Skip to main content

Showing 1–10 of 10 results for author: Mattsson, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.16978  [pdf, other

    cs.AI

    Real-Time Diffusion Policies for Games: Enhancing Consistency Policies with Q-Ensembles

    Authors: Ruoqi Zhang, Ziwei Luo, Jens Sjölund, Per Mattsson, Linus Gisslén, Alessandro Sestini

    Abstract: Diffusion models have shown impressive performance in capturing complex and multi-modal action distributions for game agents, but their slow inference speed prevents practical deployment in real-time game environments. While consistency models offer a promising approach for one-step generation, they often suffer from training instability and performance degradation when applied to policy learning.… ▽ More

    Submitted 21 March, 2025; originally announced March 2025.

  2. arXiv:2502.16205  [pdf, other

    cs.RO

    Probabilistic Bubble Roadmap

    Authors: Bernhard Wullt, Mikael Norrlöf, Per Mattsson, Thomas B. Schön

    Abstract: Finding a collision-free path is a fundamental problem in robotics, where the sampling based planners have a long line of success. However, this approach is computationally expensive, due to the frequent use of collision-detection. Furthermore, the produced paths are usually jagged and require further post-processing before they can be tracked. Due to their high computational cost, these planners… ▽ More

    Submitted 22 February, 2025; originally announced February 2025.

  3. arXiv:2407.07444  [pdf, other

    cs.CR

    EDHOC is a New Security Handshake Standard: An Overview of Security Analysis

    Authors: Elsa López Pérez, Inria Göran Selander, John Preuß Mattsson, Thomas Watteyne, Mališa Vučinić

    Abstract: The paper wraps up the call for formal analysis of the new security handshake protocol EDHOC by providing an overview of the protocol as it was standardized, a summary of the formal security analyses conducted by the community, and a discussion on open venues for future work.

    Submitted 10 July, 2024; originally announced July 2024.

    Journal ref: IEEE Computer Society, 2024

  4. arXiv:2402.04080  [pdf, other

    cs.LG eess.SY

    Entropy-regularized Diffusion Policy with Q-Ensembles for Offline Reinforcement Learning

    Authors: Ruoqi Zhang, Ziwei Luo, Jens Sjölund, Thomas B. Schön, Per Mattsson

    Abstract: This paper presents advanced techniques of training diffusion policies for offline reinforcement learning (RL). At the core is a mean-reverting stochastic differential equation (SDE) that transfers a complex action distribution into a standard Gaussian and then samples actions conditioned on the environment state with a corresponding reverse-time SDE, like a typical diffusion policy. We show that… ▽ More

    Submitted 8 January, 2025; v1 submitted 6 February, 2024; originally announced February 2024.

  5. arXiv:2312.06211  [pdf, other

    eess.SY cs.LG

    Structured state-space models are deep Wiener models

    Authors: Fabio Bonassi, Carl Andersson, Per Mattsson, Thomas B. Schön

    Abstract: The goal of this paper is to provide a system identification-friendly introduction to the Structured State-space Models (SSMs). These models have become recently popular in the machine learning community since, owing to their parallelizability, they can be efficiently and scalably trained to tackle extremely-long sequence classification and regression problems. Interestingly, SSMs appear as an eff… ▽ More

    Submitted 20 May, 2024; v1 submitted 11 December, 2023; originally announced December 2023.

    Comments: \c{opyright} 2024 the authors. This work has been accepted to IFAC for publication under a Creative Commons Licence CC-BY-NC-ND

  6. arXiv:2304.10289  [pdf, other

    eess.SY cs.LG

    Aiding reinforcement learning for set point control

    Authors: Ruoqi Zhang, Per Mattsson, Torbjörn Wigren

    Abstract: While reinforcement learning has made great improvements, state-of-the-art algorithms can still struggle with seemingly simple set-point feedback control problems. One reason for this is that the learned controller may not be able to excite the system dynamics well enough initially, and therefore it can take a long time to get data that is informative enough to learn for good control. The paper co… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    Comments: IFAC WC 2023

  7. arXiv:2304.10277  [pdf, other

    eess.SY cs.LG

    Robust nonlinear set-point control with reinforcement learning

    Authors: Ruoqi Zhang, Per Mattsson, Torbjörn Wigren

    Abstract: There has recently been an increased interest in reinforcement learning for nonlinear control problems. However standard reinforcement learning algorithms can often struggle even on seemingly simple set-point control problems. This paper argues that three ideas can improve reinforcement learning methods even for highly nonlinear set-point control problems: 1) Make use of a prior feedback controlle… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    Comments: ACC 2023

  8. arXiv:2112.00399  [pdf

    cs.CR

    Quantum-Resistant Cryptography

    Authors: John Preuß Mattsson, Ben Smeets, Erik Thormarker

    Abstract: Quantum-resistant cryptography is cryptography that aims to deliver cryptographic functions and protocols that remain secure even if large-scale fault-tolerant quantum computers are built. NIST will soon announce the first selected public-key cryptography algorithms in its Post-Quantum Cryptography (PQC) standardization which is the most important current effort in the field of quantum-resistant c… ▽ More

    Submitted 1 December, 2021; originally announced December 2021.

  9. Nori: Concealing the Concealed Identifier in 5G

    Authors: John Preuß Mattsson, Prajwol Kumar Nakarmi

    Abstract: IMSI catchers have been a long standing and serious privacy problem in pre-5G mobile networks. To tackle this, 3GPP introduced the Subscription Concealed Identifier (SUCI) and other countermeasures in 5G. In this paper, we analyze the new SUCI mechanism and discover that it provides very poor anonymity when used with the variable length Network Specific Identifiers (NSI), which are part of the 5G… ▽ More

    Submitted 14 June, 2021; v1 submitted 21 May, 2021; originally announced May 2021.

    Comments: 9 pages, 8 figures, 1 table

    Report number: ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security

    Journal ref: 2021

  10. arXiv:1505.00278  [pdf, ps, other

    cs.AI

    Automatic Observer Script for StarCraft: Brood War Bot Games (technical report)

    Authors: Björn Persson Mattsson, Tomáš Vajda, Michal Čertický

    Abstract: This short report describes an automated BWAPI-based script developed for live streams of a StarCraft Brood War bot tournament, SSCAIT. The script controls the in-game camera in order to follow the relevant events and improve the viewer experience. We enumerate its novel features and provide a few implementation notes.

    Submitted 1 May, 2015; originally announced May 2015.