Skip to main content

Showing 1–22 of 22 results for author: Bakirtzis, G

Searching in archive eess. Search in all archives.
.
  1. arXiv:2409.00015  [pdf, other

    cs.CY cs.AI eess.SY

    Navigating the sociotechnical labyrinth: Dynamic certification for responsible embodied AI

    Authors: Georgios Bakirtzis, Andrea Aler Tubella, Andreas Theodorou, David Danks, Ufuk Topcu

    Abstract: Sociotechnical requirements shape the governance of artificially intelligent (AI) systems. In an era where embodied AI technologies are rapidly reshaping various facets of contemporary society, their inherent dynamic adaptability presents a unique blend of opportunities and challenges. Traditional regulatory mechanisms, often designed for static -- or slower-paced -- technologies, find themselves… ▽ More

    Submitted 16 August, 2024; originally announced September 2024.

  2. arXiv:2408.13376  [pdf, other

    cs.AI cs.LG eess.SY math.CT

    Reduce, Reuse, Recycle: Categories for Compositional Reinforcement Learning

    Authors: Georgios Bakirtzis, Michail Savvas, Ruihan Zhao, Sandeep Chinchali, Ufuk Topcu

    Abstract: In reinforcement learning, conducting task composition by forming cohesive, executable sequences from multiple tasks remains challenging. However, the ability to (de)compose tasks is a linchpin in developing robotic systems capable of learning complex behaviors. Yet, compositional reinforcement learning is beset with difficulties, including the high dimensionality of the problem space, scarcity of… ▽ More

    Submitted 11 March, 2025; v1 submitted 23 August, 2024; originally announced August 2024.

    Comments: ECAI 2024

  3. arXiv:2407.16254  [pdf, other

    cs.RO eess.SY

    Negotiating Control: Neurosymbolic Variable Autonomy

    Authors: Georgios Bakirtzis, Manolis Chiou, Andreas Theodorou

    Abstract: Variable autonomy equips a system, such as a robot, with mixed initiatives such that it can adjust its independence level based on the task's complexity and the surrounding environment. Variable autonomy solves two main problems in robotic planning: the first is the problem of humans being unable to keep focus in monitoring and intervening during robotic tasks without appropriate human factor indi… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

  4. arXiv:2311.01258  [pdf, other

    cs.AI cs.LO eess.SY

    Formal Methods for Autonomous Systems

    Authors: Tichakorn Wongpiromsarn, Mahsa Ghasemi, Murat Cubuktepe, Georgios Bakirtzis, Steven Carr, Mustafa O. Karabag, Cyrus Neary, Parham Gohari, Ufuk Topcu

    Abstract: Formal methods refer to rigorous, mathematical approaches to system development and have played a key role in establishing the correctness of safety-critical systems. The main building blocks of formal methods are models and specifications, which are analogous to behaviors and requirements in system design and give us the means to verify and synthesize system behaviors with formal guarantees. Th… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  5. arXiv:2211.11741  [pdf, other

    eess.SY cs.LO

    Sensor Placement for Online Fault Diagnosis

    Authors: Dhananjay Raju, Georgios Bakirtzis, Ufuk Topcu

    Abstract: Fault diagnosis is the problem of determining a set of faulty system components that explain discrepancies between observed and expected behavior. Due to the intrinsic relation between observations and sensors placed on a system, sensors' fault diagnosis and placement are mutually dependent. Consequently, it is imperative to solve the fault diagnosis and sensor placement problems jointly. One appr… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

  6. arXiv:2210.14434  [pdf, other

    eess.SY

    A formal process of hierarchical functional requirements development for Set-Based Design

    Authors: Minghui Sun, Zhaoyang Chen, Georgios Bakirtzis, Hassan Jafarzadeh, Cody Fleming

    Abstract: The design of complex systems is typically uncertain and ambiguous at early stages. Set-Based Design is a promising approach to complex systems design as it supports alternative exploration and gradual uncertainty reduction. When designing a complex system, functional requirements decomposition is a common and effective approach to progress the design incrementally. However, the current literature… ▽ More

    Submitted 25 October, 2022; originally announced October 2022.

  7. arXiv:2208.13687  [pdf, other

    cs.AI cs.LO eess.SY math.CT

    Categorical semantics of compositional reinforcement learning

    Authors: Georgios Bakirtzis, Michail Savvas, Ufuk Topcu

    Abstract: Compositional knowledge representations in reinforcement learning (RL) facilitate modular, interpretable, and safe task specifications. However, generating compositional models requires the characterization of minimal assumptions for the robustness of the compositionality feature, especially in the case of functional decompositions. Using a categorical point of view, we develop a knowledge represe… ▽ More

    Submitted 10 March, 2025; v1 submitted 29 August, 2022; originally announced August 2022.

  8. arXiv:2207.05363  [pdf

    eess.SY

    AC-feasible Local Flexibility Market with Continuous Trading

    Authors: Aikaterini A. Forouli, Georgios K. Papazoglou, Emmanouil A. Bakirtzis, Pandelis N. Biskas, Anastasios G. Bakirtzis

    Abstract: This paper proposes a novel continuous Local Flexibility Market where active power flexibility located in the distribution system can be traded. The market design engages the Market Operator, the Distribution System Operator and Market Participants with dispatchable assets. The proposed market operates in a single distribution system and considers network constraints via AC network sensitivities,… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

    Comments: In proceedings of the 11th Bulk Power Systems Dynamics and Control Symposium (IREP 2022), July 25-30, 2022, Banff, Canada

    Report number: IREP2022-24

  9. arXiv:2204.08999  [pdf, other

    cs.SE eess.SY

    STPA-driven Multilevel Runtime Monitoring for In-time Hazard Detection

    Authors: Smitha Gautham, Georgios Bakirtzis, Alexander Will, Athira V. Jayakumar, Carl R. Elks

    Abstract: Runtime verification or runtime monitoring equips safety-critical cyber-physical systems to augment design assurance measures and ensure operational safety and security. Cyber-physical systems have interaction failures, attack surfaces, and attack vectors resulting in unanticipated hazards and loss scenarios. These interaction failures pose challenges to runtime verification regarding monitoring s… ▽ More

    Submitted 22 June, 2022; v1 submitted 19 April, 2022; originally announced April 2022.

  10. arXiv:2203.16343  [pdf, other

    cs.LO eess.SY

    AlgebraicSystems: Compositional Verification for Autonomous System Design

    Authors: Georgios Bakirtzis, Ufuk Topcu

    Abstract: Autonomous systems require the management of several model views to assure properties such as safety and security among others. A crucial issue in autonomous systems design assurance is the notion of emergent behavior; we cannot use their parts in isolation to examine their overall behavior or performance. Compositional verification attempts to combat emergence by implementing model transformation… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

  11. arXiv:2203.10950  [pdf, other

    cs.RO cs.LO cs.MA eess.SY

    Dynamic Certification for Autonomous Systems

    Authors: Georgios Bakirtzis, Steven Carr, David Danks, Ufuk Topcu

    Abstract: Autonomous systems are often deployed in complex sociotechnical environments, such as public roads, where they must behave safely and securely. Unlike many traditionally engineered systems, autonomous systems are expected to behave predictably in varying "open world" environmental contexts that cannot be fully specified formally. As a result, assurance about autonomous systems requires us to devel… ▽ More

    Submitted 25 April, 2023; v1 submitted 21 March, 2022; originally announced March 2022.

  12. arXiv:2109.04858  [pdf

    cs.LO cs.CR eess.SY math.CT

    Compositional Cyber-Physical Systems Theory

    Authors: Georgios Bakirtzis

    Abstract: This dissertation builds a compositional cyber-physical systems theory to develop concrete semantics relating the above diverse views necessary for safety and security assurance. In this sense, composition can take two forms. The first is composing larger models from smaller ones within each individual formalism of requirements, behaviors, and architectures which can be thought of as horizontal co… ▽ More

    Submitted 10 September, 2021; originally announced September 2021.

    Comments: PhD thesis

  13. arXiv:2105.12911  [pdf, other

    eess.SY cs.LO math.CT

    Compositional Thinking in Cyberphysical Systems Theory

    Authors: Georgios Bakirtzis, Eswaran Subrahmanian, Cody H. Fleming

    Abstract: Engineering safe and secure cyber-physical systems requires system engineers to develop and maintain a number of model views, both dynamic and static, which can be seen as algebras. We posit that verifying the composition of requirement, behavioral, and architectural models using category theory gives rise to a strictly compositional interpretation of cyber-physical systems theory, which can assis… ▽ More

    Submitted 9 October, 2021; v1 submitted 26 May, 2021; originally announced May 2021.

  14. arXiv:2103.00044  [pdf, ps, other

    cs.CR eess.SY math.CT

    Yoneda Hacking: The Algebra of Attacker Actions

    Authors: Georgios Bakirtzis, Fabrizio Genovese, Cody H. Fleming

    Abstract: Our work focuses on modeling the security of systems from their component-level designs. Towards this goal, we develop a categorical formalism to model attacker actions. Equipping the categorical formalism with algebras produces two interesting results for security modeling. First, using the Yoneda lemma, we can model attacker reconnaissance missions. In this context, the Yoneda lemma shows us tha… ▽ More

    Submitted 13 April, 2022; v1 submitted 26 February, 2021; originally announced March 2021.

  15. Compositional Cyber-Physical Systems Modeling

    Authors: Georgios Bakirtzis, Christina Vasilakopoulou, Cody H. Fleming

    Abstract: Assuring the correct behavior of cyber-physical systems requires significant modeling effort, particularly during early stages of the engineering and design process when a system is not yet available for testing or verification of proper behavior. A primary motivation for `getting things right' in these early design stages is that altering the design is significantly less costly and more effective… ▽ More

    Submitted 25 January, 2021; originally announced January 2021.

    Comments: In Proceedings ACT 2020, arXiv:2101.07888

    Journal ref: EPTCS 333, 2021, pp. 125-138

  16. Cyberphysical Security Through Resiliency: A Systems-centric Approach

    Authors: Cody Fleming, Carl Elks, Georgios Bakirtzis, Stephen C. Adams, Bryan Carter, Peter A. Beling, Barry Horowitz

    Abstract: Cyber-physical systems (CPS) are often defended in the same manner as information technology (IT) systems -- by using perimeter security. Multiple factors make such defenses insufficient for CPS. Resiliency shows potential in overcoming these shortfalls. Techniques for achieving resilience exist; however, methods and theory for evaluating resilience in CPS are lacking. We argue that such methods a… ▽ More

    Submitted 9 October, 2021; v1 submitted 29 November, 2020; originally announced November 2020.

  17. arXiv:2010.08003  [pdf, other

    cs.LO eess.SY math.CT

    Categorical Semantics of Cyber-Physical Systems Theory

    Authors: Georgios Bakirtzis, Cody H. Fleming, Christina Vasilakopoulou

    Abstract: Cyber-physical systems require the construction and management of various models to assure their correct, safe, and secure operation. These various models are necessary because of the coupled physical and computational dynamics present in cyber-physical systems. However, to date the different model views of cyber-physical systems are largely related informally, which raises issues with the degree… ▽ More

    Submitted 26 April, 2021; v1 submitted 15 October, 2020; originally announced October 2020.

  18. An Ontological Metamodel for Cyber-Physical System Safety, Security, and Resilience Coengineering

    Authors: Georgios Bakirtzis, Tim Sherburne, Stephen Adams, Barry M. Horowitz, Peter A. Beling, Cody H. Fleming

    Abstract: System complexity has become ubiquitous in the design, assessment, and implementation of practical and useful cyber-physical systems. This increased complexity is impacting the management of models necessary for designing cyber-physical systems that are able to take into account a number of ``-ilities'', such that they are safe and secure and ultimately resilient to disruption of service. We propo… ▽ More

    Submitted 9 June, 2020; originally announced June 2020.

  19. Fundamental Challenges of Cyber-Physical Systems Security Modeling

    Authors: Georgios Bakirtzis, Garrett L. Ward, Christopher J. Deloglos, Carl R. Elks, Barry M. Horowitz, Cody H. Fleming

    Abstract: Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design. Security by design is a necessity in the age of safety critical cyber-physical systems, where security violations can cause hazards. Currently, the overlap between security and safety is narrow. But deploying cyber-physical systems means that today's adversaries can… ▽ More

    Submitted 30 April, 2020; originally announced May 2020.

  20. Data Driven Vulnerability Exploration for Design Phase System Analysis

    Authors: Georgios Bakirtzis, Brandon J. Simon, Aidan G. Collins, Cody H. Fleming, Carl R. Elks

    Abstract: Applying security as a lifecycle practice is becoming increasingly important to combat targeted attacks in safety-critical systems. Among others there are two significant challenges in this area: (1) the need for models that can characterize a realistic system in the absence of an implementation and (2) an automated way to associate attack vector information; that is, historical data, to such syst… ▽ More

    Submitted 6 September, 2019; originally announced September 2019.

  21. Correct-by-construction requirement decomposition

    Authors: Minghui Sun, Georgios Bakirtzis, Hassan Jafarzadeh, Cody Fleming

    Abstract: In systems engineering, accurately decomposing requirements is crucial for creating well-defined and manageable system components, particularly in safety-critical domains. Despite the critical need, rigorous, top-down methodologies for effectively breaking down complex requirements into precise, actionable sub-requirements are scarce, especially compared to the wealth of bottom-up verification tec… ▽ More

    Submitted 14 May, 2025; v1 submitted 4 September, 2019; originally announced September 2019.

  22. A Model-Based Approach to Security Analysis for Cyber-Physical Systems

    Authors: Georgios Bakirtzis, Bryan T. Carter, Carl R. Elks, Cody H. Fleming

    Abstract: Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation. Most safety and security decisions that can have major effects on mitigation strategy options after deployment are made early in the system's life cycle. To allow for a vuln… ▽ More

    Submitted 10 June, 2018; v1 submitted 31 October, 2017; originally announced October 2017.

    Comments: 8 pages, 5 figures, conference