Skip to main content

Showing 1–50 of 52 results for author: Farokhi, F

Searching in archive math. Search in all archives.
.
  1. arXiv:2404.08172  [pdf, ps, other

    quant-ph cs.LG eess.SP math.ST

    Optimal Universal Quantum Encoding for Statistical Inference

    Authors: Farhad Farokhi

    Abstract: Optimal encoding of classical data for statistical inference using quantum computing is investigated. A universal encoder is sought that is optimal for a wide array of statistical inference tasks. Accuracy of any statistical inference is shown to be upper bounded by a term that is proportional to maximal quantum leakage from the classical data, i.e., the input to the inference model, through its q… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

  2. arXiv:2309.09411  [pdf, other

    math.OC cs.LG

    Distributionally Time-Varying Online Stochastic Optimization under Polyak-Łojasiewicz Condition with Application in Conditional Value-at-Risk Statistical Learning

    Authors: Yuen-Man Pun, Farhad Farokhi, Iman Shames

    Abstract: In this work, we consider a sequence of stochastic optimization problems following a time-varying distribution via the lens of online optimization. Assuming that the loss function satisfies the Polyak-Łojasiewicz condition, we apply online stochastic gradient descent and establish its dynamic regret bound that is composed of cumulative distribution drifts and cumulative gradient biases caused by s… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

  3. arXiv:2302.07454  [pdf, other

    math.OC eess.SP eess.SY math.PR math.ST

    Distributionally-Robust Optimization with Noisy Data for Discrete Uncertainties Using Total Variation Distance

    Authors: Farhad Farokhi

    Abstract: Stochastic programs where the uncertainty distribution must be inferred from noisy data samples are considered. The stochastic programs are approximated with distributionally-robust optimizations that minimize the worst-case expected cost over ambiguity sets, i.e., sets of distributions that are sufficiently compatible with the observed data. In this paper, the ambiguity sets capture the set of pr… ▽ More

    Submitted 15 December, 2023; v1 submitted 14 February, 2023; originally announced February 2023.

    Comments: Fixed a typo in the statement of Corollary 4.1

    Journal ref: IEEE Control Systems Letters, Vol. 7, pp. 1494-1499, 2023

  4. arXiv:2111.00631  [pdf, ps, other

    cs.LG eess.SY math.OC math.PR stat.ML

    Learning Safety Filters for Unknown Discrete-Time Linear Systems

    Authors: Farhad Farokhi, Alex S. Leong, Mohammad Zamani, Iman Shames

    Abstract: A learning-based safety filter is developed for discrete-time linear time-invariant systems with unknown models subject to Gaussian noises with unknown covariance. Safety is characterized using polytopic constraints on the states and control inputs. The empirically learned model and process noise covariance with their confidence bounds are used to construct a robust optimization problem for minima… ▽ More

    Submitted 8 May, 2023; v1 submitted 31 October, 2021; originally announced November 2021.

  5. arXiv:2110.04956  [pdf, other

    cs.RO eess.SY math.OC physics.data-an quant-ph

    Optimal Stochastic Evasive Maneuvers Using the Schrodinger's Equation

    Authors: Farhad Farokhi, Magnus Egerstedt

    Abstract: In this paper, preys with stochastic evasion policies are considered. The stochasticity adds unpredictable changes to the prey's path for avoiding predator's attacks. The prey's cost function is composed of two terms balancing the unpredictability factor (by using stochasticity to make the task of forecasting its future positions by the predator difficult) and energy consumption (the least amount… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

  6. arXiv:2103.01413  [pdf, other

    cs.LG eess.SY math.OC stat.ML

    Safe Learning of Uncertain Environments

    Authors: Farhad Farokhi, Alex Leong, Iman Shames, Mohammad Zamani

    Abstract: In many learning based control methodologies, learning the unknown dynamic model precedes the control phase, while the aim is to control the system such that it remains in some safe region of the state space. In this work, our aim is to guarantee safety while learning and control proceed simultaneously. Specifically, we consider the problem of safe learning in nonlinear control-affine systems subj… ▽ More

    Submitted 13 May, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

  7. arXiv:2101.06811  [pdf, ps, other

    cs.IT cs.LG math.OC stat.ML

    Optimal Pre-Processing to Achieve Fairness and Its Relationship with Total Variation Barycenter

    Authors: Farhad Farokhi

    Abstract: We use disparate impact, i.e., the extent that the probability of observing an output depends on protected attributes such as race and gender, to measure fairness. We prove that disparate impact is upper bounded by the total variation distance between the distribution of the inputs given the protected attributes. We then use pre-processing, also known as data repair, to enforce fairness. We show t… ▽ More

    Submitted 17 January, 2021; originally announced January 2021.

  8. Rigid-profile input scheduling under constrained dynamics with a water network application

    Authors: Adair Lang, Michael Cantoni, Farhad Farokhi, Iman Shames

    Abstract: The motivation for this work stems from the problem of scheduling requests for flow at supply points along an automated network of open-water channels. The off-take flows are rigid-profile inputs to the system dynamics. In particular, the channel operator can only shift orders in time to satisfy constraints on the automatic response to changes in the load. This leads to a non-convex semi-infinite… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

    MSC Class: 93A10 (Primary); 90C34 (Secondary); 90B35

    Journal ref: IEEE Transactions on Control Systems Technology. Early Access (2020) 1-16

  9. arXiv:2011.14572  [pdf, ps, other

    cs.LG cs.CR math.OC stat.ML

    Gradient Sparsification Can Improve Performance of Differentially-Private Convex Machine Learning

    Authors: Farhad Farokhi

    Abstract: We use gradient sparsification to reduce the adverse effect of differential privacy noise on performance of private machine learning models. To this aim, we employ compressed sensing and additive Laplace noise to evaluate differentially-private gradients. Noisy privacy-preserving gradients are used to perform stochastic gradient descent for training machine learning models. Sparsification, achieve… ▽ More

    Submitted 1 December, 2020; v1 submitted 30 November, 2020; originally announced November 2020.

    Comments: Fixed typos and a mistake in the proof of Proposition 1

  10. arXiv:2010.05616  [pdf, ps, other

    eess.SY math.OC

    Structured preconditioning of conjugate gradients for path-graph network optimal control problems

    Authors: Armaghan Zafar, Michael Cantoni, Farhad Farokhi

    Abstract: A structured preconditioned conjugate gradient (PCG) solver is developed for the Newton steps in second-order methods for a class of constrained network optimal control problems. Of specific interest are problems with discrete-time dynamics arising from the path-graph interconnection of $N$ heterogeneous sub-systems. The computational complexity of each PGC step is shown to be $O(NT)$, where $T$ i… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

    Comments: Submitted to the IEEE Transactions on Automatic Control for possible publication

  11. arXiv:2008.12466  [pdf, other

    math.ST cs.CR cs.LG stat.ML

    Deconvoluting Kernel Density Estimation and Regression for Locally Differentially Private Data

    Authors: Farhad Farokhi

    Abstract: Local differential privacy has become the gold-standard of privacy literature for gathering or releasing sensitive individual data points in a privacy-preserving manner. However, locally differential data can twist the probability density of the data because of the additive noise used to ensure privacy. In fact, the density of privacy-preserving data (no matter how many samples we gather) is alway… ▽ More

    Submitted 8 November, 2020; v1 submitted 27 August, 2020; originally announced August 2020.

    Comments: updated reference list, deeper numerical analysis

  12. arXiv:2008.04477  [pdf, other

    cs.CR cs.IT eess.SY math.OC

    Security Versus Privacy

    Authors: Farhad Farokhi, Peyman Mohajerin Esfahani

    Abstract: Linear queries can be submitted to a server containing private data. The server provides a response to the queries systematically corrupted using an additive noise to preserve the privacy of those whose data is stored on the server. The measure of privacy is inversely proportional to the trace of the Fisher information matrix. It is assumed that an adversary can inject a false bias to the response… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

    Journal ref: 2018 IEEE Conference on Decision and Control (CDC)

  13. arXiv:2006.13488  [pdf, other

    cs.LG cs.CR math.OC math.ST stat.ML

    Distributionally-Robust Machine Learning Using Locally Differentially-Private Data

    Authors: Farhad Farokhi

    Abstract: We consider machine learning, particularly regression, using locally-differentially private datasets. The Wasserstein distance is used to define an ambiguity set centered at the empirical distribution of the dataset corrupted by local differential privacy noise. The ambiguity set is shown to contain the probability distribution of unperturbed, clean data. The radius of the ambiguity set is a funct… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

  14. arXiv:2006.01397  [pdf, ps, other

    math.OC cs.LG eess.SY stat.ML

    Online Stochastic Convex Optimization: Wasserstein Distance Variation

    Authors: Iman Shames, Farhad Farokhi

    Abstract: Distributionally-robust optimization is often studied for a fixed set of distributions rather than time-varying distributions that can drift significantly over time (which is, for instance, the case in finance and sociology due to underlying expansion of economy and evolution of demographics). This motivates understanding conditions on probability distributions, using the Wasserstein distance, tha… ▽ More

    Submitted 29 September, 2020; v1 submitted 2 June, 2020; originally announced June 2020.

  15. arXiv:2003.08500  [pdf, ps, other

    cs.LG cs.CR eess.SP math.OC stat.ML

    The Cost of Privacy in Asynchronous Differentially-Private Machine Learning

    Authors: Farhad Farokhi, Nan Wu, David Smith, Mohamed Ali Kaafar

    Abstract: We consider training machine learning models using Training data located on multiple private and geographically-scattered servers with different privacy settings. Due to the distributed nature of the data, communicating with all collaborating private data owners simultaneously may prove challenging or altogether impossible. In this paper, we develop differentially-private asynchronous algorithms f… ▽ More

    Submitted 29 June, 2020; v1 submitted 18 March, 2020; originally announced March 2020.

  16. arXiv:2001.10655  [pdf, ps, other

    cs.LG cs.CR eess.SP math.OC math.ST stat.ML

    Regularization Helps with Mitigating Poisoning Attacks: Distributionally-Robust Machine Learning Using the Wasserstein Distance

    Authors: Farhad Farokhi

    Abstract: We use distributionally-robust optimization for machine learning to mitigate the effect of data poisoning attacks. We provide performance guarantees for the trained model on the original data (not including the poison records) by training the model for the worst-case distribution on a neighbourhood around the empirical distribution (extracted from the training dataset corrupted by a poisoning atta… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

  17. arXiv:2001.10648  [pdf, ps, other

    cs.LG cs.CR cs.IT math.OC math.ST stat.ML

    Modelling and Quantifying Membership Information Leakage in Machine Learning

    Authors: Farhad Farokhi, Mohamed Ali Kaafar

    Abstract: Machine learning models have been shown to be vulnerable to membership inference attacks, i.e., inferring whether individuals' data have been used for training models. The lack of understanding about factors contributing success of these attacks motivates the need for modelling membership information leakage using information theory and for investigating properties of machine learning models and t… ▽ More

    Submitted 27 April, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

  18. arXiv:1910.02220  [pdf, ps, other

    eess.SP eess.SY math.OC math.ST stat.AP

    A Fundamental Bound on Performance of Non-Intrusive Load Monitoring with Application to Smart Meter Privacy

    Authors: Farhad Farokhi

    Abstract: We prove that the expected estimation error of non-intrusive load monitoring algorithms is lower bounded by the trace of the inverse of the cross-correlation matrix between the derivatives of the load profiles of the appliances. We use this fundamental bound to develop privacy-preserving policies. Particularly, we devise a load-scheduling policy by maximizing the lower bound on the expected estima… ▽ More

    Submitted 5 October, 2019; originally announced October 2019.

  19. arXiv:1909.11812  [pdf, ps, other

    cs.CR cs.IT eess.SY math.OC

    Differential Privacy for Evolving Almost-Periodic Datasets with Continual Linear Queries: Application to Energy Data Privacy

    Authors: Farhad Farokhi

    Abstract: For evolving datasets with continual reports, the composition rule for differential privacy (DP) dictates that the scale of DP noise must grow linearly with the number of the queries, or that the privacy budget must be split equally between all the queries, so that the privacy budget across all the queries remains bounded and consistent with the privacy guarantees. To avoid this drawback of DP, we… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

  20. arXiv:1906.09721  [pdf, ps, other

    cs.CR cs.LG eess.SY math.OC

    A Game-Theoretic Approach to Adversarial Linear Support Vector Classification

    Authors: Farhad Farokhi

    Abstract: In this paper, we employ a game-theoretic model to analyze the interaction between an adversary and a classifier. There are two classes (i.e., positive and negative classes) to which data points can belong. The adversary is interested in maximizing the probability of miss-detection for the positive class (i.e., false negative probability). The adversary however does not want to significantly modif… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

  21. arXiv:1904.07377  [pdf, other

    cs.IT eess.SP eess.SY math.OC

    Non-Stochastic Hypothesis Testing with Application to Privacy Against Hypothesis-Testing Adversary

    Authors: Farhad Farokhi

    Abstract: In this paper, we consider privacy against hypothesis testing adversaries within a non-stochastic framework. We develop a theory of non-stochastic hypothesis testing by borrowing the notion of uncertain variables from non-stochastic information theory. We define tests as binary-valued map**s on uncertain variables and prove a fundamental bound on the best performance of tests in non-stochastic h… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

  22. arXiv:1902.06899  [pdf, ps, other

    cs.CR eess.SP eess.SY math.OC

    Implementing Homomorphic Encryption Based Secure Feedback Control for Physical Systems

    Authors: Julian Tran, Farhad Farokhi, Michael Cantoni, Iman Shames

    Abstract: This paper is about an encryption based approach to the secure implementation of feedback controllers for physical systems. Specifically, Paillier's homomorphic encryption is used to digitally implement a class of linear dynamic controllers, which includes the commonplace static gain and PID type feedback control laws as special cases. The developed implementation is amenable to Field Programmable… ▽ More

    Submitted 27 March, 2019; v1 submitted 19 February, 2019; originally announced February 2019.

    Journal ref: Control Engineering Practice, Volume 97, April 2020, 104350

  23. arXiv:1812.04168  [pdf, ps, other

    math.OC cs.CR eess.SY

    Secure and Private Implementation of Dynamic Controllers Using Semi-Homomorphic Encryption

    Authors: Carlos Murguia, Farhad Farokhi, Iman Shames

    Abstract: This paper presents a secure and private implementation of linear time-invariant dynamic controllers using Paillier's encryption, a semi-homomorphic encryption method. To avoid overflow or underflow within the encryption domain, the state of the controller is reset periodically. A control design approach is presented to ensure stability and optimize performance of the closed-loop system with encry… ▽ More

    Submitted 20 June, 2019; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: Improved numerical example

  24. arXiv:1810.11153  [pdf, ps, other

    cs.IT cs.CR eess.SY math.OC

    Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory

    Authors: Farhad Farokhi

    Abstract: A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy. Anyone can submit a query to a trusted agent with access to a non-stochastic uncertain private dataset. Optimal deterministic privacy-preserving policies for respondin… ▽ More

    Submitted 22 January, 2019; v1 submitted 25 October, 2018; originally announced October 2018.

    Comments: improved introduction and numerical example

    Journal ref: IEEE Transactions on Information Forensics and Security, 2019

  25. arXiv:1808.09565  [pdf, other

    math.OC cs.IT eess.SY

    Ensuring Privacy with Constrained Additive Noise by Minimizing Fisher Information

    Authors: Farhad Farokhi, Henrik Sandberg

    Abstract: The problem of preserving the privacy of individual entries of a database when responding to linear or nonlinear queries with constrained additive noise is considered. For privacy protection, the response to the query is systematically corrupted with an additive random noise whose support is a subset or equal to a pre-defined constraint set. A measure of privacy using the inverse of the trace of t… ▽ More

    Submitted 28 August, 2018; originally announced August 2018.

  26. Preserving Privacy of Finite Impulse Response Systems

    Authors: Giulio Bottegal, Farhad Farokhi, Iman Shames

    Abstract: Adding input and output noises for increasing model identification error of finite impulse response (FIR) systems is considered. This is motivated by the desire to protect the model of the system as a trade secret by rendering model identification techniques ineffective. Optimal filters for constructing additive noises that maximizes the identification error subject to maintaining the closed-loop… ▽ More

    Submitted 5 June, 2017; originally announced June 2017.

  27. arXiv:1702.08582  [pdf, other

    eess.SY cs.CR math.OC

    Private and Secure Coordination of Match-Making for Heavy-Duty Vehicle Platooning

    Authors: Farhad Farokhi, Iman Shames, Karl H. Johansson

    Abstract: A secure and private framework for inter-agent communication and coordination is developed. This allows an agent, in our case a fleet owner, to ask questions or submit queries in an encrypted fashion using semi-homomorphic encryption. The submitted query can be about the interest of the other fleet owners for using a road at a specific time of the day, for instance, for the purpose of collaborativ… ▽ More

    Submitted 27 February, 2017; originally announced February 2017.

  28. Scalable computation for optimal control of cascade systems with constraints

    Authors: Michael Cantoni, Farhad Farokhi, Eric C. Kerrigan, Iman Shames

    Abstract: A method is devised for numerically solving a class of finite-horizon optimal control problems subject to cascade linear discrete-time dynamics. It is assumed that the linear state and input inequality constraints, and the quadratic measure of performance, are all separable with respect to the spatial dimension of the underlying cascade of sub-systems, as well as the temporal dimension of the dyna… ▽ More

    Submitted 12 October, 2017; v1 submitted 21 February, 2017; originally announced February 2017.

    Journal ref: International Journal of Control, 2017

  29. arXiv:1609.01028  [pdf, other

    math.OC eess.SY

    Preserving Privacy of Agents in Participatory-Sensing Schemes for Traffic Estimation

    Authors: Farhad Farokhi, Iman Shames

    Abstract: A measure of privacy infringement for agents (or participants) travelling across a transportation network in participatory-sensing schemes for traffic estimation is introduced. The measure is defined to be the conditional probability that an external observer assigns to the private nodes in the transportation network, e.g., location of home or office, given all the position measurements that it br… ▽ More

    Submitted 5 September, 2016; originally announced September 2016.

  30. arXiv:1609.00115  [pdf, other

    math.OC eess.SY

    Optimal State Estimation with Measurements Corrupted by Laplace Noise

    Authors: Farhad Farokhi, Jezdimir Milosevic, Henrik Sandberg

    Abstract: Optimal state estimation for linear discrete-time systems is considered. Motivated by the literature on differential privacy, the measurements are assumed to be corrupted by Laplace noise. The optimal least mean square error estimate of the state is approximated using a randomized method. The method relies on that the Laplace noise can be rewritten as Gaussian noise scaled by Rayleigh random varia… ▽ More

    Submitted 1 September, 2016; originally announced September 2016.

  31. arXiv:1509.08193  [pdf, other

    math.OC cs.GT eess.SY

    Budget-Constrained Contract Design for Effort-Averse Sensors in Averaging Based Estimation

    Authors: Farhad Farokhi, Iman Shames, Michael Cantoni

    Abstract: Consider a group of effort-averse, or lazy, sensors that seek to minimize the effort invested to collect measurements of a variable. Increasing the effort invested by the sensors improves the quality of the measurements provided to the central planner but this incurs increased costs to the sensors. The central planner, which processes the sensor measurements, employs an averaging estimator. It als… ▽ More

    Submitted 14 February, 2016; v1 submitted 28 September, 2015; originally announced September 2015.

    Comments: Improved literature review

  32. arXiv:1509.05502  [pdf, other

    cs.GT eess.SY math.OC

    Mutual Information as Privacy-Loss Measure in Strategic Communication

    Authors: Farhad Farokhi, Girish Nair

    Abstract: A game is introduced to study the effect of privacy in strategic communication between well-informed senders and a receiver. The receiver wants to accurately estimate a random variable. The sender, however, wants to communicate a message that balances a trade-off between providing an accurate measurement and minimizing the amount of leaked private information, which is assumed to be correlated wit… ▽ More

    Submitted 18 September, 2015; originally announced September 2015.

  33. arXiv:1509.05500  [pdf, ps, other

    math.OC cs.CR math.PR

    On Reconstructability of Quadratic Utility Functions from the Iterations in Gradient Methods

    Authors: Farhad Farokhi, Iman Shames, Michael G. Rabbat, Mikael Johansson

    Abstract: In this paper, we consider a scenario where an eavesdropper can read the content of messages transmitted over a network. The nodes in the network are running a gradient algorithm to optimize a quadratic utility function where such a utility optimization is a part of a decision making process by an administrator. We are interested in understanding the conditions under which the eavesdropper can rec… ▽ More

    Submitted 17 September, 2015; originally announced September 2015.

  34. arXiv:1509.05499  [pdf, other

    math.OC eess.SY math.NA

    Scheduling Rigid Demands on Continuous-Time Linear Shift-Invariant Systems

    Authors: Farhad Farokhi, Michael Cantoni, Iman Shames

    Abstract: We consider load scheduling on constrained continuous-time linear dynamical systems, such as automated irrigation and other distribution networks. The requested loads are rigid, i.e., the shapes cannot be changed. Hence, it is only possible to shift the order back-and-forth in time to arrive at a feasible schedule. We present a numerical algorithm based on using log-barrier functions to include th… ▽ More

    Submitted 17 September, 2015; originally announced September 2015.

    Comments: Accepted for Presentation at the 54th IEEE Conference on Decision and Control (CDC 2015)

  35. Quadratic Gaussian Privacy Games

    Authors: Farhad Farokhi, Henrik Sandberg, Iman Shames, Michael Cantoni

    Abstract: A game-theoretic model for analysing the effects of privacy on strategic communication between agents is devised. In the model, a sender wishes to provide an accurate measurement of the state to a receiver while also protecting its private information (which is correlated with the state) private from a malicious agent that may eavesdrop on its communications with the receiver. A family of nontrivi… ▽ More

    Submitted 17 September, 2015; originally announced September 2015.

    Comments: Accepted for Presentation at the 54th IEEE Conference on Decision and Control (CDC 2015)

  36. arXiv:1503.02784  [pdf, other

    cs.GT eess.SY math.OC

    Promoting Truthful Behaviour in Participatory-Sensing Mechanisms

    Authors: Farhad Farokhi, Iman Shames, Michael Cantoni

    Abstract: In this paper, the interplay between a class of nonlinear estimators and strategic sensors is studied in several participatory-sensing scenarios. It is shown that for the class of estimators, if the strategic sensors have access to noiseless measurements of the to-be-estimated-variable, truth-telling is an equilibrium of the game that models the interplay between the sensors and the estimator. Fur… ▽ More

    Submitted 10 March, 2015; originally announced March 2015.

    Comments: IEEE Signal Processing Letters, In Press

  37. arXiv:1410.4613  [pdf, ps, other

    math.OC eess.SY

    SiMpLIfy: A Toolbox for Structured Model Reduction

    Authors: Martin Biel, Farhad Farokhi, Henrik Sandberg

    Abstract: In this paper, we present a toolbox for structured model reduction developed for MATLAB. In addition to structured model reduction methods using balanced realizations of the subsystems, we introduce a numerical algorithm for structured model reduction using a subgradient optimization algorithm. We briefly present the syntax for the toolbox and its features. Finally, we demonstrate the applicabilit… ▽ More

    Submitted 16 October, 2014; originally announced October 2014.

  38. arXiv:1402.4031  [pdf, other

    cs.GT eess.SY math.OC

    Estimation with Strategic Sensors

    Authors: Farhad Farokhi, Andre M. H. Teixeira, Cedric Langbort

    Abstract: We introduce a model of estimation in the presence of strategic, self-interested sensors. We employ a game-theoretic setup to model the interaction between the sensors and the receiver. The cost function of the receiver is equal to the estimation error variance while the cost function of the sensor contains an extra term which is determined by its private information. We start by the single sensor… ▽ More

    Submitted 24 June, 2015; v1 submitted 17 February, 2014; originally announced February 2014.

    Comments: Results are generalized, illustrative examples are added, and the literature review is improved

  39. arXiv:1312.1075  [pdf, ps, other

    cs.GT eess.SY math.OC

    A Necessary and Sufficient Condition for the Existence of Potential Functions for Heterogeneous Routing Games

    Authors: Farhad Farokhi, Walid Krichene, Alexandre M. Bayen, Karl H. Johansson

    Abstract: We study a heterogeneous routing game in which vehicles might belong to more than one type. The type determines the cost of traveling along an edge as a function of the flow of various types of vehicles over that edge. We relax the assumptions needed for the existence of a Nash equilibrium in this heterogeneous routing game. We extend the available results to present necessary and sufficient condi… ▽ More

    Submitted 3 February, 2014; v1 submitted 4 December, 2013; originally announced December 2013.

    Comments: Improved Literature Review; Updated Introduction

  40. arXiv:1310.5534  [pdf, other

    cs.GT eess.SY math.OC

    A Study of Truck Platooning Incentives Using a Congestion Game

    Authors: Farhad Farokhi, Karl H. Johansson

    Abstract: We introduce an atomic congestion game with two types of agents, cars and trucks, to model the traffic flow on a road over various time intervals of the day. Cars maximize their utility by finding a trade-off between the time they choose to use the road, the average velocity of the flow at that time, and the dynamic congestion tax that they pay for using the road. In addition to these terms, the t… ▽ More

    Submitted 21 January, 2014; v1 submitted 21 October, 2013; originally announced October 2013.

    Comments: Updated Introduction; Improved Literature Review

  41. Faithful Implementations of Distributed Algorithms and Control Laws

    Authors: Takashi Tanaka, Farhad Farokhi, Cédric Langbort

    Abstract: When a distributed algorithm must be executed by strategic agents with misaligned interests, a social leader needs to introduce an appropriate tax/subsidy mechanism to incentivize agents to faithfully implement the intended algorithm so that a correct outcome is obtained. We discuss the incentive issues of implementing economically efficient distributed algorithms using the framework of indirect m… ▽ More

    Submitted 30 September, 2015; v1 submitted 17 September, 2013; originally announced September 2013.

    Comments: This manuscript is the extended version of arXiv:1304.3063, which was presented at the 52nd IEEE Conference on Decision and Control. In addition to the previously covered material, this contains a complete discussion including proofs and new results

  42. arXiv:1307.5903  [pdf, ps, other

    math.OC

    Optimal H-infinity Control Design under Model Information Limitations and State Measurement Constraints

    Authors: Farhad Farokhi, Henrik Sandberg, Karl H. Johansson

    Abstract: We present a suboptimal control design algorithm for a family of continuous-time parameter-dependent linear systems that are composed of interconnected subsystems. We are interested in designing the controller for each subsystem such that it only utilizes partial state measurements (characterized by a directed graph called the control graph) and limited model parameter information (characterized b… ▽ More

    Submitted 22 July, 2013; originally announced July 2013.

    Comments: Proceedings of the 52nd IEEE Conference on Decision and Control (CDC), 2013

  43. arXiv:1307.0445  [pdf, other

    eess.SY math.OC

    Networked Estimation using Sparsifying Basis Prediction

    Authors: Farhad Farokhi, Amirpasha Shirazinia, Karl H. Johansson

    Abstract: We present a framework for networked state estimation, where systems encode their (possibly high dimensional) state vectors using a mutually agreed basis between the system and the estimator (in a remote monitoring unit). The basis sparsifies the state vectors, i.e., it represents them using vectors with few non-zero components, and as a result, the systems might need to transmit only a fraction o… ▽ More

    Submitted 1 July, 2013; originally announced July 2013.

    Comments: Proceedings of the 4th IFAC Workshop on Distributed Estimation and Control in Networked Systems (NecSys), 2013

  44. arXiv:1304.3063  [pdf, other

    math.OC cs.GT

    A Faithful Distributed Implementation of Dual Decomposition and Average Consensus Algorithms

    Authors: Takashi Tanaka, Farhad Farokhi, Cédric Langbort

    Abstract: We consider large scale cost allocation problems and consensus seeking problems for multiple agents, in which agents are suggested to collaborate in a distributed algorithm to find a solution. If agents are strategic to minimize their own individual cost rather than the global social cost, they are endowed with an incentive not to follow the intended algorithm, unless the tax/subsidy mechanism is… ▽ More

    Submitted 10 April, 2013; originally announced April 2013.

    Comments: 8 pages

  45. arXiv:1209.5180  [pdf, other

    math.OC eess.SY math.PR

    Stochastic Sensor Scheduling for Networked Control Systems

    Authors: Farhad Farokhi, Karl H. Johansson

    Abstract: Optimal sensor scheduling with applications to networked estimation and control systems is considered. We model sensor measurement and transmission instances using jumps between states of a continuous-time Markov chain. We introduce a cost function for this Markov chain as the summation of terms depending on the average sampling frequencies of the subsystems and the effort needed for changing the… ▽ More

    Submitted 15 October, 2013; v1 submitted 24 September, 2012; originally announced September 2012.

    Comments: Corrected Typos

    Journal ref: IEEE Transactions on Automatic Control, 59 (5), pp. 1147-1162, May 2014

  46. arXiv:1209.5077  [pdf, ps, other

    eess.SY math.OC

    Complexity Reduction for Parameter-Dependent Linear Systems

    Authors: Farhad Farokhi, Henrik Sandberg, Karl H. Johansson

    Abstract: We present a complexity reduction algorithm for a family of parameter-dependent linear systems when the system parameters belong to a compact semi-algebraic set. This algorithm potentially describes the underlying dynamical system with fewer parameters or state variables. To do so, it minimizes the distance (i.e., H-infinity-norm of the difference) between the original system and its reduced versi… ▽ More

    Submitted 23 September, 2012; originally announced September 2012.

  47. arXiv:1208.2322  [pdf, ps, other

    math.OC eess.SY

    Adaptive Control Design under Structured Model Information Limitation: A Cost-Biased Maximum-Likelihood Approach

    Authors: Farhad Farokhi, Karl H. Johansson

    Abstract: Networked control strategies based on limited information about the plant model usually results in worse closed-loop performance than optimal centralized control with full plant model information. Recently, this fact has been established by utilizing the concept of competitive ratio, which is defined as the worst case ratio of the cost of a control design with limited model information to the cost… ▽ More

    Submitted 22 July, 2014; v1 submitted 11 August, 2012; originally announced August 2012.

    Comments: Improved presentation, Fixed typos

  48. arXiv:1207.3178  [pdf, ps, other

    math.OC eess.SY

    Distributed MPC Via Dual Decomposition and Alternating Direction Method of Multipliers

    Authors: Farhad Farokhi, Iman Shames, Karl H. Johansson

    Abstract: A conventional way to handle model predictive control (MPC) problems distributedly is to solve them via dual decomposition and gradient ascent. However, at each time-step, it might not be feasible to wait for the dual algorithm to converge. As a result, the algorithm might be needed to be terminated prematurely. One is then interested to see if the solution at the point of termination is close to… ▽ More

    Submitted 5 May, 2014; v1 submitted 13 July, 2012; originally announced July 2012.

    Comments: Fixed Typos

    Journal ref: Distributed Distributed Model Predictive Control Made Easy (J. M. Maestre and R. R. Negenborn, eds.), Intelligent Systems, Control and Automation: Science and Engineering, 69, Springer, 2013

  49. arXiv:1203.1276  [pdf, ps, other

    math.OC eess.SY

    Optimal Control Design under Limited Model Information for Discrete-Time Linear Systems with Stochastically-Varying Parameters

    Authors: Farhad Farokhi, Karl H. Johansson

    Abstract: The value of plant model information available in the control design process is discussed. We design optimal state-feedback controllers for interconnected discrete-time linear systems with stochastically-varying parameters. The parameters are assumed to be independently and identically distributed random variables in time. The design of each controller relies only on (i) exact local plant model in… ▽ More

    Submitted 4 December, 2013; v1 submitted 6 March, 2012; originally announced March 2012.

    Comments: In comparison to the previous version, we have updated the proof of Corollary 3 and fixed some typos. We have also included the proof of Theorem 4

  50. arXiv:1112.5032  [pdf, ps, other

    math.OC eess.SY

    Decentralized Disturbance Accommodation with Limited Plant Model Information

    Authors: F. Farokhi, C. Langbort, K. H. Johansson

    Abstract: The design of optimal disturbance accommodation and servomechanism controllers with limited plant model information is considered in this paper. Their closed-loop performance are compared using a performance metric called competitive ratio which is the worst-case ratio of the cost of a given control design strategy to the cost of the optimal control design with full model information. It was recen… ▽ More

    Submitted 21 December, 2011; originally announced December 2011.

    Journal ref: SIAM Journal on Control and Optimization, 51(2), pp. 1543-1573, 2013