-
Analytical Characterization of Epileptic Dynamics in a Bistable System
Authors:
Yuzhen Qin,
Ahmed El-Gazzar,
Danielle S. Bassett,
Fabio Pasqualetti,
Marcel van Gerven
Abstract:
Epilepsy is one of the most common neurological disorders globally, affecting millions of individuals. Despite significant advancements, the precise mechanisms underlying this condition remain largely unknown, making accurately predicting and preventing epileptic seizures challenging. In this paper, we employ a bistable model, where a stable equilibrium and a stable limit cycle coexist, to describ…
▽ More
Epilepsy is one of the most common neurological disorders globally, affecting millions of individuals. Despite significant advancements, the precise mechanisms underlying this condition remain largely unknown, making accurately predicting and preventing epileptic seizures challenging. In this paper, we employ a bistable model, where a stable equilibrium and a stable limit cycle coexist, to describe epileptic dynamics. The equilibrium captures normal steady-state neural activity, while the stable limit cycle signifies seizure-like oscillations. The noise-driven switch from the equilibrium to the limit cycle characterizes the onset of seizures. The differences in the regions of attraction of these two stable states distinguish epileptic brain dynamics from healthy ones. We analytically construct the regions of attraction for both states. Further, using the notion of input-to-state stability, we theoretically show how the regions of attraction influence the stability of the system subject to external perturbations. Generalizing the bistable system into coupled networks, we also find the role of network parameters in sha** the regions of attraction. Our findings shed light on the intricate interplay between brain networks and epileptic activity, offering mechanistic insights into potential avenues for more predictable treatments.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
Denoising Diffusion-Based Control of Nonlinear Systems
Authors:
Karthik Elamvazhuthi,
Darshan Gadginmath,
Fabio Pasqualetti
Abstract:
We propose a novel approach based on Denoising Diffusion Probabilistic Models (DDPMs) to control nonlinear dynamical systems. DDPMs are the state-of-art of generative models that have achieved success in a wide variety of sampling tasks. In our framework, we pose the feedback control problem as a generative task of drawing samples from a target set under control system constraints. The forward pro…
▽ More
We propose a novel approach based on Denoising Diffusion Probabilistic Models (DDPMs) to control nonlinear dynamical systems. DDPMs are the state-of-art of generative models that have achieved success in a wide variety of sampling tasks. In our framework, we pose the feedback control problem as a generative task of drawing samples from a target set under control system constraints. The forward process of DDPMs constructs trajectories originating from a target set by adding noise. We learn to control a dynamical system in reverse such that the terminal state belongs to the target set. For control-affine systems without drift, we prove that the control system can exactly track the trajectory of the forward process in reverse, whenever the the Lie bracket based condition for controllability holds. We numerically study our approach on various nonlinear systems and verify our theoretical results. We also conduct numerical experiments for cases beyond our theoretical results on a physics-engine.
△ Less
Submitted 3 February, 2024;
originally announced February 2024.
-
Noise in the reverse process improves the approximation capabilities of diffusion models
Authors:
Karthik Elamvazhuthi,
Samet Oymak,
Fabio Pasqualetti
Abstract:
In Score based Generative Modeling (SGMs), the state-of-the-art in generative modeling, stochastic reverse processes are known to perform better than their deterministic counterparts. This paper delves into the heart of this phenomenon, comparing neural ordinary differential equations (ODEs) and neural stochastic differential equations (SDEs) as reverse processes. We use a control theoretic perspe…
▽ More
In Score based Generative Modeling (SGMs), the state-of-the-art in generative modeling, stochastic reverse processes are known to perform better than their deterministic counterparts. This paper delves into the heart of this phenomenon, comparing neural ordinary differential equations (ODEs) and neural stochastic differential equations (SDEs) as reverse processes. We use a control theoretic perspective by posing the approximation of the reverse process as a trajectory tracking problem. We analyze the ability of neural SDEs to approximate trajectories of the Fokker-Planck equation, revealing the advantages of stochasticity. First, neural SDEs exhibit a powerful regularizing effect, enabling $L^2$ norm trajectory approximation surpassing the Wasserstein metric approximation achieved by neural ODEs under similar conditions, even when the reference vector field or score function is not Lipschitz. Applying this result, we establish the class of distributions that can be sampled using score matching in SGMs, relaxing the Lipschitz requirement on the gradient of the data distribution in existing literature. Second, we show that this approximation property is preserved when network width is limited to the input dimension of the network. In this limited width case, the weights act as control inputs, framing our analysis as a controllability problem for neural SDEs in probability density space. This sheds light on how noise helps to steer the system towards the desired solution and illuminates the empirical success of stochasticity in generative modeling.
△ Less
Submitted 13 December, 2023; v1 submitted 12 December, 2023;
originally announced December 2023.
-
Fusing Multiple Algorithms for Heterogeneous Online Learning
Authors:
Darshan Gadginmath,
Shivanshu Tripathi,
Fabio Pasqualetti
Abstract:
This study addresses the challenge of online learning in contexts where agents accumulate disparate data, face resource constraints, and use different local algorithms. This paper introduces the Switched Online Learning Algorithm (SOLA), designed to solve the heterogeneous online learning problem by amalgamating updates from diverse agents through a dynamic switching mechanism contingent upon thei…
▽ More
This study addresses the challenge of online learning in contexts where agents accumulate disparate data, face resource constraints, and use different local algorithms. This paper introduces the Switched Online Learning Algorithm (SOLA), designed to solve the heterogeneous online learning problem by amalgamating updates from diverse agents through a dynamic switching mechanism contingent upon their respective performance and available resources. We theoretically analyze the design of the selecting mechanism to ensure that the regret of SOLA is bounded. Our findings show that the number of changes in selection needs to be bounded by a parameter dependent on the performance of the different local algorithms. Additionally, two test cases are presented to emphasize the effectiveness of SOLA, first on an online linear regression problem and then on an online classification problem with the MNIST dataset.
△ Less
Submitted 8 December, 2023;
originally announced December 2023.
-
Feedback linearization through the lens of data
Authors:
C. De Persis,
D. Gadginmath,
F. Pasqualetti,
P. Tesi
Abstract:
Controlling nonlinear systems, especially when data are being used to offset uncertainties in the model, is hard. A natural approach when dealing with the challenges of nonlinear control is to reduce the system to a linear one via change of coordinates and feedback, an approach commonly known as feedback linearization. Here we consider the feedback linearization problem of an unknown system when t…
▽ More
Controlling nonlinear systems, especially when data are being used to offset uncertainties in the model, is hard. A natural approach when dealing with the challenges of nonlinear control is to reduce the system to a linear one via change of coordinates and feedback, an approach commonly known as feedback linearization. Here we consider the feedback linearization problem of an unknown system when the solution must be found using experimental data. We propose a new method that learns the change of coordinates and the linearizing controller from a library (a dictionary) of candidate functions with a simple algebraic procedure - the computation of the null space of a data-dependent matrix. Remarkably, we show that the solution is valid over the entire state space of interest and not just on the dataset used to determine the solution.
△ Less
Submitted 24 June, 2024; v1 submitted 22 August, 2023;
originally announced August 2023.
-
Vibrational Stabilization of Cluster Synchronization in Oscillator Networks
Authors:
Yuzhen Qin,
Alberto Maria Nobili,
Danielle S. Bassett,
Fabio Pasqualetti
Abstract:
Cluster synchronization is of paramount importance for the normal functioning of numerous technological and natural systems. Deviations from normal cluster synchronization patterns are closely associated with various malfunctions, such as neurological disorders in the brain. Therefore, it is crucial to restore normal system functions by stabilizing the appropriate cluster synchronization patterns.…
▽ More
Cluster synchronization is of paramount importance for the normal functioning of numerous technological and natural systems. Deviations from normal cluster synchronization patterns are closely associated with various malfunctions, such as neurological disorders in the brain. Therefore, it is crucial to restore normal system functions by stabilizing the appropriate cluster synchronization patterns. Most existing studies focus on designing controllers based on state measurements to achieve system stabilization. However, in many real-world scenarios, measuring system states, such as neuronal activity in the brain, poses significant challenges, rendering the stabilization of such systems difficult. To overcome this challenge, in this paper, we employ an open-loop control strategy, vibrational control, which does not requires any state measurements. We establish some sufficient conditions under which vibrational inputs stabilize cluster synchronization. Further, we provide a tractable approach to design vibrational control. Finally, numerical experiments are conducted to demonstrate our theoretical findings.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Vibrational Stabilization of Complex Network Systems
Authors:
Alberto Maria Nobili,
Yuzhen Qin,
Carlo Alberto Avizzano,
Danielle S. Bassett,
Fabio Pasqualetti
Abstract:
Many natural and man-made network systems need to maintain certain patterns, such as working at equilibria or limit cycles, to function properly. Thus, the ability to stabilize such patterns is crucial. Most of the existing studies on stabilization assume that network systems states can be measured online so that feedback control strategies can be used. However, in many real-world scenarios, syste…
▽ More
Many natural and man-made network systems need to maintain certain patterns, such as working at equilibria or limit cycles, to function properly. Thus, the ability to stabilize such patterns is crucial. Most of the existing studies on stabilization assume that network systems states can be measured online so that feedback control strategies can be used. However, in many real-world scenarios, systems states, e.g., neuronal activity in the brain, are often difficult to measure. In this paper, we take this situation into account and study the stabilization problem of linear network systems with an open-loop control strategy (vibrational control). We derive a graph-theoretic sufficient condition for structural vibrational stabilizability, under which network systems can always be stabilized. We further provide an approach to select the locations in the network for control placement and design corresponding vibrational inputs to stabilize systems that satisfy this condition. Finally, we provide some numerical results that demonstrate the validity of our theoretical findings.
△ Less
Submitted 10 August, 2023;
originally announced August 2023.
-
Learning on Manifolds: Universal Approximations Properties using Geometric Controllability Conditions for Neural ODEs
Authors:
Karthik Elamvazhuthi,
Xuechen Zhang,
Samet Oymak,
Fabio Pasqualetti
Abstract:
In numerous robotics and mechanical engineering applications, among others, data is often constrained on smooth manifolds due to the presence of rotational degrees of freedom. Common datadriven and learning-based methods such as neural ordinary differential equations (ODEs), however, typically fail to satisfy these manifold constraints and perform poorly for these applications. To address this sho…
▽ More
In numerous robotics and mechanical engineering applications, among others, data is often constrained on smooth manifolds due to the presence of rotational degrees of freedom. Common datadriven and learning-based methods such as neural ordinary differential equations (ODEs), however, typically fail to satisfy these manifold constraints and perform poorly for these applications. To address this shortcoming, in this paper we study a class of neural ordinary differential equations that, by design, leave a given manifold invariant, and characterize their properties by leveraging the controllability properties of control affine systems. In particular, using a result due to Agrachev and Caponigro on approximating diffeomorphisms with flows of feedback control systems, we show that any map that can be represented as the flow of a manifold-constrained dynamical system can also be approximated using the flow of manifold-constrained neural ODE, whenever a certain controllability condition is satisfied. Additionally, we show that this universal approximation property holds when the neural ODE has limited width in each layer, thus leveraging the depth of network instead for approximation. We verify our theoretical findings using numerical experiments on PyTorch for the manifolds S2 and the 3-dimensional orthogonal group SO(3), which are model manifolds for mechanical systems such as spacecrafts and satellites. We also compare the performance of the manifold invariant neural ODE with classical neural ODEs that ignore the manifold invariant properties and show the superiority of our approach in terms of accuracy and sample complexity.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
Model-based and Data-based Dynamic Output Feedback for Externally Positive Systems
Authors:
Abed AlRahman Al Makdah,
Fabio Pasqualetti
Abstract:
In this work, we derive dynamic output-feedback controllers that render the closed-loop system externally positive. We begin by expressing the class of discrete-time, linear, time-invariant systems and the class of dynamic controllers in the space of input-output behaviors, where a dynamic controller can be expressed as a static behavioral feedback gain. We leverage the static form of the controll…
▽ More
In this work, we derive dynamic output-feedback controllers that render the closed-loop system externally positive. We begin by expressing the class of discrete-time, linear, time-invariant systems and the class of dynamic controllers in the space of input-output behaviors, where a dynamic controller can be expressed as a static behavioral feedback gain. We leverage the static form of the controller to derive output-feedback controllers that achieve monotonic output tracking of a constant non-negative reference output. Further, we provide a direct data-driven approach to derive monotonic tracking output-feedback controllers for single-input-single-output (SISO) systems. Our approaches, model-based and data-based, allow us to obtain output-feedback controllers that render the closed-loop system externally positive. Finally, we validate our results numerically in a drone landing control problem.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
On the Sample Complexity of the Linear Quadratic Gaussian Regulator
Authors:
Abed AlRahman Al Makdah,
Fabio Pasqualetti
Abstract:
In this paper we provide direct data-driven expressions for the Linear Quadratic Regulator (LQR), the Kalman filter, and the Linear Quadratic Gaussian (LQG) controller using a finite dataset of noisy input, state, and output trajectories. We show that our data-driven expressions are consistent, since they converge as the number of experimental trajectories increases, we characterize their converge…
▽ More
In this paper we provide direct data-driven expressions for the Linear Quadratic Regulator (LQR), the Kalman filter, and the Linear Quadratic Gaussian (LQG) controller using a finite dataset of noisy input, state, and output trajectories. We show that our data-driven expressions are consistent, since they converge as the number of experimental trajectories increases, we characterize their convergence rate, and quantify their error as a function of the system and data properties. These results complement the body of literature on data-driven control and finite-sample analysis, and provide new ways to solve canonical control and estimation problems that do not assume, nor require the estimation of, a model of the system and noise and do not rely on solving implicit equations.
△ Less
Submitted 19 September, 2023; v1 submitted 1 April, 2023;
originally announced April 2023.
-
Data-driven Eigenstructure Assignment for Sparse Feedback Design
Authors:
Federico Celi,
Giacomo Baggio,
Fabio Pasqualetti
Abstract:
This paper presents a novel approach for solving the pole placement and eigenstructure assignment problems through data-driven methods. By using open-loop data alone, the paper shows that it is possible to characterize the allowable eigenvector subspaces, as well as the set of feedback gains that solve the pole placement problem. Additionally, the paper proposes a closed-form expression for the fe…
▽ More
This paper presents a novel approach for solving the pole placement and eigenstructure assignment problems through data-driven methods. By using open-loop data alone, the paper shows that it is possible to characterize the allowable eigenvector subspaces, as well as the set of feedback gains that solve the pole placement problem. Additionally, the paper proposes a closed-form expression for the feedback gain that solves the eigenstructure assignment problem. Finally, the paper discusses a series of optimization problems aimed at finding sparse feedback gains for the pole placement problem.
△ Less
Submitted 31 March, 2023;
originally announced March 2023.
-
Imitation and Transfer Learning for LQG Control
Authors:
Taosha Guo,
Abed AlRahman Al Makdah,
Vishaal Krishnan,
Fabio Pasqualetti
Abstract:
In this paper we study an imitation and transfer learning setting for Linear Quadratic Gaussian (LQG) control, where (i) the system dynamics, noise statistics and cost function are unknown and expert data is provided (that is, sequences of optimal inputs and outputs) to learn the LQG controller, and (ii) multiple control tasks are performed for the same system but with different LQG costs. We show…
▽ More
In this paper we study an imitation and transfer learning setting for Linear Quadratic Gaussian (LQG) control, where (i) the system dynamics, noise statistics and cost function are unknown and expert data is provided (that is, sequences of optimal inputs and outputs) to learn the LQG controller, and (ii) multiple control tasks are performed for the same system but with different LQG costs. We show that the LQG controller can be learned from a set of expert trajectories of length $n(l+2)-1$, with $n$ and $l$ the dimension of the system state and output, respectively. Further, the controller can be decomposed as the product of an estimation matrix, which depends only on the system dynamics, and a control matrix, which depends on the LQG cost. This data-based separation principle allows us to transfer the estimation matrix across different LQG tasks, and to reduce the length of the expert trajectories needed to learn the LQG controller to~$2n+m-1$ with $m$ the dimension of the inputs (for single-input systems with $l=2$, this yields approximately a $50\%$ reduction of the required expert data).
△ Less
Submitted 22 June, 2023; v1 submitted 15 March, 2023;
originally announced March 2023.
-
Multi-Task System Identification of Similar Linear Time-Invariant Dynamical Systems
Authors:
Yiting Chen,
Ana M. Ospina,
Fabio Pasqualetti,
Emiliano Dall'Anese
Abstract:
This paper presents a system identification framework -- inspired by multi-task learning -- to estimate the dynamics of a given number of linear time-invariant (LTI) systems jointly by leveraging structural similarities across the systems. In particular, we consider LTI systems that model networked systems with similar connectivity, or LTI systems with small differences in their matrices. The syst…
▽ More
This paper presents a system identification framework -- inspired by multi-task learning -- to estimate the dynamics of a given number of linear time-invariant (LTI) systems jointly by leveraging structural similarities across the systems. In particular, we consider LTI systems that model networked systems with similar connectivity, or LTI systems with small differences in their matrices. The system identification task involves the minimization of the least-squares (LS) fit for individual systems, augmented with a regularization function that enforces structural similarities. The proposed method is particularly suitable for cases when the recorded trajectories for one or more LTI systems are not sufficiently rich, leading to ill-conditioning of LS methods. We analyze the performance of the proposed method when the matrices of the LTI systems feature a common sparsity pattern (i.e., similar connectivity), and provide simulations based on real data for the estimation of the brain dynamics. We show that the proposed method requires a significantly smaller number of fMRI scans to achieve similar error levels of the LS.
△ Less
Submitted 9 September, 2023; v1 submitted 3 January, 2023;
originally announced January 2023.
-
Data-Driven Feedback Linearization using the Koopman Generator
Authors:
Darshan Gadginmath,
Vishaal Krishnan,
Fabio Pasqualetti
Abstract:
This paper contributes a theoretical framework for data-driven feedback linearization of nonlinear control-affine systems. We unify the traditional geometric perspective on feedback linearization with an operator-theoretic perspective involving the Koopman operator. We first show that if the distribution of the control vector field and its repeated Lie brackets with the drift vector field is invol…
▽ More
This paper contributes a theoretical framework for data-driven feedback linearization of nonlinear control-affine systems. We unify the traditional geometric perspective on feedback linearization with an operator-theoretic perspective involving the Koopman operator. We first show that if the distribution of the control vector field and its repeated Lie brackets with the drift vector field is involutive, then there exists an output and a feedback control law for which the Koopman generator is finite-dimensional and locally nilpotent. We use this connection to propose a data-driven algorithm Koopman Generator-based Feedback Linearization (KGFL) for feedback linearization. Particularly, we use experimental data to identify the state transformation and control feedback from a dictionary of functions for which feedback linearization is achieved in a least-squares sense. We also propose a single-step data-driven formula which can be used to compute the linearizing transformations. When the system is feedback linearizable and the chosen dictionary is complete, our data-driven algorithm provides the same solution as model-based feedback linearization. Finally, we provide numerical examples for the data-driven algorithm and compare it with model-based feedback linearization. We also numerically study the effect of the richness of the dictionary and the size of the data set on the effectiveness of feedback linearization.
△ Less
Submitted 7 November, 2023; v1 submitted 10 October, 2022;
originally announced October 2022.
-
Direct vs Indirect Methods for Behavior-based Attack Detection
Authors:
Darshan Gadginmath,
Vishaal Krishnan,
Fabio Pasqualetti
Abstract:
We study the problem of data-driven attack detection for unknown LTI systems using only input-output behavioral data. In contrast with model-based detectors that use errors from an output predictor to detect attacks, we study behavior-based data-driven detectors. We construct a behavior-based chi-squared detector that uses a sequence of inputs and outputs and their covariance. The covariance of th…
▽ More
We study the problem of data-driven attack detection for unknown LTI systems using only input-output behavioral data. In contrast with model-based detectors that use errors from an output predictor to detect attacks, we study behavior-based data-driven detectors. We construct a behavior-based chi-squared detector that uses a sequence of inputs and outputs and their covariance. The covariance of the behaviors is estimated using data by two methods. The first (direct) method employs the sample covariance as an estimate of the covariance of behaviors. The second (indirect) method uses a lower dimensional generative model identified from data to estimate the covariance of behaviors. We prove the consistency of the two methods of estimation and provide finite sample error bounds. Finally, we numerically compare the performance and establish a tradeoff between the methods at different regimes of the size of the data set and the length of the detection horizon. Our numerical study indicates that neither method is invariable superior, and reveals the existence of two regimes for the performance of the two methods, wherein the direct method is superior in cases with large data sets relative to the length of the detection horizon, while the indirect method is superior in cases with small data sets.
△ Less
Submitted 15 September, 2022;
originally announced September 2022.
-
Behavioral Feedback for Optimal LQG Control
Authors:
Abed AlRahman Al Makdah,
Vishaal Krishnan,
Vaibhav Katewa,
Fabio Pasqualetti
Abstract:
In this work, we revisit the Linear Quadratic Gaussian (LQG) optimal control problem from a behavioral perspective. Motivated by the suitability of behavioral models for data-driven control, we begin with a reformulation of the LQG problem in the space of input-output behaviors and obtain a complete characterization of the optimal solutions. In particular, we show that the optimal LQG controller c…
▽ More
In this work, we revisit the Linear Quadratic Gaussian (LQG) optimal control problem from a behavioral perspective. Motivated by the suitability of behavioral models for data-driven control, we begin with a reformulation of the LQG problem in the space of input-output behaviors and obtain a complete characterization of the optimal solutions. In particular, we show that the optimal LQG controller can be expressed as a static behavioral-feedback gain, thereby eliminating the need for dynamic state estimation characteristic of state space methods. The static form of the optimal LQG gain also makes it amenable to its computation by gradient descent, which we investigate via numerical experiments. Furthermore, we highlight the advantage of this approach in the data-driven control setting of learning the optimal LQG controller from expert demonstrations.
△ Less
Submitted 19 September, 2022; v1 submitted 1 April, 2022;
originally announced April 2022.
-
Vibrational Control of Cluster Synchronization: Connections with Deep Brain Stimulation
Authors:
Yuzhen Qin,
Danielle S. Bassett,
Fabio Pasqualetti
Abstract:
Cluster synchronization underlies various functions in the brain. Abnormal patterns of cluster synchronization are often associated with neurological disorders. Deep brain stimulation (DBS) is a neurosurgical technique used to treat several brain diseases, which has been observed to regulate neuronal synchrony patterns. Despite its widespread use, the mechanisms of DBS remain largely unknown. In t…
▽ More
Cluster synchronization underlies various functions in the brain. Abnormal patterns of cluster synchronization are often associated with neurological disorders. Deep brain stimulation (DBS) is a neurosurgical technique used to treat several brain diseases, which has been observed to regulate neuronal synchrony patterns. Despite its widespread use, the mechanisms of DBS remain largely unknown. In this paper, we hypothesize that DBS plays a role similar to vibrational control since they both highly rely on high-frequency excitation to function. Under the framework of Kuramoto-oscillator networks, we study how vibrations introduced to network connections can stabilize cluster synchronization. We derive some sufficient conditions and also provide an effective approach to design vibrational control. Also, a numerical example is presented to demonstrate our theoretical findings.
△ Less
Submitted 5 April, 2022; v1 submitted 1 April, 2022;
originally announced April 2022.
-
Non-Stationary Representation Learning in Sequential Linear Bandits
Authors:
Yuzhen Qin,
Tommaso Menara,
Samet Oymak,
ShiNung Ching,
Fabio Pasqualetti
Abstract:
In this paper, we study representation learning for multi-task decision-making in non-stationary environments. We consider the framework of sequential linear bandits, where the agent performs a series of tasks drawn from distinct sets associated with different environments. The embeddings of tasks in each set share a low-dimensional feature extractor called representation, and representations are…
▽ More
In this paper, we study representation learning for multi-task decision-making in non-stationary environments. We consider the framework of sequential linear bandits, where the agent performs a series of tasks drawn from distinct sets associated with different environments. The embeddings of tasks in each set share a low-dimensional feature extractor called representation, and representations are different across sets. We propose an online algorithm that facilitates efficient decision-making by learning and transferring non-stationary representations in an adaptive fashion. We prove that our algorithm significantly outperforms the existing ones that treat tasks independently. We also conduct experiments using both synthetic and real data to validate our theoretical insights and demonstrate the efficacy of our algorithm.
△ Less
Submitted 16 April, 2022; v1 submitted 13 January, 2022;
originally announced January 2022.
-
Data-driven Meets Geometric Control: Zero Dynamics, Subspace Stabilization, and Malicious Attacks
Authors:
Federico Celi,
Fabio Pasqualetti
Abstract:
Studying structural properties of linear dynamical systems through invariant subspaces is one of the key contributions of the geometric approach to system theory. In general, a model of the dynamics is required in order to compute the invariant subspaces of interest. In this paper we overcome this limitation by finding data-driven formulas for some of the foundational tools of geometric control. I…
▽ More
Studying structural properties of linear dynamical systems through invariant subspaces is one of the key contributions of the geometric approach to system theory. In general, a model of the dynamics is required in order to compute the invariant subspaces of interest. In this paper we overcome this limitation by finding data-driven formulas for some of the foundational tools of geometric control. In particular, for an unknown linear system, we show how controlled and conditioned invariant subspaces can be found directly from experimental data. We use our formulas and approach to (i) find a feedback gain that confines the system state within a desired subspace, (ii) compute the invariant zeros of the unknown system, and (iii) design attacks that remain undetectable.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
Learning Lipschitz Feedback Policies from Expert Demonstrations: Closed-Loop Guarantees, Generalization and Robustness
Authors:
Abed AlRahman Al Makdah,
Vishaal Krishnan,
Fabio Pasqualetti
Abstract:
In this work, we propose a framework to learn feedback control policies with guarantees on closed-loop generalization and adversarial robustness. These policies are learned directly from expert demonstrations, contained in a dataset of state-control input pairs, without any prior knowledge of the task and system model. We use a Lipschitz-constrained loss minimization scheme to learn feedback polic…
▽ More
In this work, we propose a framework to learn feedback control policies with guarantees on closed-loop generalization and adversarial robustness. These policies are learned directly from expert demonstrations, contained in a dataset of state-control input pairs, without any prior knowledge of the task and system model. We use a Lipschitz-constrained loss minimization scheme to learn feedback policies with certified closed-loop robustness, wherein the Lipschitz constraint serves as a mechanism to tune the generalization performance and robustness to adversarial disturbances. Our analysis exploits the Lipschitz property to obtain closed-loop guarantees on generalization and robustness of the learned policies. In particular, we derive a finite sample bound on the policy learning error and establish robust closed-loop stability under the learned control policy. We also derive bounds on the closed-loop regret with respect to the expert policy and the deterioration of closed-loop performance under bounded (adversarial) disturbances to the state measurements. Numerical results validate our analysis and demonstrate the effectiveness of our robust feedback policy learning framework. Finally, our results suggest the existence of a potential tradeoff between nominal closed-loop performance and adversarial robustness, and that improvements in nominal closed-loop performance can only be made at the expense of robustness to adversarial perturbations.
△ Less
Submitted 20 January, 2022; v1 submitted 30 March, 2021;
originally announced March 2021.
-
On Direct vs Indirect Data-Driven Predictive Control
Authors:
Vishaal Krishnan,
Fabio Pasqualetti
Abstract:
In this work, we compare the direct and indirect approaches to data-driven predictive control of stochastic linear time-invariant systems. The distinction between the two approaches lies in the fact that the indirect approach involves identifying a lower dimensional model from data which is then used in a certainty-equivalent control design, while the direct approach avoids this intermediate step…
▽ More
In this work, we compare the direct and indirect approaches to data-driven predictive control of stochastic linear time-invariant systems. The distinction between the two approaches lies in the fact that the indirect approach involves identifying a lower dimensional model from data which is then used in a certainty-equivalent control design, while the direct approach avoids this intermediate step altogether. Working within an optimization-based framework, we find that the suboptimality gap measuring the control performance w.r.t. the optimal model-based control design vanishes with the size of the dataset only with the direct approach. The indirect approach has a higher rate of convergence, but its suboptimality gap does not vanish as the size of the dataset increases. This reveals the existence of two distinct regimes of performance as the size of the dataset of input-output behaviors is increased. We show that the indirect approach, by relying on the identification of a lower dimensional model, has lower variance and outperforms the direct approach for smaller datasets, while it incurs an asymptotic bias as a result of the process noise and a (possibly) incorrect assumption on the order of the identified model. The direct approach, however, does not incur an asymptotic bias, and outperforms the indirect approach for larger datasets. Ultimately, by revealing the existence of two non-asymptotic regimes for the performance of direct and indirect data-driven predictive control designs, our study suggests that neither approach is invariably superior and that the choice of design must, in practice, be informed by the available dataset.
△ Less
Submitted 8 April, 2021; v1 submitted 27 March, 2021;
originally announced March 2021.
-
Functional Control of Oscillator Networks
Authors:
Tommaso Menara,
Giacomo Baggio,
Danielle S. Bassett,
Fabio Pasqualetti
Abstract:
Oscillatory activity is ubiquitous in natural and engineered network systems. The interaction scheme underlying interdependent oscillatory components governs the emergence of network-wide patterns of synchrony that regulate and enable complex functions. Yet, understanding, and ultimately harnessing, the structure-function relationship in oscillator networks remains an outstanding challenge of mode…
▽ More
Oscillatory activity is ubiquitous in natural and engineered network systems. The interaction scheme underlying interdependent oscillatory components governs the emergence of network-wide patterns of synchrony that regulate and enable complex functions. Yet, understanding, and ultimately harnessing, the structure-function relationship in oscillator networks remains an outstanding challenge of modern science. Here, we address this challenge by presenting a principled method to prescribe exact and robust functional configurations from local network interactions through optimal tuning of the oscillators' parameters. To quantify the behavioral synchrony between coupled oscillators, we introduce the notion of functional pattern, which encodes the pairwise relationships between the oscillators' phases. Our procedure is computationally efficient and provably correct, accounts for constrained interaction types, and allows to concurrently assign multiple desired functional patterns. Further, we derive algebraic and graph-theoretic conditions to guarantee the feasibility and stability of target functional patterns. These conditions provide an interpretable map** between the structural constraints and their functional implications in oscillator networks. As a proof of concept, we apply the proposed method to replicate empirically recorded functional relationships from cortical oscillations in a human brain, and to redistribute the active power flow in different models of electrical grids.
△ Less
Submitted 10 February, 2022; v1 submitted 16 February, 2021;
originally announced February 2021.
-
Phase-Amplitude Coupling in Neuronal Oscillator Networks
Authors:
Yuzhen Qin,
Tommaso Menara,
Danielle S. Bassett,
Fabio Pasqualetti
Abstract:
Phase-amplitude coupling (PAC) describes the phenomenon where the power of a high-frequency oscillation evolves with the phase of a low-frequency one. We propose a model that explains the emergence of PAC in two commonly-accepted architectures in the brain, namely, a high-frequency neural oscillation driven by an external low-frequency input and two interacting local oscillations with distinct, lo…
▽ More
Phase-amplitude coupling (PAC) describes the phenomenon where the power of a high-frequency oscillation evolves with the phase of a low-frequency one. We propose a model that explains the emergence of PAC in two commonly-accepted architectures in the brain, namely, a high-frequency neural oscillation driven by an external low-frequency input and two interacting local oscillations with distinct, locally-generated frequencies. We further propose an interconnection structure for brain regions and demonstrate that low-frequency phase synchrony can integrate high-frequency activities regulated by local PAC and control the direction of information flow across distant regions.
△ Less
Submitted 8 December, 2020;
originally announced December 2020.
-
Habit learning supported by efficiently controlled network dynamics in naive macaque monkeys
Authors:
Karol P. Szymula,
Fabio Pasqualetti,
Ann M. Graybiel,
Theresa M. Desrochers,
Danielle S. Bassett
Abstract:
Primates display a marked ability to learn habits in uncertain and dynamic environments. The associated perceptions and actions of such habits engage distributed neural circuits. Yet, precisely how such circuits support the computations necessary for habit learning remain far from understood. Here we construct a formal theory of network energetics to account for how changes in brain state produce…
▽ More
Primates display a marked ability to learn habits in uncertain and dynamic environments. The associated perceptions and actions of such habits engage distributed neural circuits. Yet, precisely how such circuits support the computations necessary for habit learning remain far from understood. Here we construct a formal theory of network energetics to account for how changes in brain state produce changes in sequential behavior. We exercise the theory in the context of multi-unit recordings spanning the caudate nucleus, prefrontal cortex, and frontal eyefields of female macaque monkeys engaged in 60-180 sessions of a free scan task that induces motor habits. The theory relies on the determination of effective connectivity between recording channels, and on the stipulation that a brain state is taken to be the trial-specific firing rate across those channels. The theory then predicts how much energy will be required to transition from one state into another, given the constraint that activity can spread solely through effective connections. Consistent with the theory's predictions, we observed smaller energy requirements for transitions between more similar and more complex trial saccade patterns, and for sessions characterized by less entropic selection of saccade patterns. Using a virtual lesioning approach, we demonstrate the resilience of the observed relationships between minimum control energy and behavior to significant disruptions in the inferred effective connectivity. Our theoretically principled approach to the study of habit learning paves the way for future efforts examining how behavior arises from changing patterns of activity in distributed neural circuitry.
△ Less
Submitted 25 June, 2020;
originally announced June 2020.
-
On a Security vs Privacy Trade-off in Interconnected Dynamical Systems
Authors:
Vaibhav Katewa,
Rajasekhar Anguluri,
Fabio Pasqualetti
Abstract:
We study a security problem for interconnected systems, where each subsystem aims to detect local attacks using local measurements and information exchanged with neighboring subsystems. The subsystems also wish to maintain the privacy of their states and, therefore, use privacy mechanisms that share limited or noisy information with other subsystems. We quantify the privacy level based on the esti…
▽ More
We study a security problem for interconnected systems, where each subsystem aims to detect local attacks using local measurements and information exchanged with neighboring subsystems. The subsystems also wish to maintain the privacy of their states and, therefore, use privacy mechanisms that share limited or noisy information with other subsystems. We quantify the privacy level based on the estimation error of a subsystem's state and propose a novel framework to compare different mechanisms based on their privacy guarantees. We develop a local attack detection scheme without assuming the knowledge of the global dynamics, which uses local and shared information to detect attacks with provable guarantees. Additionally, we quantify a trade-off between security and privacy of the local subsystems. Interestingly, we show that, for some instances of the attack, the subsystems can achieve a better detection performance by being more private. We provide an explanation for this counter-intuitive behavior and illustrate our results through numerical examples.
△ Less
Submitted 23 June, 2020;
originally announced June 2020.
-
Learning Minimum-Energy Controls from Heterogeneous Data
Authors:
Giacomo Baggio,
Fabio Pasqualetti
Abstract:
In this paper we study the problem of learning minimum-energy controls for linear systems from heterogeneous data. Specifically, we consider datasets comprising input, initial and final state measurements collected using experiments with different time horizons and arbitrary initial conditions. In this setting, we first establish a general representation of input and sampled state trajectories of…
▽ More
In this paper we study the problem of learning minimum-energy controls for linear systems from heterogeneous data. Specifically, we consider datasets comprising input, initial and final state measurements collected using experiments with different time horizons and arbitrary initial conditions. In this setting, we first establish a general representation of input and sampled state trajectories of the system based on the available data. Then, we leverage this data-based representation to derive closed-form data-driven expressions of minimum-energy controls for a wide range of control horizons. Further, we characterize the minimum number of data required to reconstruct the minimum-energy inputs, and discuss the numerical properties of our expressions. Finally, we investigate the effect of noise on our data-driven formulas, and, in the case of noise with known second-order statistics, we provide corrected expressions that converge asymptotically to the true optimal control inputs.
△ Less
Submitted 18 June, 2020;
originally announced June 2020.
-
Lipschitz Bounds and Provably Robust Training by Laplacian Smoothing
Authors:
Vishaal Krishnan,
Abed AlRahman Al Makdah,
Fabio Pasqualetti
Abstract:
In this work we propose a graph-based learning framework to train models with provable robustness to adversarial perturbations. In contrast to regularization-based approaches, we formulate the adversarially robust learning problem as one of loss minimization with a Lipschitz constraint, and show that the saddle point of the associated Lagrangian is characterized by a Poisson equation with weighted…
▽ More
In this work we propose a graph-based learning framework to train models with provable robustness to adversarial perturbations. In contrast to regularization-based approaches, we formulate the adversarially robust learning problem as one of loss minimization with a Lipschitz constraint, and show that the saddle point of the associated Lagrangian is characterized by a Poisson equation with weighted Laplace operator. Further, the weighting for the Laplace operator is given by the Lagrange multiplier for the Lipschitz constraint, which modulates the sensitivity of the minimizer to perturbations. We then design a provably robust training scheme using graph-based discretization of the input space and a primal-dual algorithm to converge to the Lagrangian's saddle point. Our analysis establishes a novel connection between elliptic operators with constraint-enforced weighting and adversarial learning. We also study the complementary problem of improving the robustness of minimizers with a margin on their loss, formulated as a loss-constrained minimization problem of the Lipschitz constant. We propose a technique to obtain robustified minimizers, and evaluate fundamental Lipschitz lower bounds by approaching Lipschitz constant minimization via a sequence of gradient $p$-norm minimization problems. Ultimately, our results show that, for a desired nominal performance, there exists a fundamental lower bound on the sensitivity to adversarial perturbations that depends only on the loss function and the data distribution, and that improvements in robustness beyond this bound can only be made at the expense of nominal performance. Our training schemes provably achieve these bounds both under constraints on performance and~robustness.
△ Less
Submitted 22 October, 2020; v1 submitted 5 June, 2020;
originally announced June 2020.
-
Data-Driven Control of Complex Networks
Authors:
Giacomo Baggio,
Danielle S. Bassett,
Fabio Pasqualetti
Abstract:
Our ability to manipulate the behavior of complex networks depends on the design of efficient control algorithms and, critically, on the availability of an accurate and tractable model of the network dynamics. While the design of control algorithms for network systems has seen notable advances in the past few years, knowledge of the network dynamics is a ubiquitous assumption that is difficult to…
▽ More
Our ability to manipulate the behavior of complex networks depends on the design of efficient control algorithms and, critically, on the availability of an accurate and tractable model of the network dynamics. While the design of control algorithms for network systems has seen notable advances in the past few years, knowledge of the network dynamics is a ubiquitous assumption that is difficult to satisfy in practice, especially when the network topology is large and, possibly, time-varying. In this paper we overcome this limitation, and develop a data-driven framework to control a complex dynamical network optimally and without requiring any knowledge of the network dynamics. Our optimal controls are constructed using a finite set of experimental data, where the unknown complex network is stimulated with arbitrary and possibly random inputs. In addition to optimality, we show that our data-driven formulas enjoy favorable computational and numerical properties even compared to their model-based counterpart. Although our controls are provably correct for networks with linear dynamics, we also characterize their performance against noisy experimental data and in the presence of nonlinear dynamics, as they arise when mitigating cascading failures in power-grid networks and when manipulating neural activity in brain networks.
△ Less
Submitted 4 August, 2020; v1 submitted 26 March, 2020;
originally announced March 2020.
-
Navigation Systems May Deteriorate Stability in Traffic Networks
Authors:
Gianluca Bianchin,
Fabio Pasqualetti
Abstract:
Advanced traffic navigation systems, which provide routing recommendations to drivers based on real-time congestion information, are nowadays widely adopted by roadway transportation users. Yet, the emerging effects on the traffic dynamics originating from the widespread adoption of these tools have remained largely unexplored until now. In this paper, we propose a dynamic model where drivers imit…
▽ More
Advanced traffic navigation systems, which provide routing recommendations to drivers based on real-time congestion information, are nowadays widely adopted by roadway transportation users. Yet, the emerging effects on the traffic dynamics originating from the widespread adoption of these tools have remained largely unexplored until now. In this paper, we propose a dynamic model where drivers imitate the path preferences of previous drivers, and we study the properties of its equilibrium points. Our model is a dynamic generalization of the classical traffic assignment framework, and extends it by accounting for dynamics both in the path decision process and in the network's traffic flows. We show that when travelers learn shortest paths by imitating other travelers, the overall traffic system benefits from this mechanism and transfers the maximum admissible amount of traffic demand. On the other hand, we demonstrate that when the travel delay functions are not sufficiently steep or the rates at which drivers imitate previous travelers are not adequately chosen, the trajectories of the traffic system may fail to converge to an equilibrium point, thus failing asymptotic stability. Illustrative numerical simulations combined with empirical data from highway sensors illustrate our findings.
△ Less
Submitted 18 December, 2023; v1 submitted 22 March, 2020;
originally announced March 2020.
-
Network Theoretic Analysis of Maximum a Posteriori Detectors for Optimal Input Detection
Authors:
Rajasekhar Anguluri,
Vaibhav Katewa,
Sandip Roy,
Fabio Pasqualetti
Abstract:
This paper considers maximum-a-posteriori (MAP) and linear discriminant based MAP detectors to detect changes in the mean and covariance of a stochastic input, driving specific network nodes, using noisy measurements from sensors non-collocated with the input nodes. We explicitly characterize both detectors' performance in terms of the network edge weights and input and sensor nodes' location. In…
▽ More
This paper considers maximum-a-posteriori (MAP) and linear discriminant based MAP detectors to detect changes in the mean and covariance of a stochastic input, driving specific network nodes, using noisy measurements from sensors non-collocated with the input nodes. We explicitly characterize both detectors' performance in terms of the network edge weights and input and sensor nodes' location. In the asymptotic measurement regime, when the input and measurement noise are jointly Gaussian, we show that the detectors' performance can be studied using the input to output gain of the system's transfer function matrix. Using this result, we obtain conditions for which the detection performance associated with the sensors on a given network cut is better (or worse) than that of the sensors associated with the subnetwork induced by the cut and not containing the input nodes. Our results also provide structural insights into the sensor placement from a detection-theoretic viewpoint. We validate our theoretical findings via multiple numerical examples.
△ Less
Submitted 7 November, 2020; v1 submitted 18 February, 2020;
originally announced February 2020.
-
Accuracy Prevents Robustness in Perception-based Control
Authors:
Abed AlRahman Al Makdah,
Vaibhav Katewa,
Fabio Pasqualetti
Abstract:
In this paper we prove the existence of a fundamental trade-off between accuracy and robustness in perception-based control, where control decisions rely solely on data-driven, and often incompletely trained, perception maps. In particular, we consider a control problem where the state of the system is estimated from measurements extracted from a high-dimensional sensor, such as a camera. We assum…
▽ More
In this paper we prove the existence of a fundamental trade-off between accuracy and robustness in perception-based control, where control decisions rely solely on data-driven, and often incompletely trained, perception maps. In particular, we consider a control problem where the state of the system is estimated from measurements extracted from a high-dimensional sensor, such as a camera. We assume that a map between the camera's readings and the state of the system has been learned from a set of training data of finite size, from which the noise statistics are also estimated. We show that algorithms that maximize the estimation accuracy (as measured by the mean squared error) using the learned perception map tend to perform poorly in practice, where the sensor's statistics often differ from the learned ones. Conversely, increasing the variability and size of the training data leads to robust performance, however limiting the estimation accuracy, and thus the control performance, in nominal conditions. Ultimately, our work proves the existence and the implications of a fundamental trade-off between accuracy and robustness in perception-based control, which, more generally, affects a large class of machine learning and data-driven algorithms.
△ Less
Submitted 16 March, 2020; v1 submitted 30 September, 2019;
originally announced October 2019.
-
A Framework to Control Functional Connectivity in the Human Brain
Authors:
Tommaso Menara,
Giacomo Baggio,
Danielle S. Bassett,
Fabio Pasqualetti
Abstract:
In this paper, we propose a framework to control brain-wide functional connectivity by selectively acting on the brain's structure and parameters. Functional connectivity, which measures the degree of correlation between neural activities in different brain regions, can be used to distinguish between healthy and certain diseased brain dynamics and, possibly, as a control parameter to restore healt…
▽ More
In this paper, we propose a framework to control brain-wide functional connectivity by selectively acting on the brain's structure and parameters. Functional connectivity, which measures the degree of correlation between neural activities in different brain regions, can be used to distinguish between healthy and certain diseased brain dynamics and, possibly, as a control parameter to restore healthy functions. In this work, we use a collection of interconnected Kuramoto oscillators to model oscillatory neural activity, and show that functional connectivity is essentially regulated by the degree of synchronization between different clusters of oscillators. Then, we propose a minimally invasive method to correct the oscillators' interconnections and frequencies to enforce arbitrary and stable synchronization patterns among the oscillators and, consequently, a desired pattern of functional connectivity. Additionally, we show that our synchronization-based framework is robust to parameter mismatches and numerical inaccuracies, and validate it using a realistic neurovascular model to simulate neural activity and functional connectivity in the human brain.
△ Less
Submitted 19 September, 2019; v1 submitted 18 April, 2019;
originally announced April 2019.
-
Resilience of Traffic Networks with Partially Controlled Routing
Authors:
Gianluca Bianchin,
Fabio Pasqualetti,
Soumya Kundu
Abstract:
This paper investigates the use of Infrastructure-To-Vehicle (I2V) communication to generate routing suggestions for drivers in transportation systems, with the goal of optimizing a measure of overall network congestion. We define link-wise levels of trust to tolerate the non-cooperative behavior of part of the driver population, and we propose a real-time optimization mechanism that adapts to the…
▽ More
This paper investigates the use of Infrastructure-To-Vehicle (I2V) communication to generate routing suggestions for drivers in transportation systems, with the goal of optimizing a measure of overall network congestion. We define link-wise levels of trust to tolerate the non-cooperative behavior of part of the driver population, and we propose a real-time optimization mechanism that adapts to the instantaneous network conditions and to sudden changes in the levels of trust. Our framework allows us to quantify the improvement in travel time in relation to the degree at which drivers follow the routing suggestions. We then study the resilience of the system, measured as the smallest change in routing choices that results in roads reaching their maximum capacity. Interestingly, our findings suggest that fluctuations in the extent to which drivers follow the provided routing suggestions can cause failures of certain links. These results imply that the benefits of using Infrastructure-To-Vehicle communication come at the cost of new fragilities, that should be appropriately addressed in order to guarantee the reliable operation of the infrastructure.
△ Less
Submitted 16 April, 2019;
originally announced April 2019.
-
Centralized Versus Decentralized Detection of Attacks in Stochastic Interconnected Systems
Authors:
Rajasekhar Anguluri,
Vaibhav Katewa,
Fabio Pasqualetti
Abstract:
We consider a security problem for interconnected systems governed by linear, discrete, time-invariant, stochastic dynamics, where the objective is to detect exogenous attacks by processing the measurements at different locations. We consider two classes of detectors, namely centralized and decentralized detectors, which differ primarily in their knowledge of the system model. In particular, a dec…
▽ More
We consider a security problem for interconnected systems governed by linear, discrete, time-invariant, stochastic dynamics, where the objective is to detect exogenous attacks by processing the measurements at different locations. We consider two classes of detectors, namely centralized and decentralized detectors, which differ primarily in their knowledge of the system model. In particular, a decentralized detector has a model of the dynamics of the isolated subsystems, but is unaware of the interconnection signals that are exchanged among subsystems. Instead, a centralized detector has a model of the entire dynamical system. We characterize the performance of the two detectors and show that, depending on the system and attack parameters, each of the detectors can outperform the other. In particular, it may be possible for the decentralized detector to outperform its centralized counterpart, despite having less information about the system dynamics, and this surprising property is due to the nature of the considered attack detection problem. To complement our results on the detection of attacks, we propose and solve an optimization problem to design attacks that maximally degrade the system performance while maintaining a pre-specified degree of detectability. Finally, we validate our findings via numerical studies on an electric power system.
△ Less
Submitted 24 March, 2019;
originally announced March 2019.
-
Secure Trajectory Planning Against Undetectable Spoofing Attacks
Authors:
Yin-Chen Liu,
Gianluca Bianchin,
Fabio Pasqualetti
Abstract:
This paper studies, for the first time, the trajectory planning problem in adversarial environments, where the objective is to design the trajectory of a robot to reach a desired final state despite the unknown and arbitrary action of an attacker. In particular, we consider a robot moving in a two-dimensional space and equipped with two sensors, namely, a Global Navigation Satellite System (GNSS)…
▽ More
This paper studies, for the first time, the trajectory planning problem in adversarial environments, where the objective is to design the trajectory of a robot to reach a desired final state despite the unknown and arbitrary action of an attacker. In particular, we consider a robot moving in a two-dimensional space and equipped with two sensors, namely, a Global Navigation Satellite System (GNSS) sensor and a Radio Signal Strength Indicator (RSSI) sensor. The attacker can arbitrarily spoof the readings of the GNSS sensor and the robot control input so as to maximally deviate his trajectory from the nominal precomputed path. We derive explicit and constructive conditions for the existence of undetectable attacks, through which the attacker deviates the robot trajectory in a stealthy way. Conversely, we characterize the existence of secure trajectories, which guarantee that the robot either moves along the nominal trajectory or that the attack remains detectable. We show that secure trajectories can only exist between a subset of states, and provide a numerical mechanism to compute them. We illustrate our findings through several numerical studies, and discuss that our methods are applicable to different models of robot dynamics, including unicycles. More generally, our results show how control design affects security in systems with nonlinear dynamics.
△ Less
Submitted 23 October, 2019; v1 submitted 27 February, 2019;
originally announced February 2019.
-
Data-Driven Minimum-Energy Controls for Linear Systems
Authors:
Giacomo Baggio,
Vaibhav Katewa,
Fabio Pasqualetti
Abstract:
In this paper we study the problem of computing minimum-energy controls for linear systems from experimental data. The design of open-loop minimum-energy control inputs to steer a linear system between two different states in finite time is a classic problem in control theory, whose solution can be computed in closed form using the system matrices and its controllability Gramian. Yet, the computat…
▽ More
In this paper we study the problem of computing minimum-energy controls for linear systems from experimental data. The design of open-loop minimum-energy control inputs to steer a linear system between two different states in finite time is a classic problem in control theory, whose solution can be computed in closed form using the system matrices and its controllability Gramian. Yet, the computation of these inputs is known to be ill-conditioned, especially when the system is large, the control horizon long, and the system model uncertain. Due to these limitations, open-loop minimum-energy controls and the associated state trajectories have remained primarily of theoretical value. Surprisingly, in this paper we show that open-loop minimum-energy controls can be learned exactly from experimental data, with a finite number of control experiments over the same time horizon, without knowledge or estimation of the system model, and with an algorithm that is significantly more reliable than the direct model-based computation. These findings promote a new philosophy of controlling large, uncertain, linear systems where data is abundantly available.
△ Less
Submitted 29 April, 2019; v1 submitted 6 February, 2019;
originally announced February 2019.
-
Gramian-Based Optimization for the Analysis and Control of Traffic Networks
Authors:
Gianluca Bianchin,
Fabio Pasqualetti
Abstract:
This paper proposes a simplified version of classical models for urban transportation networks, and studies the problem of controlling intersections with the goal of optimizing network-wide congestion. Differently from traditional approaches to control traffic signaling, a simplified framework allows for a more tractable analysis of the network overall dynamics, and enables the design of critical…
▽ More
This paper proposes a simplified version of classical models for urban transportation networks, and studies the problem of controlling intersections with the goal of optimizing network-wide congestion. Differently from traditional approaches to control traffic signaling, a simplified framework allows for a more tractable analysis of the network overall dynamics, and enables the design of critical parameters while considering network-wide measures of efficiency. Motivated by the increasing availability of real-time high-resolution traffic data, we cast an optimization problem that formalizes the goal of minimizing the overall network congestion by optimally controlling the durations of green lights at intersections. Our formulation allows us to relate congestion objectives with the problem of optimizing a metric of controllability of an associated dynamical network. We then provide a technique to efficiently solve the optimization by parallelizing the computation among a group of distributed agents. Lastly, we assess the benefits of the proposed modeling and optimization framework through microscopic simulations on typical traffic commute scenarios for the area of Manhattan. The optimization framework proposed in this study is made available online on a Sumo microscopic simulator based interface [1].
△ Less
Submitted 6 November, 2018;
originally announced November 2018.
-
On the Real Stability Radius of Sparse Systems
Authors:
Vaibhav Katewa,
Fabio Pasqualetti
Abstract:
In this paper, we study robust stability of sparse LTI systems using the stability radius (SR) as a robustness measure. We consider real perturbations with an arbitrary and pre-specified sparsity pattern of the system matrix and measure their size using the Frobenius norm. We formulate the SR problem as an equality-constrained minimization problem. Using the Lagrangian method for optimization, we…
▽ More
In this paper, we study robust stability of sparse LTI systems using the stability radius (SR) as a robustness measure. We consider real perturbations with an arbitrary and pre-specified sparsity pattern of the system matrix and measure their size using the Frobenius norm. We formulate the SR problem as an equality-constrained minimization problem. Using the Lagrangian method for optimization, we characterize the optimality conditions of the SR problem, thereby revealing the relation between an optimal perturbation and the eigenvectors of an optimally perturbed system. Further, we use the Sylvester equation based parametrization to develop a penalty based gradient/Newton descent algorithm which converges to the local minima of the optimization problem. Finally, we illustrate how our framework provides structural insights into the robust stability of sparse networks.
△ Less
Submitted 24 October, 2018;
originally announced October 2018.
-
Stability Conditions for Cluster Synchronization in Networks of Heterogeneous Kuramoto Oscillators
Authors:
Tommaso Menara,
Giacomo Baggio,
Danielle S. Bassett,
Fabio Pasqualetti
Abstract:
In this paper we study cluster synchronization in networks of oscillators with heterogenous Kuramoto dynamics, where multiple groups of oscillators with identical phases coexist in a connected network. Cluster synchronization is at the basis of several biological and technological processes; yet the underlying mechanisms to enable cluster synchronization of Kuramoto oscillators have remained elusi…
▽ More
In this paper we study cluster synchronization in networks of oscillators with heterogenous Kuramoto dynamics, where multiple groups of oscillators with identical phases coexist in a connected network. Cluster synchronization is at the basis of several biological and technological processes; yet the underlying mechanisms to enable cluster synchronization of Kuramoto oscillators have remained elusive. In this paper we derive quantitative conditions on the network weights, cluster configuration, and oscillators' natural frequency that ensure asymptotic stability of the cluster synchronization manifold; that is, the ability to recover the desired cluster synchronization configuration following a perturbation of the oscillators' states. Qualitatively, our results show that cluster synchronization is stable when the intra-cluster coupling is sufficiently stronger than the inter-cluster coupling, the natural frequencies of the oscillators in distinct clusters are sufficiently different, or, in the case of two clusters, when the intra-cluster dynamics is homogeneous. We illustrate and validate the effectiveness of our theoretical results via numerical studies.
△ Less
Submitted 8 March, 2019; v1 submitted 15 June, 2018;
originally announced June 2018.
-
Minimum-gain Pole Placement with Sparse Static Feedback
Authors:
Vaibhav Katewa,
Fabio Pasqualetti
Abstract:
The minimum-gain eigenvalue assignment/pole placement problem (MGEAP) is a classical problem in LTI systems with static state feedback. In this paper, we study the MGEAP when the state feedback has arbitrary sparsity constraints. We formulate the sparse MGEAP problem as an equality-constrained optimization problem and present an analytical characterization of its locally optimal solution in terms…
▽ More
The minimum-gain eigenvalue assignment/pole placement problem (MGEAP) is a classical problem in LTI systems with static state feedback. In this paper, we study the MGEAP when the state feedback has arbitrary sparsity constraints. We formulate the sparse MGEAP problem as an equality-constrained optimization problem and present an analytical characterization of its locally optimal solution in terms of eigenvector matrices of the closed loop system. This result is used to provide a geometric interpretation of the solution of the non-sparse MGEAP, thereby providing additional insights for this classical problem. Further, we develop an iterative projected gradient descent algorithm to obtain local solutions for the sparse MGEAP using a parametrization based on the Sylvester equation. We present a heuristic algorithm to compute the projections, which also provides a novel method to solve the sparse EAP. Also, a relaxed version of the sparse MGEAP is presented and an algorithm is developed to obtain approximately sparse local solutions to the MGEAP. Finally, numerical studies are presented to compare the properties of the algorithms, which suggest that the proposed projection algorithm converges in most cases.
△ Less
Submitted 14 August, 2020; v1 submitted 22 May, 2018;
originally announced May 2018.
-
Synchronization Patterns in Networks of Kuramoto Oscillators: A Geometric Approach for Analysis and Control
Authors:
Lorenzo Tiberi,
Chiara Favaretto,
Mario Innocenti,
Danielle S. Bassett,
Fabio Pasqualetti
Abstract:
Synchronization is crucial for the correct functionality of many natural and man-made complex systems. In this work we characterize the formation of synchronization patterns in networks of Kuramoto oscillators. Specifically, we reveal conditions on the network weights and structure and on the oscillators' natural frequencies that allow the phases of a group of oscillators to evolve cohesively, yet…
▽ More
Synchronization is crucial for the correct functionality of many natural and man-made complex systems. In this work we characterize the formation of synchronization patterns in networks of Kuramoto oscillators. Specifically, we reveal conditions on the network weights and structure and on the oscillators' natural frequencies that allow the phases of a group of oscillators to evolve cohesively, yet independently from the phases of oscillators in different clusters. Our conditions are applicable to general directed and weighted networks of heterogeneous oscillators. Surprisingly, although the oscillators exhibit nonlinear dynamics, our approach relies entirely on tools from linear algebra and graph theory. Further, we develop a control mechanism to determine the smallest (as measured by the Frobenius norm) network perturbation to ensure the formation of a desired synchronization pattern. Our procedure allows us to constrain the set of edges that can be modified, thus enforcing the sparsity structure of the network perturbation. The results are validated through a set of numerical examples.
△ Less
Submitted 18 September, 2017;
originally announced September 2017.
-
On Structural Controllability of Symmetric (Brain) Networks
Authors:
Tommaso Menara,
Shi Gu,
Danielle S. Bassett,
Fabio Pasqualetti
Abstract:
The question of controllability of natural and man-made network systems has recently received considerable attention. In the context of the human brain, the study of controllability may not only shed light into the organization and function of different neural circuits, but also inform the design and implementation of minimally invasive yet effective intervention protocols to treat neurological di…
▽ More
The question of controllability of natural and man-made network systems has recently received considerable attention. In the context of the human brain, the study of controllability may not only shed light into the organization and function of different neural circuits, but also inform the design and implementation of minimally invasive yet effective intervention protocols to treat neurological disorders. While the characterization of brain controllability is still in its infancy, some results have recently appeared and given rise to scientific debate. Among these, [1] has numerically shown that a class of brain networks constructed from DSI/DTI imaging data are controllable from one brain region. That is, a single brain region is theoretically capable of moving the whole brain network towards any desired target state. In this note we provide evidence supporting controllability of brain networks from a single region as discussed in [1], thus contradicting the main conclusion and methods developed in [2].
△ Less
Submitted 27 November, 2018; v1 submitted 15 June, 2017;
originally announced June 2017.
-
Benchmarking measures of network controllability on canonical graph models
Authors:
Elena Wu-Yan,
Richard F. Betzel,
Evelyn Tang,
Shi Gu,
Fabio Pasqualetti,
Danielle S. Bassett
Abstract:
Many real-world systems are composed of many individual components that interact with one another in a complex pattern to produce diverse behaviors. Understanding how to intervene in these systems to guide behaviors is critically important to facilitate new discoveries and therapies in systems biology and neuroscience. A promising approach to optimizing interventions in complex systems is network…
▽ More
Many real-world systems are composed of many individual components that interact with one another in a complex pattern to produce diverse behaviors. Understanding how to intervene in these systems to guide behaviors is critically important to facilitate new discoveries and therapies in systems biology and neuroscience. A promising approach to optimizing interventions in complex systems is network control theory, an emerging conceptual framework and associated mathematics to understand how targeted input to nodes in a network system can predictably alter system dynamics. While network control theory is currently being applied to real-world data, the practical performance of these measures on simple networks with pre-specified structure is not well understood. In this study, we benchmark measures of network controllability on canonical graph models, providing an intuition for how control strategy, graph topology, and edge weight distribution mutually depend on one another. Our numerical studies motivate future analytical efforts to gain a mechanistic understanding of the relationship between graph topology and control, as well as efforts to design networks with specific control profiles.
△ Less
Submitted 15 June, 2017;
originally announced June 2017.
-
Data-Injection Attacks in Stochastic Control Systems: Detectability and Performance Tradeoffs
Authors:
Cheng-Zong Bai,
Fabio Pasqualetti,
Vijay Gupta
Abstract:
Consider a stochastic process being controlled across a communication channel. The control signal that is transmitted across the control channel can be replaced by a malicious attacker. The controller is allowed to implement any arbitrary detection algorithm to detect if an attacker is present. This work characterizes some fundamental limitations of when such an attack can be detected, and quantif…
▽ More
Consider a stochastic process being controlled across a communication channel. The control signal that is transmitted across the control channel can be replaced by a malicious attacker. The controller is allowed to implement any arbitrary detection algorithm to detect if an attacker is present. This work characterizes some fundamental limitations of when such an attack can be detected, and quantifies the performance degradation that an attacker that seeks to be undetected or stealthy can introduce.
△ Less
Submitted 3 April, 2017;
originally announced April 2017.
-
Heterogeneity of Central Nodes Explains the Benefits of Time-Varying Control in Complex Dynamical Networks
Authors:
Erfan Nozari,
Fabio Pasqualetti,
Jorge Cortes
Abstract:
Despite extensive research and remarkable advancements in the control of complex dynamical networks, most studies and practical control methods limit their focus to time-invariant control schedules (TICS). This is both due to their simplicity and the fact that the benefits of time-varying control schedules (TVCS) have remained largely uncharacterized. In this paper we study networks with linear an…
▽ More
Despite extensive research and remarkable advancements in the control of complex dynamical networks, most studies and practical control methods limit their focus to time-invariant control schedules (TICS). This is both due to their simplicity and the fact that the benefits of time-varying control schedules (TVCS) have remained largely uncharacterized. In this paper we study networks with linear and discrete-time dynamics and analyze the role of network structure in TVCS. First, we show that TVCS can significantly enhance network controllability over TICS, especially when applied to large networks. Through the analysis of a scale-dependent notion of nodal centrality, we then show that optimal TVCS involves the actuation of the most central nodes at appropriate spatial scales at all times. Consequently, it is the scale-heterogeneity of the central-nodes in a network that determine whether, and to what extent, TVCS outperforms conventional policies based on TICS. Here, scale-heterogeneity of a network refers to how diverse the central nodes of the network are at different spatial (local vs. global) scales. Several analytical results and case studies support and illustrate this relationship.
△ Less
Submitted 26 December, 2018; v1 submitted 20 November, 2016;
originally announced November 2016.
-
Controllability Metrics, Limitations and Algorithms for Complex Networks
Authors:
Fabio Pasqualetti,
Sandro Zampieri,
Francesco Bullo
Abstract:
This paper studies the problem of controlling complex networks, that is, the joint problem of selecting a set of control nodes and of designing a control input to steer a network to a target state. For this problem (i) we propose a metric to quantify the difficulty of the control problem as a function of the required control energy, (ii) we derive bounds based on the system dynamics (network topol…
▽ More
This paper studies the problem of controlling complex networks, that is, the joint problem of selecting a set of control nodes and of designing a control input to steer a network to a target state. For this problem (i) we propose a metric to quantify the difficulty of the control problem as a function of the required control energy, (ii) we derive bounds based on the system dynamics (network topology and weights) to characterize the tradeoff between the control energy and the number of control nodes, and (iii) we propose an open-loop control strategy with performance guarantees. In our strategy we select control nodes by relying on network partitioning, and we design the control input by leveraging optimal and distributed control techniques. Our findings show several control limitations and properties. For instance, for Schur stable and symmetric networks: (i) if the number of control nodes is constant, then the control energy increases exponentially with the number of network nodes, (ii) if the number of control nodes is a fixed fraction of the network nodes, then certain networks can be controlled with constant energy independently of the network dimension, and (iii) clustered networks may be easier to control because, for sufficiently many control nodes, the control energy depends only on the controllability properties of the clusters and on their coupling strength. We validate our results with examples from power networks, social networks, and epidemics spreading.
△ Less
Submitted 3 March, 2014; v1 submitted 6 August, 2013;
originally announced August 2013.
-
Consensus Networks over Finite Fields
Authors:
Fabio Pasqualetti,
Domenica Borra,
Francesco Bullo
Abstract:
This work studies consensus strategies for networks of agents with limited memory, computation, and communication capabilities. We assume that agents can process only values from a finite alphabet, and we adopt the framework of finite fields, where the alphabet consists of the integers {0,...,p-1}, for some prime number p, and operations are performed modulo p. Thus, we define a new class of conse…
▽ More
This work studies consensus strategies for networks of agents with limited memory, computation, and communication capabilities. We assume that agents can process only values from a finite alphabet, and we adopt the framework of finite fields, where the alphabet consists of the integers {0,...,p-1}, for some prime number p, and operations are performed modulo p. Thus, we define a new class of consensus dynamics, which can be exploited in certain applications such as pose estimation in capacity and memory constrained sensor networks. For consensus networks over finite fields, we provide necessary and sufficient conditions on the network topology and weights to ensure convergence. We show that consensus networks over finite fields converge in finite time, a feature that can be hardly achieved over the field of real numbers. For the design of finite-field consensus networks, we propose a general design method, with high computational complexity, and a network composition rule to generate large consensus networks from smaller components. Finally, we discuss the application of finite-field consensus networks to distributed averaging and pose estimation in sensor networks.
△ Less
Submitted 19 January, 2013;
originally announced January 2013.
-
Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations
Authors:
Fabio Pasqualetti,
Florian Dörfler,
Francesco Bullo
Abstract:
Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malignant attacks, and specific analysis tools as well as monitoring mechanisms need to be developed to enforce system security and reliability. This paper proposes a unified framework to analyze t…
▽ More
Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malignant attacks, and specific analysis tools as well as monitoring mechanisms need to be developed to enforce system security and reliability. This paper proposes a unified framework to analyze the resilience of cyber-physical systems against attacks cast by an omniscient adversary. We model cyber-physical systems as linear descriptor systems, and attacks as exogenous unknown inputs. Despite its simplicity, our model captures various real-world cyber-physical systems, and it includes and generalizes many prototypical attacks, including stealth, (dynamic) false-data injection and replay attacks. First, we characterize fundamental limitations of static, dynamic, and active monitors for attack detection and identification. Second, we provide constructive algebraic conditions to cast undetectable and unidentifiable attacks. Third, by using the system interconnection structure, we describe graph-theoretic conditions for the existence of undetectable and unidentifiable attacks. Finally, we validate our findings through some illustrative examples with different cyber-physical systems, such as a municipal water supply network and two electrical power grids.
△ Less
Submitted 9 March, 2012; v1 submitted 28 February, 2012;
originally announced February 2012.
-
Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design
Authors:
Fabio Pasqualetti,
Florian Dörfler,
Francesco Bullo
Abstract:
Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malicious attacks so that specific analysis tools and monitoring mechanisms need to be developed to enforce system security and reliability. This paper builds upon the results presented in our comp…
▽ More
Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malicious attacks so that specific analysis tools and monitoring mechanisms need to be developed to enforce system security and reliability. This paper builds upon the results presented in our companion paper [1] and proposes centralized and distributed monitors for attack detection and identification. First, we design optimal centralized attack detection and identification monitors. Optimality refers to the ability of detecting (respectively identifying) every detectable (respectively identifiable) attack. Second, we design an optimal distributed attack detection filter based upon a waveform relaxation technique. Third, we show that the attack identification problem is computationally hard, and we design a sub-optimal distributed attack identification procedure with performance guarantees. Finally, we illustrate the robustness of our monitors to system noise and unmodeled dynamics through a simulation study.
△ Less
Submitted 27 February, 2012;
originally announced February 2012.
-
Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design
Authors:
Fabio Pasqualetti,
Florian Dörfler,
Francesco Bullo
Abstract:
Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and advanced monitoring procedures to detect and identify network components malfunction or measurements corruption caused by an omniscient adversary. We model a power system under cyber-physical attack as a linear time-invariant de…
▽ More
Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and advanced monitoring procedures to detect and identify network components malfunction or measurements corruption caused by an omniscient adversary. We model a power system under cyber-physical attack as a linear time-invariant descriptor system with unknown inputs. Our attack model generalizes the prototypical stealth, (dynamic) false-data injection and replay attacks. We characterize the fundamental limitations of both static and dynamic procedures for attack detection and identification. Additionally, we design provably-correct (dynamic) detection and identification procedures based on tools from geometric control theory. Finally, we illustrate the effectiveness of our method through a comparison with existing (static) detection algorithms, and through a numerical study.
△ Less
Submitted 14 March, 2011;
originally announced March 2011.