voice-command-based human-computer interaction (HCI). A front-end LID module helps to improve the performance of many speech-based applications in the multilingual scenario. India is a populous country with diverse cultures and languages. The majority of the Indian population needs to use t…
▽ More
Automatic spoken language identification (LID) is a very important research field in the era of multilingual voice-command-based human-computer interaction (HCI). A front-end LID module helps to improve the performance of many speech-based applications in the multilingual scenario. India is a populous country with diverse cultures and languages. The majority of the Indian population needs to use their respective native languages for verbal interaction with machines. Therefore, the development of efficient Indian spoken language recognition systems is useful for adapting smart technologies in every section of Indian society. The field of Indian LID has started gaining momentum in the last two decades, mainly due to the development of several standard multilingual speech corpora for the Indian languages. Even though significant research progress has already been made in this field, to the best of our knowledge, there are not many attempts to analytically review them collectively. In this work, we have conducted one of the very first attempts to present a comprehensive review of the Indian spoken language recognition research field. In-depth analysis has been presented to emphasize the unique challenges of low-resource and mutual influences for develo** LID systems in the Indian contexts. Several essential aspects of the Indian LID research, such as the detailed description of the available speech corpora, the major research contributions, including the earlier attempts based on statistical modeling to the recent approaches based on different neural network architectures, and the future research trends are discussed. This review work will help assess the state of the present Indian LID research by any active researcher or any research enthusiasts from related fields.
△ Less
Submitted 30 November, 2022;
originally announced December 2022.
-
Safe Human Robot-Interaction using Switched Model Reference Admittance Control
Authors:
Chayan Kumar Paul,
Bhabani Shankar Dey,
Udayan Banerjee,
Indra Narayan Kar
Abstract:
Physical Human-Robot Interaction (pHRI) task involves tight coupling between safety constraints and compliance with human intentions. In this paper, a novel switched model reference admittance controller is developed to maintain compliance with the external force while upholding safety constraints in the workspace for an n-link manipulator involved in pHRI. A switched reference model is designed f…
▽ More
Physical Human-Robot Interaction (pHRI) task involves tight coupling between safety constraints and compliance with human intentions. In this paper, a novel switched model reference admittance controller is developed to maintain compliance with the external force while upholding safety constraints in the workspace for an n-link manipulator involved in pHRI. A switched reference model is designed for the admittance controller to generate the reference trajectory within the safe workspace. The stability analysis of the switched reference model is carried out by an appropriate selection of the Common Quadratic Lyapunov Function (CQLF) so that asymptotic convergence of the trajectory tracking error is ensured. The efficacy of the proposed controller is validated in simulation on a two-link robot manipulator.
△ Less
Submitted 27 November, 2022;
originally announced November 2022.
-
DLKoopman: A deep learning software package for Koopman theory
Authors:
Sourya Dey,
Eric Davis
Abstract:
We present DLKoopman -- a software package for Koopman theory that uses deep learning to learn an encoding of a nonlinear dynamical system into a linear space, while simultaneously learning the linear dynamics. While several previous efforts have either restricted the ability to learn encodings, or been bespoke efforts designed for specific systems, DLKoopman is a generalized tool that can be appl…
▽ More
We present DLKoopman -- a software package for Koopman theory that uses deep learning to learn an encoding of a nonlinear dynamical system into a linear space, while simultaneously learning the linear dynamics. While several previous efforts have either restricted the ability to learn encodings, or been bespoke efforts designed for specific systems, DLKoopman is a generalized tool that can be applied to data-driven learning and optimization of any dynamical system. It can either be trained on data from individual states (snapshots) of a system and used to predict its unknown states, or trained on data from trajectories of a system and used to predict unknown trajectories for new initial states. DLKoopman is available on the Python Package Index (PyPI) as 'dlkoopman', and includes extensive documentation and tutorials. Additional contributions of the package include a novel metric called Average Normalized Absolute Error for evaluating performance, and a ready-to-use hyperparameter search module for improving performance.
△ Less
Submitted 23 June, 2023; v1 submitted 15 November, 2022;
originally announced November 2022.
-
Dynamic Mode Decomposition and Koopman Theory
Authors:
Sourya Dey
Abstract:
Dynamic Mode Decomposition (DMD) is a technique to approximate generally non-linear dynamical systems using linear techniques, which are better understood and easier to analyze. Koopman theory extends DMD by transforming the original system into a new domain which facilitates linearization. This is a technical report on DMD and Koopman theory, with primary focus on explaining the underlying mathem…
▽ More
Dynamic Mode Decomposition (DMD) is a technique to approximate generally non-linear dynamical systems using linear techniques, which are better understood and easier to analyze. Koopman theory extends DMD by transforming the original system into a new domain which facilitates linearization. This is a technical report on DMD and Koopman theory, with primary focus on explaining the underlying mathematics in clear and concise form. We include dimensions of vectors and marices, and step-by-step derivations of equations in order to assist the user in easily comprehending these concepts. This report will also enable users to implement DMD and Koopman theory in code.
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
Leveraging unsupervised data and domain adaptation for deep regression in low-cost sensor calibration
Authors:
Swapnil Dey,
Vipul Arora,
Sachchida Nand Tripathi
Abstract:
Air quality monitoring is becoming an essential task with rising awareness about air quality. Low cost air quality sensors are easy to deploy but are not as reliable as the costly and bulky reference monitors. The low quality sensors can be calibrated against the reference monitors with the help of deep learning. In this paper, we translate the task of sensor calibration into a semi-supervised dom…
▽ More
Air quality monitoring is becoming an essential task with rising awareness about air quality. Low cost air quality sensors are easy to deploy but are not as reliable as the costly and bulky reference monitors. The low quality sensors can be calibrated against the reference monitors with the help of deep learning. In this paper, we translate the task of sensor calibration into a semi-supervised domain adaptation problem and propose a novel solution for the same. The problem is challenging because it is a regression problem with covariate shift and label gap. We use histogram loss instead of mean squared or mean absolute error, which is commonly used for regression, and find it useful against covariate shift. To handle the label gap, we propose weighting of samples for adversarial entropy optimization. In experimental evaluations, the proposed scheme outperforms many competitive baselines, which are based on semi-supervised and supervised domain adaptation, in terms of R2 score and mean absolute error. Ablation studies show the relevance of each proposed component in the entire scheme.
△ Less
Submitted 2 October, 2022;
originally announced October 2022.
-
Robust Artificial Delay based Impedance Control of Robotic Manipulators with Uncertain Dynamics
Authors:
Udayan Banerjee,
Bhabani Shankar Dey,
Indra Narayan Kar,
Subir Kumar Saha
Abstract:
In this paper an artificial delay based impedance controller is proposed for robotic manipulators with uncertainty in dynamics. The control law unites the time delayed estimation (TDE) framework with a second order switching controller of super twisting algorithm (STA) type via a novel generalized filtered tracking error (GFTE). While time delayed estimation framework eliminates the need for accur…
▽ More
In this paper an artificial delay based impedance controller is proposed for robotic manipulators with uncertainty in dynamics. The control law unites the time delayed estimation (TDE) framework with a second order switching controller of super twisting algorithm (STA) type via a novel generalized filtered tracking error (GFTE). While time delayed estimation framework eliminates the need for accurate modelling of robot dynamics by estimating the uncertain robot dynamics and interaction forces from immediate past data of state and control effort, the second order switching control law in the outer loop provides robustness against the time delayed estimation (TDE) error that arises due to approximation of the manipulator dynamics. Thus, the proposed control law tries to establish a desired impedance model between the robot end effector variables i.e. force and motion in presence of uncertainties, both when it is encountering smooth contact forces and during free motion. Simulation results for a two link manipulator using the proposed controller along with convergence analysis are shown to validate the proposition.
△ Less
Submitted 20 August, 2022; v1 submitted 18 August, 2022;
originally announced August 2022.
-
Exploring The Resilience of Control Execution Skips against False Data Injection Attacks
Authors:
Ipsita Koley,
Sunandan Adhikary,
Soumyajit Dey
Abstract:
Modern Cyber-Physical Systems (CPSs) are often designed as networked, software-based controller implementations which have been found to be vulnerable to network-level and physical level attacks. A number of research works have proposed CPS-specific attack detection schemes as well as techniques for attack resilient controller design. However, such schemes also incur platform-level overheads. In t…
▽ More
Modern Cyber-Physical Systems (CPSs) are often designed as networked, software-based controller implementations which have been found to be vulnerable to network-level and physical level attacks. A number of research works have proposed CPS-specific attack detection schemes as well as techniques for attack resilient controller design. However, such schemes also incur platform-level overheads. In this regard, some recent works have leveraged the use of skips in control execution to enhance the resilience of a CPS against false data injection (FDI) attacks.
In this paper, we provide an analytical discussion on when and how skip** a control execution can improve the resilience of the system against FDI attacks while maintaining the control performance requirement. We also propose a methodology to synthesize such optimal control execution patterns. To the best of our knowledge, no previous work has provided any quantitative analysis about the trade-off between attack resilience and control performance for such aperiodic control execution. Finally, we evaluate the proposed method on several safety-critical CPS benchmarks.
△ Less
Submitted 16 July, 2022;
originally announced July 2022.
-
A contraction theory approach to observer-based controller design for glucose regulation in type 1 diabetes with intra-patient variability
Authors:
Bhabani Shankar Dey,
Anirudh Nath,
Abhilash Patel,
Indra Narayan Kar
Abstract:
While the Artificial Pancreas is effective in regulating the blood glucose in the safe range of 70-180 mg/dl in type 1 diabetic patients, the high intra-patient variability, as well as exogenous meal disturbances, poses a serious challenge. The existing control algorithms thus require additional safety algorithms and feed-forward actions. Moreover, the unavailability of insulin sensors in Artifici…
▽ More
While the Artificial Pancreas is effective in regulating the blood glucose in the safe range of 70-180 mg/dl in type 1 diabetic patients, the high intra-patient variability, as well as exogenous meal disturbances, poses a serious challenge. The existing control algorithms thus require additional safety algorithms and feed-forward actions. Moreover, the unavailability of insulin sensors in Artificial Pancreas makes this task more difficult. In the present work, a subcutaneous model of type 1 diabetes (T1D) is considered for observer-based controller design in the framework of contraction analysis. A variety of realistic multiple-meal scenarios for three virtual T1D patients have been investigated with +30 % and -30 % of parametric variability. The average time spent by the three T1D patients is found to be 77 %, 73 % and 76 %, respectively. A significant reduction in the time spent in hyperglycemia (>180 mg/dl) is achieved without any feed-forward action for meal compensation.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
A CAD Framework for Simulation of Network Level Attack on Platoons
Authors:
Ipsita Koley,
Sunandan Adhikary,
Rohit Rohit,
Soumyajit Dey
Abstract:
Recent developments in the smart mobility domain have transformed automobiles into networked transportation agents hel** realize new age, large-scale intelligent transportation systems (ITS). The motivation behind such networked transportation is to improve road safety as well as traffic efficiency. In this setup, vehicles can share information about their speed and/or acceleration values among…
▽ More
Recent developments in the smart mobility domain have transformed automobiles into networked transportation agents hel** realize new age, large-scale intelligent transportation systems (ITS). The motivation behind such networked transportation is to improve road safety as well as traffic efficiency. In this setup, vehicles can share information about their speed and/or acceleration values among themselves and infrastructures can share traffic signal data with them. This enables the connected vehicles (CVs) to stay informed about their surroundings while moving. However, the inter-vehicle communication channels significantly broaden the attack surface. The inter-vehicle network enables an attacker to remotely launch attacks. An attacker can create collision as well as hamper performance by reducing the traffic efficiency. Thus, security vulnerabilities must be taken into consideration in the early phase of the development cycle of CVs. To the best of our knowledge, there exists no such automated simulation tool using which engineers can verify the performance of CV prototypes in the presence of an attacker. In this work, we present an automated tool flow that facilitates false data injection attack synthesis and simulation on customizable platoon structure and vehicle dynamics. This tool can be used to simulate as well as design and verify control-theoretic light-weight attack detection and mitigation algorithms for CVs.
△ Less
Submitted 2 May, 2022;
originally announced May 2022.
-
An Input-to-State Safety Approach Towards Safe Control of a Class of Parabolic PDEs Under Disturbances
Authors:
Tanushree Roy,
Ashley Knichel,
Satadru Dey
Abstract:
Distributed Parameter Systems (DPSs), modelled by partial differential equations (PDEs), are increasingly vulnerable to disturbances arising from various sources. Although detection of disturbances in PDE systems have received considerable attention in existing literature, safety control of PDEs under disturbances remains significantly under-explored. In this context, we explore a practical input-…
▽ More
Distributed Parameter Systems (DPSs), modelled by partial differential equations (PDEs), are increasingly vulnerable to disturbances arising from various sources. Although detection of disturbances in PDE systems have received considerable attention in existing literature, safety control of PDEs under disturbances remains significantly under-explored. In this context, we explore a practical input-to-state safety (pISSf) based control design approach for a class of DPSs modelled by linear Parabolic PDEs. Specifically, we develop a control design framework for this class of system with both safety and stability guarantees based on control Lyapunov functional and control barrier functional. To illustrate our methodology, we apply our strategy to design a thermal control system for battery modules under disturbance. Several simulation studies are done to show the efficacy of our method.
△ Less
Submitted 20 June, 2023; v1 submitted 6 January, 2022;
originally announced January 2022.
-
Acoustic scene classification using auditory datasets
Authors:
Jayesh Kumpawat,
Shubhajit Dey
Abstract:
The approach used not only challenges some of the fundamental mathematical techniques used so far in early experiments of the same trend but also introduces new scopes and new horizons for interesting results. The physics governing spectrograms have been optimized in the project along with exploring how it handles the intense requirements of the problem at hand. Major contributions and development…
▽ More
The approach used not only challenges some of the fundamental mathematical techniques used so far in early experiments of the same trend but also introduces new scopes and new horizons for interesting results. The physics governing spectrograms have been optimized in the project along with exploring how it handles the intense requirements of the problem at hand. Major contributions and developments brought under the light, through this project involve using better mathematical techniques and problem-specific machine learning methods. Improvised data analysis and data augmentation for audio datasets like frequency masking and random frequency-time stretching are used in the project and hence are explained in this paper. In the used methodology, the audio transforms principle were also tried and explored, and indeed the insights gained were used constructively in the later stages of the project. Using a deep learning principle is surely one of them. Also, in this paper, the potential scopes and upcoming research openings in both short and long term tunnel of time has been presented. Although much of the results gained are domain-specific as of now, they are surely potent enough to produce novel solutions in various different domains of diverse backgrounds.
△ Less
Submitted 15 July, 2022; v1 submitted 26 December, 2021;
originally announced December 2021.
-
Security of Distributed Parameter Cyber-Physical Systems: Cyber-Attack Detection in Linear Parabolic PDEs
Authors:
Tanushree Roy,
Satadru Dey
Abstract:
Security of Distributed Parameter Cyber-Physical Systems (DPCPSs) is of critical importance in the face of cyber-attack threats. Although security aspects of Cyber-Physical Systems (CPSs) modelled by Ordinary differential Equations (ODEs) have been extensively explored during the past decade, security of DPCPSs has not received its due attention despite its safety-critical nature. In this work, we…
▽ More
Security of Distributed Parameter Cyber-Physical Systems (DPCPSs) is of critical importance in the face of cyber-attack threats. Although security aspects of Cyber-Physical Systems (CPSs) modelled by Ordinary differential Equations (ODEs) have been extensively explored during the past decade, security of DPCPSs has not received its due attention despite its safety-critical nature. In this work, we explore the security aspects of DPCPSs from a system theoretic viewpoint. Specifically, we focus on DPCPSs modelled by linear parabolic Partial Differential Equations (PDEs) subject to cyber-attacks in actuation channel. First, we explore the detectability of such attacks and derive conditions for stealthy attacks. Next, we develop a design framework for cyber-attack detection algorithms based on output injection observers. Such attack detection algorithms explicitly consider stability, robustness and attack sensitivity in their design. Finally, theoretical analysis and simulation studies are performed to illustrate the effectiveness of the proposed approach.
△ Less
Submitted 30 July, 2021; v1 submitted 29 July, 2021;
originally announced July 2021.
-
Co-designing Intelligent Control of Building HVACs and Microgrids
Authors:
Rumia Masburah,
Sayan Sinha,
Rajib Lochan Jana,
Soumyajit Dey,
Qi Zhu
Abstract:
Building loads consume roughly 40% of the energy produced in developed countries, a significant part of which is invested towards building temperature-control infrastructure. Therein, renewable resource-based microgrids offer a greener and cheaper alternative. This communication explores the possible co-design of microgrid power dispatch and building HVAC (heating, ventilation and air conditioning…
▽ More
Building loads consume roughly 40% of the energy produced in developed countries, a significant part of which is invested towards building temperature-control infrastructure. Therein, renewable resource-based microgrids offer a greener and cheaper alternative. This communication explores the possible co-design of microgrid power dispatch and building HVAC (heating, ventilation and air conditioning system) actuations with the objective of effective temperature control under minimised operating cost. For this, we attempt control designs with various levels of abstractions based on information available about microgrid and HVAC system models using the Deep Reinforcement Learning (DRL) technique. We provide control architectures that consider model information ranging from completely determined system models to systems with fully unknown parameter settings and illustrate the advantages of DRL for the design prescriptions.
△ Less
Submitted 18 July, 2021;
originally announced July 2021.
-
A Differential Private Method for Distributed Optimization in Directed Networks via State Decomposition
Authors:
Xiaomeng Chen,
Lingying Huang,
Lidong He,
Subhrakanti Dey,
Ling Shi
Abstract:
In this paper, we study the problem of consensus-based distributed optimization where a network of agents, abstracted as a directed graph, aims to minimize the sum of all agents' cost functions collaboratively. In existing distributed optimization approaches (Push-Pull/AB) for directed graphs, all agents exchange their states with neighbors to achieve the optimal solution with a constant stepsize,…
▽ More
In this paper, we study the problem of consensus-based distributed optimization where a network of agents, abstracted as a directed graph, aims to minimize the sum of all agents' cost functions collaboratively. In existing distributed optimization approaches (Push-Pull/AB) for directed graphs, all agents exchange their states with neighbors to achieve the optimal solution with a constant stepsize, which may lead to the disclosure of sensitive and private information. For privacy preservation, we propose a novel state-decomposition based gradient tracking approach (SD-Push-Pull) for distributed optimzation over directed networks that preserves differential privacy, which is a strong notion that protects agents' privacy against an adversary with arbitrary auxiliary information. The main idea of the proposed approach is to decompose the gradient state of each agent into two sub-states. Only one substate is exchanged by the agent with its neighbours over time, and the other one is kept private. That is to say, only one substate is visible to an adversary, protecting the privacy from being leaked. It is proved that under certain decomposition principles, a bound for the sub-optimality of the proposed algorithm can be derived and the differential privacy is achieved simultaneously. Moreover, the trade-off between differential privacy and the optimization accuracy is also characterized. Finally, a numerical simulation is provided to illustrate the effectiveness of the proposed approach.
△ Less
Submitted 29 August, 2022; v1 submitted 9 July, 2021;
originally announced July 2021.
-
Dialectal Speech Recognition and Translation of Swiss German Speech to Standard German Text: Microsoft's Submission to SwissText 2021
Authors:
Yuriy Arabskyy,
Aashish Agarwal,
Subhadeep Dey,
Oscar Koller
Abstract:
This paper describes the winning approach in the Shared Task 3 at SwissText 2021 on Swiss German Speech to Standard German Text, a public competition on dialect recognition and translation. Swiss German refers to the multitude of Alemannic dialects spoken in the German-speaking parts of Switzerland. Swiss German differs significantly from standard German in pronunciation, word inventory and gramma…
▽ More
This paper describes the winning approach in the Shared Task 3 at SwissText 2021 on Swiss German Speech to Standard German Text, a public competition on dialect recognition and translation. Swiss German refers to the multitude of Alemannic dialects spoken in the German-speaking parts of Switzerland. Swiss German differs significantly from standard German in pronunciation, word inventory and grammar. It is mostly incomprehensible to native German speakers. Moreover, it lacks a standardized written script. To solve the challenging task, we propose a hybrid automatic speech recognition system with a lexicon that incorporates translations, a 1st pass language model that deals with Swiss German particularities, a transfer-learned acoustic model and a strong neural language model for 2nd pass rescoring. Our submission reaches 46.04% BLEU on a blind conversational test set and outperforms the second best competitor by a 12% relative margin.
△ Less
Submitted 1 July, 2021; v1 submitted 15 June, 2021;
originally announced June 2021.
-
Resilient Control of Platooning Networked Robotic Systems via Dynamic Watermarking
Authors:
Matthew Porter,
Arnav Joshi,
Sidhartha Dey,
Qirui Wu,
Pedro Hespanhol,
Anil Aswani,
Matthew Johnson-Roberson,
Ram Vasudevan
Abstract:
Networked robotic systems, such as connected vehicle platoons, can improve the safety and efficiency of transportation networks by allowing for high-speed coordination. To enable such coordination, these systems rely on networked communications. This can make them susceptible to cyber attacks. Though security methods such as encryption or specially designed network topologies can increase the diff…
▽ More
Networked robotic systems, such as connected vehicle platoons, can improve the safety and efficiency of transportation networks by allowing for high-speed coordination. To enable such coordination, these systems rely on networked communications. This can make them susceptible to cyber attacks. Though security methods such as encryption or specially designed network topologies can increase the difficulty of successfully executing such an attack, these techniques are unable to guarantee secure communication against an attacker. More troublingly, these security methods are unable to ensure that individual agents are able to detect attacks that alter the content of specific messages. To ensure resilient behavior under such attacks, this paper formulates a networked linear time-varying version of dynamic watermarking in which each agent generates and adds a private excitation to the input of its corresponding robotic subsystem. This paper demonstrates that such a method can enable each agent in a networked robotic system to detect cyber attacks. By altering measurements sent between vehicles, this paper illustrates that an attacker can create unstable behavior within a platoon. By utilizing the dynamic watermarking method proposed in this paper, the attack is detected, allowing the vehicles in the platoon to gracefully degrade to a non-communicative control strategy that maintains safety across a variety of scenarios.
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
Cross-Corpora Language Recognition: A Preliminary Investigation with Indian Languages
Authors:
Spandan Dey,
Goutam Saha,
Md Sahidullah
Abstract:
In this paper, we conduct one of the very first studies for cross-corpora performance evaluation in the spoken language identification (LID) problem. Cross-corpora evaluation was not explored much in LID research, especially for the Indian languages. We have selected three Indian spoken language corpora: IIITH-ILSC, LDC South Asian, and IITKGP-MLILSC. For each of the corpus, LID systems are traine…
▽ More
In this paper, we conduct one of the very first studies for cross-corpora performance evaluation in the spoken language identification (LID) problem. Cross-corpora evaluation was not explored much in LID research, especially for the Indian languages. We have selected three Indian spoken language corpora: IIITH-ILSC, LDC South Asian, and IITKGP-MLILSC. For each of the corpus, LID systems are trained on the state-of-the-art time-delay neural network (TDNN) based architecture with MFCC features. We observe that the LID performance degrades drastically for cross-corpora evaluation. For example, the system trained on the IIITH-ILSC corpus shows an average EER of 11.80 % and 43.34 % when evaluated with the same corpora and LDC South Asian corpora, respectively. Our preliminary analysis shows the significant differences among these corpora in terms of mismatch in the long-term average spectrum (LTAS) and signal-to-noise ratio (SNR). Subsequently, we apply different feature level compensation methods to reduce the cross-corpora acoustic mismatch. Our results indicate that these feature normalization schemes can help to achieve promising LID performance on cross-corpora experiments.
△ Less
Submitted 12 May, 2021; v1 submitted 10 May, 2021;
originally announced May 2021.
-
Cylindrical Battery Fault Detection under Extreme Fast Charging: A Physics-based Learning Approach
Authors:
Roya Firoozi,
Sara Sattarzadeh,
Satadru Dey
Abstract:
High power operation in extreme fast charging significantly increases the risk of internal faults in Electric Vehicle batteries which can lead to accelerated battery failure. Early detection of these faults is crucial for battery safety and widespread deployment of fast charging. In this setting, we propose a real-time {detection} framework for battery voltage and thermal faults. A major challenge…
▽ More
High power operation in extreme fast charging significantly increases the risk of internal faults in Electric Vehicle batteries which can lead to accelerated battery failure. Early detection of these faults is crucial for battery safety and widespread deployment of fast charging. In this setting, we propose a real-time {detection} framework for battery voltage and thermal faults. A major challenge in battery fault detection arises from the effect of uncertainties originating from sensor inaccuracies, nominal aging, or unmodelled dynamics. Inspired by physics-based learning, we explore a detection paradigm that combines physics-based models, model-based detection observers, and data-driven learning techniques to address this challenge. Specifically, we construct the {detection} observers based on an experimentally identified electrochemical-thermal model, and subsequently design the observer tuning parameters following Lyapunov's stability theory. Furthermore, we utilize Gaussian Process Regression technique to learn the model and measurement uncertainties which in turn aid the {detection} observers in distinguishing faults and uncertainties. Such uncertainty learning essentially helps suppressing their effects, potentially enabling early detection of faults. We perform simulation and experimental case studies on the proposed fault {detection} scheme verifying the potential of physics-based learning in early detection of battery faults.
△ Less
Submitted 7 May, 2021; v1 submitted 5 May, 2021;
originally announced May 2021.
-
Thermal Fault Detection and Localization Framework for Large Format Batteries
Authors:
Sara Sattarzadeh,
Tanushree Roy,
Satadru Dey
Abstract:
Safety against thermal failures is crucial in battery systems. Real-time thermal diagnostics can be a key enabler of such safer batteries. Thermal fault diagnostics in large format pouch or prismatic cells pose additional challenges compared to cylindrical cells. These challenges arise from the fact that the temperature distribution in large format cells is at least two-dimensional in nature (alon…
▽ More
Safety against thermal failures is crucial in battery systems. Real-time thermal diagnostics can be a key enabler of such safer batteries. Thermal fault diagnostics in large format pouch or prismatic cells pose additional challenges compared to cylindrical cells. These challenges arise from the fact that the temperature distribution in large format cells is at least two-dimensional in nature (along length and breadth) while such distribution can be reasonably approximated in one dimension (along radial direction) in cylindrical cells. This difference makes the placement of temperature sensor(s) non-trivial and the design of detection algorithm challenging. In this work, we address these issues by proposing a framework that (i) optimizes the sensor locations to improve detectability and isolability of thermal faults, and (ii) designs a filtering scheme for fault detection and localization based on a two-dimensional thermal model. The proposed framework is illustrated by experimental and simulation studies on a commercial battery cell.
△ Less
Submitted 12 September, 2021; v1 submitted 25 March, 2021;
originally announced March 2021.
-
Cyber-Attack Detection in Socio-Technical Transportation Systems Exploiting Redundancies Between Physical and Social Data
Authors:
Tanushree Roy,
Sara Sattarzadeh,
Satadru Dey
Abstract:
Cyber-physical-social connectivity is a key element in Intelligent Transportation Systems (ITSs) due to the ever-increasing interaction between human users and technological systems. Such connectivity translates the ITSs into dynamical systems of socio-technical nature. Exploiting this socio-technical feature to our advantage, we propose a cyber-attack detection scheme for ITSs that focuses on cyb…
▽ More
Cyber-physical-social connectivity is a key element in Intelligent Transportation Systems (ITSs) due to the ever-increasing interaction between human users and technological systems. Such connectivity translates the ITSs into dynamical systems of socio-technical nature. Exploiting this socio-technical feature to our advantage, we propose a cyber-attack detection scheme for ITSs that focuses on cyber-attacks on freeway traffic infrastructure. The proposed scheme combines two parallel macroscopic traffic model-based Partial Differential Equation (PDE) filters whose output residuals are compared to make decision on attack occurrences. One of the filters utilizes physical (vehicle/infrastructure) sensor data as feedback whereas the other utilizes social data from human users' mobile devices as feedback. The Social Data-based Filter is aided by a fake data isolator and a social signal processor that translates the social information into usable feedback signals. Mathematical convergence properties are analyzed for the filters using Lyapunov's stability theory. Lastly, we validate our proposed scheme by presenting simulation results.
△ Less
Submitted 21 March, 2021;
originally announced March 2021.
-
Transmission Power Allocation for Remote Estimation with Multi-packet Reception Capabilities
Authors:
Matthias Pezzutto,
Luca Schenato,
Subhrakanti Dey
Abstract:
In this paper we consider the problem of transmission power allocation for remote estimation of a dynamical system in the case where the estimator is able to simultaneously receive packets from multiple interfering sensors, as it is possible e.g. with the latest wireless technologies such as 5G and WiFi. To this end we introduce a general model where packet arrival probabilities are determined bas…
▽ More
In this paper we consider the problem of transmission power allocation for remote estimation of a dynamical system in the case where the estimator is able to simultaneously receive packets from multiple interfering sensors, as it is possible e.g. with the latest wireless technologies such as 5G and WiFi. To this end we introduce a general model where packet arrival probabilities are determined based on the received Signal-to-Interference-and-Noise Ratio and with two different receivers design schemes, one implementing standard multi-packet reception technique and one implementing Successive Interference Cancellation decoding algorithm in addition. Then we cast the power allocation problem as an optimization task where the mean error covariance at the remote estimator is minimized, while penalizing the mean transmission power consumption. For the infinite-horizon problem we show the existence of a stationary optimal policy, while for the finite-horizon case we derive some structural properties under the special scenario where the overall system to be estimated can be seen as a set of independent subsystems. Numerical simulations illustrate the improvement given by the proposed receivers over orthogonal schemes that schedules only one sensor transmission at a time in order to avoid interference.
△ Less
Submitted 12 January, 2022; v1 submitted 29 January, 2021;
originally announced January 2021.
-
Route Choice-based Socio-Technical Macroscopic Traffic Model
Authors:
Tanushree Roy,
Satadru Dey
Abstract:
Human route choice is undeniably one of the key contributing factors towards traffic dynamics. However, most existing macroscopic traffic models are typically concerned with driving behavior and do not incorporate human route choice behavior models in their formulation. In this paper, we propose a socio-technical macroscopic traffic model that characterizes the traffic states using human route cho…
▽ More
Human route choice is undeniably one of the key contributing factors towards traffic dynamics. However, most existing macroscopic traffic models are typically concerned with driving behavior and do not incorporate human route choice behavior models in their formulation. In this paper, we propose a socio-technical macroscopic traffic model that characterizes the traffic states using human route choice attributes. Essentially, such model provides a framework for capturing the Cyber-Physical-Social coupling in smart transportation systems. To derive this model, we first use Cumulative Prospect Theory (CPT) to model the human passengers' route choice under bounded rationality. These choices are assumed to be influenced by traffic alerts and other incomplete traffic information. Next, we assume that the vehicles are operating under a non-cooperative cruise control scenario. Accordingly, human route choice segregates the traffic into multiple classes where each class corresponds to a specific route between an origin-destination pair. Thereafter, we derive a Mean Field Game (MFG) limit of this non-cooperative game to obtain a macroscopic model which embeds the human route choice attribute. Finally, we analyze the mathematical characteristics of the proposed model and present simulation studies to illustrate the model behavior.
△ Less
Submitted 26 January, 2021;
originally announced January 2021.
-
Stealthy hacking and secrecy of controlled state estimation systems with random dropouts
Authors:
**gyi Lu,
Daniel Quevedo,
Vijay Gupta,
Subhrakanti Dey
Abstract:
We study the maximum information gain that an adversary may obtain through hacking without being detected. Consider a dynamical process observed by a sensor that transmits a local estimate of the system state to a remote estimator according to some reference transmission policy across a packet-drop** wireless channel equipped with acknowledgments (ACK). An adversary overhears the transmissions a…
▽ More
We study the maximum information gain that an adversary may obtain through hacking without being detected. Consider a dynamical process observed by a sensor that transmits a local estimate of the system state to a remote estimator according to some reference transmission policy across a packet-drop** wireless channel equipped with acknowledgments (ACK). An adversary overhears the transmissions and proactively hijacks the sensor to reprogram its transmission policy. We define perfect secrecy as kee** the averaged expected error covariance bounded at the legitimate estimator and unbounded at the adversary. By analyzing the stationary distribution of the expected error covariance, we show that perfect secrecy can be attained for unstable systems only if the ACK channel has no packet dropouts. In other situations, we prove that independent of the reference policy and the detection methods, perfect secrecy is not attainable. For this scenario, we formulate a constrained Markov decision process to derive the optimal transmission policy that the adversary should implement at the sensor, and devise a Stackelberg game to derive the optimal reference policy for the legitimate estimator.
△ Less
Submitted 7 November, 2020;
originally announced November 2020.
-
Privacy-Preserving Push-sum Average Consensus via State Decomposition
Authors:
Xiaomeng Chen,
Lingying Huang,
Kemi Ding,
Subhrakanti Dey,
Ling Shi
Abstract:
Average consensus is extensively used in distributed networks for computation and control, where all the agents constantly communicate with each other and update their states in order to reach an agreement. Under a general average consensus algorithm, information exchanged through wireless or wired communication networks could lead to the disclosure of sensitive and private information. In this pa…
▽ More
Average consensus is extensively used in distributed networks for computation and control, where all the agents constantly communicate with each other and update their states in order to reach an agreement. Under a general average consensus algorithm, information exchanged through wireless or wired communication networks could lead to the disclosure of sensitive and private information. In this paper, we propose a privacy-preserving push-sum approach for directed networks that can protect the privacy of all agents while achieving average consensus simultaneously. Each node decomposes its initial state arbitrarily into two substates, and their average equals to the initial state, guaranteeing that the agent's state will converge to the accurate average consensus. Only one substate is exchanged by the node with its neighbours over time, and the other one is reserved. That is to say, only the exchanged substate would be visible to an adversary, preventing the initial state information from leakage. Different from the existing state-decomposition approach which only applies to undirected graphs, our proposed approach is applicable to strongly connected digraphs. In addition, in direct contrast to offset-adding based privacy-preserving push-sum algorithm, which is vulnerable to an external eavesdropper, our proposed approach can ensure privacy against both an honest-but-curious node and an external eavesdropper. A numerical simulation is provided to illustrate the effectiveness of the proposed approach.
△ Less
Submitted 16 June, 2021; v1 submitted 25 September, 2020;
originally announced September 2020.
-
Skip to Secure: Securing Cyber-physical Control Loops with Intentionally Skipped Executions
Authors:
Sunandan Adhikary,
Ipsita Koley,
Sumana Ghosh,
Saurav Kumar Ghosh,
Soumyajit Dey,
Debdeep Mukhopadhyay
Abstract:
We consider the problem of provably securing a given control loop implementation in the presence of adversarial interventions on data exchange between plant and controller. Such interventions can be thwarted using continuously operating monitoring systems and also cryptographic techniques, both of which consume network and computational resources. We provide a principled approach for intentional s…
▽ More
We consider the problem of provably securing a given control loop implementation in the presence of adversarial interventions on data exchange between plant and controller. Such interventions can be thwarted using continuously operating monitoring systems and also cryptographic techniques, both of which consume network and computational resources. We provide a principled approach for intentional skip** of control loop executions which may qualify as a useful control theoretic countermeasure against stealthy attacks which violate message integrity and authenticity. As is evident from our experiments, such a control theoretic counter-measure helps in lowering the cryptographic security measure overhead and resulting resource consumption in Control Area Network (CAN) based automotive CPS without compromising performance and safety.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.
-
Advanced Single Image Resolution Upsurging Using a Generative Adversarial Network
Authors:
Md. Moshiur Rahman,
Samrat Kumar Dey,
Kabid Hassan Shibly
Abstract:
The resolution of an image is a very important criterion for evaluating the quality of the image. A higher resolution of an image is always preferable as images of lower resolution are unsuitable due to fuzzy quality. A higher resolution of an image is important for various fields such as medical imaging; astronomy works and so on as images of lower resolution becomes unclear and indistinct when t…
▽ More
The resolution of an image is a very important criterion for evaluating the quality of the image. A higher resolution of an image is always preferable as images of lower resolution are unsuitable due to fuzzy quality. A higher resolution of an image is important for various fields such as medical imaging; astronomy works and so on as images of lower resolution becomes unclear and indistinct when their sizes are enlarged. In recent times, various research works are performed to generate a higher resolution of an image from its lower resolution. In this paper, we have proposed a technique of generating higher resolution images form lower resolution using Residual in Residual Dense Block network architecture with a deep network. We have also compared our method with other methods to prove that our method provides better visual quality images.
△ Less
Submitted 30 May, 2020;
originally announced June 2020.
-
PowerPlanningDL: Reliability-Aware Framework for On-Chip Power Grid Design using Deep Learning
Authors:
Sukanta Dey,
Sukumar Nandi,
Gaurav Trivedi
Abstract:
With the increase in the complexity of chip designs, VLSI physical design has become a time-consuming task, which is an iterative design process. Power planning is that part of the floorplanning in VLSI physical design where power grid networks are designed in order to provide adequate power to all the underlying functional blocks. Power planning also requires multiple iterative steps to create th…
▽ More
With the increase in the complexity of chip designs, VLSI physical design has become a time-consuming task, which is an iterative design process. Power planning is that part of the floorplanning in VLSI physical design where power grid networks are designed in order to provide adequate power to all the underlying functional blocks. Power planning also requires multiple iterative steps to create the power grid network while satisfying the allowed worst-case IR drop and Electromigration (EM) margin. For the first time, this paper introduces Deep learning (DL)-based framework to approximately predict the initial design of the power grid network, considering different reliability constraints. The proposed framework reduces many iterative design steps and speeds up the total design cycle. Neural Network-based multi-target regression technique is used to create the DL model. Feature extraction is done, and the training dataset is generated from the floorplans of some of the power grid designs extracted from the IBM processor. The DL model is trained using the generated dataset. The proposed DL-based framework is validated using a new set of power grid specifications (obtained by perturbing the designs used in the training phase). The results show that the predicted power grid design is closer to the original design with minimal prediction error (~2%). The proposed DL-based approach also improves the design cycle time with a speedup of ~6X for standard power grid benchmarks.
△ Less
Submitted 24 July, 2020; v1 submitted 4 May, 2020;
originally announced May 2020.
-
Cytology Image Analysis Techniques Towards Automation: Systematically Revisited
Authors:
Shyamali Mitra,
Nibaran Das,
Soumyajyoti Dey,
Sukanta Chakrabarty,
Mita Nasipuri,
Mrinal Kanti Naskar
Abstract:
Cytology is the branch of pathology which deals with the microscopic examination of cells for diagnosis of carcinoma or inflammatory conditions. Automation in cytology started in the early 1950s with the aim to reduce manual efforts in diagnosis of cancer. The inflush of intelligent technological units with high computational power and improved specimen collection techniques helped to achieve its…
▽ More
Cytology is the branch of pathology which deals with the microscopic examination of cells for diagnosis of carcinoma or inflammatory conditions. Automation in cytology started in the early 1950s with the aim to reduce manual efforts in diagnosis of cancer. The inflush of intelligent technological units with high computational power and improved specimen collection techniques helped to achieve its technological heights. In the present survey, we focus on such image processing techniques which put steps forward towards the automation of cytology. We take a short tour to 17 types of cytology and explore various segmentation and/or classification techniques which evolved during last three decades boosting the concept of automation in cytology. It is observed, that most of the works are aligned towards three types of cytology: Cervical, Breast and Lung, which are discussed elaborately in this paper. The user-end systems developed during that period are summarized to comprehend the overall growth in the respective domains. To be precise, we discuss the diversity of the state-of-the-art methodologies, their challenges to provide prolific and competent future research directions inbringing the cytology-based commercial systems into the mainstream.
△ Less
Submitted 17 March, 2020;
originally announced March 2020.