Skip to main content

Showing 1–46 of 46 results for author: Koutsoukos, X

.
  1. arXiv:2504.17278  [pdf, other

    math.CO math.AC

    An Upper Bound on Generalized Cospectral Mates of Oriented Graphs Using Skew-Walk Matrices

    Authors: Muhammad Raza, Obaid Ullah Ahmed, Mudassir Shabbir, Xenofon Koutsoukos, Waseem Abbas

    Abstract: Let $D$ be an oriented graph with skew adjacency matrix $S(D)$. Two oriented graphs $D$ and $C$ are said to share the same generalized skew spectrum if $S(D)$ and $S(C)$ have the same eigenvalues, and $J-S(D)$ and $J-S(C)$ also have the same eigenvalues, where $J$ is the all-ones matrix. Such graphs that are not isomorphic are generalized cospectral mates. We derive tight upper bounds on the numbe… ▽ More

    Submitted 24 April, 2025; originally announced April 2025.

    MSC Class: 05C50

  2. arXiv:2502.17713  [pdf, other

    cs.LG cs.MA eess.SY

    Learning Backbones: Sparsifying Graphs through Zero Forcing for Effective Graph-Based Learning

    Authors: Obaid Ullah Ahmad, Anwar Said, Mudassir Shabbir, Xenofon Koutsoukos, Waseem Abbas

    Abstract: This paper introduces a novel framework for graph sparsification that preserves the essential learning attributes of original graphs, improving computational efficiency and reducing complexity in learning algorithms. We refer to these sparse graphs as "learning backbones". Our approach leverages the zero-forcing (ZF) phenomenon, a dynamic process on graphs with applications in network control. The… ▽ More

    Submitted 24 February, 2025; originally announced February 2025.

    Comments: 13th International Conference on Complex Networks and their Applications

  3. arXiv:2501.04610  [pdf, ps, other

    cs.LG

    Resilient Peer-to-peer Learning based on Adaptive Aggregation

    Authors: Chandreyee Bhowmick, Xenofon Koutsoukos

    Abstract: Collaborative learning in peer-to-peer networks offers the benefits of distributed learning while mitigating the risks associated with single points of failure inherent in centralized servers. However, adversarial workers pose potential threats by attempting to inject malicious information into the network. Thus, ensuring the resilience of peer-to-peer learning emerges as a pivotal research object… ▽ More

    Submitted 8 January, 2025; originally announced January 2025.

    Comments: 11 pages

    Journal ref: DCAI 2024

  4. arXiv:2412.02875  [pdf, other

    cs.LG cs.AI cs.CR

    Out-of-Distribution Detection for Neurosymbolic Autonomous Cyber Agents

    Authors: Ankita Samaddar, Nicholas Potteiger, Xenofon Koutsoukos

    Abstract: Autonomous agents for cyber applications take advantage of modern defense techniques by adopting intelligent agents with conventional and learning-enabled components. These intelligent agents are trained via reinforcement learning (RL) algorithms, and can learn, adapt to, reason about and deploy security rules to defend networked computer systems while maintaining critical operational workflows. H… ▽ More

    Submitted 3 December, 2024; originally announced December 2024.

    Comments: 9 pages, 10 figures, IEEE International Conference on AI in Cybersecurity (ICAIC), 2025

  5. arXiv:2411.12967  [pdf, other

    cs.RO cs.AI

    Shrinking POMCP: A Framework for Real-Time UAV Search and Rescue

    Authors: Yunuo Zhang, Baiting Luo, Ayan Mukhopadhyay, Daniel Stojcsics, Daniel Elenius, Anirban Roy, Susmit Jha, Miklos Maroti, Xenofon Koutsoukos, Gabor Karsai, Abhishek Dubey

    Abstract: Efficient path optimization for drones in search and rescue operations faces challenges, including limited visibility, time constraints, and complex information gathering in urban environments. We present a comprehensive approach to optimize UAV-based search and rescue operations in neighborhood areas, utilizing both a 3D AirSim-ROS2 simulator and a 2D simulator. The path planning problem is formu… ▽ More

    Submitted 19 November, 2024; originally announced November 2024.

    Comments: Accepted to the The 3rd International Conference on Assured Autonomy

  6. arXiv:2410.16383  [pdf, other

    cs.AI cs.CR cs.LG eess.SY

    Designing Robust Cyber-Defense Agents with Evolving Behavior Trees

    Authors: Nicholas Potteiger, Ankita Samaddar, Hunter Bergstrom, Xenofon Koutsoukos

    Abstract: Modern network defense can benefit from the use of autonomous systems, offloading tedious and time-consuming work to agents with standard and learning-enabled components. These agents, operating on critical network infrastructure, need to be robust and trustworthy to ensure defense against adaptive cyber-attackers and, simultaneously, provide explanations for their actions and network activity. Ho… ▽ More

    Submitted 21 October, 2024; originally announced October 2024.

    Comments: 10 pages, 8 figures

  7. arXiv:2409.11554  [pdf, ps, other

    cs.LG cs.SI

    PropEnc: A Property Encoder for Graph Neural Networks

    Authors: Anwar Said, Waseem Abbas, Xenofon Koutsoukos

    Abstract: Graph machine learning, particularly using graph neural networks, heavily relies on node features. However, many real-world systems, such as social and biological networks, lack node features due to privacy concerns, incomplete data, or collection limitations. Structural and positional encoding are commonly used to address this but are constrained by the maximum values of the encoded properties, s… ▽ More

    Submitted 9 June, 2025; v1 submitted 17 September, 2024; originally announced September 2024.

    Comments: conference paper

  8. arXiv:2405.03706  [pdf, other

    cs.LG

    Improving Graph Machine Learning Performance Through Feature Augmentation Based on Network Control Theory

    Authors: Anwar Said, Obaid Ullah Ahmad, Waseem Abbas, Mudassir Shabbir, Xenofon Koutsoukos

    Abstract: Network control theory (NCT) offers a robust analytical framework for understanding the influence of network topology on dynamic behaviors, enabling researchers to decipher how certain patterns of external control measures can steer system dynamics towards desired states. Distinguished from other structure-function methodologies, NCT's predictive capabilities can be coupled with deploying Graph Ne… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: Conference paper

  9. arXiv:2403.04923  [pdf, other

    cs.LG cs.MA eess.SY

    Control-based Graph Embeddings with Data Augmentation for Contrastive Learning

    Authors: Obaid Ullah Ahmad, Anwar Said, Mudassir Shabbir, Waseem Abbas, Xenofon Koutsoukos

    Abstract: In this paper, we study the problem of unsupervised graph representation learning by harnessing the control properties of dynamical networks defined on graphs. Our approach introduces a novel framework for contrastive learning, a widely prevalent technique for unsupervised representation learning. A crucial step in contrastive learning is the creation of 'augmented' graphs from the input graphs. T… ▽ More

    Submitted 17 April, 2024; v1 submitted 7 March, 2024; originally announced March 2024.

    Comments: Accepted in 2024 American Control Conference (ACC), July 8-12, 2024 in Toronto, ON, Canada

  10. arXiv:2310.12169  [pdf, other

    cs.SI cs.LG

    Enhanced Graph Neural Networks with Ego-Centric Spectral Subgraph Embeddings Augmentation

    Authors: Anwar Said, Mudassir Shabbir, Tyler Derr, Waseem Abbas, Xenofon Koutsoukos

    Abstract: Graph Neural Networks (GNNs) have shown remarkable merit in performing various learning-based tasks in complex networks. The superior performance of GNNs often correlates with the availability and quality of node-level features in the input networks. However, for many network applications, such node-level information may be missing or unreliable, thereby limiting the applicability and efficacy of… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

    Comments: 22nd IEEE International Conference on Machine Learning and Applications 2023

  11. arXiv:2310.02164  [pdf, other

    cs.LG

    A Survey of Graph Unlearning

    Authors: Anwar Said, Yuying Zhao, Tyler Derr, Mudassir Shabbir, Waseem Abbas, Xenofon Koutsoukos

    Abstract: Graph unlearning emerges as a crucial advancement in the pursuit of responsible AI, providing the means to remove sensitive data traces from trained models, thereby upholding the right to be forgotten. It is evident that graph machine learning exhibits sensitivity to data privacy and adversarial attacks, necessitating the application of graph unlearning techniques to address these concerns effecti… ▽ More

    Submitted 16 November, 2024; v1 submitted 23 August, 2023; originally announced October 2023.

    Comments: 22 page review paper on graph unlearning

  12. arXiv:2306.06202  [pdf, other

    cs.LG cs.AI q-bio.NC

    NeuroGraph: Benchmarks for Graph Machine Learning in Brain Connectomics

    Authors: Anwar Said, Roza G. Bayrak, Tyler Derr, Mudassir Shabbir, Daniel Moyer, Catie Chang, Xenofon Koutsoukos

    Abstract: Machine learning provides a valuable tool for analyzing high-dimensional functional neuroimaging data, and is proving effective in predicting various neurological conditions, psychiatric disorders, and cognitive patterns. In functional magnetic resonance imaging (MRI) research, interactions between brain regions are commonly modeled using graph-based representations. The potency of graph machine l… ▽ More

    Submitted 22 November, 2024; v1 submitted 9 June, 2023; originally announced June 2023.

    Comments: NeurIPS23

  13. arXiv:2306.05375  [pdf, other

    cs.CR cs.LG

    Sequential Graph Neural Networks for Source Code Vulnerability Identification

    Authors: Ammar Ahmed, Anwar Said, Mudassir Shabbir, Xenofon Koutsoukos

    Abstract: Vulnerability identification constitutes a task of high importance for cyber security. It is quite helpful for locating and fixing vulnerable functions in large applications. However, this task is rather challenging owing to the absence of reliable and adequately managed datasets and learning models. Existing solutions typically rely on human expertise to annotate datasets or specify features, whi… ▽ More

    Submitted 23 May, 2023; originally announced June 2023.

    Comments: 7 pages paper presented at HotSoS2023 conference

  14. arXiv:2306.03434  [pdf, other

    cs.LG cs.DM

    Learning-Based Heuristic for Combinatorial Optimization of the Minimum Dominating Set Problem using Graph Convolutional Networks

    Authors: Abihith Kothapalli, Mudassir Shabbir, Xenofon Koutsoukos

    Abstract: A dominating set of a graph $\mathcal{G=(V, E)}$ is a subset of vertices $S\subseteq\mathcal{V}$ such that every vertex $v\in \mathcal{V} \setminus S$ outside the dominating set is adjacent to a vertex $u\in S$ within the set. The minimum dominating set problem seeks to find a dominating set of minimum cardinality and is a well-established NP-hard combinatorial optimization problem. We propose a n… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

  15. arXiv:2303.05785  [pdf, other

    eess.IV cs.CV cs.LG

    Scaling Up 3D Kernels with Bayesian Frequency Re-parameterization for Medical Image Segmentation

    Authors: Ho Hin Lee, Quan Liu, Shunxing Bao, Qi Yang, Xin Yu, Leon Y. Cai, Thomas Li, Yuankai Huo, Xenofon Koutsoukos, Bennett A. Landman

    Abstract: With the inspiration of vision transformers, the concept of depth-wise convolution revisits to provide a large Effective Receptive Field (ERF) using Large Kernel (LK) sizes for medical image segmentation. However, the segmentation performance might be saturated and even degraded as the kernel sizes scaled up (e.g., $21\times 21\times 21$) in a Convolutional Neural Network (CNN). We hypothesize tha… ▽ More

    Submitted 5 June, 2023; v1 submitted 10 March, 2023; originally announced March 2023.

    Comments: Accepted to MICCAI 2023 (top 13.6%), both codes and pretrained models are available at: https://github.com/MASILab/RepUX-Net

  16. arXiv:2206.05550  [pdf, other

    cs.ET cs.CY math.NA

    Web-Based Platform for Evaluation of Resilient and Transactive Smart-Grids

    Authors: Himanshu Neema, Harsh Vardhan, Carlos Barreto, Xenofon Koutsoukos

    Abstract: Today's smart-grids have seen a clear rise in new ways of energy generation, transmission, and storage. This has not only introduced a huge degree of variability, but also a continual shift away from traditionally centralized generation and storage to distributed energy resources (DERs). In addition, the distributed sensors, energy generators and storage devices, and networking have led to a huge… ▽ More

    Submitted 11 June, 2022; originally announced June 2022.

  17. arXiv:2203.08441  [pdf, other

    cs.CV cs.AI

    Open Set Recognition using Vision Transformer with an Additional Detection Head

    Authors: Feiyang Cai, Zhenkai Zhang, Jie Liu, Xenofon Koutsoukos

    Abstract: Deep neural networks have demonstrated prominent capacities for image classification tasks in a closed set setting, where the test data come from the same distribution as the training data. However, in a more realistic open set scenario, traditional classifiers with incomplete knowledge cannot tackle test data that are not from the training classes. Open set recognition (OSR) aims to address this… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: under review

  18. Reliable Probability Intervals For Classification Using Inductive Venn Predictors Based on Distance Learning

    Authors: Dimitrios Boursinos, Xenofon Koutsoukos

    Abstract: Deep neural networks are frequently used by autonomous systems for their ability to learn complex, non-linear data patterns and make accurate predictions in dynamic environments. However, their use as black boxes introduces risks as the confidence in each prediction is unknown. Different frameworks have been proposed to compute accurate confidence measures along with the predictions but at the sam… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: Published in IEEE International Conference on Omni-Layer Intelligent Systems (COINS), 2021

    Journal ref: IEEE International Conference on Omni-Layer Intelligent Systems (COINS), 2021, pp. 1-7

  19. Improving Prediction Confidence in Learning-Enabled Autonomous Systems

    Authors: Dimitrios Boursinos, Xenofon Koutsoukos

    Abstract: Autonomous systems use extensively learning-enabled components such as deep neural networks (DNNs) for prediction and decision making. In this paper, we utilize a feedback loop between learning-enabled components used for classification and the sensors of an autonomous system in order to improve the confidence of the predictions. We design a classifier using Inductive Conformal Prediction (ICP) ba… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: Published in Dynamic Data Driven Applications Systems. DDDAS 2020

    Journal ref: Dynamic Data Driven Applications Systems. DDDAS 2020. Lecture Notes in Computer Science, vol 12312. Springer

  20. Assurance Monitoring of Learning Enabled Cyber-Physical Systems Using Inductive Conformal Prediction based on Distance Learning

    Authors: Dimitrios Boursinos, Xenofon Koutsoukos

    Abstract: Machine learning components such as deep neural networks are used extensively in Cyber-Physical Systems (CPS). However, such components may introduce new types of hazards that can have disastrous consequences and need to be addressed for engineering trustworthy systems. Although deep neural networks offer advanced capabilities, they must be complemented by engineering methods and practices that al… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: Published in Artificial Intelligence for Engineering Design, Analysis and Manufacturing. arXiv admin note: text overlap with arXiv:2001.05014

    Journal ref: Artificial Intelligence for Engineering Design, Analysis and Manufacturing, 35(2), 2021, 251-264

  21. arXiv:2105.06011  [pdf, other

    eess.SY cs.DM

    Edge Augmentation with Controllability Constraints in Directed Laplacian Networks

    Authors: Waseem Abbas, Mudassir Shabbir, Yasin Yazıcıoglu, Xenofon Koutsoukos

    Abstract: In this paper, we study the maximum edge augmentation problem in directed Laplacian networks to improve their robustness while preserving lower bounds on their strong structural controllability (SSC). Since adding edges could adversely impact network controllability, the main objective is to maximally densify a given network by selectively adding missing edges while ensuring that SSC of the networ… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

  22. arXiv:2104.06613  [pdf

    cs.LG

    Detection of Dataset Shifts in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression

    Authors: Feiyang Cai, Ali I. Ozdagli, Xenofon Koutsoukos

    Abstract: Cyber-physical systems (CPSs) use learning-enabled components (LECs) extensively to cope with various complex tasks under high-uncertainty environments. However, the dataset shifts between the training and testing phase may lead the LECs to become ineffective to make large-error predictions, and further, compromise the safety of the overall system. In our paper, we first provide the formal definit… ▽ More

    Submitted 13 April, 2021; originally announced April 2021.

    Comments: Accepted by the 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS2021)

  23. arXiv:2010.13032  [pdf, other

    cs.LG stat.ML

    Byzantine Resilient Distributed Multi-Task Learning

    Authors: Jiani Li, Waseem Abbas, Xenofon Koutsoukos

    Abstract: Distributed multi-task learning provides significant advantages in multi-agent networks with heterogeneous data sources where agents aim to learn distinct but correlated models simultaneously.However, distributed algorithms for learning relatedness among tasks are not resilient in the presence of Byzantine agents. In this paper, we present an approach for Byzantine resilient distributed multi-task… ▽ More

    Submitted 7 January, 2021; v1 submitted 25 October, 2020; originally announced October 2020.

    Journal ref: Thirty-fourth Conference on Neural Information Processing Systems (NeurIPS 2020)

  24. arXiv:2009.02417  [pdf, other

    eess.SY

    Interplay Between Resilience and Accuracy in Resilient Vector Consensus in Multi-Agent Networks

    Authors: Waseem Abbas, Mudassir Shabbir, Jiani Li, Xenofon Koutsoukos

    Abstract: In this paper, we study the relationship between resilience and accuracy in the resilient distributed multi-dimensional consensus problem. We consider a network of agents, each of which has a state in $\mathbb{R}^d$. Some agents in the network are adversarial and can change their states arbitrarily. The normal (non-adversarial) agents interact locally and update their states to achieve consensus a… ▽ More

    Submitted 4 September, 2020; originally announced September 2020.

    Comments: IEEE Conference on Decision and Control (CDC) 2020

  25. arXiv:2008.07495  [pdf, other

    eess.SY math.CO math.OC

    Strong Structural Controllability of Diffusively Coupled Networks: Comparison of Bounds Based on Distances and Zero Forcing

    Authors: Yasin Yazicioglu, Mudassir Shabbir, Waseem Abbas, Xenofon Koutsoukos

    Abstract: We study the strong structural controllability (SSC) of diffusively coupled networks, where the external control inputs are injected to only some nodes, namely the leaders. For such systems, one measure of controllability is the dimension of strong structurally controllable subspace, which is equal to the smallest possible rank of controllability matrix under admissible (positive) coupling weights… ▽ More

    Submitted 17 August, 2020; originally announced August 2020.

    Comments: Accepted to the 59th IEEE Conference on Decision and Control

  26. Resilient Distributed Diffusion for Multi-task Estimation

    Authors: Jiani Li, Xenofon Koutsoukos

    Abstract: Distributed diffusion is a powerful algorithm for multi-task state estimation which enables networked agents to interact with neighbors to process input data and diffuse information across the network. Compared to a centralized approach, diffusion offers multiple advantages that include robustness to node and link failures. In this paper, we consider distributed diffusion for multi-task estimation… ▽ More

    Submitted 23 March, 2020; originally announced March 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2003.10563

    Journal ref: 2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS), New York, NY, 2018, pp. 93-102

  27. arXiv:2003.10804  [pdf, other

    cs.LG stat.ML

    Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression

    Authors: Feiyang Cai, Jiani Li, Xenofon Koutsoukos

    Abstract: Learning-enabled components (LECs) are widely used in cyber-physical systems (CPS) since they can handle the uncertainty and variability of the environment and increase the level of autonomy. However, it has been shown that LECs such as deep neural networks (DNN) are not robust and adversarial examples can cause the model to make a false prediction. The paper considers the problem of efficiently d… ▽ More

    Submitted 21 March, 2020; originally announced March 2020.

    Comments: Accepted by Workshop on Assured Autonomous Systems (WAAS2020). arXiv admin note: text overlap with arXiv:2001.10494

  28. Resilient Distributed Diffusion in Networks with Adversaries

    Authors: Jiani Li, Waseem Abbas, Xenofon Koutsoukos

    Abstract: In this paper, we study resilient distributed diffusion for multi-task estimation in the presence of adversaries where networked agents must estimate distinct but correlated states of interest by processing streaming data. We show that in general diffusion strategies are not resilient to malicious agents that do not adhere to the diffusion-based information processing rules. In particular, by expl… ▽ More

    Submitted 23 March, 2020; originally announced March 2020.

    Journal ref: in IEEE Transactions on Signal and Information Processing over Networks, vol. 6, pp. 1-17, 2020

  29. arXiv:2003.05497  [pdf, other

    eess.SY

    Resilient Distributed Vector Consensus Using Centerpoints

    Authors: Waseem Abbas, Mudassir Shabbir, Jiani Li, Xenofon Koutsoukos

    Abstract: In this paper, we study the resilient vector consensus problem in networks with adversarial agents and improve resilience guarantees of existing algorithms. A common approach to achieving resilient vector consensus is that every non-adversarial (or normal) agent in the network updates its state by moving towards a point in the convex hull of its \emph{normal} neighbors' states. Since an agent cann… ▽ More

    Submitted 14 August, 2021; v1 submitted 11 March, 2020; originally announced March 2020.

  30. arXiv:2003.05490  [pdf, other

    eess.SY

    Improving Network Robustness through Edge Augmentation While Preserving Strong Structural Controllability

    Authors: Waseem Abbas, Mudassir Shabbir, Hassan Jaleel, Xenofon Koutsoukos

    Abstract: In this paper, we consider a network of agents with Laplacian dynamics, and study the problem of improving network robustness by adding a maximum number of edges within the network while preserving a lower bound on its strong structural controllability (SSC) at the same time. Edge augmentation increases network's robustness to noise and structural changes, however, it could also deteriorate networ… ▽ More

    Submitted 11 March, 2020; originally announced March 2020.

    Comments: American Control Conference (ACC)2020, Denver

  31. Trusted Confidence Bounds for Learning Enabled Cyber-Physical Systems

    Authors: Dimitrios Boursinos, Xenofon Koutsoukos

    Abstract: Cyber-physical systems (CPS) can benefit by the use of learning enabled components (LECs) such as deep neural networks (DNNs) for perception and decision making tasks. However, DNNs are typically non-transparent making reasoning about their predictions very difficult, and hence their application to safety-critical systems is very challenging. LECs could be integrated easier into CPS if their predi… ▽ More

    Submitted 20 April, 2020; v1 submitted 11 March, 2020; originally announced March 2020.

    Comments: Accepted at the Workshop on Assured Autonomous Systems at the IEEE Symposium on Security and Privacy 2020

    Journal ref: IEEE Security and Privacy Workshops (SPW), 2020, pp. 228-233

  32. arXiv:2001.10494  [pdf, other

    cs.LG eess.SY stat.ML

    Real-time Out-of-distribution Detection in Learning-Enabled Cyber-Physical Systems

    Authors: Feiyang Cai, Xenofon Koutsoukos

    Abstract: Cyber-physical systems (CPS) greatly benefit by using machine learning components that can handle the uncertainty and variability of the real-world. Typical components such as deep neural networks, however, introduce new types of hazards that may impact system safety. The system behavior depends on data that are available only during runtime and may be different than the data used for training. Ou… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

    Comments: Accepted by 11th International Conference on Cyber-Physical Systems (ICCPS2020)

  33. arXiv:2001.05014  [pdf, other

    cs.LG stat.ML

    Assurance Monitoring of Cyber-Physical Systems with Machine Learning Components

    Authors: Dimitrios Boursinos, Xenofon Koutsoukos

    Abstract: Machine learning components such as deep neural networks are used extensively in Cyber-Physical Systems (CPS). However, they may introduce new types of hazards that can have disastrous consequences and need to be addressed for engineering trustworthy systems. Although deep neural networks offer advanced capabilities, they must be complemented by engineering methods and practices that allow effecti… ▽ More

    Submitted 17 April, 2020; v1 submitted 14 January, 2020; originally announced January 2020.

    Comments: Accepted at TMCE 2020

  34. arXiv:1909.03565  [pdf, other

    eess.SY math.DS

    Computation of the Distance-based Bound on Strong Structural Controllability in Networks

    Authors: Mudassir Shabbir, Waseem Abbas, A. Yasin Yazicioglu, Xenofon Koutsoukos

    Abstract: In this paper, we study the problem of computing a tight lower bound on the dimension of the strong structurally controllable subspace (SSCS) in networks with Laplacian dynamics. The bound is based on a sequence of vectors containing the distances between leaders (nodes with external inputs) and followers (remaining nodes) in the underlying network graph. Such vectors are referred to as the distan… ▽ More

    Submitted 13 August, 2021; v1 submitted 8 September, 2019; originally announced September 2019.

  35. arXiv:1808.09090  [pdf, other

    cs.CR

    Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening

    Authors: Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: As the Industrial Internet of Things (IIot) becomes more prevalent in critical application domains, ensuring security and resilience in the face of cyber-attacks is becoming an issue of paramount importance. Cyber-attacks against critical infrastructures, for example, against smart water-distribution and transportation systems, pose serious threats to public health and safety. Owing to the severit… ▽ More

    Submitted 27 August, 2018; originally announced August 2018.

  36. arXiv:1808.08349  [pdf, other

    cs.CR cs.GT

    Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game

    Authors: Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In recent years, state-of-the-art traffic-control devices have evolved from standalone hardware to networked smart devices. Smart traffic control enables operators to decrease traffic congestion and environmental impact by acquiring real-time traffic data and changing traffic signals from fixed to adaptive schedules. However, these capabilities have inadvertently exposed traffic control to a wide… ▽ More

    Submitted 2 August, 2019; v1 submitted 24 August, 2018; originally announced August 2018.

  37. arXiv:1804.11022  [pdf, ps, other

    cs.AI

    Adversarial Regression for Detecting Attacks in Cyber-Physical Systems

    Authors: Amin Ghafouri, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: Attacks in cyber-physical systems (CPS) which manipulate sensor readings can cause enormous physical damage if undetected. Detection of attacks on sensors is crucial to mitigate this issue. We study supervised regression as a means to detect anomalous sensor readings, where each sensor's measurement is predicted as a function of other sensors. We show that several common learning approaches in thi… ▽ More

    Submitted 29 April, 2018; originally announced April 2018.

  38. Optimal Detection of Faulty Traffic Sensors Used in Route Planning

    Authors: Amin Ghafouri, Aron Laszka, Abhishek Dubey, Xenofon Koutsoukos

    Abstract: In a smart city, real-time traffic sensors may be deployed for various applications, such as route planning. Unfortunately, sensors are prone to failures, which result in erroneous traffic data. Erroneous data can adversely affect applications such as route planning, and can cause increased travel time. To minimize the impact of sensor failures, we must detect them promptly and accurately. However… ▽ More

    Submitted 16 March, 2017; v1 submitted 8 February, 2017; originally announced February 2017.

    Comments: Proceedings of The 2nd Workshop on Science of Smart City Operations and Platforms Engineering (SCOPE 2017), Pittsburgh, PA USA, April 2017, 6 pages

  39. arXiv:1608.07329  [pdf, ps, other

    cs.NI

    Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks

    Authors: Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In networked systems, monitoring devices such as sensors are typically deployed to monitor various target locations. Targets are the points in the physical space at which events of some interest, such as random faults or attacks, can occur. Most often, these devices have limited energy supplies, and they can operate for a limited duration. As a result, energy-efficient monitoring of various target… ▽ More

    Submitted 25 August, 2016; originally announced August 2016.

  40. arXiv:1606.06707  [pdf, other

    cs.GT cs.CR eess.SY

    Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments

    Authors: Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In cyber-physical systems, malicious and resourceful attackers could penetrate the system through cyber means and cause significant physical damage. Consequently, detection of such attacks becomes integral towards making these systems resilient to attacks. To achieve this objective, intrusion detection systems (IDS) that are able to detect malicious behavior can be deployed. However, practical IDS… ▽ More

    Submitted 8 February, 2017; v1 submitted 21 June, 2016; originally announced June 2016.

    Comments: Decision and Game Theory for Security: 7th International Conference, GameSec 2016, New York, NY, USA

  41. arXiv:1606.06699  [pdf, other

    eess.SY cs.CR

    Resilient Supervisory Control of Autonomous Intersections in the Presence of Sensor Attacks

    Authors: Amin Ghafouri, Xenofon D. Koutsoukos

    Abstract: Cyber-physical systems (CPS), such as autonomous vehicles crossing an intersection, are vulnerable to cyber-attacks and their safety-critical nature makes them a target for malicious adversaries. This paper studies the problem of supervisory control of autonomous intersections in the presence of sensor attacks. Sensor attacks are performed when an adversary gains access to the transmission channel… ▽ More

    Submitted 21 June, 2016; originally announced June 2016.

    Comments: 8 pages, submitted to 55th IEEE Conference on Decision and Control (CDC 2016)

  42. arXiv:1606.06698  [pdf, other

    eess.SY cs.CR

    Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering

    Authors: Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: Recent experimental studies have shown that traffic management systems are vulnerable to cyber-attacks on sensor data. This paper studies the vulnerability of fixed-time control of signalized intersections when sensors measuring traffic flow information are compromised and perturbed by an adversary. The problems are formulated by considering three malicious objectives: 1) worst-case network accumu… ▽ More

    Submitted 8 February, 2017; v1 submitted 21 June, 2016; originally announced June 2016.

    Journal ref: 9th International Symposium on Resilient Control Systems (ISRCS), Chicago, IL, pp. 130-135 (2016)

  43. arXiv:1507.07134  [pdf, other

    eess.SY

    Sensor placement for fault location identification in water networks: A minimum test cover approach

    Authors: Lina Sela Perelman, Waseem Abbas, Xenofon Koutsoukos, Saurabh Amin

    Abstract: This paper focuses on the optimal sensor placement problem for the identification of pipe failure locations in large-scale urban water systems. The problem involves selecting the minimum number of sensors such that every pipe failure can be uniquely localized. This problem can be viewed as a minimum test cover (MTC) problem, which is NP-hard. We consider two approaches to obtain approximate soluti… ▽ More

    Submitted 21 March, 2016; v1 submitted 25 July, 2015; originally announced July 2015.

  44. arXiv:1503.04473  [pdf, ps, other

    cs.DM cs.CR eess.SY

    Guarding Networks Through Heterogeneous Mobile Guards

    Authors: Waseem Abbas, Sajal Bhatia, Xenofon Koutsoukos

    Abstract: In this article, the issue of guarding multi-agent systems against a sequence of intruder attacks through mobile heterogeneous guards (guards with different ranges) is discussed. The article makes use of graph theoretic abstractions of such systems in which agents are the nodes of a graph and edges represent interconnections between agents. Guards represent specialized mobile agents on specific no… ▽ More

    Submitted 15 March, 2015; originally announced March 2015.

    Comments: American Control Conference, Chicago, IL, 2015

  45. arXiv:1303.2709  [pdf, ps, other

    eess.SY

    Resilient Continuous-Time Consensus in Fractional Robust Networks

    Authors: Heath J. LeBlanc, Haotian Zhang, Shreyas Sundaram, Xenofon Koutsoukos

    Abstract: In this paper, we study the continuous-time consensus problem in the presence of adversaries. The networked multi-agent system is modeled as a switched system, where the normal agents have integrator dynamics and the switching signal determines the topology of the network. We consider several models of omniscient adversaries under the assumption that at most a fraction of any normal agent's neighb… ▽ More

    Submitted 11 March, 2013; originally announced March 2013.

    Comments: to appear at the American Control Conference in June 2013

  46. arXiv:1205.3676  [pdf, ps, other

    cs.DC eess.SY

    Consensus of Multi-Agent Networks in the Presence of Adversaries Using Only Local Information

    Authors: Heath J. LeBlanc, Haotian Zhang, Shreyas Sundaram, Xenofon Koutsoukos

    Abstract: This paper addresses the problem of resilient consensus in the presence of misbehaving nodes. Although it is typical to assume knowledge of at least some nonlocal information when studying secure and fault-tolerant consensus algorithms, this assumption is not suitable for large-scale dynamic networks. To remedy this, we emphasize the use of local strategies to deal with resilience to security brea… ▽ More

    Submitted 20 June, 2012; v1 submitted 22 February, 2012; originally announced May 2012.

    Comments: This report contains the proofs of the results presented at HiCoNS 2012

    ACM Class: C.2.4; H.1.1