-
Modified Control Barrier Function for Quadratic Program Based Control Design via Sum-of-Squares Programming
Authors:
Yankai Lin,
Michelle S. Chong,
Carlos Murguia
Abstract:
We consider a nonlinear control affine system controlled by inputs generated by a quadratic program (QP) induced by a control barrier functions (CBF). Specifically, we slightly modify the condition satisfied by CBFs and study how the modification can positively impact the closed loop behavior of the system. We show that, QP-based controllers designed using the modified CBF condition preserves the…
▽ More
We consider a nonlinear control affine system controlled by inputs generated by a quadratic program (QP) induced by a control barrier functions (CBF). Specifically, we slightly modify the condition satisfied by CBFs and study how the modification can positively impact the closed loop behavior of the system. We show that, QP-based controllers designed using the modified CBF condition preserves the desired properties of QP-based controllers using standard CBF conditions. Furthermore, using the generalized S-procedure for polynomial functions, we formulate the design of the modified CBFs as a Sum-Of-Squares (SOS) program, which can be solved efficiently. Via a numerical example, the proposed CBF design is shown to have superior performance over the standard CBF widely used in existing literature.
△ Less
Submitted 28 April, 2025;
originally announced April 2025.
-
Nonconvex Obstacle Avoidance using Efficient Sampling-Based Distance Functions
Authors:
Paul Lutkus,
Michelle S. Chong,
Lars Lindemann
Abstract:
We consider nonconvex obstacle avoidance where a robot described by nonlinear dynamics and a nonconvex shape has to avoid nonconvex obstacles. Obstacle avoidance is a fundamental problem in robotics and well studied in control. However, existing solutions are computationally expensive (e.g., model predictive controllers), neglect nonlinear dynamics (e.g., graph-based planners), use diffeomorphic t…
▽ More
We consider nonconvex obstacle avoidance where a robot described by nonlinear dynamics and a nonconvex shape has to avoid nonconvex obstacles. Obstacle avoidance is a fundamental problem in robotics and well studied in control. However, existing solutions are computationally expensive (e.g., model predictive controllers), neglect nonlinear dynamics (e.g., graph-based planners), use diffeomorphic transformations into convex domains (e.g., for star shapes), or are conservative due to convex overapproximations. The key challenge here is that the computation of the distance between the shapes of the robot and the obstacles is a nonconvex problem. We propose efficient computation of this distance via sampling-based distance functions. We quantify the sampling error and show that, for certain systems, such sampling-based distance functions are valid nonsmooth control barrier functions. We also study how to deal with disturbances on the robot dynamics in our setting. Finally, we illustrate our method on a robot navigation task involving an omnidirectional robot and nonconvex obstacles. We also analyze performance and computational efficiency of our controller as a function of the number of samples.
△ Less
Submitted 11 April, 2025;
originally announced April 2025.
-
Secondary Safety Control for Systems with Sector Bounded Nonlinearities [Extended Version]
Authors:
Yankai Lin,
Michelle S. Chong,
Carlos Murguia
Abstract:
We consider the problem of safety verification and safety-aware controller synthesis for systems with sector bounded nonlinearities. We aim to keep the states of the system within a given safe set under potential actuator and sensor attacks. Specifically, we adopt the setup that a controller has already been designed to stabilize the plant. Using invariant sets and barrier certificate theory, we f…
▽ More
We consider the problem of safety verification and safety-aware controller synthesis for systems with sector bounded nonlinearities. We aim to keep the states of the system within a given safe set under potential actuator and sensor attacks. Specifically, we adopt the setup that a controller has already been designed to stabilize the plant. Using invariant sets and barrier certificate theory, we first give sufficient conditions to verify the safety of the closed-loop system under attacks. Furthermore, by using a subset of sensors that are assumed to be free of attacks, we provide a synthesis method for a secondary controller that enhances the safety of the system. The sufficient conditions to verify safety are derived using Lyapunov-based tools and the S-procedure. Using the projection lemma, the conditions are then formulated as linear matrix inequality (LMI) problems which can be solved efficiently. Lastly, our theoretical results are illustrated through numerical simulations.
△ Less
Submitted 14 April, 2025; v1 submitted 11 April, 2025;
originally announced April 2025.
-
Self-sustained oscillations in discrete-time relay feedback systems
Authors:
Kang Tong,
Christian Grussler,
Michelle S. Chong
Abstract:
We study the problem of determining self-sustained oscillations in discrete-time linear time-invariant relay feedback systems. Concretely, we are interested in predicting when such a system admits unimodal oscillations, i.e., when the output has a single-peaked period. Under the assumption that the linear system is stable and has an impulse response that is strictly monotonically decreasing on its…
▽ More
We study the problem of determining self-sustained oscillations in discrete-time linear time-invariant relay feedback systems. Concretely, we are interested in predicting when such a system admits unimodal oscillations, i.e., when the output has a single-peaked period. Under the assumption that the linear system is stable and has an impulse response that is strictly monotonically decreasing on its infinite support, we take a novel approach in using the framework of total positivity to address our main question. It is shown that unimodal self-oscillations can only exist if the number of positive and negative elements in a period coincides. Based on this result, we derive conditions for the existence of such oscillations, determine bounds on their periods, and address the question of uniqueness.
△ Less
Submitted 8 April, 2025;
originally announced April 2025.
-
Data-Driven Nonconvex Reachability Analysis using Exact Multiplication
Authors:
Zhen Zhang,
M. Umar B. Niazi,
Michelle S. Chong,
Karl H. Johansson,
Amr Alanwar
Abstract:
This paper addresses a fundamental challenge in data-driven reachability analysis: accurately representing and propagating non-convex reachable sets. We propose a novel approach using constrained polynomial zonotopes to describe reachable sets for unknown LTI systems. Unlike constrained zonotopes commonly used in existing literature, constrained polynomial zonotopes are closed under multiplication…
▽ More
This paper addresses a fundamental challenge in data-driven reachability analysis: accurately representing and propagating non-convex reachable sets. We propose a novel approach using constrained polynomial zonotopes to describe reachable sets for unknown LTI systems. Unlike constrained zonotopes commonly used in existing literature, constrained polynomial zonotopes are closed under multiplication with constrained matrix zonotopes. We leverage this property to develop an exact multiplication method that preserves the non-convex geometry of reachable sets without resorting to approximations. We demonstrate that our approach provides tighter over-approximations of reachable sets for LTI systems compared to conventional methods.
△ Less
Submitted 2 April, 2025;
originally announced April 2025.
-
HC$^3$L-Diff: Hybrid conditional latent diffusion with high frequency enhancement for CBCT-to-CT synthesis
Authors:
Shi Yin,
Hongqi Tan,
Li Ming Chong,
Haofeng Liu,
Hui Liu,
Kang Hao Lee,
Jeffrey Kit Loong Tuan,
Dean Ho,
Yueming Jin
Abstract:
Background: Cone-beam computed tomography (CBCT) plays a crucial role in image-guided radiotherapy, but artifacts and noise make them unsuitable for accurate dose calculation. Artificial intelligence methods have shown promise in enhancing CBCT quality to produce synthetic CT (sCT) images. However, existing methods either produce images of suboptimal quality or incur excessive time costs, failing…
▽ More
Background: Cone-beam computed tomography (CBCT) plays a crucial role in image-guided radiotherapy, but artifacts and noise make them unsuitable for accurate dose calculation. Artificial intelligence methods have shown promise in enhancing CBCT quality to produce synthetic CT (sCT) images. However, existing methods either produce images of suboptimal quality or incur excessive time costs, failing to satisfy clinical practice standards. Methods and materials: We propose a novel hybrid conditional latent diffusion model for efficient and accurate CBCT-to-CT synthesis, named HC$^3$L-Diff. We employ the Unified Feature Encoder (UFE) to compress images into a low-dimensional latent space, thereby optimizing computational efficiency. Beyond the use of CBCT images, we propose integrating its high-frequency knowledge as a hybrid condition to guide the diffusion model in generating sCT images with preserved structural details. This high-frequency information is captured using our designed High-Frequency Extractor (HFE). During inference, we utilize denoising diffusion implicit model to facilitate rapid sampling. We construct a new in-house prostate dataset with paired CBCT and CT to validate the effectiveness of our method. Result: Extensive experimental results demonstrate that our approach outperforms state-of-the-art methods in terms of sCT quality and generation efficiency. Moreover, our medical physicist conducts the dosimetric evaluations to validate the benefit of our method in practical dose calculation, achieving a remarkable 93.8% gamma passing rate with a 2%/2mm criterion, superior to other methods. Conclusion: The proposed HC$^3$L-Diff can efficiently achieve high-quality CBCT-to-CT synthesis in only over 2 mins per patient. Its promising performance in dose calculation shows great potential for enhancing real-world adaptive radiotherapy.
△ Less
Submitted 3 November, 2024;
originally announced November 2024.
-
Data-Driven Identification of Attack-free Sensors in Networked Control Systems
Authors:
Sribalaji C. Anand,
Michelle S. Chong,
André M. H. Teixeira
Abstract:
This paper proposes a data-driven framework to identify the attack-free sensors in a networked control system when some of the sensors are corrupted by an adversary. An operator with access to offline input-output attack-free trajectories of the plant is considered. Then, a data-driven algorithm is proposed to identify the attack-free sensors when the plant is controlled online. We also provide ne…
▽ More
This paper proposes a data-driven framework to identify the attack-free sensors in a networked control system when some of the sensors are corrupted by an adversary. An operator with access to offline input-output attack-free trajectories of the plant is considered. Then, a data-driven algorithm is proposed to identify the attack-free sensors when the plant is controlled online. We also provide necessary conditions, based on the properties of the plant, under which the algorithm is feasible. An extension of the algorithm is presented to identify the sensors completely online against certain classes of attacks. The efficacy of our algorithm is depicted through numerical examples.
△ Less
Submitted 8 December, 2023;
originally announced December 2023.
-
Secure Set-Based State Estimation for Linear Systems under Adversarial Attacks on Sensors
Authors:
M. Umar B. Niazi,
Michelle S. Chong,
Amr Alanwar,
Karl H. Johansson
Abstract:
Set-based state estimation plays a vital role in the safety verification of dynamical systems, which becomes significantly challenging when the system's sensors are susceptible to cyber-attacks. Existing methods often impose limitations on the attacker's capabilities, restricting the number of attacked sensors to be strictly less than half of the total number of sensors. This paper proposes a Secu…
▽ More
Set-based state estimation plays a vital role in the safety verification of dynamical systems, which becomes significantly challenging when the system's sensors are susceptible to cyber-attacks. Existing methods often impose limitations on the attacker's capabilities, restricting the number of attacked sensors to be strictly less than half of the total number of sensors. This paper proposes a Secure Set-Based State Estimation (S3E) algorithm that addresses this limitation. The S3E algorithm guarantees that the true system state is contained within the estimated set, provided the initialization set encompasses the true initial state and the system is redundantly observable from the set of uncompromised sensors. The algorithm gives the estimated set as a collection of constrained zonotopes, which can be employed as robust certificates for verifying whether the system adheres to safety constraints. Furthermore, we demonstrate that the estimated set remains unaffected by attack signals of sufficiently large and also establish sufficient conditions for attack detection, identification, and filtering. This compels the attacker to inject only stealthy signals of small magnitude to evade detection, thus preserving the accuracy of the estimated set. When a few number of sensors (less than half) can be compromised, we prove that the estimated set remains bounded by a contracting set that converges to a ball whose radius is solely determined by the noise magnitude and is independent of the attack signals. To address the computational complexity of the algorithm, we offer several strategies for complexity-performance trade-offs. The efficacy of the proposed algorithm is illustrated through its application to a three-story building model.
△ Less
Submitted 16 May, 2024; v1 submitted 10 September, 2023;
originally announced September 2023.
-
Safety monitoring under stealthy sensor injection attacks using reachable sets
Authors:
Cédric Escudero,
Michelle S. Chong,
Paolo Massioni,
Eric Zamaï
Abstract:
Stealthy sensor injection attacks are serious threats for industrial plants as they can compromise the plant's integrity without being detected by traditional fault detectors. In this manuscript, we study the possibility of revealing the presence of such attacks by monitoring only the control input. This approach consists in computing an ellipsoidal bound of the input reachable set. When the contr…
▽ More
Stealthy sensor injection attacks are serious threats for industrial plants as they can compromise the plant's integrity without being detected by traditional fault detectors. In this manuscript, we study the possibility of revealing the presence of such attacks by monitoring only the control input. This approach consists in computing an ellipsoidal bound of the input reachable set. When the control input does not belong to this set, this means that a stealthy sensor injection attack is driving the plant to critical states. The problem of finding this ellipsoidal bound is posed as a convex optimization problem (convex cost with Linear Matrix Inequalities constraints). Our monitoring approach is tested in simulation.
△ Less
Submitted 24 July, 2023;
originally announced July 2023.
-
Deep Learning-Assisted Simultaneous Targets Sensing and Super-Resolution Imaging
Authors:
Jin Zhao,
Huang Zhao Zhang,
Ming-Zhe Chong,
Yue-Yi Zhang,
Zi-Wen Zhang,
Zong-Kun Zhang,
Chao-Hai Du,
Pu-Kun Liu
Abstract:
Recently, metasurfaces have experienced revolutionary growth in the sensing and superresolution imaging field, due to their enabling of subwavelength manipulation of electromagnetic waves. However, the addition of metasurfaces multiplies the complexity of retrieving target information from the detected fields. Besides, although the deep learning method affords a compelling platform for a series of…
▽ More
Recently, metasurfaces have experienced revolutionary growth in the sensing and superresolution imaging field, due to their enabling of subwavelength manipulation of electromagnetic waves. However, the addition of metasurfaces multiplies the complexity of retrieving target information from the detected fields. Besides, although the deep learning method affords a compelling platform for a series of electromagnetic problems, many studies mainly concentrate on resolving one single function and limit the research's versatility. In this study, a multifunctional deep neural network is demonstrated to reconstruct target information in a metasurface targets interactive system. Firstly, the interactive scenario is confirmed to tolerate the system noises in a primary verification experiment. Then, fed with the electric field distributions, the multitask deep neural network can not only sense the quantity and permittivity of targets but also generate superresolution images with high precision. The deep learning method provides another way to recover targets' diverse information in metasurface based target detection, accelerating the progression of target reconstruction areas. This methodology may also hold promise for inverse reconstruction or forward prediction problems in other electromagnetic scenarios.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
Secondary Controller Design for the Safety of Nonlinear Systems via Sum-of-Squares Programming
Authors:
Yankai Lin,
Michelle S. Chong,
Carlos Murguia
Abstract:
We consider the problem of ensuring the safety of nonlinear control systems under adversarial signals. Using Lyapunov based reachability analysis, we first give sufficient conditions to assess safety, i.e., to guarantee that the states of the control system, when starting from a given initial set, always remain in a prescribed safe set. We consider polynomial systems with semi-algebraic safe sets.…
▽ More
We consider the problem of ensuring the safety of nonlinear control systems under adversarial signals. Using Lyapunov based reachability analysis, we first give sufficient conditions to assess safety, i.e., to guarantee that the states of the control system, when starting from a given initial set, always remain in a prescribed safe set. We consider polynomial systems with semi-algebraic safe sets. Using the S-procedure for polynomial functions, safety conditions can be formulated as a Sum-Of-Squares (SOS) programme, which can be solved efficiently. When safety cannot be guaranteed, we provide tools via SOS to synthesize polynomial controllers that enforce safety of the closed loop system. The theoretical results are illustrated through numerical simulations.
△ Less
Submitted 20 April, 2023;
originally announced April 2023.
-
Plug-and-Play Secondary Control for Safety of LTI Systems under Attacks
Authors:
Yankai Lin,
Michelle S. Chong,
Carlos Murguia
Abstract:
We consider the problem of controller design for linear time-invariant cyber-physical systems (CPSs) controlled via networks. Specifically, we adopt the set-up that a controller has already been designed to stabilize the plant. However, the closed loop system may be subject to actuator and sensor attacks. We first perform a reachability analysis to see the effect of potential attacks. To further e…
▽ More
We consider the problem of controller design for linear time-invariant cyber-physical systems (CPSs) controlled via networks. Specifically, we adopt the set-up that a controller has already been designed to stabilize the plant. However, the closed loop system may be subject to actuator and sensor attacks. We first perform a reachability analysis to see the effect of potential attacks. To further ensure the safety of the states of the system, we choose a subset of sensors that can be locally secured and made free of attacks. Using these limited resources, an extra controller is designed to enhance the safety of the new closed loop. The safety of the system will be characterized by the notion of safe sets. Lyapunov based analysis will be used to derive sufficient conditions that ensure the states always stay in the safe set. The conditions will then be stated as convex optimization problems which can be solved efficiently. Lastly, our theoretical results are illustrated through numerical simulations.
△ Less
Submitted 1 December, 2022;
originally announced December 2022.
-
Resilient Set-based State Estimation for Linear Time-Invariant Systems Using Zonotopes
Authors:
Muhammad Umar B. Niazi,
Amr Alanwar,
Michelle S. Chong,
Karl Henrik Johansson
Abstract:
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) systems under time-varying sensor attacks. Provided that the LTI system is stable and observable via every single sensor and that at least one sensor is uncompromised, we guarantee that the true state is always contained in the estimated set. We use zonotopes to represent these sets for computational eff…
▽ More
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) systems under time-varying sensor attacks. Provided that the LTI system is stable and observable via every single sensor and that at least one sensor is uncompromised, we guarantee that the true state is always contained in the estimated set. We use zonotopes to represent these sets for computational efficiency. However, we show that intelligently designed stealthy attacks may cause exponential growth in the algorithm's worst-case complexity. We present several strategies to handle this complexity issue and illustrate our resilient zonotope-based state estimation algorithm on a rotating target system.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
Atrial Fibrillation Detection Using Weight-Pruned, Log-Quantised Convolutional Neural Networks
Authors:
Xiu Qi Chang,
Ann Feng Chew,
Benjamin Chen Ming Choong,
Shuhui Wang,
Rui Han,
Wang He,
Li Xiaolin,
Rajesh C. Panicker,
Deepu John
Abstract:
Deep neural networks (DNN) are a promising tool in medical applications. However, the implementation of complex DNNs on battery-powered devices is challenging due to high energy costs for communication. In this work, a convolutional neural network model is developed for detecting atrial fibrillation from electrocardiogram (ECG) signals. The model demonstrates high performance despite being trained…
▽ More
Deep neural networks (DNN) are a promising tool in medical applications. However, the implementation of complex DNNs on battery-powered devices is challenging due to high energy costs for communication. In this work, a convolutional neural network model is developed for detecting atrial fibrillation from electrocardiogram (ECG) signals. The model demonstrates high performance despite being trained on limited, variable-length input data. Weight pruning and logarithmic quantisation are combined to introduce sparsity and reduce model size, which can be exploited for reduced data movement and lower computational complexity. The final model achieved a 91.1% model compression ratio while maintaining high model accuracy of 91.7% and less than 1% loss.
△ Less
Submitted 14 June, 2022;
originally announced June 2022.
-
Distributed Periodic Event-triggered Control of Nonlinear Multi-Agent Systems
Authors:
Koen J. A. Scheres,
Victor S. Dolk,
Michelle S. Chong,
Romain Postoyan,
W. P. Maurice H. Heemels
Abstract:
We present a general emulation-based framework to address the distributed control of multi-agent systems over packet-based networks. We consider the setup where information is only transmitted at (non-uniform) sampling times and where packets are received with unknown delays. We design local dynamic periodic event-triggering mechanisms to generate the transmissions. The triggering mechanisms can r…
▽ More
We present a general emulation-based framework to address the distributed control of multi-agent systems over packet-based networks. We consider the setup where information is only transmitted at (non-uniform) sampling times and where packets are received with unknown delays. We design local dynamic periodic event-triggering mechanisms to generate the transmissions. The triggering mechanisms can run on non-synchronized digital platforms, i.e., we ensure that the conditions must only be verified at asynchronous sampling times, which may differ for each platform. Different stability and performance characteristics can be considered as we follow a general dissipativity-based approach. Moreover, Zeno-free properties are guaranteed by design. The results are illustrated on a consensus problem.
△ Less
Submitted 23 May, 2022; v1 submitted 13 February, 2022;
originally announced February 2022.
-
Event-Triggered State Estimation with Multiple Noisy Sensor Nodes
Authors:
Koen J. A. Scheres,
Michelle S. Chong,
Romain Postoyan,
W. P. Maurice H. Heemels
Abstract:
General nonlinear continuous-time systems are considered for which its state is estimated via a packet-based communication network. We assume that the system has multiple sensor nodes, affected by measurement noise, which can transmit at discrete (non-equidistant) points in time. Moreover, each node can transmit asynchronously. For this setup, we develop a state estimation framework, where the tra…
▽ More
General nonlinear continuous-time systems are considered for which its state is estimated via a packet-based communication network. We assume that the system has multiple sensor nodes, affected by measurement noise, which can transmit at discrete (non-equidistant) points in time. Moreover, each node can transmit asynchronously. For this setup, we develop a state estimation framework, where the transmission instances of the individual sensor nodes can be generated in either time-triggered or event-triggered fashions. In the latter case, we guarantee the absence of Zeno behavior by construction. It is shown that, under the provided design conditions, an input-to-state stability property is obtained for the estimation error with respect to the measurement noise and process disturbances and that the state is thus reconstructed asymptotically in the absence of noise. A numerical case study shows the strengths of the developed framework.
△ Less
Submitted 8 December, 2021; v1 submitted 10 August, 2021;
originally announced August 2021.
-
Linear system security -- detection and correction of adversarial attacks in the noise-free case
Authors:
Zhanghan Tang,
Margreta Kuijper,
Michelle Chong,
Iven Mareels,
Chris Leckie
Abstract:
We address the problem of attack detection and attack correction for multi-output discrete-time linear time-invariant systems under sensor attack. More specifically, we focus on the situation where adversarial attack signals are added to some of the system's output signals. A 'security index' is defined to characterize the vulnerability of a system against such sensor attacks. Methods to compute t…
▽ More
We address the problem of attack detection and attack correction for multi-output discrete-time linear time-invariant systems under sensor attack. More specifically, we focus on the situation where adversarial attack signals are added to some of the system's output signals. A 'security index' is defined to characterize the vulnerability of a system against such sensor attacks. Methods to compute the security index are presented as are algorithms to detect and correct for sensor attacks. The results are illustrated by examples involving multiple sensors.
△ Less
Submitted 14 November, 2017;
originally announced November 2017.
-
Vulnerability of linear systems against sensor attacks--a system's security index
Authors:
Michelle S. Chong,
Margreta Kuijper
Abstract:
The `security index' of a discrete-time LTI system under sensor attacks is introduced as a quantitative measure on the security of an observable system. We derive ideas from error control coding theory to provide sufficient conditions for attack detection and correction.
The `security index' of a discrete-time LTI system under sensor attacks is introduced as a quantitative measure on the security of an observable system. We derive ideas from error control coding theory to provide sufficient conditions for attack detection and correction.
△ Less
Submitted 21 February, 2016;
originally announced February 2016.