-
Vector Cost Bimatrix Games with Applications to Autonomous Racing
Authors:
Benjamin R. Toaz,
Shaunak D. Bopardikar
Abstract:
We formulate a vector cost alternative to the scalarization method for weighting and combining multi-objective costs. The algorithm produces solutions to bimatrix games that are simultaneously pure, unique Nash equilibria and Pareto optimal with guarantees for avoiding worst case outcomes. We achieve this by enforcing exact potential game constraints to guide cost adjustments towards equilibrium,…
▽ More
We formulate a vector cost alternative to the scalarization method for weighting and combining multi-objective costs. The algorithm produces solutions to bimatrix games that are simultaneously pure, unique Nash equilibria and Pareto optimal with guarantees for avoiding worst case outcomes. We achieve this by enforcing exact potential game constraints to guide cost adjustments towards equilibrium, while minimizing the deviation from the original cost structure. The magnitude of this adjustment serves as a metric for differentiating between Pareto optimal solutions. We implement this approach in a racing competition between agents with heterogeneous cost structures, resulting in fewer collision incidents with a minimal decrease in performance. Code is available at https://github.com/toazbenj/race_simulation.
△ Less
Submitted 7 July, 2025;
originally announced July 2025.
-
Competitive Perimeter Defense in Tree Environments
Authors:
Richard L. Frost,
Shaunak D. Bopardikar
Abstract:
We consider a perimeter defense problem in a rooted full tree graph environment in which a single defending vehicle seeks to defend a set of specified vertices, termed as the perimeter from mobile intruders that enter the environment through the tree's leaves. We adopt the technique of competitive analysis to characterize the performance of an online algorithm for the defending vehicle. We first d…
▽ More
We consider a perimeter defense problem in a rooted full tree graph environment in which a single defending vehicle seeks to defend a set of specified vertices, termed as the perimeter from mobile intruders that enter the environment through the tree's leaves. We adopt the technique of competitive analysis to characterize the performance of an online algorithm for the defending vehicle. We first derive fundamental limits on the performance of any online algorithm relative to that of an optimal offline algorithm. Specifically, we give three fundamental conditions for finite, 2, and 3/2 competitive ratios in terms of the environment parameters. We then design and analyze three classes of online algorithms that have provably finite competitiveness under varying environmental parameter regimes. Finally, we give a numerical visualization of these regimes to better show the comparative strengths and weaknesses of each algorithm.
△ Less
Submitted 9 February, 2025; v1 submitted 24 July, 2024;
originally announced July 2024.
-
FlipDyn in Graphs: Resource Takeover Games in Graphs
Authors:
Sandeep Banik,
Shaunak D. Bopardikar,
Naira Hovakimyan
Abstract:
We present \texttt{FlipDyn-G}, a dynamic game model extending the \texttt{FlipDyn} framework to a graph-based setting, where each node represents a dynamical system. This model captures the interactions between a defender and an adversary who strategically take over nodes in a graph to minimize (resp. maximize) a finite horizon additive cost. At any time, the \texttt{FlipDyn} state is represented…
▽ More
We present \texttt{FlipDyn-G}, a dynamic game model extending the \texttt{FlipDyn} framework to a graph-based setting, where each node represents a dynamical system. This model captures the interactions between a defender and an adversary who strategically take over nodes in a graph to minimize (resp. maximize) a finite horizon additive cost. At any time, the \texttt{FlipDyn} state is represented as the current node, and each player can transition the \texttt{FlipDyn} state to a depending based on the connectivity from the current node. Such transitions are driven by the node dynamics, state, and node-dependent costs. This model results in a hybrid dynamical system where the discrete state (\texttt{FlipDyn} state) governs the continuous state evolution and the corresponding state cost. Our objective is to compute the Nash equilibrium of this finite horizon zero-sum game on a graph. Our contributions are two-fold. First, we model and characterize the \texttt{FlipDyn-G} game for general dynamical systems, along with the corresponding Nash equilibrium (NE) takeover strategies. Second, for scalar linear discrete-time dynamical systems with quadratic costs, we derive the NE takeover strategies and saddle-point values independent of the continuous state of the system. Additionally, for a finite state birth-death Markov chain (represented as a graph) under scalar linear dynamical systems, we derive analytical expressions for the NE takeover strategies and saddle-point values. We illustrate our findings through numerical studies involving epidemic models and linear dynamical systems with adversarial interactions.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Linear Quadratic Guidance Law for Joint Motion Planning of a Pursuer-Turret Assembly
Authors:
Bhargav Jha,
Shaunak Bopardikar,
Alexander Von Moll,
David Casbeer
Abstract:
This paper presents joint motion planning of a vehicle with an attached rotating turret. The turret has a limited range as well as the field of view. The objective is capture a maneuvering target such that at the terminal time it is withing the field-of-view and range limits. Catering to it, we present a minimum effort guidance law that commensurate for the turn rate abilities of the vehicle and t…
▽ More
This paper presents joint motion planning of a vehicle with an attached rotating turret. The turret has a limited range as well as the field of view. The objective is capture a maneuvering target such that at the terminal time it is withing the field-of-view and range limits. Catering to it, we present a minimum effort guidance law that commensurate for the turn rate abilities of the vehicle and the turret. The guidance law is obtained using linearization about the collision triangle and admits an analytical solution. Simulation results are presented to exemplify the cooperation between the turret and the vehicle.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Shortest Trajectory of a Dubins Vehicle with a Controllable Laser
Authors:
Shivam Bajaj,
Bhargav Jha,
Shaunak D. Bopardikar,
Alexander Von Moll,
David W. Casbeer
Abstract:
We formulate a novel planar motion planning problem for a Dubins-Laser system that consists of a Dubins vehicle with an attached controllable laser. The vehicle moves with unit speed and the laser, having a finite range, can rotate in a clockwise or anti-clockwise direction with a bounded angular rate. From an arbitrary initial position and orientation, the objective is to steer the system so that…
▽ More
We formulate a novel planar motion planning problem for a Dubins-Laser system that consists of a Dubins vehicle with an attached controllable laser. The vehicle moves with unit speed and the laser, having a finite range, can rotate in a clockwise or anti-clockwise direction with a bounded angular rate. From an arbitrary initial position and orientation, the objective is to steer the system so that a given static target is within the range of the laser and the laser is oriented at it in minimum time. We characterize multiple properties of the optimal trajectory and establish that the optimal trajectory for the Dubins-laser system is one out of a total of 16 candidates. Finally, we provide numerical insights that illustrate the properties characterized in this work.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
Matrix Concentration Inequalities for Sensor Selection
Authors:
Christopher I. Calle,
Shaunak D. Bopardikar
Abstract:
In this work, we address the problem of sensor selection for state estimation via Kalman filtering. We consider a linear time-invariant (LTI) dynamical system subject to process and measurement noise, where the sensors we use to perform state estimation are randomly drawn according to a sampling with replacement policy. Since our selection of sensors is randomly chosen, the estimation error covari…
▽ More
In this work, we address the problem of sensor selection for state estimation via Kalman filtering. We consider a linear time-invariant (LTI) dynamical system subject to process and measurement noise, where the sensors we use to perform state estimation are randomly drawn according to a sampling with replacement policy. Since our selection of sensors is randomly chosen, the estimation error covariance of the Kalman filter is also a stochastic quantity. Fortunately, concentration inequalities (CIs) for the estimation error covariance allow us to gauge the estimation performance we intend to achieve when our sensors are randomly drawn with replacement. To obtain a non-trivial improvement on existing CIs for the estimation error covariance, we first present novel matrix CIs for a sum of independent and identically-distributed (i.i.d.) and positive semi-definite (p.s.d.) random matrices, whose support is finite. Next, we show that our guarantees generalize an existing matrix CI. Also, we show that our generalized guarantees require significantly fewer number of sampled sensors to be applicable. Lastly, we show through a numerical study that our guarantees significantly outperform existing ones in terms of their ability to bound (in the semi-definite sense) the steady-state estimation error covariance of the Kalman filter.
△ Less
Submitted 9 March, 2024;
originally announced March 2024.
-
An approach to solve the coarse-grained Protein folding problem in a Quantum Computer
Authors:
Jaya Vasavi P,
Soham Bopardikar,
Avinash D,
Ashwini K,
Kalyan Dasgupta,
Sanjib Senapati
Abstract:
Protein folding, which dictates the protein structure from its amino acid sequence, is half a century old problem of biology. The function of the protein correlates with its structure, emphasizing the need of understanding protein folding for studying the cellular and molecular mechanisms that occur within biological systems. Understanding protein structures and enzymes plays a critical role in ta…
▽ More
Protein folding, which dictates the protein structure from its amino acid sequence, is half a century old problem of biology. The function of the protein correlates with its structure, emphasizing the need of understanding protein folding for studying the cellular and molecular mechanisms that occur within biological systems. Understanding protein structures and enzymes plays a critical role in target based drug designing, elucidating protein-related disease mechanisms, and innovating novel enzymes. While recent advancements in AI based protein structure prediction methods have solved the protein folding problem to an extent, their precision in determining the structure of the protein with low sequence similarity is limited. Classical methods face challenges in generating extensive conformational samplings, making quantum-based approaches advantageous for solving protein folding problems. In this work we developed a novel turn based encoding algorithm that can be run on a gate based quantum computer for predicting the structure of smaller protein sequences using the HP model as an initial framework, which can be extrapolated in its application to larger and more intricate protein systems in future. The HP model best represents a major step in protein folding phenomena - the hydrophobic collapse which brings the hydrophobic amino acid to the interior of a protein. The folding problem is cast in a 3D cubic lattice with degrees of freedom along edges parallel to the orthogonal axes, as well as along diagonals parallel to the axial planes. While, the original formulation with higher order terms can be run on gate based quantum hardwares, the QUBO formulation can give results on both classical softwares employing annealers and IBM CPLEX as well as quantum hardwares.
△ Less
Submitted 23 November, 2023;
originally announced November 2023.
-
FlipDyn with Control: Resource Takeover Games with Dynamics
Authors:
Sandeep Banik,
Shaunak D. Bopardikar
Abstract:
We present the FlipDyn, a dynamic game in which two opponents (a defender and an adversary) choose strategies to optimally takeover a resource that involves a dynamical system. At any time instant, each player can take over the resource and thereby control the dynamical system after incurring a state-dependent and a control-dependent costs. The resulting model becomes a hybrid dynamical system whe…
▽ More
We present the FlipDyn, a dynamic game in which two opponents (a defender and an adversary) choose strategies to optimally takeover a resource that involves a dynamical system. At any time instant, each player can take over the resource and thereby control the dynamical system after incurring a state-dependent and a control-dependent costs. The resulting model becomes a hybrid dynamical system where the discrete state (FlipDyn state) determines which player is in control of the resource. Our objective is to compute the Nash equilibria of this dynamic zero-sum game. Our contributions are four-fold. First, for any non-negative costs, we present analytical expressions for the saddle-point value of the FlipDyn game, along with the corresponding Nash equilibrium (NE) takeover strategies. Second, for continuous state, linear dynamical systems with quadratic costs, we establish sufficient conditions under which the game admits a NE in the space of linear state-feedback policies. Third, for scalar dynamical systems with quadratic costs, we derive the NE takeover strategies and saddle-point values independent of the continuous state of the dynamical system. Fourth and finally, for higher dimensional linear dynamical systems with quadratic costs, we derive approximate NE takeover strategies and control policies which enable the computation of bounds on the value functions of the game in each takeover state. We illustrate our findings through a numerical study involving the control of a linear dynamical system in the presence of an adversary.
△ Less
Submitted 25 October, 2023; v1 submitted 22 October, 2023;
originally announced October 2023.
-
On Multi-Fidelity Impedance Tuning for Human-Robot Cooperative Manipulation
Authors:
Ethan Lau,
Vaibhav Srivastava,
Shaunak D. Bopardikar
Abstract:
We examine how a human-robot interaction (HRI) system may be designed when input-output data from previous experiments are available. In particular, we consider how to select an optimal impedance in the assistance design for a cooperative manipulation task with a new operator. Due to the variability between individuals, the design parameters that best suit one operator of the robot may not be the…
▽ More
We examine how a human-robot interaction (HRI) system may be designed when input-output data from previous experiments are available. In particular, we consider how to select an optimal impedance in the assistance design for a cooperative manipulation task with a new operator. Due to the variability between individuals, the design parameters that best suit one operator of the robot may not be the best parameters for another one. However, by incorporating historical data using a linear auto-regressive (AR-1) Gaussian process, the search for a new operator's optimal parameters can be accelerated. We lay out a framework for optimizing the human-robot cooperative manipulation that only requires input-output data. We establish how the AR-1 model improves the bound on the regret and numerically simulate a human-robot cooperative manipulation task to show the regret improvement. Further, we show how our approach's input-output nature provides robustness against modeling error through an additional numerical study.
△ Less
Submitted 9 October, 2023;
originally announced October 2023.
-
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions
Authors:
Mustafa Abdallah,
Saurabh Bagchi,
Shaunak D. Bopardikar,
Kevin Chan,
Xing Gao,
Murat Kantarcioglu,
Congmiao Li,
Peng Liu,
Quanyan Zhu
Abstract:
Many of our critical infrastructure systems and personal computing systems have a distributed computing systems structure. The incentives to attack them have been growing rapidly as has their attack surface due to increasing levels of connectedness. Therefore, we feel it is time to bring in rigorous reasoning to secure such systems. The distributed system security and the game theory technical com…
▽ More
Many of our critical infrastructure systems and personal computing systems have a distributed computing systems structure. The incentives to attack them have been growing rapidly as has their attack surface due to increasing levels of connectedness. Therefore, we feel it is time to bring in rigorous reasoning to secure such systems. The distributed system security and the game theory technical communities can come together to effectively address this challenge. In this article, we lay out the foundations from each that we can build upon to achieve our goals. Next, we describe a set of research challenges for the community, organized into three categories -- analytical, systems, and integration challenges, each with "short term" time horizon (2-3 years) and "long term" (5-10 years) items. This article was conceived of through a community discussion at the 2022 NSF SaTC PI meeting.
△ Less
Submitted 28 May, 2024; v1 submitted 3 September, 2023;
originally announced September 2023.
-
A Multi-Fidelity Bayesian Approach to Safe Controller Design
Authors:
Ethan Lau,
Vaibhav Srivastava,
Shaunak D. Bopardikar
Abstract:
Safely controlling unknown dynamical systems is one of the biggest challenges in the field of control. Oftentimes, an approximate model of a system's dynamics exists which provides beneficial information for the selection of controls. However, differences between the approximate and true systems present challenges as well as safety concerns. We propose an algorithm called SAFE-SLOPE to safely eval…
▽ More
Safely controlling unknown dynamical systems is one of the biggest challenges in the field of control. Oftentimes, an approximate model of a system's dynamics exists which provides beneficial information for the selection of controls. However, differences between the approximate and true systems present challenges as well as safety concerns. We propose an algorithm called SAFE-SLOPE to safely evaluate points from a Gaussian process model of a function when its Lipschitz constant is unknown. We establish theoretical guarantees for the performance of SAFE-SLOPE and quantify how multi-fidelity modeling improves the algorithm's performance. Finally, we demonstrate how SAFE-SLOPE achieves lower cumulative regret than a naive sampling method by applying it to find the control gains of a linear time-invariant system.
△ Less
Submitted 9 August, 2023; v1 submitted 21 April, 2023;
originally announced April 2023.
-
A Concentration-Based Approach for Optimizing the Estimation Performance in Stochastic Sensor Selection
Authors:
Christopher I. Calle,
Shaunak D. Bopardikar
Abstract:
In this work, we consider a sensor selection drawn at random by a sampling with replacement policy for a linear time-invariant dynamical system subject to process and measurement noise. We employ the Kalman filter to estimate the state of the system. However, the statistical properties of the filter are not deterministic due to the stochastic selection of sensors. As a consequence, we derive conce…
▽ More
In this work, we consider a sensor selection drawn at random by a sampling with replacement policy for a linear time-invariant dynamical system subject to process and measurement noise. We employ the Kalman filter to estimate the state of the system. However, the statistical properties of the filter are not deterministic due to the stochastic selection of sensors. As a consequence, we derive concentration inequalities to bound the estimation error covariance of the Kalman filter in the semi-definite sense. Concentration inequalities provide a framework for deriving semi-definite bounds that hold in a probabilistic sense. Our main contributions are three-fold. First, we develop algorithmic tools to aid in the implementation of a matrix concentration inequality. Second, we derive concentration-based bounds for three types of stochastic selections. Third, we propose a polynomial-time procedure for finding a sampling distribution that indirectly minimizes the maximum eigenvalue of the estimation error covariance. Our proposed sampling policy is also shown to empirically outperform three other sampling policies: uniform, deterministic greedy, and randomized greedy.
△ Less
Submitted 14 March, 2023;
originally announced March 2023.
-
Perimeter Defense using a Turret with Finite Range and Service Times
Authors:
Shivam Bajaj,
Shaunak D. Bopardikar,
Alexander Von Moll,
Eric Torng,
David W. Casbeer
Abstract:
We consider a perimeter defense problem in a planar conical environment comprising a single turret that has a finite range and non-zero service time. The turret seeks to defend a concentric perimeter against $N\geq 2$ intruders. Upon release, each intruder moves radially towards the perimeter with a fixed speed. To capture an intruder, the turret's angle must be aligned with that of the intruder's…
▽ More
We consider a perimeter defense problem in a planar conical environment comprising a single turret that has a finite range and non-zero service time. The turret seeks to defend a concentric perimeter against $N\geq 2$ intruders. Upon release, each intruder moves radially towards the perimeter with a fixed speed. To capture an intruder, the turret's angle must be aligned with that of the intruder's angle and must spend a specified service time at that orientation. We address offline and online versions of this optimization problem. Specifically, in the offline version, we establish that in general parameter regimes, this problem is equivalent to solving a Travelling Repairperson Problem with Time Windows (TRP-TW). We then identify specific parameter regimes in which there is a polynomial time algorithm that maximizes the number of intruders captured. In the online version, we present a competitive analysis technique in which we establish a fundamental guarantee on the existence of at best $(N-1)$-competitive algorithms. We also design two online algorithms that are provably $1$ and $2$-competitive in specific parameter regimes.
△ Less
Submitted 4 February, 2023;
originally announced February 2023.
-
FlipDyn: A game of resource takeovers in dynamical systems
Authors:
Sandeep Banik,
Shaunak D. Bopardikar
Abstract:
We introduce a game in which two players with opposing objectives seek to repeatedly takeover a common resource. The resource is modeled as a discrete time dynamical system over which a player can gain control after spending a state-dependent amount of energy at each time step. We use a FlipIT-inspired deterministic model that decides which player is in control at every time step. A player's polic…
▽ More
We introduce a game in which two players with opposing objectives seek to repeatedly takeover a common resource. The resource is modeled as a discrete time dynamical system over which a player can gain control after spending a state-dependent amount of energy at each time step. We use a FlipIT-inspired deterministic model that decides which player is in control at every time step. A player's policy is the probability with which the player should spend energy to gain control at each time step. Our main results are three-fold. First, we present analytic expressions for the cost-to-go as a function of the hybrid state of the system, i.e., the physical state of the dynamical system and the binary \texttt{FlipDyn} state for any general system with arbitrary costs. These expressions are exact when the physical state is also discrete and has finite cardinality. Second, for a continuous physical state with linear dynamics and quadratic costs, we derive expressions for Nash equilibrium (NE). For scalar physical states, we show that the NE depends only on the parameters of the value function and costs, and is independent of the state. Third, we derive an approximate value function for higher dimensional linear systems with quadratic costs. Finally, we illustrate our results through a numerical study on the problem of controlling a linear system in a given environment in the presence of an adversary.
△ Less
Submitted 12 September, 2022;
originally announced September 2022.
-
Competitive Perimeter Defense of Conical Environments
Authors:
Shivam Bajaj,
Eric Torng,
Shaunak D. Bopardikar,
Alexander Von Moll,
Isaac Weintraub,
Eloy Garcia,
David W. Casbeer
Abstract:
We consider a perimeter defense problem in a planar conical environment in which a single vehicle, having a finite capture radius, aims to defend a concentric perimeter from mobile intruders. The intruders are arbitrarily released at the circumference of the environment and they move radially toward the perimeter with fixed speed. We present a competitive analysis approach to this problem by measu…
▽ More
We consider a perimeter defense problem in a planar conical environment in which a single vehicle, having a finite capture radius, aims to defend a concentric perimeter from mobile intruders. The intruders are arbitrarily released at the circumference of the environment and they move radially toward the perimeter with fixed speed. We present a competitive analysis approach to this problem by measuring the performance of multiple online algorithms for the vehicle against arbitrary inputs, relative to an optimal offline algorithm that has information about entire input sequence in advance. In particular, we establish two necessary conditions on the parameter space to guarantee (i) finite competitiveness of any algorithm and (ii) a competitive ratio of at least 2 for any algorithm. We then design and analyze three online algorithms and characterize parameter regimes in which they have finite competitive ratios. Specifically, our first two algorithms are provably 1, and 2-competitive, respectively, whereas our third algorithm exhibits different competitive ratios in different regimes of problem parameters. Finally, we provide a numerical plot in the parameter space to reveal additional insights into the relative performance of our algorithms.
△ Less
Submitted 29 March, 2022; v1 submitted 9 October, 2021;
originally announced October 2021.
-
Cooperative Evasion by Translating Targets with Variable Speeds
Authors:
Shivam Bajaj,
Eloy Garcia,
Shaunak D. Bopardikar
Abstract:
We consider a problem of cooperative evasion between a single pursuer and multiple evaders in which the evaders are constrained to move in the positive Y direction. The evaders are slower than the vehicle and can choose their speeds from a bounded interval. The pursuer aims to intercept all evaders in a given sequence by executing a Manhattan pursuit strategy of moving parallel to the X axis, foll…
▽ More
We consider a problem of cooperative evasion between a single pursuer and multiple evaders in which the evaders are constrained to move in the positive Y direction. The evaders are slower than the vehicle and can choose their speeds from a bounded interval. The pursuer aims to intercept all evaders in a given sequence by executing a Manhattan pursuit strategy of moving parallel to the X axis, followed by moving parallel to the Y axis. The aim of the evaders is to cooperatively pick their individual speeds so that the total time to intercept all evaders is maximized. We first obtain conditions under which evaders should cooperate in order to maximize the total time to intercept as opposed to each moving greedily to optimize its own intercept time. Then, we propose and analyze an algorithm that assigns evasive strategies to the evaders in two iterations as opposed to performing an exponential search over the choice of evader speeds. We also characterize a fundamental limit on the total time taken by the pursuer to capture all evaders when the number of evaders is large. Finally, we provide numerical comparisons against random sampling heuristics.
△ Less
Submitted 5 July, 2021; v1 submitted 19 June, 2021;
originally announced June 2021.
-
Competitive Perimeter Defense on a Line
Authors:
Shivam Bajaj,
Eric Torng,
Shaunak D. Bopardikar
Abstract:
We consider a perimeter defense problem in which a single vehicle seeks to defend a compact region from intruders in a one-dimensional environment parameterized by the perimeter size and the intruder-to-vehicle speed ratio. The intruders move inward with fixed speed and direction to reach the perimeter. We provide both positive and negative worst-case performance results over the parameter space u…
▽ More
We consider a perimeter defense problem in which a single vehicle seeks to defend a compact region from intruders in a one-dimensional environment parameterized by the perimeter size and the intruder-to-vehicle speed ratio. The intruders move inward with fixed speed and direction to reach the perimeter. We provide both positive and negative worst-case performance results over the parameter space using competitive analysis. We first establish fundamental limits by identifying the most difficult parameter combinations that admit no $c$-competitive algorithms for any constant $c\geq 1$ and slightly easier parameter combinations in which every algorithm is at best $2$-competitive. We then design three classes of algorithms and prove they are $1$, $2$, and $4$-competitive, respectively, for increasingly difficult parameter combinations. Finally, we present numerical studies that provide insights into the performance of these algorithms against stochastically generated intruders.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Probabilistic Performance Bounds for Randomized Sensor Selection in Kalman Filtering
Authors:
Christopher I. Calle,
Shaunak D. Bopardikar
Abstract:
We consider the problem of randomly choosing the sensors of a linear time-invariant dynamical system subject to process and measurement noise. We sample the sensors independently and from the same distribution. We measure the performance of a Kalman filter by its estimation error covariance. Using tools from random matrix theory, we derive probabilistic bounds on the estimation error covariance in…
▽ More
We consider the problem of randomly choosing the sensors of a linear time-invariant dynamical system subject to process and measurement noise. We sample the sensors independently and from the same distribution. We measure the performance of a Kalman filter by its estimation error covariance. Using tools from random matrix theory, we derive probabilistic bounds on the estimation error covariance in the semi-definite sense. We indirectly improve the performance of our Kalman filter for the maximum eigenvalue metric and show that under certain conditions the optimal sampling distribution that minimizes the maximum eigenvalue of the upper bound is the solution to an appropriately defined convex optimization problem. Our numerical results show the efficacy of the optimal sampling scheme in improving Kalman filter performance relative to the trivial uniform sampling distribution and a greedy sampling $\textit{with replacement}$ algorithm.
△ Less
Submitted 20 March, 2021;
originally announced March 2021.
-
Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning
Authors:
Arnab Bhattacharya,
Thiagarajan Ramachandran,
Sandeep Banik,
Chase P. Dowling,
Shaunak D. Bopardikar
Abstract:
Adversary emulation is an offensive exercise that provides a comprehensive assessment of a system's resilience against cyber attacks. However, adversary emulation is typically a manual process, making it costly and hard to deploy in cyber-physical systems (CPS) with complex dynamics, vulnerabilities, and operational uncertainties. In this paper, we develop an automated, domain-aware approach to ad…
▽ More
Adversary emulation is an offensive exercise that provides a comprehensive assessment of a system's resilience against cyber attacks. However, adversary emulation is typically a manual process, making it costly and hard to deploy in cyber-physical systems (CPS) with complex dynamics, vulnerabilities, and operational uncertainties. In this paper, we develop an automated, domain-aware approach to adversary emulation for CPS. We formulate a Markov Decision Process (MDP) model to determine an optimal attack sequence over a hybrid attack graph with cyber (discrete) and physical (continuous) components and related physical dynamics. We apply model-based and model-free reinforcement learning (RL) methods to solve the discrete-continuous MDP in a tractable fashion. As a baseline, we also develop a greedy attack algorithm and compare it with the RL procedures. We summarize our findings through a numerical study on sensor deception attacks in buildings to compare the performance and solution quality of the proposed algorithms.
△ Less
Submitted 9 November, 2020;
originally announced November 2020.
-
Secure Route Planning Using Dynamic Games with Stopping States
Authors:
Sandeep Banik,
Shaunak D. Bopardikar
Abstract:
We consider the classic motion planning problem defined over a roadmap in which a vehicle seeks to find an optimal path from a source to a destination in presence of an attacker who can launch attacks on the vehicle over any edge of the roadmap. The vehicle (defender) has the capability to switch on/off a countermeasure that can detect and permanently disable the attack if it occurs concurrently.…
▽ More
We consider the classic motion planning problem defined over a roadmap in which a vehicle seeks to find an optimal path from a source to a destination in presence of an attacker who can launch attacks on the vehicle over any edge of the roadmap. The vehicle (defender) has the capability to switch on/off a countermeasure that can detect and permanently disable the attack if it occurs concurrently. We model the problem of traveling along en edge using the framework of a simultaneous zero-sum dynamic game (edge-game) with a stopping state played between an attacker and defender. We characterize the Nash equiliria of an edge-game and provide closed form expressions for two actions per player. We further provide an analytic and approximate expression on the value of an edge-game and characterize conditions under which it grows sub-linearly with the number of stages. We study the sensitivity of Nash equilibrium to the (i) cost of using the countermeasure, (ii) cost of motion and (iii) benefit of disabling the attack. The solution of an edge-game is used to formulate and solve for the secure planning problem known as a meta-game. We design an efficient heuristic by converting the problem to a shortest path problem using the edge cost as the solution of corresponding edge-games. We illustrate our findings through several insightful simulations.
△ Less
Submitted 15 April, 2022; v1 submitted 12 June, 2020;
originally announced June 2020.
-
Dynamic Boundary Guarding Against Radially Incoming Targets
Authors:
Shivam Bajaj,
Shaunak D. Bopardikar
Abstract:
We introduce a dynamic vehicle routing problem in which a single vehicle seeks to guard a circular perimeter against radially inward moving targets. Targets are generated uniformly as per a Poisson process in time with a fixed arrival rate on the boundary of a circle with a larger radius and concentric with the perimeter. Upon generation, each target moves radially inward toward the perimeter with…
▽ More
We introduce a dynamic vehicle routing problem in which a single vehicle seeks to guard a circular perimeter against radially inward moving targets. Targets are generated uniformly as per a Poisson process in time with a fixed arrival rate on the boundary of a circle with a larger radius and concentric with the perimeter. Upon generation, each target moves radially inward toward the perimeter with a fixed speed. The aim of the vehicle is to maximize the capture fraction, i.e., the fraction of targets intercepted before they enter the perimeter. We first obtain a fundamental upper bound on the capture fraction which is independent of any policy followed by the vehicle. We analyze several policies in the low and high arrival rates of target generation. For low arrival, we propose and analyze a First-Come-First-Served and a Look-Ahead policy based on repeated computation of the path that passes through maximum number of unintercepted targets. For high arrival, we design and analyze a policy based on repeated computation of Euclidean Minimum Hamiltonian path through a fraction of existing targets and show that it is within a constant factor of the optimal. Finally, we provide a numerical study of the performance of the policies in parameter regimes beyond the scope of the analysis.
△ Less
Submitted 4 September, 2019;
originally announced September 2019.
-
Incentivizing Collaboration in Heterogeneous Teams via Common-Pool Resource Games
Authors:
Piyush Gupta,
Shaunak D. Bopardikar,
Vaibhav Srivastava
Abstract:
We consider a team of heterogeneous agents that is collectively responsible for servicing, and subsequently reviewing, a stream of homogeneous tasks. Each agent has an associated mean service time and a mean review time for servicing and reviewing the tasks, respectively. Agents receive a reward based on their service and review admission rates. The team objective is to collaboratively maximize th…
▽ More
We consider a team of heterogeneous agents that is collectively responsible for servicing, and subsequently reviewing, a stream of homogeneous tasks. Each agent has an associated mean service time and a mean review time for servicing and reviewing the tasks, respectively. Agents receive a reward based on their service and review admission rates. The team objective is to collaboratively maximize the number of "serviced and reviewed" tasks. We formulate a Common-Pool Resource (CPR) game and design utility functions to incentivize collaboration among heterogeneous agents in a decentralized manner. We show the existence of a unique Pure Nash Equilibrium (PNE), and establish convergence of best response dynamics to this unique PNE. Finally, we establish an analytic upper bound on three measures of inefficiency of the PNE, namely the price of anarchy, the ratio of the total review admission rate, and the ratio of latency, along with an empirical study.
△ Less
Submitted 8 September, 2020; v1 submitted 11 August, 2019;
originally announced August 2019.
-
Scenario Approach for Robust Blackbox Optimization in the Bandit Setting
Authors:
Shaunak D. Bopardikar,
Vaibhav Srivastava
Abstract:
This paper discusses a scenario approach to robust optimization of a blackbox function in a bandit setting. We assume that the blackbox function can be modeled as a Gaussian Process (GP) for every realization of the uncertain parameter. We adopt a scenario approach in which we draw fixed independent samples of the uncertain parameter. For a given policy, i.e., a sequence of query points and uncert…
▽ More
This paper discusses a scenario approach to robust optimization of a blackbox function in a bandit setting. We assume that the blackbox function can be modeled as a Gaussian Process (GP) for every realization of the uncertain parameter. We adopt a scenario approach in which we draw fixed independent samples of the uncertain parameter. For a given policy, i.e., a sequence of query points and uncertain parameters in the sampled set, we introduce a notion of regret defined with respect to additional draws of the uncertain parameter, termed as scenario regret under re-draw. We present a scenario-based iterative algorithm using the upper confidence bound (UCB) of the fixed independent scenarios to compute a policy for the blackbox optimization. For this algorithm, we characterize a high probability upper bound on the regret under re-draw for any finite number of iterations of the algorithm. We further characterize parameter regimes in which the regret tends to zero asymptotically with the number of iterations with high probability. Finally, we supplement our analysis with numerical results.
△ Less
Submitted 29 April, 2018;
originally announced April 2018.
-
Optimal Configurations in Coverage Control with Polynomial Costs
Authors:
Shaunak D. Bopardikar,
Dhagash Mehta,
Jonathan D. Hauenstein
Abstract:
We revisit the static coverage control problem for placement of vehicles with simple motion on the real line, under the assumption that the cost is a polynomial function of the locations of the vehicles. The main contribution of this paper is to demonstrate the use of tools from numerical algebraic geometry, in particular, a numerical polynomial homotopy continuation method that guarantees to find…
▽ More
We revisit the static coverage control problem for placement of vehicles with simple motion on the real line, under the assumption that the cost is a polynomial function of the locations of the vehicles. The main contribution of this paper is to demonstrate the use of tools from numerical algebraic geometry, in particular, a numerical polynomial homotopy continuation method that guarantees to find all solutions of polynomial equations, in order to characterize the \emph{global minima} for the coverage control problem. The results are then compared against a classic distributed approach involving the use of Lloyd descent, which is known to converge only to a local minimum under certain technical conditions.
△ Less
Submitted 30 January, 2018;
originally announced January 2018.
-
Sensor Selection via Randomized Sampling
Authors:
Shaunak D. Bopardikar
Abstract:
Given a linear dynamical system, we consider the problem of constructing an approximate system using only a subset of the sensors out of the total set such that the observability Gramian of the new system is approximately equal to that of the original system. Our contributions are as follows. First, we present a randomized algorithm that samples the sensors with replacement as per specified distri…
▽ More
Given a linear dynamical system, we consider the problem of constructing an approximate system using only a subset of the sensors out of the total set such that the observability Gramian of the new system is approximately equal to that of the original system. Our contributions are as follows. First, we present a randomized algorithm that samples the sensors with replacement as per specified distributions. For specific metrics of the observability Gramian such as the trace or the maximum eigenvalue, we derive novel bounds on the number of samples required to yield a high probability lower bound on the metric evaluated on the approximate Gramian. Second, with a different distribution, we derive high probability bounds on other standard metrics used in sensor selection, including the minimum eigenvalue or the trace of the Gramian inverse. This distribution requires a number of samples which is larger than the one required for the trace and the maximum eigenvalue, but guarantees non-singularity of the approximate Gramian if the original system is observable with high probability. Third, we demonstrate how the randomized procedure can be used for recursive state estimation using fewer sensors than the original system and provide a high probability upper bound on the initial error covariance. We supplement the theoretical results with several insightful numerical studies and comparisons with competing greedy approaches.
△ Less
Submitted 7 November, 2018; v1 submitted 18 December, 2017;
originally announced December 2017.
-
Sequential Randomized Matrix Factorization for Gaussian Processes: Efficient Predictions and Hyper-parameter Optimization
Authors:
Shaunak D. Bopardikar,
George S. Eskander Ekladious
Abstract:
This paper presents a sequential randomized lowrank matrix factorization approach for incrementally predicting values of an unknown function at test points using the Gaussian Processes framework. It is well-known that in the Gaussian processes framework, the computational bottlenecks are the inversion of the (regularized) kernel matrix and the computation of the hyper-parameters defining the kerne…
▽ More
This paper presents a sequential randomized lowrank matrix factorization approach for incrementally predicting values of an unknown function at test points using the Gaussian Processes framework. It is well-known that in the Gaussian processes framework, the computational bottlenecks are the inversion of the (regularized) kernel matrix and the computation of the hyper-parameters defining the kernel. The main contributions of this paper are two-fold. First, we formalize an approach to compute the inverse of the kernel matrix using randomized matrix factorization algorithms in a streaming scenario, i.e., data is generated incrementally over time. The metrics of accuracy and computational efficiency of the proposed method are compared against a batch approach based on use of randomized matrix factorization and an existing streaming approach based on approximating the Gaussian process by a finite set of basis vectors. Second, we extend the sequential factorization approach to a class of kernel functions for which the hyperparameters can be efficiently optimized. All results are demonstrated on two publicly available datasets.
△ Less
Submitted 19 November, 2017;
originally announced November 2017.
-
Convergence Analysis of Iterated Best Response for a Trusted Computation Game
Authors:
Shaunak D. Bopardikar,
Alberto Speranzon,
Cedric Langbort
Abstract:
We introduce a game of trusted computation in which a sensor equipped with limited computing power leverages a central node to evaluate a specified function over a large dataset, collected over time. We assume that the central computer can be under attack and we propose a strategy where the sensor retains a limited amount of the data to counteract the effect of attack. We formulate the problem as…
▽ More
We introduce a game of trusted computation in which a sensor equipped with limited computing power leverages a central node to evaluate a specified function over a large dataset, collected over time. We assume that the central computer can be under attack and we propose a strategy where the sensor retains a limited amount of the data to counteract the effect of attack. We formulate the problem as a two player game in which the sensor (defender) chooses an optimal fusion strategy using both the non-trusted output from the central computer and locally stored trusted data. The attacker seeks to compromise the computation by influencing the fused value through malicious manipulation of the data stored on the central node. We first characterize all Nash equilibria of this game, which turn out to be dependent on parameters known to both players. Next we adopt an Iterated Best Response (IBR) scheme in which, at each iteration, the central computer reveals its output to the sensor, who then computes its best response based on a linear combination of its private local estimate and the untrusted third-party output. We characterize necessary and sufficient conditions for convergence of the IBR along with numerical results which show that the convergence conditions are relatively tight.
△ Less
Submitted 7 November, 2016;
originally announced November 2016.
-
An Algebraic Topological Approach to Privacy: Numerical and Categorical Data
Authors:
Alberto Speranzon,
Shaunak D. Bopardikar
Abstract:
In this paper, we cast the classic problem of achieving k-anonymity for a given database as a problem in algebraic topology. Using techniques from this field of mathematics, we propose a framework for k-anonymity that brings new insights and algorithms to anonymize a database. We begin by addressing the simpler case when the data lies in a metric space. This case is instrumental to introduce the m…
▽ More
In this paper, we cast the classic problem of achieving k-anonymity for a given database as a problem in algebraic topology. Using techniques from this field of mathematics, we propose a framework for k-anonymity that brings new insights and algorithms to anonymize a database. We begin by addressing the simpler case when the data lies in a metric space. This case is instrumental to introduce the main ideas and notation. Specifically, by mapping a database to the Euclidean space and by considering the distance between datapoints, we introduce a simplicial representation of the data and show how concepts from algebraic topology, such as the nerve complex and persistent homology, can be applied to efficiently obtain the entire spectrum of k-anonymity of the database for various values of k and levels of generalization. For this representation, we provide an analytic characterization of conditions under which a given representation of the dataset is k-anonymous. We introduce a weighted barcode diagram which, in this context, becomes a computational tool to tradeoff data anonymity with data loss expressed as level of generalization. Some simulations results are used to illustrate the main idea of the paper. We conclude the paper with a discussion on how to extend this method to address the general case of a mix of categorical and metric data.
△ Less
Submitted 21 February, 2016;
originally announced February 2016.
-
Robust Belief Roadmap: Planning Under Intermittent Sensing
Authors:
Shaunak D. Bopardikar,
Brendan J. Englot,
Alberto Speranzon
Abstract:
In this paper, we extend the recent body of work on planning under uncertainty to include the fact that sensors may not provide any measurement owing to misdetection. This is caused either by adverse environmental conditions that prevent the sensors from making measurements or by the fundamental limitations of the sensors. Examples include RF-based ranging devices that intermittently do not receiv…
▽ More
In this paper, we extend the recent body of work on planning under uncertainty to include the fact that sensors may not provide any measurement owing to misdetection. This is caused either by adverse environmental conditions that prevent the sensors from making measurements or by the fundamental limitations of the sensors. Examples include RF-based ranging devices that intermittently do not receive the signal from beacons because of obstacles; the misdetection of features by a camera system in detrimental lighting conditions; a LIDAR sensor that is pointed at a glass-based material such as a window, etc.
The main contribution of this paper is twofold. We first show that it is possible to obtain an analytical bound on the performance of a state estimator under sensor misdetection occurring stochastically over time in the environment. We then show how this bound can be used in a sample-based path planning algorithm to produce a path that trades off accuracy and robustness. Computational results demonstrate the benefit of the approach and comparisons are made with the state of the art in path planning under state uncertainty.
△ Less
Submitted 15 September, 2013; v1 submitted 26 April, 2013;
originally announced April 2013.
-
k-Capture in Multiagent Pursuit Evasion, or the Lion and the Hyenas
Authors:
Shaunak D. Bopardikar,
Subhash Suri
Abstract:
We consider the following generalization of the classical pursuit-evasion problem, which we call k-capture. A group of n pursuers (hyenas) wish to capture an evader (lion) who is free to move in an m-dimensional Euclidean space, the pursuers and the evader can move with the same maximum speed, and at least k pursuers must simultaneously reach the evader's location to capture it. If fewer than k pu…
▽ More
We consider the following generalization of the classical pursuit-evasion problem, which we call k-capture. A group of n pursuers (hyenas) wish to capture an evader (lion) who is free to move in an m-dimensional Euclidean space, the pursuers and the evader can move with the same maximum speed, and at least k pursuers must simultaneously reach the evader's location to capture it. If fewer than k pursuers reach the evader, then those pursuers get destroyed by the evader. Under what conditions can the evader be k-captured? We study this problem in the discrete time, continuous space model and prove that k-capture is possible if and only there exists a time when the evader lies in the interior of the pursuers' k-Hull. When the pursuit occurs inside a compact, convex subset of the Euclidean space, we show through an easy constructive strategy that k-capture is always possible.
△ Less
Submitted 7 August, 2011;
originally announced August 2011.
-
Hide-and-Seek with Directional Sensing
Authors:
Alessandro Borri,
Shaunak D. Bopardikar,
Joao P. Hespanha,
Maria D. Di Benedetto
Abstract:
We consider a game played between a hider, who hides a static object in one of several possible positions in a bounded planar region, and a searcher, who wishes to reach the object by querying sensors placed in the plane. The searcher is a mobile agent, and whenever it physically visits a sensor, the sensor returns a random direction, corresponding to a half-plane in which the hidden object is loc…
▽ More
We consider a game played between a hider, who hides a static object in one of several possible positions in a bounded planar region, and a searcher, who wishes to reach the object by querying sensors placed in the plane. The searcher is a mobile agent, and whenever it physically visits a sensor, the sensor returns a random direction, corresponding to a half-plane in which the hidden object is located. We first present a novel search heuristic and characterize bounds on the expected distance covered before reaching the object. Next, we model this game as a large-dimensional zero-sum dynamic game and we apply a recently introduced randomized sampling technique that provides a probabilistic level of security to the hider. We observe that, when the randomized sampling approach is only allowed to select a very small number of samples, the cost of the heuristic is comparable to the security level provided by the randomized procedure. However, as we allow the number of samples to increase, the randomized procedure provides a higher probabilistic security level.
△ Less
Submitted 7 April, 2011;
originally announced April 2011.
-
On Vehicle Placement to Intercept Moving Targets
Authors:
Shaunak D. Bopardikar,
Stephen L. Smith,
Francesco Bullo
Abstract:
We address optimal placement of vehicles with simple motion to intercept a mobile target that arrives stochastically on a line segment. The optimality of vehicle placement is measured through a cost function associated with intercepting the target. With a single vehicle, we assume that the target moves (i) with fixed speed and in a fixed direction perpendicular to the line segment, or (ii) to maxi…
▽ More
We address optimal placement of vehicles with simple motion to intercept a mobile target that arrives stochastically on a line segment. The optimality of vehicle placement is measured through a cost function associated with intercepting the target. With a single vehicle, we assume that the target moves (i) with fixed speed and in a fixed direction perpendicular to the line segment, or (ii) to maximize the distance from the line segment, or (iii) to maximize intercept time. In each case, we show that the cost function is strictly convex, its gradient is smooth, and the optimal vehicle placement is obtained by a standard gradient-based optimization technique. With multiple vehicles, we assume that the target moves with fixed speed and in a fixed direction perpendicular to the line segment. We present a discrete time partitioning and gradient-based algorithm, and characterize conditions under which the algorithm asymptotically leads the vehicles to a set of critical configurations of the cost function.
△ Less
Submitted 3 March, 2011; v1 submitted 6 March, 2010;
originally announced March 2010.
-
A Dynamic Boundary Guarding Problem with Translating Targets
Authors:
Stephen L. Smith,
Shaunak D. Bopardikar,
Francesco Bullo
Abstract:
We introduce a problem in which a service vehicle seeks to guard a deadline (boundary) from dynamically arriving mobile targets. The environment is a rectangle and the deadline is one of its edges. Targets arrive continuously over time on the edge opposite the deadline, and move towards the deadline at a fixed speed. The goal for the vehicle is to maximize the fraction of targets that are captur…
▽ More
We introduce a problem in which a service vehicle seeks to guard a deadline (boundary) from dynamically arriving mobile targets. The environment is a rectangle and the deadline is one of its edges. Targets arrive continuously over time on the edge opposite the deadline, and move towards the deadline at a fixed speed. The goal for the vehicle is to maximize the fraction of targets that are captured before reaching the deadline. We consider two cases; when the service vehicle is faster than the targets, and; when the service vehicle is slower than the targets. In the first case we develop a novel vehicle policy based on computing longest paths in a directed acyclic graph. We give a lower bound on the capture fraction of the policy and show that the policy is optimal when the distance between the target arrival edge and deadline becomes very large. We present numerical results which suggest near optimal performance away from this limiting regime. In the second case, when the targets are slower than the vehicle, we propose a policy based on servicing fractions of the translational minimum Hamiltonian path. In the limit of low target speed and high arrival rate, the capture fraction of this policy is within a small constant factor of the optimal.
△ Less
Submitted 26 August, 2009;
originally announced August 2009.