-
On data usage and predictive behavior of data-driven predictive control with 1-norm regularization
Authors:
Manuel Klädtke,
Moritz Schulze Darup
Abstract:
We investigate the data usage and predictive behavior of data-driven predictive control (DPC) with 1-norm regularization. Our analysis enables the offline removal of unused data and facilitates a comparison between the identified symmetric structure and data usage against prior knowledge of the true system. This comparison helps assess the suitability of the DPC scheme for effective control.
We investigate the data usage and predictive behavior of data-driven predictive control (DPC) with 1-norm regularization. Our analysis enables the offline removal of unused data and facilitates a comparison between the identified symmetric structure and data usage against prior knowledge of the true system. This comparison helps assess the suitability of the DPC scheme for effective control.
△ Less
Submitted 8 July, 2025; v1 submitted 28 May, 2025;
originally announced May 2025.
-
A mixed-integer framework for analyzing neural network-based controllers for piecewise affine systems with bounded disturbances
Authors:
Dieter Teichrib,
Moritz Schulze Darup
Abstract:
We present a method for representing the closed-loop dynamics of piecewise affine (PWA) systems with bounded additive disturbances and neural network-based controllers as mixed-integer (MI) linear constraints. We show that such representations enable the computation of robustly positively invariant (RPI) sets for the specified system class by solving MI linear programs. These RPI sets can subseque…
▽ More
We present a method for representing the closed-loop dynamics of piecewise affine (PWA) systems with bounded additive disturbances and neural network-based controllers as mixed-integer (MI) linear constraints. We show that such representations enable the computation of robustly positively invariant (RPI) sets for the specified system class by solving MI linear programs. These RPI sets can subsequently be used to certify stability and constraint satisfaction. Furthermore, the approach allows to handle non-linear systems based on suitable PWA approximations and corresponding error bounds, which can be interpreted as the bounded disturbances from above.
△ Less
Submitted 28 April, 2025; v1 submitted 15 April, 2025;
originally announced April 2025.
-
A moving horizon estimator for aquifer thermal energy storages
Authors:
Johannes van Randenborgh,
Moritz Schulze Darup
Abstract:
Aquifer thermal energy storages (ATES) represent groundwater saturated aquifers that store thermal energy in the form of heated or cooled groundwater. Combining two ATES, one can harness excess thermal energy from summer (heat) and winter (cold) to support the building's heating, ventilation, and air conditioning (HVAC) technology. In general, a dynamic operation of ATES throughout the year is ben…
▽ More
Aquifer thermal energy storages (ATES) represent groundwater saturated aquifers that store thermal energy in the form of heated or cooled groundwater. Combining two ATES, one can harness excess thermal energy from summer (heat) and winter (cold) to support the building's heating, ventilation, and air conditioning (HVAC) technology. In general, a dynamic operation of ATES throughout the year is beneficial to avoid using fossil fuel-based HVAC technology and maximize the ``green use'' of ATES. Model predictive control (MPC) with an appropriate system model may become a crucial control approach for ATES systems. Consequently, the MPC model should reflect spatial temperature profiles around ATES' boreholes to predict extracted groundwater temperatures accurately. However, meaningful predictions require the estimation of the current state of the system, as measurements are usually only at the borehole of the ATES. In control, this is often realized by model-based observers. Still, observing the state of an ATES system is non-trivial, since the model is typically hybrid. We show how to exploit the specific structure of the hybrid ATES model and design an easy-to-solve moving horizon estimator based on a quadratic program.
△ Less
Submitted 15 April, 2025; v1 submitted 14 April, 2025;
originally announced April 2025.
-
Towards explainable data-driven predictive control with regularizations
Authors:
Manuel Klädtke,
Moritz Schulze Darup
Abstract:
Data-driven predictive control (DPC), using linear combinations of recorded trajectory data, has recently emerged as a popular alternative to traditional model predictive control (MPC). Without an explicitly enforced prediction model, the effects of commonly used regularization terms (and the resulting predictions) can be opaque. This opacity may lead to practical challenges, such as reliance on e…
▽ More
Data-driven predictive control (DPC), using linear combinations of recorded trajectory data, has recently emerged as a popular alternative to traditional model predictive control (MPC). Without an explicitly enforced prediction model, the effects of commonly used regularization terms (and the resulting predictions) can be opaque. This opacity may lead to practical challenges, such as reliance on empirical tuning of regularization parameters based on closed-loop performance, and potentially misleading heuristic interpretations of norm-based regularizations. However, by examining the structure of the underlying optimal control problem (OCP), more precise and insightful interpretations of regularization effects can be derived. In this paper, we demonstrate how to analyze the predictive behavior of DPC through implicit predictors and the trajectory-specific effects of quadratic regularization. We further extend these results to cover typical DPC modifications, including DPC for affine systems, offset regularizations, slack variables, and terminal constraints. Additionally, we provide a simple but general result on (recursive) feasibility in DPC. This work aims to enhance the explainability and reliability of DPC by providing a deeper understanding of these regularization mechanisms.
△ Less
Submitted 27 March, 2025;
originally announced March 2025.
-
Towards privacy-preserving cooperative control via encrypted distributed optimization
Authors:
Philipp Binfet,
Janis Adamek,
Nils Schlüter,
Moritz Schulze Darup
Abstract:
Cooperative control is crucial for the effective operation of dynamical multi-agent systems. Especially for distributed control schemes, it is essential to exchange data between the agents. This becomes a privacy threat if the data is sensitive. Encrypted control has shown the potential to address this risk and ensure confidentiality. However, existing approaches mainly focus on cloud-based contro…
▽ More
Cooperative control is crucial for the effective operation of dynamical multi-agent systems. Especially for distributed control schemes, it is essential to exchange data between the agents. This becomes a privacy threat if the data is sensitive. Encrypted control has shown the potential to address this risk and ensure confidentiality. However, existing approaches mainly focus on cloud-based control and distributed schemes are restrictive.
In this paper, we present a novel privacy-preserving cooperative control scheme based on encrypted distributed optimization. More precisely, we focus on a secure distributed solution of a general consensus problem, which has manifold applications in cooperative control, by means of the alternating direction method of multipliers (ADMM). As a unique feature of our approach, we explicitly take into account the common situation that local decision variables contain copies of quantities associated with neighboring agents and ensure the neighbor's privacy. We show the effectiveness of our method based on a numerical case study dealing with the formation of mobile robots.
△ Less
Submitted 18 December, 2024;
originally announced December 2024.
-
Privacy-Preserving Power Flow Analysis via Secure Multi-Party Computation
Authors:
Jonas von der Heyden,
Nils Schlüter,
Philipp Binfet,
Martin Asman,
Markus Zdrallek,
Tibor Jager,
Moritz Schulze Darup
Abstract:
Smart grids feature a bidirectional flow of electricity and data, enhancing flexibility, efficiency, and reliability in increasingly volatile energy grids. However, data from smart meters can reveal sensitive private information. Consequently, the adoption of smart meters is often restricted via legal means and hampered by limited user acceptance. Since metering data is beneficial for fault-free g…
▽ More
Smart grids feature a bidirectional flow of electricity and data, enhancing flexibility, efficiency, and reliability in increasingly volatile energy grids. However, data from smart meters can reveal sensitive private information. Consequently, the adoption of smart meters is often restricted via legal means and hampered by limited user acceptance. Since metering data is beneficial for fault-free grid operation, power management, and resource allocation, applying privacy-preserving techniques to smart metering data is an important research problem. This work addresses this by using secure multi-party computation (SMPC), allowing multiple parties to jointly evaluate functions of their private inputs without revealing the latter. Concretely, we show how to perform power flow analysis on cryptographically hidden prosumer data. More precisely, we present a tailored solution to the power flow problem building on an SMPC implementation of Newtons method. We analyze the security of our approach in the universal composability framework and provide benchmarks for various grid types, threat models, and solvers. Our results indicate that secure multi-party computation can be able to alleviate privacy issues in smart grids in certain applications.
△ Less
Submitted 21 November, 2024;
originally announced November 2024.
-
Reachability analysis for piecewise affine systems with neural network-based controllers
Authors:
Dieter Teichrib,
Moritz Schulze Darup
Abstract:
Neural networks (NN) have been successfully applied to approximate various types of complex control laws, resulting in low-complexity NN-based controllers that are fast to evaluate. However, when approximating control laws using NN, performance and stability guarantees of the original controller may not be preserved. Recently, it has been shown that it is possible to provide such guarantees for li…
▽ More
Neural networks (NN) have been successfully applied to approximate various types of complex control laws, resulting in low-complexity NN-based controllers that are fast to evaluate. However, when approximating control laws using NN, performance and stability guarantees of the original controller may not be preserved. Recently, it has been shown that it is possible to provide such guarantees for linear systems with NN-based controllers by analyzing the approximation error with respect to a stabilizing base-line controller or by computing reachable sets of the closed-loop system. The latter has the advantage of not requiring a base-line controller. In this paper, we show that similar ideas can be used to analyze the closed-loop behavior of piecewise affine (PWA) systems with an NN-based controller. Our approach builds on computing over-approximations of reachable sets using mixed-integer linear programming, which allows to certify that the closed-loop system converges to a small set containing the origin while satisfying input and state constraints. We also show how to modify a given NN-based controller to ensure asymptotic stability for the controlled PWA system.
△ Less
Submitted 6 November, 2024;
originally announced November 2024.
-
Encrypted system identification as-a-service via reliable encrypted matrix inversion
Authors:
Janis Adamek,
Philipp Binfet,
Nils Schlüter,
Moritz Schulze Darup
Abstract:
Encrypted computation opens up promising avenues across a plethora of application domains, including machine learning, health-care, finance, and control. Arithmetic homomorphic encryption, in particular, is a natural fit for cloud-based computational services. However, computations are essentially limited to polynomial circuits, while comparisons, transcendental functions, and iterative algorithms…
▽ More
Encrypted computation opens up promising avenues across a plethora of application domains, including machine learning, health-care, finance, and control. Arithmetic homomorphic encryption, in particular, is a natural fit for cloud-based computational services. However, computations are essentially limited to polynomial circuits, while comparisons, transcendental functions, and iterative algorithms are notoriously hard to realize. Against this background, the paper presents an encrypted system identification service enabled by a reliable encrypted solution to least squares problems. More precisely, we devise an iterative algorithm for matrix inversion and present reliable initializations as well as certificates for the achieved accuracy without compromising the privacy of provided I/O-data. The effectiveness of the approach is illustrated with three popular identification tasks.
△ Less
Submitted 27 October, 2024;
originally announced October 2024.
-
On the design of stabilizing FIR controllers
Authors:
Janis Adamek,
Nils Schlüter,
Moritz Schulze Darup
Abstract:
Recently, it has been observed that finite impulse response controllers are an excellent basis for encrypted control, where privacy-preserving controller evaluations via special cryptosystems are the main focus. Beneficial properties of FIR filters are also well-known from digital signal processing, which makes them preferable over infinite impulse response filters in many applications. Their appe…
▽ More
Recently, it has been observed that finite impulse response controllers are an excellent basis for encrypted control, where privacy-preserving controller evaluations via special cryptosystems are the main focus. Beneficial properties of FIR filters are also well-known from digital signal processing, which makes them preferable over infinite impulse response filters in many applications. Their appeal extends to feedback control, offering design flexibility grounded solely on output measurements. However, designing FIR controllers is challenging, which motivates this work. To address the design challenge, we initially show that FIR controller designs for linear systems can equivalently be stated as static or dynamic output feedback problems. After focusing on the existence of stabilizing FIR controllers for a given plant, we tailor two common design approaches for output feedback to the case of FIR controllers. Unfortunately, it will turn out that the FIR characteristics add further restrictions to the LMI-based approaches. Hence, we finally turn to designs building on non-convex optimization, which provide satisfactory results for a selection of benchmark systems.
△ Less
Submitted 21 August, 2024;
originally announced August 2024.
-
Privacy-preserving gradient-based fair federated learning
Authors:
Janis Adamek,
Moritz Schulze Darup
Abstract:
Federated learning (FL) schemes allow multiple participants to collaboratively train neural networks without the need to directly share the underlying data.However, in early schemes, all participants eventually obtain the same model. Moreover, the aggregation is typically carried out by a third party, who obtains combined gradients or weights, which may reveal the model. These downsides underscore…
▽ More
Federated learning (FL) schemes allow multiple participants to collaboratively train neural networks without the need to directly share the underlying data.However, in early schemes, all participants eventually obtain the same model. Moreover, the aggregation is typically carried out by a third party, who obtains combined gradients or weights, which may reveal the model. These downsides underscore the demand for fair and privacy-preserving FL schemes. Here, collaborative fairness asks for individual model quality depending on the individual data contribution. Privacy is demanded with respect to any kind of data outsourced to the third party. Now, there already exist some approaches aiming for either fair or privacy-preserving FL and a few works even address both features. In our paper, we build upon these seminal works and present a novel, fair and privacy-preserving FL scheme. Our approach, which mainly relies on homomorphic encryption, stands out for exclusively using local gradients. This increases the usability in comparison to state-of-the-art approaches and thereby opens the door to applications in control.
△ Less
Submitted 18 July, 2024;
originally announced July 2024.
-
Piecewise regression via mixed-integer programming for MPC
Authors:
Dieter Teichrib,
Moritz Schulze Darup
Abstract:
Piecewise regression is a versatile approach used in various disciplines to approximate complex functions from limited, potentially noisy data points. In control, piecewise regression is, e.g., used to approximate the optimal control law of model predictive control (MPC), the optimal value function, or unknown system dynamics. Neural networks are a common choice to solve the piecewise regression p…
▽ More
Piecewise regression is a versatile approach used in various disciplines to approximate complex functions from limited, potentially noisy data points. In control, piecewise regression is, e.g., used to approximate the optimal control law of model predictive control (MPC), the optimal value function, or unknown system dynamics. Neural networks are a common choice to solve the piecewise regression problem. However, due to their nonlinear structure, training is often based on gradient-based methods, which may fail to find a global optimum or even a solution that leads to a small approximation error. To overcome this problem and to find a global optimal solution, methods based on mixed-integer programming (MIP) can be used. However, the known MIP-based methods are either limited to a special class of functions, e.g., convex piecewise affine functions, or they lead to complex approximations in terms of the number of regions of the piecewise defined function. Both complicate a usage in the framework of control. We propose a new MIP-based method that is not restricted to a particular class of piecewise defined functions and leads to functions that are fast to evaluate and can be used within an optimization problem, making them well suited for use in control.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
MPC using mixed-integer programming for aquifer thermal energy storages
Authors:
Johannes van Randenborgh,
Moritz Schulze Darup
Abstract:
Aquifer thermal energy storages (ATES) are used to temporally store thermal energy in groundwater saturated aquifers. Typically, two storages are combined, one for heat and one for cold, to support heating and cooling of buildings. This way, the use of classical fossil fuel-based heating, ventilation, and air conditioning can be significantly reduced. Exploiting the benefits of ATES beyond "season…
▽ More
Aquifer thermal energy storages (ATES) are used to temporally store thermal energy in groundwater saturated aquifers. Typically, two storages are combined, one for heat and one for cold, to support heating and cooling of buildings. This way, the use of classical fossil fuel-based heating, ventilation, and air conditioning can be significantly reduced. Exploiting the benefits of ATES beyond "seasonal" heating in winter and cooling in summer as well as meeting legislative restrictions requires sophisticated control. We propose a tailored model predictive control (MPC) scheme for the sustainable operation of ATES systems, which mainly builds on a novel model and objective function. The new approach leads to a mixed-integer quadratic program. Its performance is evaluated on real data from an ATES system in Belgium.
△ Less
Submitted 10 October, 2024; v1 submitted 15 April, 2024;
originally announced April 2024.
-
A code-driven tutorial on encrypted control: From pioneering realizations to modern implementations
Authors:
Nils Schlüter,
Junsoo Kim,
Moritz Schulze Darup
Abstract:
The growing interconnectivity in control systems due to robust wireless communication and cloud usage paves the way for exciting new opportunities such as data-driven control and service-based decision-making. At the same time, connected systems are susceptible to cyberattacks and data leakages. Against this background, encrypted control aims to increase the security and safety of cyber-physical s…
▽ More
The growing interconnectivity in control systems due to robust wireless communication and cloud usage paves the way for exciting new opportunities such as data-driven control and service-based decision-making. At the same time, connected systems are susceptible to cyberattacks and data leakages. Against this background, encrypted control aims to increase the security and safety of cyber-physical systems. A central goal is to ensure confidentiality of process data during networked controller evaluations, which is enabled by, e.g., homomorphic encryption. However, the integration of advanced cryptographic systems renders the design of encrypted controllers an interdisciplinary challenge.
This code-driven tutorial paper aims to facilitate the access to encrypted control by providing exemplary realizations based on popular homomorphic cryptosystems. In particular, we discuss the encrypted implementation of state feedback and PI controllers using the Paillier, GSW, and CKKS cryptosystem.
△ Less
Submitted 6 April, 2024;
originally announced April 2024.
-
Extending direct data-driven predictive control towards systems with finite control sets
Authors:
Manuel Klädtke,
Moritz Schulze Darup,
Daniel E. Quevedo
Abstract:
Although classical model predictive control with finite control sets (FCS-MPC) is quite a popular control method, particularly in the realm of power electronics systems, its direct data-driven predictive control (FCS-DPC) counterpart has received relatively limited attention. In this paper, we introduce a novel reformulation of a commonly used DPC scheme that allows for the application of a modifi…
▽ More
Although classical model predictive control with finite control sets (FCS-MPC) is quite a popular control method, particularly in the realm of power electronics systems, its direct data-driven predictive control (FCS-DPC) counterpart has received relatively limited attention. In this paper, we introduce a novel reformulation of a commonly used DPC scheme that allows for the application of a modified sphere decoding algorithm, known for its efficiency and prominence in FCS-MPC applications. We test the reformulation on a popular electrical drive example and compare the computation times of sphere decoding FCS-DPC with an enumeration-based and a MIQP method.
△ Less
Submitted 28 May, 2025; v1 submitted 3 April, 2024;
originally announced April 2024.
-
Towards a unifying framework for data-driven predictive control with quadratic regularization
Authors:
Manuel Klädtke,
Moritz Schulze Darup
Abstract:
Data-driven predictive control (DPC) has recently gained popularity as an alternative to model predictive control (MPC). Amidst the surge in proposed DPC frameworks, upon closer inspection, many of these frameworks are more closely related (or perhaps even equivalent) to each other than it may first appear. We argue for a more formal characterization of these relationships so that results can be f…
▽ More
Data-driven predictive control (DPC) has recently gained popularity as an alternative to model predictive control (MPC). Amidst the surge in proposed DPC frameworks, upon closer inspection, many of these frameworks are more closely related (or perhaps even equivalent) to each other than it may first appear. We argue for a more formal characterization of these relationships so that results can be freely transferred from one framework to another, rather than being uniquely attributed to a particular framework. We demonstrate this idea by examining the connection between $γ$-DDPC and the original DeePC formulation.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
Privacy Analysis of Affine Transformations in Cloud-based MPC: Vulnerability to Side-knowledge
Authors:
Teimour Hosseinalizadeh,
Nils Schlüter,
Moritz Schulze Darup,
Nima Monshizadeh
Abstract:
Search for the optimizer in computationally demanding model predictive control (MPC) setups can be facilitated by Cloud as a service provider in cyber-physical systems. This advantage introduces the risk that Cloud can obtain unauthorized access to the privacy-sensitive parameters of the system and cost function. To solve this issue, i.e., preventing Cloud from accessing the parameters while benef…
▽ More
Search for the optimizer in computationally demanding model predictive control (MPC) setups can be facilitated by Cloud as a service provider in cyber-physical systems. This advantage introduces the risk that Cloud can obtain unauthorized access to the privacy-sensitive parameters of the system and cost function. To solve this issue, i.e., preventing Cloud from accessing the parameters while benefiting from Cloud computation, random affine transformations provide an exact yet light weight in computation solution. This research deals with analyzing privacy preserving properties of these transformations when they are adopted for MPC problems. We consider two common strategies for outsourcing the optimization required in MPC problems, namely separate and dense forms, and establish that random affine transformations utilized in these forms are vulnerable to side-knowledge from Cloud. Specifically, we prove that the privacy guarantees of these methods and their extensions for separate form are undermined when a mild side-knowledge about the problem in terms of structure of MPC cost function is available. In addition, while we prove that outsourcing the MPC problem in the dense form inherently leads to some degree of privacy for the system and cost function parameters, we also establish that affine transformations applied to this form are nevertheless prone to be undermined by a Cloud with mild side-knowledge. Numerical simulations confirm our results.
△ Less
Submitted 11 January, 2024;
originally announced January 2024.
-
On the security of randomly transformed quadratic programs for privacy-preserving cloud-based control
Authors:
Philipp Binfet,
Nils Schlüter,
Moritz Schulze Darup
Abstract:
Control related data, such as system states and inputs or controller specifications, is often sensitive. Meanwhile, the increasing connectivity of cloud-based or networked control results in vast amounts of such data, which poses a privacy threat, especially when evaluation on external platforms is considered. In this context, a cipher based on a random affine transformation gained attention, whic…
▽ More
Control related data, such as system states and inputs or controller specifications, is often sensitive. Meanwhile, the increasing connectivity of cloud-based or networked control results in vast amounts of such data, which poses a privacy threat, especially when evaluation on external platforms is considered. In this context, a cipher based on a random affine transformation gained attention, which is supposed to enable privacy-preserving evaluations of quadratic programs (QPs) with little computational overhead compared to other methods.
This paper deals with the security of such randomly transformed QPs in the context of model predictive control (MPC). In particular, we show how to construct attacks against this cipher and thereby underpin concerns regarding its security in a practical setting. To this end, we exploit invariants under the transformations and common specifications of MPC-related QPs. Our numerical examples then illustrate that these two ingredients suffice to extract information from ciphertexts.
△ Less
Submitted 9 November, 2023;
originally announced November 2023.
-
Efficient computation of Lipschitz constants for MPC with symmetries
Authors:
Dieter Teichrib,
Moritz Schulze Darup
Abstract:
Lipschitz constants for linear MPC are useful for certifying inherent robustness against unmodeled disturbances or robustness for neural network-based approximations of the control law. In both cases, knowing the minimum Lipschitz constant leads to less conservative certifications. Computing this minimum Lipschitz constant is trivial given the explicit MPC. However, the computation of the explicit…
▽ More
Lipschitz constants for linear MPC are useful for certifying inherent robustness against unmodeled disturbances or robustness for neural network-based approximations of the control law. In both cases, knowing the minimum Lipschitz constant leads to less conservative certifications. Computing this minimum Lipschitz constant is trivial given the explicit MPC. However, the computation of the explicit MPC may be intractable for complex systems. The paper discusses a method for efficiently computing the minimum Lipschitz constant without using the explicit control law. The proposed method simplifies a recently presented mixed-integer linear program (MILP) that computes the minimum Lipschitz constant. The simplification is obtained by exploiting saturation and symmetries of the control law and irrelevant constraints of the optimal control problem.
△ Less
Submitted 8 November, 2023;
originally announced November 2023.
-
Implicit predictors in regularized data-driven predictive control
Authors:
Manuel Klädtke,
Moritz Schulze Darup
Abstract:
We introduce the notion of implicit predictors, which characterize the input-(state)-output prediction behavior underlying a predictive control scheme, even if it is not explicitly enforced as an equality constraint (as in traditional model or subspace predictive control). To demonstrate this concept, we derive and analyze implicit predictors for some basic data-driven predictive control (DPC) sch…
▽ More
We introduce the notion of implicit predictors, which characterize the input-(state)-output prediction behavior underlying a predictive control scheme, even if it is not explicitly enforced as an equality constraint (as in traditional model or subspace predictive control). To demonstrate this concept, we derive and analyze implicit predictors for some basic data-driven predictive control (DPC) schemes, which offers a new perspective on this popular approach that may form the basis for modified DPC schemes and further theoretical insights.
△ Less
Submitted 26 May, 2025; v1 submitted 20 July, 2023;
originally announced July 2023.
-
Error bounds for maxout neural network approximations of model predictive control
Authors:
Dieter Teichrib,
Moritz Schulze Darup
Abstract:
Neural network (NN) approximations of model predictive control (MPC) are a versatile approach if the online solution of the underlying optimal control problem (OCP) is too demanding and if an exact computation of the explicit MPC law is intractable. The drawback of such approximations is that they typically do not preserve stability and performance guarantees of the original MPC. However, such gua…
▽ More
Neural network (NN) approximations of model predictive control (MPC) are a versatile approach if the online solution of the underlying optimal control problem (OCP) is too demanding and if an exact computation of the explicit MPC law is intractable. The drawback of such approximations is that they typically do not preserve stability and performance guarantees of the original MPC. However, such guarantees can be recovered if the maximum error with respect to the optimal control law and the Lipschitz constant of that error are known. We show in this work how to compute both values exactly when the control law is approximated by a maxout NN. We build upon related results for ReLU NN approximations and derive mixed-integer (MI) linear constraints that allow a computation of the output and the local gain of a maxout NN by solving an MI feasibility problem. Furthermore, we show theoretically and experimentally that maxout NN exist for which the maximum error is zero.
△ Less
Submitted 21 April, 2023; v1 submitted 18 April, 2023;
originally announced April 2023.
-
Convex NMPC reformulations for a special class of nonlinear multi-input systems with application to rank-one bilinear networks
Authors:
Manuel Klädtke,
Moritz Schulze Darup
Abstract:
We show that a special class of (nonconvex) NMPC problems admits an exact solution by reformulating them as a finite number of convex subproblems, extending previous results to the multi-input case. Our approach is applicable to a special class of input-affine discrete-time systems, which includes a class of bilinear rank-one systems that is considered useful in modeling certain controlled network…
▽ More
We show that a special class of (nonconvex) NMPC problems admits an exact solution by reformulating them as a finite number of convex subproblems, extending previous results to the multi-input case. Our approach is applicable to a special class of input-affine discrete-time systems, which includes a class of bilinear rank-one systems that is considered useful in modeling certain controlled networks. We illustrate our results with two numerical examples, including the aforementioned rank-one bilinear network.
△ Less
Submitted 26 May, 2025; v1 submitted 17 April, 2023;
originally announced April 2023.
-
Cryptanalysis of Random Affine Transformations for Encrypted Control
Authors:
Nils Schlüter,
Philipp Binfet,
Moritz Schulze Darup
Abstract:
Cloud-based and distributed computations are of growing interest in modern control systems. However, these technologies require performing computations on not necessarily trustworthy platforms and, thus, put the confidentiality of sensitive control-related data at risk. Encrypted control has dealt with this issue by utilizing modern cryptosystems with homomorphic properties, which allow a secure e…
▽ More
Cloud-based and distributed computations are of growing interest in modern control systems. However, these technologies require performing computations on not necessarily trustworthy platforms and, thus, put the confidentiality of sensitive control-related data at risk. Encrypted control has dealt with this issue by utilizing modern cryptosystems with homomorphic properties, which allow a secure evaluation at the cost of an increased computation or communication effort (among others). Recently, a cipher based on a random affine transformation gained attention in the encrypted control community. Its appeal stems from the possibility to construct security providing homomorphisms that do not suffer from the restrictions of ``conventional'' approaches.
This paper provides a cryptanalysis of random affine transformations in the context of encrypted control. To this end, a deterministic and probabilistic variant of the cipher over real numbers are analyzed in a generalized setup, where we use cryptographic definitions for security and attacker models. It is shown that the deterministic cipher breaks under a known-plaintext attack, and unavoidably leaks information of the closed-loop, which opens another angle of attack. For the probabilistic variant, statistical indistinguishability of ciphertexts can be achieved, which makes successful attacks unlikely. We complete our analysis by investigating a floating point realization of the probabilistic random affine transformation cipher, which unfortunately suggests the impracticality of the scheme if a security guarantee is needed.
△ Less
Submitted 13 April, 2023;
originally announced April 2023.
-
Encrypted distributed state estimation via affine averaging
Authors:
N. Schlüter,
P. Binfet,
J. Kim,
M. Schulze Darup
Abstract:
Distributed state estimation arises in many applications such as position estimation in robot swarms, clock synchronization for processor networks, and data fusion. One characteristic is that agents only have access to noisy measurements of deviations between their own and neighboring states. Still, estimations of their actual state can be obtained in a fully distributed manner using algorithms su…
▽ More
Distributed state estimation arises in many applications such as position estimation in robot swarms, clock synchronization for processor networks, and data fusion. One characteristic is that agents only have access to noisy measurements of deviations between their own and neighboring states. Still, estimations of their actual state can be obtained in a fully distributed manner using algorithms such as affine averaging. However, running this algorithm, requires that the agents exchange their current state estimations, which can be a privacy issue (since they eventually reveal the actual states). To counteract this threat, we propose an encrypted version of the affine averaging algorithm in this paper. More precisely, we use homomorphic encryption to realize an encrypted implementation, where only one ``leader'' agent has access to its state estimation in plaintext. One main challenge (which often arises for recursive encrypted computations) is to prevent overflow w.r.t.~the bounded message space of the cryptosystem. We solve this problem by periodically resetting the agents' states with the help of the leader. We study the resulting system dynamics with respect to different reset strategies and support our findings with extensive numerical simulations.
△ Less
Submitted 15 September, 2022;
originally announced September 2022.
-
Encrypted extremum seeking for privacy-preserving PID tuning as-a-Service
Authors:
Nils Schlüter,
Matthias Neuhaus,
Moritz Schulze Darup
Abstract:
Wireless communication offers many benefits for control such as substantially reduced deployment costs, higher flexibility, as well as easier data access. It is thus not surprising that smart and wireless sensors and actuators are increasingly used in industry. With these enhanced possibilities, exciting new technologies such as Control-as-a-Service arise, where (for example) controller design or…
▽ More
Wireless communication offers many benefits for control such as substantially reduced deployment costs, higher flexibility, as well as easier data access. It is thus not surprising that smart and wireless sensors and actuators are increasingly used in industry. With these enhanced possibilities, exciting new technologies such as Control-as-a-Service arise, where (for example) controller design or tuning based on input-output-data can be outsourced to a cloud or mobile device. This implies, however, that sensitive plant information may become available to service providers or, possibly, attackers.
Against this background, we focus on privacy-preserving optimal PID tuning as-a-Service here. In particular, we combine homomorphic encryption with extremum seeking in order to provide a purely data-driven and confidential tuning algorithm. The encrypted realization requires several adaptions of established extremum seekers. These encompass relative parameter updates, stochastic gradient approximations, and a normalized objective function. As a result, and as illustrated by various numerical examples, the proposed encrypted extremum seeker is able to tune PID controllers for a wide variety of plants without being too conservative.
△ Less
Submitted 10 July, 2022;
originally announced July 2022.
-
Convex reformulations for a special class of nonlinear MPC problems
Authors:
Manuel Klädtke,
Moritz Schulze Darup
Abstract:
We show how the solution to NMPC problems for a special type of input-affine discrete-time systems can be obtained by reformulating the underlying non-convex optimal control problem in terms of a finite number of convex subproblems. The reformulation is facilitated by exact (input-state) linearization, which is shown to provide beneficial properties for the treated class of systems. We characteriz…
▽ More
We show how the solution to NMPC problems for a special type of input-affine discrete-time systems can be obtained by reformulating the underlying non-convex optimal control problem in terms of a finite number of convex subproblems. The reformulation is facilitated by exact (input-state) linearization, which is shown to provide beneficial properties for the treated class of systems. We characterize possible types of the resulting convex subproblems and illustrate our approach with three numerical examples.
△ Less
Submitted 17 April, 2023; v1 submitted 17 June, 2022;
originally announced June 2022.
-
A deterministic view on explicit data-driven (M)PC
Authors:
Manuel Klädtke,
Dieter Teichrib,
Nils Schlüter,
Moritz Schulze Darup
Abstract:
We show that the explicit realization of data-driven predictive control (DPC) for linear deterministic systems is more tractable than previously thought. To this end, we compare the optimal control problems (OCP) corresponding to deterministic DPC and classical model predictive control (MPC), specify its close relation, and systematically eliminate ambiguity inherent in DPC. As a central result, w…
▽ More
We show that the explicit realization of data-driven predictive control (DPC) for linear deterministic systems is more tractable than previously thought. To this end, we compare the optimal control problems (OCP) corresponding to deterministic DPC and classical model predictive control (MPC), specify its close relation, and systematically eliminate ambiguity inherent in DPC. As a central result, we find that the explicit solutions to these types of DPC and MPC are of exactly the same complexity. We illustrate our results with two numerical examples highlighting features of our approach.
△ Less
Submitted 17 April, 2023; v1 submitted 14 June, 2022;
originally announced June 2022.
-
Tailored max-out networks for learning convex PWQ functions
Authors:
Dieter Teichrib,
Moritz Schulze Darup
Abstract:
Convex piecewise quadratic (PWQ) functions frequently appear in control and elsewhere. For instance, it is well-known that the optimal value function (OVF) as well as Q-functions for linear MPC are convex PWQ functions. Now, in learning-based control, these functions are often represented with the help of artificial neural networks (NN). In this context, a recurring question is how to choose the t…
▽ More
Convex piecewise quadratic (PWQ) functions frequently appear in control and elsewhere. For instance, it is well-known that the optimal value function (OVF) as well as Q-functions for linear MPC are convex PWQ functions. Now, in learning-based control, these functions are often represented with the help of artificial neural networks (NN). In this context, a recurring question is how to choose the topology of the NN in terms of depth, width, and activations in order to enable efficient learning. An elegant answer to that question could be a topology that, in principle, allows to exactly describe the function to be learned. Such solutions are already available for related problems. In fact, suitable topologies are known for piecewise affine (PWA) functions that can, for example, reflect the optimal control law in linear MPC. Following this direction, we show in this paper that convex PWQ functions can be exactly described by max-out-NN with only one hidden layer and two neurons.
△ Less
Submitted 14 June, 2022;
originally announced June 2022.
-
Tailored neural networks for learning optimal value functions in MPC
Authors:
Dieter Teichrib,
Moritz Schulze Darup
Abstract:
Learning-based predictive control is a promising alternative to optimization-based MPC. However, efficiently learning the optimal control policy, the optimal value function, or the Q-function requires suitable function approximators. Often, artificial neural networks (ANN) are considered but choosing a suitable topology is also non-trivial. Against this background, it has recently been shown that…
▽ More
Learning-based predictive control is a promising alternative to optimization-based MPC. However, efficiently learning the optimal control policy, the optimal value function, or the Q-function requires suitable function approximators. Often, artificial neural networks (ANN) are considered but choosing a suitable topology is also non-trivial. Against this background, it has recently been shown that tailored ANN allow, in principle, to exactly describe the optimal control policy in linear MPC by exploiting its piecewise affine structure. In this paper, we provide a similar result for representing the optimal value function and the Q-function that are both known to be piecewise quadratic for linear MPC.
△ Less
Submitted 7 December, 2021;
originally announced December 2021.
-
Secure learning-based MPC via garbled circuit
Authors:
K. Tjell,
N. Schlüter,
P. Binfet,
M. Schulze Darup
Abstract:
Encrypted control seeks confidential controller evaluation in cloud-based or networked systems. Many existing approaches build on homomorphic encryption (HE) that allow simple mathematical operations to be carried out on encrypted data. Unfortunately, HE is computationally demanding and many control laws (in particular non-polynomial ones) cannot be efficiently implemented with this technology.…
▽ More
Encrypted control seeks confidential controller evaluation in cloud-based or networked systems. Many existing approaches build on homomorphic encryption (HE) that allow simple mathematical operations to be carried out on encrypted data. Unfortunately, HE is computationally demanding and many control laws (in particular non-polynomial ones) cannot be efficiently implemented with this technology.
We show in this paper that secure two-party computation using garbled circuits provides a powerful alternative to HE for encrypted control. More precisely, we present a novel scheme that allows to efficiently implement (non-polynomial) max-out neural networks with one hidden layer in a secure fashion. These networks are of special interest for control since they allow, in principle, to exactly describe piecewise affine control laws resulting from, e.g., linear model predictive control (MPC). However, exact fits require high-dimensional preactivations of the neurons. Fortunately, we illustrate that even low-dimensional learning-based approximations are sufficiently accurate for linear MPC. In addition, these approximations can be securely evaluated using garbled circuit in less than 100~ms for our numerical example. Hence, our approach opens new opportunities for applying encrypted control.
△ Less
Submitted 7 December, 2021;
originally announced December 2021.
-
Encrypted dynamic control with unlimited operating time via FIR filters
Authors:
N. Schlüter,
M. Neuhaus,
M. Schulze Darup
Abstract:
Encrypted control enables confidential controller evaluations in cloud-based or networked control systems. From a technical point of view, an encrypted controller is a modified control algorithm that is capable of computing encrypted control actions based on encrypted system outputs. Unsurprisingly, encrypted implementations of controllers using, e.g., homomorphic cryptosystems entail new design c…
▽ More
Encrypted control enables confidential controller evaluations in cloud-based or networked control systems. From a technical point of view, an encrypted controller is a modified control algorithm that is capable of computing encrypted control actions based on encrypted system outputs. Unsurprisingly, encrypted implementations of controllers using, e.g., homomorphic cryptosystems entail new design challenges. For instance, in order to avoid overflow or high computational loads, only a finite number of operations should be carried out on encrypted data. Clearly, this guideline is hard to satisfy for dynamic controllers due to their recursive nature. To enable an unlimited operating time, existing implementations thus rely on external refreshments of the controller state, internal refreshments using bootstrapping, or recurring controller resets.
We show in this paper that simple FIR filter-based controllers allow overcoming many drawbacks of the existing approaches. In fact, since FIR filters consider only a finite amount of the most recent input data, the recursion issue is immediately solved and controller refreshments or resets are no longer required. Moreover, well-designed FIR filters are often less complex than and equally effective as IIR controllers.
△ Less
Submitted 6 December, 2021;
originally announced December 2021.
-
Novel convex decomposition of piecewise affine functions
Authors:
Nils Schlüter,
Moritz Schulze Darup
Abstract:
In this paper, we present a novel approach to decompose a given piecewise affine (PWA) function into two convex PWA functions. Convex decompositions are useful to speed up or distribute evaluations of PWA functions. Different approaches to construct a convex decomposition have already been published. However, either the two resulting convex functions have very high or very different complexities,…
▽ More
In this paper, we present a novel approach to decompose a given piecewise affine (PWA) function into two convex PWA functions. Convex decompositions are useful to speed up or distribute evaluations of PWA functions. Different approaches to construct a convex decomposition have already been published. However, either the two resulting convex functions have very high or very different complexities, which is often undesirable, or the decomposition procedure is inapplicable even for simple cases. Our novel methodology significantly reduces these drawbacks in order to extend the applicability of convex decompositions.
△ Less
Submitted 9 August, 2021;
originally announced August 2021.
-
Teaching MPC: Which Way to the Promised Land?
Authors:
Timm Faulwasser,
Sergio Lucia,
Moritz Schulze Darup,
Martin Mönnigmann
Abstract:
Since the earliest conceptualizations by Lee and Markus, and Propoi in the 1960s, Model Predictive Control (MPC) has become a major success story of systems and control with respect to industrial impact and with respect to continued and wide-spread research interest. The field has evolved from conceptually simple linear-quadratic (convex) settings in discrete and continuous time to nonlinear and d…
▽ More
Since the earliest conceptualizations by Lee and Markus, and Propoi in the 1960s, Model Predictive Control (MPC) has become a major success story of systems and control with respect to industrial impact and with respect to continued and wide-spread research interest. The field has evolved from conceptually simple linear-quadratic (convex) settings in discrete and continuous time to nonlinear and distributed settings including hybrid, stochastic, and infinite-dimensional systems. Put differently, essentially the entire spectrum of dynamic systems can be considered in the MPC framework with respect to both -- system theoretic analysis and tailored numerics. Moreover, recent developments in machine learning also leverage MPC concepts and learning-based and data-driven MPC have become highly active research areas.
However, this evident and continued success renders it increasingly complex to live up to industrial expectations while enabling graduate students for state-of-the-art research in teaching MPC. Hence, this position paper attempts to trigger a discussion on teaching MPC. To lay the basis for a fruitful debate, we subsequently investigate the prospect of covering MPC in undergraduate courses; we comment on teaching textbooks; and we discuss the increasing complexity of research-oriented graduate teaching of~MPC.
△ Less
Submitted 2 June, 2021;
originally announced June 2021.
-
Encrypted control for networked systems -- An illustrative introduction and current challenges
Authors:
M. Schulze Darup,
A. B. Alexandru,
D. E. Quevedo,
G. J. Pappas
Abstract:
Cloud computing and distributed computing are becoming ubiquitous in many modern control systems such as smart grids, building automation, robot swarms or intelligent transportation systems. Compared to "isolated" control systems, the advantages of cloud-based and distributed control systems are, in particular, resource pooling and outsourcing, rapid scalability, and high performance. However, the…
▽ More
Cloud computing and distributed computing are becoming ubiquitous in many modern control systems such as smart grids, building automation, robot swarms or intelligent transportation systems. Compared to "isolated" control systems, the advantages of cloud-based and distributed control systems are, in particular, resource pooling and outsourcing, rapid scalability, and high performance. However, these capabilities do not come without risks. In fact, the involved communication and processing of sensitive data via public networks and on third-party platforms promote, among other cyberthreats, eavesdropping and manipulation of data. Encrypted control addresses this security gap and provides confidentiality of the processed data in the entire control loop. This paper presents a tutorial-style introduction to this young but emerging field in the framework of secure control for networked dynamical systems.
△ Less
Submitted 1 October, 2020;
originally announced October 2020.