Skip to main content

Showing 1–18 of 18 results for author: Chong, M

Searching in archive eess. Search in all archives.
.
  1. arXiv:2504.19796  [pdf, ps, other

    math.OC eess.SY

    Modified Control Barrier Function for Quadratic Program Based Control Design via Sum-of-Squares Programming

    Authors: Yankai Lin, Michelle S. Chong, Carlos Murguia

    Abstract: We consider a nonlinear control affine system controlled by inputs generated by a quadratic program (QP) induced by a control barrier functions (CBF). Specifically, we slightly modify the condition satisfied by CBFs and study how the modification can positively impact the closed loop behavior of the system. We show that, QP-based controllers designed using the modified CBF condition preserves the… ▽ More

    Submitted 28 April, 2025; originally announced April 2025.

  2. arXiv:2504.09038  [pdf, other

    cs.RO eess.SY

    Nonconvex Obstacle Avoidance using Efficient Sampling-Based Distance Functions

    Authors: Paul Lutkus, Michelle S. Chong, Lars Lindemann

    Abstract: We consider nonconvex obstacle avoidance where a robot described by nonlinear dynamics and a nonconvex shape has to avoid nonconvex obstacles. Obstacle avoidance is a fundamental problem in robotics and well studied in control. However, existing solutions are computationally expensive (e.g., model predictive controllers), neglect nonlinear dynamics (e.g., graph-based planners), use diffeomorphic t… ▽ More

    Submitted 11 April, 2025; originally announced April 2025.

  3. arXiv:2504.08535  [pdf, other

    eess.SY

    Secondary Safety Control for Systems with Sector Bounded Nonlinearities [Extended Version]

    Authors: Yankai Lin, Michelle S. Chong, Carlos Murguia

    Abstract: We consider the problem of safety verification and safety-aware controller synthesis for systems with sector bounded nonlinearities. We aim to keep the states of the system within a given safe set under potential actuator and sensor attacks. Specifically, we adopt the setup that a controller has already been designed to stabilize the plant. Using invariant sets and barrier certificate theory, we f… ▽ More

    Submitted 14 April, 2025; v1 submitted 11 April, 2025; originally announced April 2025.

    Comments: Supplementary material for the Automatica submission

  4. arXiv:2504.05941  [pdf, other

    math.OC eess.SY math.DS

    Self-sustained oscillations in discrete-time relay feedback systems

    Authors: Kang Tong, Christian Grussler, Michelle S. Chong

    Abstract: We study the problem of determining self-sustained oscillations in discrete-time linear time-invariant relay feedback systems. Concretely, we are interested in predicting when such a system admits unimodal oscillations, i.e., when the output has a single-peaked period. Under the assumption that the linear system is stable and has an impulse response that is strictly monotonically decreasing on its… ▽ More

    Submitted 8 April, 2025; originally announced April 2025.

    MSC Class: 34A34; 34C12; 93C55

  5. arXiv:2504.02147  [pdf, other

    eess.SY

    Data-Driven Nonconvex Reachability Analysis using Exact Multiplication

    Authors: Zhen Zhang, M. Umar B. Niazi, Michelle S. Chong, Karl H. Johansson, Amr Alanwar

    Abstract: This paper addresses a fundamental challenge in data-driven reachability analysis: accurately representing and propagating non-convex reachable sets. We propose a novel approach using constrained polynomial zonotopes to describe reachable sets for unknown LTI systems. Unlike constrained zonotopes commonly used in existing literature, constrained polynomial zonotopes are closed under multiplication… ▽ More

    Submitted 2 April, 2025; originally announced April 2025.

  6. arXiv:2411.01575  [pdf, other

    eess.IV cs.CV

    HC$^3$L-Diff: Hybrid conditional latent diffusion with high frequency enhancement for CBCT-to-CT synthesis

    Authors: Shi Yin, Hongqi Tan, Li Ming Chong, Haofeng Liu, Hui Liu, Kang Hao Lee, Jeffrey Kit Loong Tuan, Dean Ho, Yueming Jin

    Abstract: Background: Cone-beam computed tomography (CBCT) plays a crucial role in image-guided radiotherapy, but artifacts and noise make them unsuitable for accurate dose calculation. Artificial intelligence methods have shown promise in enhancing CBCT quality to produce synthetic CT (sCT) images. However, existing methods either produce images of suboptimal quality or incur excessive time costs, failing… ▽ More

    Submitted 3 November, 2024; originally announced November 2024.

    Comments: 13 pages, 5 figures

  7. arXiv:2312.04845  [pdf, other

    eess.SY math.OC

    Data-Driven Identification of Attack-free Sensors in Networked Control Systems

    Authors: Sribalaji C. Anand, Michelle S. Chong, André M. H. Teixeira

    Abstract: This paper proposes a data-driven framework to identify the attack-free sensors in a networked control system when some of the sensors are corrupted by an adversary. An operator with access to offline input-output attack-free trajectories of the plant is considered. Then, a data-driven algorithm is proposed to identify the attack-free sensors when the plant is controlled online. We also provide ne… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

    Comments: Conference submission

  8. arXiv:2309.05075  [pdf, other

    eess.SY math.OC

    Secure Set-Based State Estimation for Linear Systems under Adversarial Attacks on Sensors

    Authors: M. Umar B. Niazi, Michelle S. Chong, Amr Alanwar, Karl H. Johansson

    Abstract: Set-based state estimation plays a vital role in the safety verification of dynamical systems, which becomes significantly challenging when the system's sensors are susceptible to cyber-attacks. Existing methods often impose limitations on the attacker's capabilities, restricting the number of attacked sensors to be strictly less than half of the total number of sensors. This paper proposes a Secu… ▽ More

    Submitted 16 May, 2024; v1 submitted 10 September, 2023; originally announced September 2023.

  9. arXiv:2307.12715  [pdf, ps, other

    eess.SY

    Safety monitoring under stealthy sensor injection attacks using reachable sets

    Authors: Cédric Escudero, Michelle S. Chong, Paolo Massioni, Eric Zamaï

    Abstract: Stealthy sensor injection attacks are serious threats for industrial plants as they can compromise the plant's integrity without being detected by traditional fault detectors. In this manuscript, we study the possibility of revealing the presence of such attacks by monitoring only the control input. This approach consists in computing an ellipsoidal bound of the input reachable set. When the contr… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

  10. arXiv:2305.03177  [pdf

    eess.SP cs.CV cs.LG eess.IV physics.optics

    Deep Learning-Assisted Simultaneous Targets Sensing and Super-Resolution Imaging

    Authors: Jin Zhao, Huang Zhao Zhang, Ming-Zhe Chong, Yue-Yi Zhang, Zi-Wen Zhang, Zong-Kun Zhang, Chao-Hai Du, Pu-Kun Liu

    Abstract: Recently, metasurfaces have experienced revolutionary growth in the sensing and superresolution imaging field, due to their enabling of subwavelength manipulation of electromagnetic waves. However, the addition of metasurfaces multiplies the complexity of retrieving target information from the detected fields. Besides, although the deep learning method affords a compelling platform for a series of… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

  11. arXiv:2304.10359  [pdf, other

    math.OC eess.SY

    Secondary Controller Design for the Safety of Nonlinear Systems via Sum-of-Squares Programming

    Authors: Yankai Lin, Michelle S. Chong, Carlos Murguia

    Abstract: We consider the problem of ensuring the safety of nonlinear control systems under adversarial signals. Using Lyapunov based reachability analysis, we first give sufficient conditions to assess safety, i.e., to guarantee that the states of the control system, when starting from a given initial set, always remain in a prescribed safe set. We consider polynomial systems with semi-algebraic safe sets.… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

  12. arXiv:2212.00593  [pdf, other

    eess.SY

    Plug-and-Play Secondary Control for Safety of LTI Systems under Attacks

    Authors: Yankai Lin, Michelle S. Chong, Carlos Murguia

    Abstract: We consider the problem of controller design for linear time-invariant cyber-physical systems (CPSs) controlled via networks. Specifically, we adopt the set-up that a controller has already been designed to stabilize the plant. However, the closed loop system may be subject to actuator and sensor attacks. We first perform a reachability analysis to see the effect of potential attacks. To further e… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

  13. arXiv:2211.08474  [pdf, other

    eess.SY cs.CR math.OC

    Resilient Set-based State Estimation for Linear Time-Invariant Systems Using Zonotopes

    Authors: Muhammad Umar B. Niazi, Amr Alanwar, Michelle S. Chong, Karl Henrik Johansson

    Abstract: This paper considers the problem of set-based state estimation for linear time-invariant (LTI) systems under time-varying sensor attacks. Provided that the LTI system is stable and observable via every single sensor and that at least one sensor is uncompromised, we guarantee that the true state is always contained in the estimated set. We use zonotopes to represent these sets for computational eff… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

  14. arXiv:2206.07649  [pdf, ps, other

    eess.SP cs.LG

    Atrial Fibrillation Detection Using Weight-Pruned, Log-Quantised Convolutional Neural Networks

    Authors: Xiu Qi Chang, Ann Feng Chew, Benjamin Chen Ming Choong, Shuhui Wang, Rui Han, Wang He, Li Xiaolin, Rajesh C. Panicker, Deepu John

    Abstract: Deep neural networks (DNN) are a promising tool in medical applications. However, the implementation of complex DNNs on battery-powered devices is challenging due to high energy costs for communication. In this work, a convolutional neural network model is developed for detecting atrial fibrillation from electrocardiogram (ECG) signals. The model demonstrates high performance despite being trained… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

  15. arXiv:2202.06282  [pdf, ps, other

    eess.SY math.OC

    Distributed Periodic Event-triggered Control of Nonlinear Multi-Agent Systems

    Authors: Koen J. A. Scheres, Victor S. Dolk, Michelle S. Chong, Romain Postoyan, W. P. Maurice H. Heemels

    Abstract: We present a general emulation-based framework to address the distributed control of multi-agent systems over packet-based networks. We consider the setup where information is only transmitted at (non-uniform) sampling times and where packets are received with unknown delays. We design local dynamic periodic event-triggering mechanisms to generate the transmissions. The triggering mechanisms can r… ▽ More

    Submitted 23 May, 2022; v1 submitted 13 February, 2022; originally announced February 2022.

    Comments: To appear in the proceedings of NecSys2022

  16. arXiv:2108.04591  [pdf, ps, other

    eess.SY

    Event-Triggered State Estimation with Multiple Noisy Sensor Nodes

    Authors: Koen J. A. Scheres, Michelle S. Chong, Romain Postoyan, W. P. Maurice H. Heemels

    Abstract: General nonlinear continuous-time systems are considered for which its state is estimated via a packet-based communication network. We assume that the system has multiple sensor nodes, affected by measurement noise, which can transmit at discrete (non-equidistant) points in time. Moreover, each node can transmit asynchronously. For this setup, we develop a state estimation framework, where the tra… ▽ More

    Submitted 8 December, 2021; v1 submitted 10 August, 2021; originally announced August 2021.

  17. arXiv:1711.05400  [pdf, other

    eess.SP eess.SY

    Linear system security -- detection and correction of adversarial attacks in the noise-free case

    Authors: Zhanghan Tang, Margreta Kuijper, Michelle Chong, Iven Mareels, Chris Leckie

    Abstract: We address the problem of attack detection and attack correction for multi-output discrete-time linear time-invariant systems under sensor attack. More specifically, we focus on the situation where adversarial attack signals are added to some of the system's output signals. A 'security index' is defined to characterize the vulnerability of a system against such sensor attacks. Methods to compute t… ▽ More

    Submitted 14 November, 2017; originally announced November 2017.

    Comments: 10 pages, 4 figures; this paper also submitted to Automatica in Nov 2017

  18. arXiv:1602.06594  [pdf, ps, other

    eess.SY cs.CR

    Vulnerability of linear systems against sensor attacks--a system's security index

    Authors: Michelle S. Chong, Margreta Kuijper

    Abstract: The `security index' of a discrete-time LTI system under sensor attacks is introduced as a quantitative measure on the security of an observable system. We derive ideas from error control coding theory to provide sufficient conditions for attack detection and correction.

    Submitted 21 February, 2016; originally announced February 2016.

    Comments: Submitted

    MSC Class: 93B35; 94B05

    Journal ref: Proceedings of MTNS 2016 (International Symposium on Mathematical Theory of Networks and Systems, July 2016, Minneapolis, USA), pp.373-376