-
A Distributionally Robust Approach to Regret Optimal Control using the Wasserstein Distance
Authors:
Feras Al Taha,
Shuhao Yan,
Eilyan Bitar
Abstract:
This paper proposes a distributionally robust approach to regret optimal control of discrete-time linear dynamical systems with quadratic costs subject to a stochastic additive disturbance on the state process. The underlying probability distribution of the disturbance process is unknown, but assumed to lie in a given ball of distributions defined in terms of the type-2 Wasserstein distance. In th…
▽ More
This paper proposes a distributionally robust approach to regret optimal control of discrete-time linear dynamical systems with quadratic costs subject to a stochastic additive disturbance on the state process. The underlying probability distribution of the disturbance process is unknown, but assumed to lie in a given ball of distributions defined in terms of the type-2 Wasserstein distance. In this framework, strictly causal linear disturbance feedback controllers are designed to minimize the worst-case expected regret. The regret incurred by a controller is defined as the difference between the cost it incurs in response to a realization of the disturbance process and the cost incurred by the optimal noncausal controller which has perfect knowledge of the disturbance process realization at the outset. Building on a well-established duality theory for optimal transport problems, we derive a reformulation of the minimax regret optimal control problem as a tractable semidefinite program. Using the equivalent dual reformulation, we characterize a worst-case distribution achieving the worst-case expected regret in relation to the distribution at the center of the Wasserstein ball. We compare the minimax regret optimal control design method with the distributionally robust optimal control approach using an illustrative example and numerical experiments.
△ Less
Submitted 16 August, 2023; v1 submitted 13 April, 2023;
originally announced April 2023.
-
Data-Driven Approximations of Chance Constrained Programs in Nonstationary Environments
Authors:
Shuhao Yan,
Francesca Parise,
Eilyan Bitar
Abstract:
We study sample average approximations (SAA) of chance constrained programs. SAA methods typically approximate the actual distribution in the chance constraint using an empirical distribution constructed from random samples assumed to be independent and identically distributed according to the actual distribution. In this paper, we consider a nonstationary variant of this problem, where the random…
▽ More
We study sample average approximations (SAA) of chance constrained programs. SAA methods typically approximate the actual distribution in the chance constraint using an empirical distribution constructed from random samples assumed to be independent and identically distributed according to the actual distribution. In this paper, we consider a nonstationary variant of this problem, where the random samples are assumed to be independently drawn in a sequential fashion from an unknown and possibly time-varying distribution. This nonstationarity may be driven by changing environmental conditions present in many real-world applications. To account for the potential nonstationarity in the data generation process, we propose a novel robust SAA method exploiting information about the Wasserstein distance between the sequence of data-generating distributions and the actual chance constraint distribution. As a key result, we obtain distribution-free estimates of the sample size required to ensure that the robust SAA method will yield solutions that are feasible for the chance constraint under the actual distribution with high confidence.
△ Less
Submitted 7 May, 2022;
originally announced May 2022.
-
Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving
Authors:
James Tu,
Huichen Li,
Xinchen Yan,
Mengye Ren,
Yun Chen,
Ming Liang,
Eilyan Bitar,
Ersin Yumer,
Raquel Urtasun
Abstract:
Modern self-driving perception systems have been shown to improve upon processing complementary inputs such as LiDAR with images. In isolation, 2D images have been found to be extremely vulnerable to adversarial attacks. Yet, there have been limited studies on the adversarial robustness of multi-modal models that fuse LiDAR features with image features. Furthermore, existing works do not consider…
▽ More
Modern self-driving perception systems have been shown to improve upon processing complementary inputs such as LiDAR with images. In isolation, 2D images have been found to be extremely vulnerable to adversarial attacks. Yet, there have been limited studies on the adversarial robustness of multi-modal models that fuse LiDAR features with image features. Furthermore, existing works do not consider physically realizable perturbations that are consistent across the input modalities. In this paper, we showcase practical susceptibilities of multi-sensor detection by placing an adversarial object on top of a host vehicle. We focus on physically realizable and input-agnostic attacks as they are feasible to execute in practice, and show that a single universal adversary can hide different host vehicles from state-of-the-art multi-modal detectors. Our experiments demonstrate that successful attacks are primarily caused by easily corrupted image features. Furthermore, we find that in modern sensor fusion methods which project image features into 3D, adversarial attacks can exploit the projection process to generate false positives across distant regions in 3D. Towards more robust multi-modal perception systems, we show that adversarial training with feature denoising can boost robustness to such attacks significantly. However, we find that standard adversarial defenses still struggle to prevent false positives which are also caused by inaccurate associations between 3D LiDAR points and 2D pixels.
△ Less
Submitted 7 January, 2022; v1 submitted 17 January, 2021;
originally announced January 2021.
-
Nonparametric Estimation of Uncertainty Sets for Robust Optimization
Authors:
Polina Alexeenko,
Eilyan Bitar
Abstract:
We investigate a data-driven approach to constructing uncertainty sets for robust optimization problems, where the uncertain problem parameters are modeled as random variables whose joint probability distribution is not known. Relying only on independent samples drawn from this distribution, we provide a nonparametric method to estimate uncertainty sets whose probability mass is guaranteed to appr…
▽ More
We investigate a data-driven approach to constructing uncertainty sets for robust optimization problems, where the uncertain problem parameters are modeled as random variables whose joint probability distribution is not known. Relying only on independent samples drawn from this distribution, we provide a nonparametric method to estimate uncertainty sets whose probability mass is guaranteed to approximate a given target mass within a given tolerance with high confidence. The nonparametric estimators that we consider are also shown to obey distribution-free finite-sample performance bounds that imply their convergence in probability to the given target mass. In addition to being efficient to compute, the proposed estimators result in uncertainty sets that yield computationally tractable robust optimization problems for a large family of constraint functions.
△ Less
Submitted 20 September, 2020; v1 submitted 6 April, 2020;
originally announced April 2020.
-
Safe Linear Stochastic Bandits
Authors:
Kia Khezeli,
Eilyan Bitar
Abstract:
We introduce the safe linear stochastic bandit framework---a generalization of linear stochastic bandits---where, in each stage, the learner is required to select an arm with an expected reward that is no less than a predetermined (safe) threshold with high probability. We assume that the learner initially has knowledge of an arm that is known to be safe, but not necessarily optimal. Leveraging on…
▽ More
We introduce the safe linear stochastic bandit framework---a generalization of linear stochastic bandits---where, in each stage, the learner is required to select an arm with an expected reward that is no less than a predetermined (safe) threshold with high probability. We assume that the learner initially has knowledge of an arm that is known to be safe, but not necessarily optimal. Leveraging on this assumption, we introduce a learning algorithm that systematically combines known safe arms with exploratory arms to safely expand the set of safe arms over time, while facilitating safe greedy exploitation in subsequent stages. In addition to ensuring the satisfaction of the safety constraint at every stage of play, the proposed algorithm is shown to exhibit an expected regret that is no more than $O(\sqrt{T}\log (T))$ after $T$ stages of play.
△ Less
Submitted 21 November, 2019;
originally announced November 2019.
-
Transparency and Control in Platforms for Networked Markets
Authors:
John Pang,
Weixuan Lin,
Hu Fu,
Jack Kleeman,
Eilyan Bitar,
Adam Wierman
Abstract:
In this paper, we analyze the worst case efficiency loss of online platform designs under a networked Cournot competition model. Inspired by some of the largest platforms in operation today, the platform designs that we consider examine the trade-off between transparency and control. Our results show that open access designs incentivize increased production towards perfectly competitive levels and…
▽ More
In this paper, we analyze the worst case efficiency loss of online platform designs under a networked Cournot competition model. Inspired by some of the largest platforms in operation today, the platform designs that we consider examine the trade-off between transparency and control. Our results show that open access designs incentivize increased production towards perfectly competitive levels and limit efficiency loss, while controlled allocation designs lead to producer-platform incentive misalignment, resulting in low participation and unbounded efficiency loss. We also show that discriminatory access designs balance transparency and control, achieving the best of both worlds by maintaining high participation rates while limiting efficiency loss.
△ Less
Submitted 29 September, 2020; v1 submitted 11 March, 2019;
originally announced March 2019.
-
A Structural Characterization of Market Power in Electric Power Networks
Authors:
Weixuan Lin,
Eilyan Bitar
Abstract:
We consider a market in which capacity-constrained generators compete in scalar-parameterized supply functions to serve an inelastic demand spread throughout a transmission constrained power network. The market clears according to a locational marginal pricing mechanism, in which the independent system operator (ISO) determines the generators' production quantities to minimize the revealed cost of…
▽ More
We consider a market in which capacity-constrained generators compete in scalar-parameterized supply functions to serve an inelastic demand spread throughout a transmission constrained power network. The market clears according to a locational marginal pricing mechanism, in which the independent system operator (ISO) determines the generators' production quantities to minimize the revealed cost of meeting demand, while ensuring that network transmission and generator capacity constraints are met. Under the stylizing assumption that both the ISO and generators choose their strategies simultaneously, we establish the existence of Nash equilibria for the underlying market, and derive an upper bound on the allocative efficiency loss at Nash equilibrium relative to the socially optimal level. We also characterize an upper bound on the markup of locational marginal prices at Nash equilibrium above their perfectly competitive levels. Of particular relevance to ex ante market power monitoring, these bounds reveal the role of certain market structures---specifically, the \emph{market share} and \emph{residual supply index} of a producer---in predicting the degree to which that producer is able to exercise market power to influence the market outcome to its advantage. Finally, restricting our attention to the simpler setting of a two-node power network, we provide a characterization of market structures under which a Braess-like paradox occurs due to the exercise of market power---that is to say, we provide a necessary and sufficient condition on market structure under which the strengthening of the network's transmission line capacity results in the (counterintuitive) increase in the total cost of generation at Nash equilibrium.
△ Less
Submitted 27 January, 2019; v1 submitted 26 September, 2017;
originally announced September 2017.
-
An Online Learning Approach to Buying and Selling Demand Response
Authors:
Kia Khezeli,
Eilyan Bitar
Abstract:
We adopt the perspective of an aggregator, which seeks to coordinate its purchase of demand reductions from a fixed group of residential electricity customers, with its sale of the aggregate demand reduction in a two-settlement wholesale energy market. The aggregator procures reductions in demand by offering its customers a uniform price for reductions in consumption relative to their predetermine…
▽ More
We adopt the perspective of an aggregator, which seeks to coordinate its purchase of demand reductions from a fixed group of residential electricity customers, with its sale of the aggregate demand reduction in a two-settlement wholesale energy market. The aggregator procures reductions in demand by offering its customers a uniform price for reductions in consumption relative to their predetermined baselines. Prior to its realization of the aggregate demand reduction, the aggregator must also determine how much energy to sell into the two-settlement energy market. In the day-ahead market, the aggregator commits to a forward contract, which calls for the delivery of energy in the real-time market. The underlying aggregate demand curve, which relates the aggregate demand reduction to the aggregator's offered price, is assumed to be affine and subject to unobservable, random shocks. Assuming that both the parameters of the demand curve and the distribution of the random shocks are initially unknown to the aggregator, we investigate the extent to which the aggregator might dynamically adapt its offered prices and forward contracts to maximize its expected profit over a time window of $T$ days. Specifically, we design a dynamic pricing and contract offering policy that resolves the aggregator's need to learn the unknown demand model with its desire to maximize its cumulative expected profit over time. In particular, the proposed pricing policy is proven to incur a regret over $T$ days that is no greater than $O(\log(T)\sqrt{T})$.
△ Less
Submitted 27 December, 2017; v1 submitted 23 July, 2017;
originally announced July 2017.
-
Risk-Sensitive Learning and Pricing for Demand Response
Authors:
Kia Khezeli,
Eilyan Bitar
Abstract:
We consider the setting in which an electric power utility seeks to curtail its peak electricity demand by offering a fixed group of customers a uniform price for reductions in consumption relative to their predetermined baselines. The underlying demand curve, which describes the aggregate reduction in consumption in response to the offered price, is assumed to be affine and subject to unobservabl…
▽ More
We consider the setting in which an electric power utility seeks to curtail its peak electricity demand by offering a fixed group of customers a uniform price for reductions in consumption relative to their predetermined baselines. The underlying demand curve, which describes the aggregate reduction in consumption in response to the offered price, is assumed to be affine and subject to unobservable random shocks. Assuming that both the parameters of the demand curve and the distribution of the random shocks are initially unknown to the utility, we investigate the extent to which the utility might dynamically adjust its offered prices to maximize its cumulative risk-sensitive payoff over a finite number of $T$ days. In order to do so effectively, the utility must design its pricing policy to balance the tradeoff between the need to learn the unknown demand model (exploration) and maximize its payoff (exploitation) over time. In this paper, we propose such a pricing policy, which is shown to exhibit an expected payoff loss over $T$ days that is at most $O(\sqrt{T}\log(T))$, relative to an oracle pricing policy that knows the underlying demand model. Moreover, the proposed pricing policy is shown to yield a sequence of prices that converge to the oracle optimal prices in the mean square sense.
△ Less
Submitted 18 June, 2018; v1 submitted 21 November, 2016;
originally announced November 2016.
-
Semantic web service discovery approaches: overview and limitations
Authors:
Ibrahim El Bitar,
Fatima-Zahra Belouadha,
Ounsa Roudies
Abstract:
The semantic Web service discovery has been given massive attention within the last few years. With the increasing number of Web services available on the web, looking for a particular service has become very difficult, especially with the evolution of the clients needs. In this context, various approaches to discover semantic Web services have been proposed. In this paper, we compare these approa…
▽ More
The semantic Web service discovery has been given massive attention within the last few years. With the increasing number of Web services available on the web, looking for a particular service has become very difficult, especially with the evolution of the clients needs. In this context, various approaches to discover semantic Web services have been proposed. In this paper, we compare these approaches in order to assess their maturity and their adaptation to the current domain requirements. The outcome of this comparison will help us to identify the mechanisms that constitute the strengths of the existing approaches, and thereafter will serve as guideline to determine the basis for a discovery approach more adapted to the current context of Web services.
△ Less
Submitted 10 September, 2014;
originally announced September 2014.
-
Deadline Differentiated Pricing of Deferrable Electric Loads
Authors:
Eilyan Bitar,
Yunjian Xu
Abstract:
A large fraction of the total electric load is comprised of end-use devices whose demand for energy is inherently deferrable in time. Of interest is the potential to leverage on such latent flexibility in demand to absorb variability in power supplied from intermittent renewable generation. The challenge, however, lies in designing incentives to reliably induce the desired response in demand. With…
▽ More
A large fraction of the total electric load is comprised of end-use devices whose demand for energy is inherently deferrable in time. Of interest is the potential to leverage on such latent flexibility in demand to absorb variability in power supplied from intermittent renewable generation. The challenge, however, lies in designing incentives to reliably induce the desired response in demand. With an eye to electric vehicle charging, we propose a novel forward market for differentiated electric power services, where consumers consent to deferred service of pre-specified loads in exchange for a reduced per-unit price for energy. The longer a consumer is willing to defer, the larger the reduction in price. The proposed forward contract provides a guarantee on the aggregate quantity of energy to be delivered by a consumer-specified deadline. Under the earliest-deadline-first (EDF) scheduling policy, which is shown to be optimal for the supplier, we explicitly characterize a non-discriminatory, deadline-differentiated pricing scheme that yields an efficient competitive equilibrium between the supplier and consumers. We further show that this efficient pricing scheme, in combination with EDF scheduling, is incentive compatible (IC) in that every consumer would like to reveal her true deadline to the supplier, regardless of the actions taken by other consumers.
△ Less
Submitted 20 August, 2016; v1 submitted 7 July, 2014;
originally announced July 2014.
-
A Logic and Adaptive Approach for Efficient Diagnosis Systems using CBR
Authors:
Ibrahim El Bitar,
Fatima-Zahra Belouadha,
Ounsa Roudies
Abstract:
Case Based Reasoning (CBR) is an intelligent way of thinking based on experience and capitalization of already solved cases (source cases) to find a solution to a new problem (target case). Retrieval phase consists on identifying source cases that are similar to the target case. This phase may lead to erroneous results if the existing knowledge imperfections are not taken into account. This work p…
▽ More
Case Based Reasoning (CBR) is an intelligent way of thinking based on experience and capitalization of already solved cases (source cases) to find a solution to a new problem (target case). Retrieval phase consists on identifying source cases that are similar to the target case. This phase may lead to erroneous results if the existing knowledge imperfections are not taken into account. This work presents a novel solution based on Fuzzy logic techniques and adaptation measures which aggregate weighted similarities to improve the retrieval results. To confirm the efficiency of our solution, we have applied it to the industrial diagnosis domain. The obtained results are more efficient results than those obtained by applying typical measures.
△ Less
Submitted 17 November, 2012;
originally announced November 2012.
-
Taxonomy and synthesis of Web services querying languages
Authors:
Ibrahim El Bitar,
Fatima Zahra Belouadha,
Ounsa Roudies
Abstract:
Most works on Web services has focused on discovery, composition and selection processes of these kinds of services. Other few works were interested in how to represent Web services search queries. However, these queries cannot be processed by ensuring a high level of performance without being adequately represented first. To this end, different query languages were designed. Even so, in the absen…
▽ More
Most works on Web services has focused on discovery, composition and selection processes of these kinds of services. Other few works were interested in how to represent Web services search queries. However, these queries cannot be processed by ensuring a high level of performance without being adequately represented first. To this end, different query languages were designed. Even so, in the absence of a standard, these languages are quite various. Their diversity makes it difficult choosing the most suitable language. In fact, this language should be able to cover all types of preferences or requirements of clients such as their functional, nonfunctional,temporal or even specific constraints as is the case of geographical or spatial constraints and meet their needs and preferences helping to provide them the best answer. It must also be mutually simple and imposes no restrictions or at least not too many constraints in terms of prior knowledge to use and also provide a formal or semi-formal queries presentation to support their automatic post-processing. A comparative study is eventually established to allow to reveal the advantages and limitations of various existing languages in this context. It is a synthesis of this category of languages discussing their performance level and their capability to respond to various needs related to the Web services research and discovery case. The criterions identified at this stage may, in our opinion, constitute then the main pre-requisite that a language should satisfy to be called perfect or to be a future standard.
△ Less
Submitted 25 April, 2012;
originally announced April 2012.