Skip to main content

Showing 1–5 of 5 results for author: Chinchali, S P

Searching in archive eess. Search in all archives.
.
  1. arXiv:2410.12652  [pdf, other

    cs.LG cs.AI eess.SP

    Constrained Posterior Sampling: Time Series Generation with Hard Constraints

    Authors: Sai Shankar Narasimhan, Shubhankar Agarwal, Litu Rout, Sanjay Shakkottai, Sandeep P. Chinchali

    Abstract: Generating realistic time series samples is crucial for stress-testing models and protecting user privacy by using synthetic data. In engineering and safety-critical applications, these samples must meet certain hard constraints that are domain-specific or naturally imposed by physics or nature. Consider, for example, generating electricity demand patterns with constraints on peak demand times. Th… ▽ More

    Submitted 16 October, 2024; originally announced October 2024.

  2. arXiv:2407.00913  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    SecureSpectra: Safeguarding Digital Identity from Deep Fake Threats via Intelligent Signatures

    Authors: Oguzhan Baser, Kaan Kale, Sandeep P. Chinchali

    Abstract: Advancements in DeepFake (DF) audio models pose a significant threat to voice authentication systems, leading to unauthorized access and the spread of misinformation. We introduce a defense mechanism, SecureSpectra, addressing DF threats by embedding orthogonal, irreversible signatures within audio. SecureSpectra leverages the inability of DF models to replicate high-frequency content, which we em… ▽ More

    Submitted 30 June, 2024; originally announced July 2024.

    Comments: 5 pages, 4 figures, Proc. INTERSPEECH 2024

  3. arXiv:2302.09182  [pdf, other

    cs.RO cs.FL eess.SY

    Safe Networked Robotics with Probabilistic Verification

    Authors: Sai Shankar Narasimhan, Sharachchandra Bhat, Sandeep P. Chinchali

    Abstract: Autonomous robots must utilize rich sensory data to make safe control decisions. To process this data, compute-constrained robots often require assistance from remote computation, or the cloud, that runs compute-intensive deep neural network perception or control models. However, this assistance comes at the cost of a time delay due to network latency, resulting in past observations being used in… ▽ More

    Submitted 3 December, 2024; v1 submitted 17 February, 2023; originally announced February 2023.

  4. arXiv:2210.00358  [pdf, other

    eess.SY

    Differentially Private Timeseries Forecasts for Networked Control

    Authors: Po-han Li, Sandeep P. Chinchali, Ufuk Topcu

    Abstract: We analyze a cost-minimization problem in which the controller relies on an imperfect timeseries forecast. Forecasting models generate imperfect forecasts because they use anonymization noise to protect input data privacy. However, this noise increases the control cost. We consider a scenario where the controller pays forecasting models incentives to reduce the noise and combines the forecasts int… ▽ More

    Submitted 9 March, 2023; v1 submitted 1 October, 2022; originally announced October 2022.

    Comments: American Control Conference (ACC) 2023 accepted

  5. arXiv:2207.06982  [pdf, other

    eess.SY

    Adversarial Examples for Model-Based Control: A Sensitivity Analysis

    Authors: Po-han Li, Ufuk Topcu, Sandeep P. Chinchali

    Abstract: We propose a method to attack controllers that rely on external timeseries forecasts as task parameters. An adversary can manipulate the costs, states, and actions of the controllers by forging the timeseries, in this case perturbing the real timeseries. Since the controllers often encode safety requirements or energy limits in their costs and constraints, we refer to such manipulation as an adver… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

    Comments: Submission to the 58th Annual Allerton Conference on Communication, Control, and Computing