-
Deep Learning-Based Pneumonia Detection from Chest X-ray Images: A CNN Approach with Performance Analysis and Clinical Implications
Authors:
P K Dutta,
Anushri Chowdhury,
Anouska Bhattacharyya,
Shakya Chakraborty,
Sujatra Dey
Abstract:
Deep learning integration into medical imaging systems has transformed disease detection and diagnosis processes with a focus on pneumonia identification. The study introduces an intricate deep learning system using Convolutional Neural Networks for automated pneumonia detection from chest Xray images which boosts diagnostic precision and speed. The proposed CNN architecture integrates sophisticat…
▽ More
Deep learning integration into medical imaging systems has transformed disease detection and diagnosis processes with a focus on pneumonia identification. The study introduces an intricate deep learning system using Convolutional Neural Networks for automated pneumonia detection from chest Xray images which boosts diagnostic precision and speed. The proposed CNN architecture integrates sophisticated methods including separable convolutions along with batch normalization and dropout regularization to enhance feature extraction while reducing overfitting. Through the application of data augmentation techniques and adaptive learning rate strategies the model underwent training on an extensive collection of chest Xray images to enhance its generalization capabilities. A convoluted array of evaluation metrics such as accuracy, precision, recall, and F1 score collectively verify the model exceptional performance by recording an accuracy rate of 91. This study tackles critical clinical implementation obstacles such as data privacy protection, model interpretability, and integration with current healthcare systems beyond just model performance. This approach introduces a critical advancement by integrating medical ontologies with semantic technology to improve diagnostic accuracy. The study enhances AI diagnostic reliability by integrating machine learning outputs with structured medical knowledge frameworks to boost interpretability. The findings demonstrate AI powered healthcare tools as a scalable efficient pneumonia detection solution. This study advances AI integration into clinical settings by developing more precise automated diagnostic methods that deliver consistent medical imaging results.
△ Less
Submitted 26 September, 2025;
originally announced October 2025.
-
Real-Time Thermal State Estimation and Forecasting in Laser Powder Bed Fusion
Authors:
Yukta Pareek,
Abdul Malik Al Mardhouf Al Saadi,
Amrita Basak,
Satadru Dey
Abstract:
Laser Powder Bed Fusion (L-PBF) is a widely adopted additive manufacturing process for fabricating complex metallic parts layer by layer. Effective thermal management is essential to ensure part quality and structural integrity, as thermal gradients and residual stresses can lead to defects such as warping and cracking. However, existing experimental or computational techniques lack the ability to…
▽ More
Laser Powder Bed Fusion (L-PBF) is a widely adopted additive manufacturing process for fabricating complex metallic parts layer by layer. Effective thermal management is essential to ensure part quality and structural integrity, as thermal gradients and residual stresses can lead to defects such as warping and cracking. However, existing experimental or computational techniques lack the ability to forecast future temperature distributions in real time, an essential capability for proactive process control. This paper presents a real-time thermal state forecasting framework for L-PBF, based on a physics-informed reduced-order thermal model integrated with a Kalman filtering scheme. The proposed approach efficiently captures inter-layer heat transfer dynamics and enables accurate tracking and forecasting of spatial and temporal temperature evolution. Validation across multiple part geometries using measured data demonstrates that the method reliably estimates and forecasts peak temperatures and cooling trends. By enabling predictive thermal control, this framework offers a practical and computationally efficient solution for thermal management in L-PBF, paving the way toward closed-loop control in L-PBF.
△ Less
Submitted 19 September, 2025;
originally announced September 2025.
-
A Modified VGG19-Based Framework for Accurate and Interpretable Real-Time Bone Fracture Detection
Authors:
Md. Ehsanul Haque,
Abrar Fahim,
Shamik Dey,
Syoda Anamika Jahan,
S. M. Jahidul Islam,
Sakib Rokoni,
Md Sakib Morshed
Abstract:
Early and accurate detection of the bone fracture is paramount to initiating treatment as early as possible and avoiding any delay in patient treatment and outcomes. Interpretation of X-ray image is a time consuming and error prone task, especially when resources for such interpretation are limited by lack of radiology expertise. Additionally, deep learning approaches used currently, typically suf…
▽ More
Early and accurate detection of the bone fracture is paramount to initiating treatment as early as possible and avoiding any delay in patient treatment and outcomes. Interpretation of X-ray image is a time consuming and error prone task, especially when resources for such interpretation are limited by lack of radiology expertise. Additionally, deep learning approaches used currently, typically suffer from misclassifications and lack interpretable explanations to clinical use. In order to overcome these challenges, we propose an automated framework of bone fracture detection using a VGG-19 model modified to our needs. It incorporates sophisticated preprocessing techniques that include Contrast Limited Adaptive Histogram Equalization (CLAHE), Otsu's thresholding, and Canny edge detection, among others, to enhance image clarity as well as to facilitate the feature extraction. Therefore, we use Grad-CAM, an Explainable AI method that can generate visual heatmaps of the model's decision making process, as a type of model interpretability, for clinicians to understand the model's decision making process. It encourages trust and helps in further clinical validation. It is deployed in a real time web application, where healthcare professionals can upload X-ray images and get the diagnostic feedback within 0.5 seconds. The performance of our modified VGG-19 model attains 99.78\% classification accuracy and AUC score of 1.00, making it exceptionally good. The framework provides a reliable, fast, and interpretable solution for bone fracture detection that reasons more efficiently for diagnoses and better patient care.
△ Less
Submitted 31 July, 2025;
originally announced August 2025.
-
Model Predictive Control-Based Optimal Energy Management of Autonomous Electric Vehicles Under Cold Temperatures
Authors:
Shanthan Kumar Padisala,
Satadru Dey
Abstract:
In autonomous electric vehicles (AEVs), battery energy must be judiciously allocated to satisfy primary propulsion demands and secondary auxiliary demands, particularly the Heating, Ventilation, and Air Conditioning (HVAC) system. This becomes especially critical when the battery is in a low state of charge under cold ambient conditions, and cabin heating and battery preconditioning (prior to actu…
▽ More
In autonomous electric vehicles (AEVs), battery energy must be judiciously allocated to satisfy primary propulsion demands and secondary auxiliary demands, particularly the Heating, Ventilation, and Air Conditioning (HVAC) system. This becomes especially critical when the battery is in a low state of charge under cold ambient conditions, and cabin heating and battery preconditioning (prior to actual charging) can consume a significant percentage of available energy, directly impacting the driving range. In such cases, one usually prioritizes propulsion or applies heuristic rules for thermal management, often resulting in suboptimal energy utilization. There is a pressing need for a principled approach that can dynamically allocate battery power in a way that balances thermal comfort, battery health and preconditioning, along with range preservation. This paper attempts to address this issue using real-time Model Predictive Control to optimize the power consumption between the propulsion, HVAC, and battery temperature preparation so that it can be charged immediately once the destination is reached.
△ Less
Submitted 11 September, 2025; v1 submitted 11 June, 2025;
originally announced June 2025.
-
The Promise of Spiking Neural Networks for Ubiquitous Computing: A Survey and New Perspectives
Authors:
Hemanth Sabbella,
Archit Mukherjee,
Thivya Kandappu,
Sounak Dey,
Arpan Pal,
Archan Misra,
Dong Ma
Abstract:
Spiking neural networks (SNNs) have emerged as a class of bio -inspired networks that leverage sparse, event-driven signaling to achieve low-power computation while inherently modeling temporal dynamics. Such characteristics align closely with the demands of ubiquitous computing systems, which often operate on resource-constrained devices while continuously monitoring and processing time-series se…
▽ More
Spiking neural networks (SNNs) have emerged as a class of bio -inspired networks that leverage sparse, event-driven signaling to achieve low-power computation while inherently modeling temporal dynamics. Such characteristics align closely with the demands of ubiquitous computing systems, which often operate on resource-constrained devices while continuously monitoring and processing time-series sensor data. Despite their unique and promising features, SNNs have received limited attention and remain underexplored (or at least, under-adopted) within the ubiquitous computing community. To address this gap, this paper first introduces the core components of SNNs, both in terms of models and training mechanisms. It then presents a systematic survey of 76 SNN-based studies focused on time-series data analysis, categorizing them into six key application domains. For each domain, we summarize relevant works and subsequent advancements, distill core insights, and highlight key takeaways for researchers and practitioners. To facilitate hands-on experimentation, we also provide a comprehensive review of current software frameworks and neuromorphic hardware platforms, detailing their capabilities and specifications, and then offering tailored recommendations for selecting development tools based on specific application needs. Finally, we identify prevailing challenges within each application domain and propose future research directions that need be explored in ubiquitous community. Our survey highlights the transformative potential of SNNs in enabling energy-efficient ubiquitous sensing across diverse application domains, while also serving as an essential introduction for researchers looking to enter this emerging field.
△ Less
Submitted 2 June, 2025;
originally announced June 2025.
-
Synthesis of Ventilator Dyssynchrony Waveforms using a Hybrid Generative Model and a Lung Model
Authors:
Sagar Deep Deb,
Suvakash Dey,
Deepak K. Agrawal
Abstract:
Ventilator dyssynchrony (VD) is often described as a mismatch between a patient breathing effort and the ventilator support during mechanical ventilation. This mismatch is often associated with an increased risk of lung injury and longer hospital stays. The manual VD detection method is unreliable and requires considerable effort from medical professionals. Automating this process requires a compu…
▽ More
Ventilator dyssynchrony (VD) is often described as a mismatch between a patient breathing effort and the ventilator support during mechanical ventilation. This mismatch is often associated with an increased risk of lung injury and longer hospital stays. The manual VD detection method is unreliable and requires considerable effort from medical professionals. Automating this process requires a computational pipeline that can identify VD breaths from continuous waveform signals. For that, while various machine learning (ML) models have been proposed, their accuracy is often limited due to the unavailability of a large, well-annotated VD waveform dataset. This paper presents a new approach combining mathematical and deep generative models to generate synthetic, clinically relevant VD waveforms. The mathematical model, which we call the VD lung ventilator model (VDLV), can accurately replicate clinically observable deformation in the pressure and volume waveforms. These temporal deformations are hypothesized to be related to specific VD breaths. We leverage the VDLV model to produce training waveform datasets covering normal and various VD breaths. These datasets are further diversified using deep learning models such as Generative Adversarial Network (GAN) and Conditional GAN (cGAN). The performance of both GAN and cGAN models is assessed through quantitative metrics, demonstrating that this hybrid approach effectively creates realistic and diverse VD waveforms. Notably, the pressure and volume cGAN models enable the generation of more precise and targeted VD signals. These improved synthetic waveform datasets have the potential to significantly enhance the accuracy and robustness of VD detection algorithms.
△ Less
Submitted 22 May, 2025;
originally announced May 2025.
-
Neural Incremental Input-to-State Stable Control Lyapunov Functions for Unknown Continuous-time Systems
Authors:
Ahan Basu,
Bhabani Shankar Dey,
Pushpak Jagtap
Abstract:
This work primarily focuses on synthesizing a controller that guarantees an unknown continuous-time system to be incrementally input-to-state stable ($δ$-ISS). In this context, the notion of $δ$-ISS control Lyapunov function ($δ$-ISS-CLF) for the continuous-time system is introduced. Combined with the controller, the $δ$-ISS-CLF guarantees that the system is incrementally stable. As the paper deal…
▽ More
This work primarily focuses on synthesizing a controller that guarantees an unknown continuous-time system to be incrementally input-to-state stable ($δ$-ISS). In this context, the notion of $δ$-ISS control Lyapunov function ($δ$-ISS-CLF) for the continuous-time system is introduced. Combined with the controller, the $δ$-ISS-CLF guarantees that the system is incrementally stable. As the paper deals with unknown dynamical systems, the controller as well as the $δ$-ISS-CLF are parametrized using neural networks. The data set used to train the neural networks is generated from the state space of the system by proper sampling. Now, to give a formal guarantee that the controller makes the system incrementally stable, we develop a validity condition by having some Lipschitz continuity assumptions and incorporate the condition into the training framework to ensure a provable correctness guarantee at the end of the training process. Finally, we demonstrate the effectiveness of the proposed approach through several case studies: a scalar system with a non-affine, non-polynomial structure, a one-link manipulator system, a nonlinear Moore-Greitzer model of a jet engine, and a rotating rigid spacecraft model.
△ Less
Submitted 25 April, 2025;
originally announced April 2025.
-
An Addendum to NeBula: Towards Extending TEAM CoSTAR's Solution to Larger Scale Environments
Authors:
Ali Agha,
Kyohei Otsu,
Benjamin Morrell,
David D. Fan,
Sung-Kyun Kim,
Muhammad Fadhil Ginting,
Xianmei Lei,
Jeffrey Edlund,
Seyed Fakoorian,
Amanda Bouman,
Fernando Chavez,
Taeyeon Kim,
Gustavo J. Correa,
Maira Saboia,
Angel Santamaria-Navarro,
Brett Lopez,
Boseong Kim,
Chanyoung Jung,
Mamoru Sobue,
Oriana Claudia Peltzer,
Joshua Ott,
Robert Trybula,
Thomas Touma,
Marcel Kaufmann,
Tiago Stegun Vaquero
, et al. (64 additional authors not shown)
Abstract:
This paper presents an appendix to the original NeBula autonomy solution developed by the TEAM CoSTAR (Collaborative SubTerranean Autonomous Robots), participating in the DARPA Subterranean Challenge. Specifically, this paper presents extensions to NeBula's hardware, software, and algorithmic components that focus on increasing the range and scale of the exploration environment. From the algorithm…
▽ More
This paper presents an appendix to the original NeBula autonomy solution developed by the TEAM CoSTAR (Collaborative SubTerranean Autonomous Robots), participating in the DARPA Subterranean Challenge. Specifically, this paper presents extensions to NeBula's hardware, software, and algorithmic components that focus on increasing the range and scale of the exploration environment. From the algorithmic perspective, we discuss the following extensions to the original NeBula framework: (i) large-scale geometric and semantic environment mapping; (ii) an adaptive positioning system; (iii) probabilistic traversability analysis and local planning; (iv) large-scale POMDP-based global motion planning and exploration behavior; (v) large-scale networking and decentralized reasoning; (vi) communication-aware mission planning; and (vii) multi-modal ground-aerial exploration solutions. We demonstrate the application and deployment of the presented systems and solutions in various large-scale underground environments, including limestone mine exploration scenarios as well as deployment in the DARPA Subterranean challenge.
△ Less
Submitted 18 April, 2025;
originally announced April 2025.
-
Joint Localization and Synchronization in Downlink Distributed MIMO
Authors:
Sauradeep Dey,
Musa Furkan Keskin,
Dario Tagliaferri,
Gonzalo Seco-Granados,
Henk Wymeersch
Abstract:
We investigate joint localization and synchronization in the downlink of a distributed multiple-input-multiple-output (D-MIMO) system, aiming to estimate the position and phase offset of a single-antenna user equipment (UE) using downlink transmissions of multiple phase-synchronized, multi-antenna access points (APs). We propose two transmission protocols: sequential (P1) and simultaneous (P2) AP…
▽ More
We investigate joint localization and synchronization in the downlink of a distributed multiple-input-multiple-output (D-MIMO) system, aiming to estimate the position and phase offset of a single-antenna user equipment (UE) using downlink transmissions of multiple phase-synchronized, multi-antenna access points (APs). We propose two transmission protocols: sequential (P1) and simultaneous (P2) AP transmissions, together with the ML estimators that either leverage (coherent estimator) or disregard phase information (non-coherent estimator). Simulation results reveal that downlink D-MIMO holds significant potential for high-accuracy localization while showing that P2 provides superior localization performance and reduced transmission latency.
△ Less
Submitted 14 April, 2025;
originally announced April 2025.
-
Optimal Control Selection over the Edge-Cloud Continuum
Authors:
Xiyu Gu,
Matthias Pezzutto,
Luca Schenato,
Subhrakanti Dey
Abstract:
The emerging computing continuum paves the way for exploiting multiple computing devices, ranging from the edge to the cloud, to implement the control algorithm. Different computing units over the continuum are characterized by different computational capabilities and communication latencies, thus resulting in different control performances and advocating for an effective trade-off. To this end, i…
▽ More
The emerging computing continuum paves the way for exploiting multiple computing devices, ranging from the edge to the cloud, to implement the control algorithm. Different computing units over the continuum are characterized by different computational capabilities and communication latencies, thus resulting in different control performances and advocating for an effective trade-off. To this end, in this work, we first introduce a multi-tiered controller and we propose a simple network delay compensator. Then we propose a control selection policy to optimize the control cost taking into account the delay and the disturbances. We theoretically investigate the stability of the switching system resulting from the proposed control selection policy. Accurate simulations show the improvements of the considered setup.
△ Less
Submitted 10 March, 2025;
originally announced March 2025.
-
Formally Verified Neural Network Controllers for Incremental Input-to-State Stability of Unknown Discrete-Time Systems
Authors:
Ahan Basu,
Bhabani Shankar Dey,
Pushpak Jagtap
Abstract:
This work aims to synthesize a controller that ensures that an unknown discrete-time system is incrementally input-to-state stable ($δ$-ISS). In this work, we introduce the notion of $δ$-ISS control Lyapunov function ($δ$-ISS-CLF), which, in conjunction with the controller, ensures that the closed-loop system is incrementally ISS. To address the unknown dynamics of the system, we parameterize the…
▽ More
This work aims to synthesize a controller that ensures that an unknown discrete-time system is incrementally input-to-state stable ($δ$-ISS). In this work, we introduce the notion of $δ$-ISS control Lyapunov function ($δ$-ISS-CLF), which, in conjunction with the controller, ensures that the closed-loop system is incrementally ISS. To address the unknown dynamics of the system, we parameterize the controller as well as the $δ$-ISS-CLF as neural networks and learn them by utilizing the sampled data from the state space of the unknown system. To formally verify the obtained $δ$-ISS-CLF, we develop a validity condition and incorporate the condition into the training framework to ensure a provable correctness guarantee at the end of the training process. Finally, the usefulness of the proposed approach is proved using multiple case studies - the first one is a scalar system with a non-affine non-polynomial structure, the second example is a one-link manipulator system, the third system is a nonlinear Moore-Grietzer model of the jet engine and the final one is a rotating rigid spacecraft model.
△ Less
Submitted 6 March, 2025;
originally announced March 2025.
-
Physics Informed Neural Network Estimated Circuit Parameter Adaptive Modulation of DAB
Authors:
Saikat Dey,
Ayan Mallik
Abstract:
This article presents the development, implementation, and validation of a loss-optimized and circuit parameter-sensitive TPS modulation scheme for a dual-active-bridge DC-DC converter. The proposed approach dynamically adjusts control parameters based on circuit parameters estimated using a physics-informed neural network.
This article presents the development, implementation, and validation of a loss-optimized and circuit parameter-sensitive TPS modulation scheme for a dual-active-bridge DC-DC converter. The proposed approach dynamically adjusts control parameters based on circuit parameters estimated using a physics-informed neural network.
△ Less
Submitted 7 February, 2025;
originally announced February 2025.
-
On the Contraction Analysis of Nonlinear System with Multiple Equilibrium Points
Authors:
Riddhi Mohan Bora,
Bhabani Shankar Dey,
Indra Narayan Kar
Abstract:
In this work, we leverage the 2-contraction theory, which extends the capabilities of classical contraction theory, to develop a global stability framework. Coupled with powerful geometric tools such as the Poincare index theory, the 2-contraction theory enables us to analyze the stability of planar nonlinear systems without relying on local equilibrium analysis. By utilizing index theory and 2-co…
▽ More
In this work, we leverage the 2-contraction theory, which extends the capabilities of classical contraction theory, to develop a global stability framework. Coupled with powerful geometric tools such as the Poincare index theory, the 2-contraction theory enables us to analyze the stability of planar nonlinear systems without relying on local equilibrium analysis. By utilizing index theory and 2-contraction results, we efficiently characterize the nature of equilibrium points and delineate regions in 2-dimensional state space where periodic solutions, closed orbits, or stable dynamics may exist. A key focus of this work is the identification of regions in the state space where periodic solutions may occur, as well as 2-contraction regions that guarantee the nonexistence of such solutions. Additionally, we address a critical problem in engineering the determination of the basin of attraction (BOA) for stable equilibrium points. For systems with multiple equilibria identifying candidate BOAs becomes highly nontrivial. We propose a novel methodology leveraging the 2-contraction theory to approximate a common BOA for a class of nonlinear systems with multiple stable equilibria. Theoretical findings are substantiated through benchmark examples and numerical simulations, demonstrating the practical utility of the proposed approach. Furthermore, we extend our framework to analyze networked systems, showcasing their efficacy in an opinion dynamics problem.
△ Less
Submitted 19 February, 2025;
originally announced February 2025.
-
IITKGP-ABSP Submission to LRE22: Language Recognition in Low-Resource Settings
Authors:
Spandan Dey,
Md Sahidullah,
Goutam Saha
Abstract:
This is the detailed system description of the IITKGP-ABSP lab's submission to the NIST language recognition evaluation (LRE) 2022. The objective of this LRE (LRE22) is focused on recognizing 14 low-resourced African languages. Even though NIST has provided additional training and development data, we develop our systems with additional constraints of extreme low-resource. Our primary fixed-set su…
▽ More
This is the detailed system description of the IITKGP-ABSP lab's submission to the NIST language recognition evaluation (LRE) 2022. The objective of this LRE (LRE22) is focused on recognizing 14 low-resourced African languages. Even though NIST has provided additional training and development data, we develop our systems with additional constraints of extreme low-resource. Our primary fixed-set submission ensures the usage of only the LRE 22 development data that contains the utterances of 14 target languages. We further restrict our system from using any pre-trained models for feature extraction or classifier fine-tuning. To address the issue of low-resource, our system relies on diverse audio augmentations followed by classifier fusions. Abiding by all the constraints, the proposed methods achieve an EER of 11.43% and cost metric of 0.41 in the LRE22 development set. For users with limited computational resources or limited storage/network capabilities, the proposed system will help achieve efficient LID performance.
△ Less
Submitted 15 January, 2025;
originally announced January 2025.
-
Formally Verified Neural Lyapunov Function for Incremental Input-to-State Stability of Unknown Systems
Authors:
Ahan Basu,
Bhabani Shankar Dey,
Pushpak Jagtap
Abstract:
This work presents an approach to synthesize a Lyapunov-like function to ensure incrementally input-to-state stability ($δ$-ISS) property for an unknown discrete-time system. To deal with challenges posed by unknown system dynamics, we parameterize the Lyapunov-like function as a neural network, which we train using the data samples collected from the unknown system along with appropriately design…
▽ More
This work presents an approach to synthesize a Lyapunov-like function to ensure incrementally input-to-state stability ($δ$-ISS) property for an unknown discrete-time system. To deal with challenges posed by unknown system dynamics, we parameterize the Lyapunov-like function as a neural network, which we train using the data samples collected from the unknown system along with appropriately designed loss functions. We propose a validity condition to test the obtained function and incorporate it into the training framework to ensure provable correctness at the end of the training. Finally, the usefulness of the proposed technique is proved using two case studies: a scalar non-linear dynamical system and a permanent magnet DC motor.
△ Less
Submitted 10 January, 2025;
originally announced January 2025.
-
Smartphone-based Iris Recognition through High-Quality Visible Spectrum Iris Capture
Authors:
Naveenkumar G Venkataswamy,
Yu Liu,
Surendra Singh,
Soumyabrata Dey,
Stephanie Schuckers,
Masudul H Imtiaz
Abstract:
Iris recognition is widely acknowledged for its exceptional accuracy in biometric authentication, traditionally relying on near-infrared (NIR) imaging. Recently, visible spectrum (VIS) imaging via accessible smartphone cameras has been explored for biometric capture. However, a thorough study of iris recognition using smartphone-captured 'High-Quality' VIS images and cross-spectral matching with p…
▽ More
Iris recognition is widely acknowledged for its exceptional accuracy in biometric authentication, traditionally relying on near-infrared (NIR) imaging. Recently, visible spectrum (VIS) imaging via accessible smartphone cameras has been explored for biometric capture. However, a thorough study of iris recognition using smartphone-captured 'High-Quality' VIS images and cross-spectral matching with previously enrolled NIR images has not been conducted. The primary challenge lies in capturing high-quality biometrics, a known limitation of smartphone cameras. This study introduces a novel Android application designed to consistently capture high-quality VIS iris images through automated focus and zoom adjustments. The application integrates a YOLOv3-tiny model for precise eye and iris detection and a lightweight Ghost-Attention U-Net (G-ATTU-Net) for segmentation, while adhering to ISO/IEC 29794-6 standards for image quality. The approach was validated using smartphone-captured VIS and NIR iris images from 47 subjects, achieving a True Acceptance Rate (TAR) of 96.57% for VIS images and 97.95% for NIR images, with consistent performance across various capture distances and iris colors. This robust solution is expected to significantly advance the field of iris biometrics, with important implications for enhancing smartphone security.
△ Less
Submitted 17 December, 2024;
originally announced December 2024.
-
Learning-Enabled Adaptive Voltage Protection Against Load Alteration Attacks On Smart Grids
Authors:
Anjana B.,
Suman Maiti,
Sunandan Adhikary,
Soumyajit Dey,
Ashish R. Hota
Abstract:
Smart grids are designed to efficiently handle variable power demands, especially for large loads, by real-time monitoring, distributed generation and distribution of electricity. However, the grid's distributed nature and the internet connectivity of large loads like Heating Ventilation, and Air Conditioning (HVAC) systems introduce vulnerabilities in the system that cyber-attackers can exploit,…
▽ More
Smart grids are designed to efficiently handle variable power demands, especially for large loads, by real-time monitoring, distributed generation and distribution of electricity. However, the grid's distributed nature and the internet connectivity of large loads like Heating Ventilation, and Air Conditioning (HVAC) systems introduce vulnerabilities in the system that cyber-attackers can exploit, potentially leading to grid instability and blackouts. Traditional protection strategies, primarily designed to handle transmission line faults are often inadequate against such threats, emphasising the need for enhanced grid security. In this work, we propose a Deep Reinforcement Learning (DRL)-based protection system that learns to differentiate any stealthy load alterations from normal grid operations and adaptively adjusts activation thresholds of the protection schemes. We train this adaptive protection scheme against an optimal and stealthy load alteration attack model that manipulates the power demands of HVACs at the most unstable grid buses to induce blackouts. We theoretically prove that the adaptive protection system trained in this competitive game setting can effectively mitigate any stealthy load alteration-based attack. To corroborate this, we also demonstrate the method's success in several real-world grid scenarios by implementing it in a hardware-in-loop setup.
△ Less
Submitted 21 November, 2024;
originally announced November 2024.
-
Backstepping Design for Incremental Input-to-State Stabilization of Unknown Systems
Authors:
David Smith Sundarsingh,
Bhabani Shankar Dey,
Pushpak Jagtap
Abstract:
Incremental stability of dynamical systems ensures the convergence of trajectories from different initial conditions towards each other rather than a fixed trajectory or equilibrium point. Here, we introduce and characterize a novel class of incremental Lyapunov functions, an incremental stability notion known as Incremental Input-to-State practical Stability (δ-ISpS). Using Gaussian Process, we l…
▽ More
Incremental stability of dynamical systems ensures the convergence of trajectories from different initial conditions towards each other rather than a fixed trajectory or equilibrium point. Here, we introduce and characterize a novel class of incremental Lyapunov functions, an incremental stability notion known as Incremental Input-to-State practical Stability (δ-ISpS). Using Gaussian Process, we learn the unknown dynamics of a class of control systems. We then present a backstepping control design scheme that provides state-feedback controllers that render the partially unknown control system δ-ISpS. To show the effectiveness of the proposed controller, we implement it in two case studies.
△ Less
Submitted 4 November, 2024;
originally announced November 2024.
-
Enhancing Attack Resilience in Real-Time Systems through Variable Control Task Sampling Rates
Authors:
Arkaprava Sain,
Sunandan Adhikary,
Ipsita Koley,
Soumyajit Dey
Abstract:
Cyber-physical systems (CPSs) in modern real-time applications integrate numerous control units linked through communication networks, each responsible for executing a mix of real-time safety-critical and non-critical tasks. To ensure predictable timing behaviour, most safety-critical tasks are scheduled with fixed sampling periods, which supports rigorous safety and performance analyses. However,…
▽ More
Cyber-physical systems (CPSs) in modern real-time applications integrate numerous control units linked through communication networks, each responsible for executing a mix of real-time safety-critical and non-critical tasks. To ensure predictable timing behaviour, most safety-critical tasks are scheduled with fixed sampling periods, which supports rigorous safety and performance analyses. However, this deterministic execution can be exploited by attackers to launch inference-based attacks on safety-critical tasks. This paper addresses the challenge of preventing such timing inference or schedule-based attacks by dynamically adjusting the execution rates of safety-critical tasks while maintaining their performance. We propose a novel schedule vulnerability analysis methodology, enabling runtime switching between valid schedules for various control task sampling rates. Leveraging this approach, we present the Multi-Rate Attack-Aware Randomized Scheduling (MAARS) framework for preemptive fixed-priority schedulers, designed to reduce the success rate of timing inference attacks on real-time systems. To our knowledge, this is the first method that combines attack-aware schedule randomization with preserved control and scheduling integrity. The framework's efficacy in attack prevention is evaluated on automotive benchmarks using a Hardware-in-the-Loop (HiL) setup.
△ Less
Submitted 14 November, 2024; v1 submitted 1 August, 2024;
originally announced August 2024.
-
Communication-efficient and Differentially-private Distributed Nash Equilibrium Seeking with Linear Convergence
Authors:
Xiaomeng Chen,
Wei Huo,
Kemi Ding,
Subhrakanti Dey,
Ling Shi
Abstract:
The distributed computation of a Nash equilibrium (NE) for non-cooperative games is gaining increased attention recently. Due to the nature of distributed systems, privacy and communication efficiency are two critical concerns. Traditional approaches often address these critical concerns in isolation. This work introduces a unified framework, named CDP-NES, designed to improve communication effici…
▽ More
The distributed computation of a Nash equilibrium (NE) for non-cooperative games is gaining increased attention recently. Due to the nature of distributed systems, privacy and communication efficiency are two critical concerns. Traditional approaches often address these critical concerns in isolation. This work introduces a unified framework, named CDP-NES, designed to improve communication efficiency in the privacy-preserving NE seeking algorithm for distributed non-cooperative games over directed graphs. Leveraging both general compression operators and the noise adding mechanism, CDP-NES perturbs local states with Laplacian noise and applies difference compression prior to their exchange among neighbors. We prove that CDP-NES not only achieves linear convergence to a neighborhood of the NE in games with restricted monotone mappings but also guarantees $ε$-differential privacy, addressing privacy and communication efficiency simultaneously. Finally, simulations are provided to illustrate the effectiveness of the proposed method.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Compression-based Privacy Preservation for Distributed Nash Equilibrium Seeking in Aggregative Games
Authors:
Wei Huo,
Xiaomeng Chen,
Kemi Ding,
Subhrakanti Dey,
Ling Shi
Abstract:
This paper explores distributed aggregative games in multi-agent systems. Current methods for finding distributed Nash equilibrium require players to send original messages to their neighbors, leading to communication burden and privacy issues. To jointly address these issues, we propose an algorithm that uses stochastic compression to save communication resources and conceal information through r…
▽ More
This paper explores distributed aggregative games in multi-agent systems. Current methods for finding distributed Nash equilibrium require players to send original messages to their neighbors, leading to communication burden and privacy issues. To jointly address these issues, we propose an algorithm that uses stochastic compression to save communication resources and conceal information through random errors induced by compression. Our theoretical analysis shows that the algorithm guarantees convergence accuracy, even with aggressive compression errors used to protect privacy. We prove that the algorithm achieves differential privacy through a stochastic quantization scheme. Simulation results for energy consumption games support the effectiveness of our approach.
△ Less
Submitted 5 May, 2024;
originally announced May 2024.
-
Prediction of soil fertility parameters using USB-microscope imagery and portable X-ray fluorescence spectrometry
Authors:
Shubhadip Dasgupta,
Satwik Pate,
Divya Rathore,
L. G. Divyanth,
Ayan Das,
Anshuman Nayak,
Subhadip Dey,
Asim Biswas,
David C. Weindorf,
Bin Li,
Sergio Henrique Godinho Silva,
Bruno Teixeira Ribeiro,
Sanjay Srivastava,
Somsubhra Chakraborty
Abstract:
This study investigated the use of portable X-ray fluorescence (PXRF) spectrometry and soil image analysis for rapid soil fertility assessment, with a focus on key indicators such as available boron (B), organic carbon (OC), available manganese (Mn), available sulfur (S), and the sulfur availability index (SAI). A total of 1,133 soil samples from diverse agro-climatic zones in Eastern India were a…
▽ More
This study investigated the use of portable X-ray fluorescence (PXRF) spectrometry and soil image analysis for rapid soil fertility assessment, with a focus on key indicators such as available boron (B), organic carbon (OC), available manganese (Mn), available sulfur (S), and the sulfur availability index (SAI). A total of 1,133 soil samples from diverse agro-climatic zones in Eastern India were analyzed. The research integrated color and texture features from microscopic soil images, PXRF data, and auxiliary soil variables (AVs) using a Random Forest model. Results showed that combining image features (IFs) with AVs significantly improved prediction accuracy for available B (R2 = 0.80) and OC (R2 = 0.88). A data fusion approach, incorporating IFs, AVs, and PXRF data, further enhanced predictions for available Mn and SAI, with R2 values of 0.72 and 0.70, respectively. The study highlights the potential of integrating these technologies to offer rapid, cost-effective soil testing methods, paving the way for more advanced predictive models and a deeper understanding of soil fertility. Future work should explore the application of deep learning models on a larger dataset, incorporating soils from a wider range of agro-climatic zones under field conditions.
△ Less
Submitted 5 September, 2024; v1 submitted 17 April, 2024;
originally announced April 2024.
-
Score-Based Diffusion Models for Photoacoustic Tomography Image Reconstruction
Authors:
Sreemanti Dey,
Snigdha Saha,
Berthy T. Feng,
Manxiu Cui,
Laure Delisle,
Oscar Leong,
Lihong V. Wang,
Katherine L. Bouman
Abstract:
Photoacoustic tomography (PAT) is a rapidly-evolving medical imaging modality that combines optical absorption contrast with ultrasound imaging depth. One challenge in PAT is image reconstruction with inadequate acoustic signals due to limited sensor coverage or due to the density of the transducer array. Such cases call for solving an ill-posed inverse reconstruction problem. In this work, we use…
▽ More
Photoacoustic tomography (PAT) is a rapidly-evolving medical imaging modality that combines optical absorption contrast with ultrasound imaging depth. One challenge in PAT is image reconstruction with inadequate acoustic signals due to limited sensor coverage or due to the density of the transducer array. Such cases call for solving an ill-posed inverse reconstruction problem. In this work, we use score-based diffusion models to solve the inverse problem of reconstructing an image from limited PAT measurements. The proposed approach allows us to incorporate an expressive prior learned by a diffusion model on simulated vessel structures while still being robust to varying transducer sparsity conditions.
△ Less
Submitted 30 March, 2024;
originally announced April 2024.
-
Policy Gradient-based Model Free Optimal LQG Control with a Probabilistic Risk Constraint
Authors:
Arunava Naha,
Subhrakanti Dey
Abstract:
In this paper, we investigate a model-free optimal control design that minimizes an infinite horizon average expected quadratic cost of states and control actions subject to a probabilistic risk or chance constraint using input-output data. In particular, we consider linear time-invariant systems and design an optimal controller within the class of linear state feedback control. Three different po…
▽ More
In this paper, we investigate a model-free optimal control design that minimizes an infinite horizon average expected quadratic cost of states and control actions subject to a probabilistic risk or chance constraint using input-output data. In particular, we consider linear time-invariant systems and design an optimal controller within the class of linear state feedback control. Three different policy gradient (PG) based algorithms, natural policy gradient (NPG), Gauss-Newton policy gradient (GNPG), and deep deterministic policy gradient (DDPG), are developed, and compared with the optimal risk-neutral linear-quadratic regulator (LQR) and a scenario-based model predictive control (MPC) technique via numerical simulations. The convergence properties and the accuracy of all the algorithms are compared numerically. We also establish analytical convergence properties of the NPG and GNPG algorithms under the known model scenario, while the proof of convergence for the unknown model scenario is part of our ongoing work.
△ Less
Submitted 8 November, 2024; v1 submitted 25 March, 2024;
originally announced March 2024.
-
Could We Generate Cytology Images from Histopathology Images? An Empirical Study
Authors:
Soumyajyoti Dey,
Sukanta Chakraborty,
Utso Guha Roy,
Nibaran Das
Abstract:
Automation in medical imaging is quite challenging due to the unavailability of annotated datasets and the scarcity of domain experts. In recent years, deep learning techniques have solved some complex medical imaging tasks like disease classification, important object localization, segmentation, etc. However, most of the task requires a large amount of annotated data for their successful implemen…
▽ More
Automation in medical imaging is quite challenging due to the unavailability of annotated datasets and the scarcity of domain experts. In recent years, deep learning techniques have solved some complex medical imaging tasks like disease classification, important object localization, segmentation, etc. However, most of the task requires a large amount of annotated data for their successful implementation. To mitigate the shortage of data, different generative models are proposed for data augmentation purposes which can boost the classification performances. For this, different synthetic medical image data generation models are developed to increase the dataset. Unpaired image-to-image translation models here shift the source domain to the target domain. In the breast malignancy identification domain, FNAC is one of the low-cost low-invasive modalities normally used by medical practitioners. But availability of public datasets in this domain is very poor. Whereas, for automation of cytology images, we need a large amount of annotated data. Therefore synthetic cytology images are generated by translating breast histopathology samples which are publicly available. In this study, we have explored traditional image-to-image transfer models like CycleGAN, and Neural Style Transfer. Further, it is observed that the generated cytology images are quite similar to real breast cytology samples by measuring FID and KID scores.
△ Less
Submitted 16 March, 2024;
originally announced March 2024.
-
Distributed Average Consensus via Noisy and Non-Coherent Over-the-Air Aggregation
Authors:
Huiwen Yang,
Xiaomeng Chen,
Lingying Huang,
Subhrakanti Dey,
Ling Shi
Abstract:
Over-the-air aggregation has attracted widespread attention for its potential advantages in task-oriented applications, such as distributed sensing, learning, and consensus. In this paper, we develop a communication-efficient distributed average consensus protocol by utilizing over-the-air aggregation, which exploits the superposition property of wireless channels rather than combat it. Noisy chan…
▽ More
Over-the-air aggregation has attracted widespread attention for its potential advantages in task-oriented applications, such as distributed sensing, learning, and consensus. In this paper, we develop a communication-efficient distributed average consensus protocol by utilizing over-the-air aggregation, which exploits the superposition property of wireless channels rather than combat it. Noisy channels and non-coherent transmission are taken into account, and only half-duplex transceivers are required. We prove that the system can achieve average consensus in mean square and even almost surely under the proposed protocol. Furthermore, we extend the analysis to the scenarios with time-varying topology. Numerical simulation shows the effectiveness of the proposed protocol.
△ Less
Submitted 11 March, 2024;
originally announced March 2024.
-
Exploring Adversarial Threat Models in Cyber Physical Battery Systems
Authors:
Shanthan Kumar Padisala,
Shashank Dhananjay Vyas,
Satadru Dey
Abstract:
Technological advancements like the Internet of Things (IoT) have facilitated data exchange across various platforms. This data exchange across various platforms has transformed the traditional battery system into a cyber physical system. Such connectivity makes modern cyber physical battery systems vulnerable to cyber threats where a cyber attacker can manipulate sensing and actuation signals to…
▽ More
Technological advancements like the Internet of Things (IoT) have facilitated data exchange across various platforms. This data exchange across various platforms has transformed the traditional battery system into a cyber physical system. Such connectivity makes modern cyber physical battery systems vulnerable to cyber threats where a cyber attacker can manipulate sensing and actuation signals to bring the battery system into an unsafe operating condition. Hence, it is essential to build resilience in modern cyber physical battery systems (CPBS) under cyber attacks. The first step of building such resilience is to analyze potential adversarial behavior, that is, how the adversaries can inject attacks into the battery systems. However, it has been found that in this under-explored area of battery cyber physical security, such an adversarial threat model has not been studied in a systematic manner. In this study, we address this gap and explore adversarial attack generation policies based on optimal control framework. The framework is developed by performing theoretical analysis, which is subsequently supported by evaluation with experimental data generated from a commercial battery cell.
△ Less
Submitted 25 March, 2025; v1 submitted 24 January, 2024;
originally announced January 2024.
-
An Efficient Distributed Nash Equilibrium Seeking with Compressed and Event-triggered Communication
Authors:
Xiaomeng Chen,
Wei Huo,
Yuchi Wu,
Subhrakanti Dey,
Ling Shi
Abstract:
Distributed Nash equilibrium (NE) seeking problems for networked games have been widely investigated in recent years. Despite the increasing attention, communication expenditure is becoming a major bottleneck for scaling up distributed approaches within limited communication bandwidth between agents. To reduce communication cost, an efficient distributed NE seeking (ETC-DNES) algorithm is proposed…
▽ More
Distributed Nash equilibrium (NE) seeking problems for networked games have been widely investigated in recent years. Despite the increasing attention, communication expenditure is becoming a major bottleneck for scaling up distributed approaches within limited communication bandwidth between agents. To reduce communication cost, an efficient distributed NE seeking (ETC-DNES) algorithm is proposed to obtain an NE for games over directed graphs, where the communication efficiency is improved by event-triggered exchanges of compressed information among neighbors. ETC-DNES saves communication costs in both transmitted bits and rounds of communication. Furthermore, our method only requires the row-stochastic property of the adjacency matrix, unlike previous approaches that hinged on doubly-stochastic communication matrices. We provide convergence guarantees for ETC-DNES on games with restricted strongly monotone mappings and testify its efficiency with no sacrifice on the accuracy. The algorithm and analysis are extended to a compressed algorithm with stochastic event-triggered mechanism (SETC-DNES). In SETC-DNES, we introduce a random variable in the triggering condition to further enhance algorithm efficiency. We demonstrate that SETC-DNES guarantees linear convergence to the NE while achieving even greater reductions in communication costs compared to ETC-DNES. Finally, numerical simulations illustrate the effectiveness of the proposed algorithms.
△ Less
Submitted 14 June, 2024; v1 submitted 23 November, 2023;
originally announced November 2023.
-
On Distinguishability of Anomalies as Physical Faults or Actuation Cyberattacks
Authors:
Tanushree Roy,
Satadru Dey
Abstract:
Increased automation has created an impetus to integrate infrastructure with wide-spread connectivity in order to improve efficiency, sustainability, autonomy, and security. Nonetheless, this reliance on connectivity and the inevitability of complexity in this system increases the vulnerabilities to physical faults or degradation and external cyber-threats. However, strategies to counteract faults…
▽ More
Increased automation has created an impetus to integrate infrastructure with wide-spread connectivity in order to improve efficiency, sustainability, autonomy, and security. Nonetheless, this reliance on connectivity and the inevitability of complexity in this system increases the vulnerabilities to physical faults or degradation and external cyber-threats. However, strategies to counteract faults and cyberattacks would be widely different and thus it is vital to not only detect but also to identify the nature of the anomaly that is present in these systems. In this work, we propose a mathematical framework to distinguish between physical faults and cyberattack using a sliding mode based unknown input observer. Finally, we present simulation case studies to distinguish between physical faults and cyberattacks using the proposed Distinguishability metric and criterion. The simulation results show that the proposed framework successfully distinguishes between faults and cyberattacks.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Over-the-air Federated Policy Gradient
Authors:
Huiwen Yang,
Lingying Huang,
Subhrakanti Dey,
Ling Shi
Abstract:
In recent years, over-the-air aggregation has been widely considered in large-scale distributed learning, optimization, and sensing. In this paper, we propose the over-the-air federated policy gradient algorithm, where all agents simultaneously broadcast an analog signal carrying local information to a common wireless channel, and a central controller uses the received aggregated waveform to updat…
▽ More
In recent years, over-the-air aggregation has been widely considered in large-scale distributed learning, optimization, and sensing. In this paper, we propose the over-the-air federated policy gradient algorithm, where all agents simultaneously broadcast an analog signal carrying local information to a common wireless channel, and a central controller uses the received aggregated waveform to update the policy parameters. We investigate the effect of noise and channel distortion on the convergence of the proposed algorithm, and establish the complexities of communication and sampling for finding an $ε$-approximate stationary point. Finally, we present some simulation results to show the effectiveness of the algorithm.
△ Less
Submitted 25 February, 2024; v1 submitted 25 October, 2023;
originally announced October 2023.
-
Wavelet Scattering Transform for Improving Generalization in Low-Resourced Spoken Language Identification
Authors:
Spandan Dey,
Premjeet Singh,
Goutam Saha
Abstract:
Commonly used features in spoken language identification (LID), such as mel-spectrogram or MFCC, lose high-frequency information due to windowing. The loss further increases for longer temporal contexts. To improve generalization of the low-resourced LID systems, we investigate an alternate feature representation, wavelet scattering transform (WST), that compensates for the shortcomings. To our kn…
▽ More
Commonly used features in spoken language identification (LID), such as mel-spectrogram or MFCC, lose high-frequency information due to windowing. The loss further increases for longer temporal contexts. To improve generalization of the low-resourced LID systems, we investigate an alternate feature representation, wavelet scattering transform (WST), that compensates for the shortcomings. To our knowledge, WST is not explored earlier in LID tasks. We first optimize WST features for multiple South Asian LID corpora. We show that LID requires low octave resolution and frequency-scattering is not useful. Further, cross-corpora evaluations show that the optimal WST hyper-parameters depend on both train and test corpora. Hence, we develop fused ECAPA-TDNN based LID systems with different sets of WST hyper-parameters to improve generalization for unknown data. Compared to MFCC, EER is reduced upto 14.05% and 6.40% for same-corpora and blind VoxLingua107 evaluations, respectively.
△ Less
Submitted 3 October, 2023; v1 submitted 1 October, 2023;
originally announced October 2023.
-
On Incremental Stability of Interconnected Switched Systems
Authors:
Bhabani Shankar Dey,
Indra Narayan Kar,
Pushpak Jagtap
Abstract:
In this paper, the incremental stability of interconnected switched nonlinear systems is discussed. The nature of switching considered is state-dependent. The incremental stability of the switched interconnected system is a stronger property compared to the conventional notion of stability. Even if individual systems in the interconnected setting are stable, guaranteeing stability for the overall…
▽ More
In this paper, the incremental stability of interconnected switched nonlinear systems is discussed. The nature of switching considered is state-dependent. The incremental stability of the switched interconnected system is a stronger property compared to the conventional notion of stability. Even if individual systems in the interconnected setting are stable, guaranteeing stability for the overall system is challenging. However, one of the important features of incremental stability is that the notion is preserved over interconnection. Here, leveraging the contraction-theoretic tools, we derive a set of sufficient conditions for the overall interconnection consisting of bimodal switched systems. To showcase the wider usability of our proposed results, we have also included the effect of external input, which leads to the study of incremental input-to-state stability ($δ$-ISS). For the case of feedback interconnection, the small gain characterisation is presented for the overall system's $δ$-ISS. Further, for a special case of feedback, i.e., cascade interconnection, the results are derived. The derived conditions are based on the matrix measure, making it computationally tractable and general. To make the results more general, a generalised interconnection of bimodal switched systems is studied and corresponding sufficient condition for $δ$-ISS are presented. Two numerical examples are demonstrated and supported with simulation results to verify the theoretical claims.
△ Less
Submitted 8 May, 2025; v1 submitted 24 August, 2023;
originally announced August 2023.
-
Exploiting the Brain's Network Structure for Automatic Identification of ADHD Subjects
Authors:
Soumyabrata Dey,
Ravishankar Rao,
Mubarak Shah
Abstract:
Attention Deficit Hyperactive Disorder (ADHD) is a common behavioral problem affecting children. In this work, we investigate the automatic classification of ADHD subjects using the resting state Functional Magnetic Resonance Imaging (fMRI) sequences of the brain. We show that the brain can be modeled as a functional network, and certain properties of the networks differ in ADHD subjects from cont…
▽ More
Attention Deficit Hyperactive Disorder (ADHD) is a common behavioral problem affecting children. In this work, we investigate the automatic classification of ADHD subjects using the resting state Functional Magnetic Resonance Imaging (fMRI) sequences of the brain. We show that the brain can be modeled as a functional network, and certain properties of the networks differ in ADHD subjects from control subjects. We compute the pairwise correlation of brain voxels' activity over the time frame of the experimental protocol which helps to model the function of a brain as a network. Different network features are computed for each of the voxels constructing the network. The concatenation of the network features of all the voxels in a brain serves as the feature vector. Feature vectors from a set of subjects are then used to train a PCA-LDA (principal component analysis-linear discriminant analysis) based classifier. We hypothesized that ADHD-related differences lie in some specific regions of the brain and using features only from those regions is sufficient to discriminate ADHD and control subjects. We propose a method to create a brain mask that includes the useful regions only and demonstrate that using the feature from the masked regions improves classification accuracy on the test data set. We train our classifier with 776 subjects and test on 171 subjects provided by The Neuro Bureau for the ADHD-200 challenge. We demonstrate the utility of graph-motif features, specifically the maps that represent the frequency of participation of voxels in network cycles of length 3. The best classification performance (69.59%) is achieved using 3-cycle map features with masking. Our proposed approach holds promise in being able to diagnose and understand the disorder.
△ Less
Submitted 15 June, 2023;
originally announced June 2023.
-
Concealing CAN Message Sequences to Prevent Schedule-based Bus-off Attacks
Authors:
Sunandan Adhikary,
Ipsita Koley,
Arkaprava Sain,
Soumyadeep das,
Shuvam Saha,
Soumyajit Dey
Abstract:
This work focuses on eliminating timing-side channels in real-time safety-critical cyber-physical network protocols like Controller Area Networks (CAN). Automotive Electronic Control Units (ECUs) implement predictable scheduling decisions based on task level response time estimation. Such levels of determinism exposes timing information about task executions and therefore corresponding message tra…
▽ More
This work focuses on eliminating timing-side channels in real-time safety-critical cyber-physical network protocols like Controller Area Networks (CAN). Automotive Electronic Control Units (ECUs) implement predictable scheduling decisions based on task level response time estimation. Such levels of determinism exposes timing information about task executions and therefore corresponding message transmissions via the network buses (that connect the ECUs and actuators). With proper analysis, such timing side channels can be utilized to launch several schedule-based attacks that can lead to eventual denial-of-service or man-in-the-middle-type attacks. To eliminate this determinism, we propose a novel schedule obfuscation strategy by skipping certain control task executions and related data transmissions along with random shifting of the victim task instance. While doing this, our strategy contemplates the performance of the control task as well by bounding the number of control execution skips. We analytically demonstrate how the attack success probability (ASP) is reduced under this proposed attack-aware skipping and randomization. We also demonstrate the efficacy and real-time applicability of our attack-aware schedule obfuscation strategy Hide-n-Seek by applying it to synthesized automotive task sets in a real-time Hardware-in-loop (HIL) setup.
△ Less
Submitted 15 June, 2023;
originally announced June 2023.
-
Deterministic policy gradient based optimal control with probabilistic constraints
Authors:
Arunava Naha,
Subhrakanti Dey
Abstract:
This paper studies a deep deterministic policy gradient (DDPG) based actor critic (AC) reinforcement learning (RL) technique to control a linear discrete-time system with a quadratic control cost while ensuring a constraint on the probability of potentially risky or undesirable events. The proposed methodology can be applied to both known and unknown system models with minor adjustments to the rew…
▽ More
This paper studies a deep deterministic policy gradient (DDPG) based actor critic (AC) reinforcement learning (RL) technique to control a linear discrete-time system with a quadratic control cost while ensuring a constraint on the probability of potentially risky or undesirable events. The proposed methodology can be applied to both known and unknown system models with minor adjustments to the reward structure (negative cost). The problem is formulated by considering the average expected quadratic cost of the states and inputs over an infinite time horizon. Risky or undesirable events are represented as functions of the states at the next time step exceeding a user-defined limit. Two strategies are employed to manage the probabilistic constraint in scenarios of known and unknown system models. In the case of a known system model, the probabilistic constraint is replaced with an upper bound, such as the Chernoff bound. For unknown system models, the expected value of the indicator function of the occurrence of the risky or undesirable event is used. We have adopted a deterministic policy gradient (DPG) based AC method to derive a parameterised optimal policy. Extensive numerical simulations are performed using a second- and a fourth-order system, and the proposed method is compared with the standard risk-neutral linear quadratic regulator (LQR) and a chance-constrained model predictive control (MPC) method. The results demonstrate the effectiveness of the proposed approach in both known and unknown system model scenarios.
△ Less
Submitted 21 December, 2023; v1 submitted 25 May, 2023;
originally announced May 2023.
-
Q-SHED: Distributed Optimization at the Edge via Hessian Eigenvectors Quantization
Authors:
Nicolò Dal Fabbro,
Michele Rossi,
Luca Schenato,
Subhrakanti Dey
Abstract:
Edge networks call for communication efficient (low overhead) and robust distributed optimization (DO) algorithms. These are, in fact, desirable qualities for DO frameworks, such as federated edge learning techniques, in the presence of data and system heterogeneity, and in scenarios where internode communication is the main bottleneck. Although computationally demanding, Newton-type (NT) methods…
▽ More
Edge networks call for communication efficient (low overhead) and robust distributed optimization (DO) algorithms. These are, in fact, desirable qualities for DO frameworks, such as federated edge learning techniques, in the presence of data and system heterogeneity, and in scenarios where internode communication is the main bottleneck. Although computationally demanding, Newton-type (NT) methods have been recently advocated as enablers of robust convergence rates in challenging DO problems where edge devices have sufficient computational power. Along these lines, in this work we propose Q-SHED, an original NT algorithm for DO featuring a novel bit-allocation scheme based on incremental Hessian eigenvectors quantization. The proposed technique is integrated with the recent SHED algorithm, from which it inherits appealing features like the small number of required Hessian computations, while being bandwidth-versatile at a bit-resolution level. Our empirical evaluation against competing approaches shows that Q-SHED can reduce by up to 60% the number of communication rounds required for convergence.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
Optimal Vehicle Charging in Bilevel Power-Traffic Networks via Charging Demand Function
Authors:
Yufan Zhang,
Sujit Dey,
Yuanyuan Shi
Abstract:
Electric vehicle (EV) charging couples the operation of power and traffic networks. Specifically, the power network determines the charging price at various locations, while EVs on the traffic network optimize the charging power given the price, acting as price-takers. We model such decision-making processes by a bilevel program, with the power network at the upper-level and the traffic network at…
▽ More
Electric vehicle (EV) charging couples the operation of power and traffic networks. Specifically, the power network determines the charging price at various locations, while EVs on the traffic network optimize the charging power given the price, acting as price-takers. We model such decision-making processes by a bilevel program, with the power network at the upper-level and the traffic network at the lower-level. However, since the two networks are managed by separate entities and the charging expense term, calculated as the product of charging price and charging demand, is nonlinear. Solving the bilevel program is nontrivial. To overcome these challenges, we derive the charging demand function using multiparametric programming theory. This function establishes a piecewise linear relationship between the charging price and the optimal charging power, enabling the power network operator to manage EV charging power independently while accounting for the coupling between the two networks. With the derived function, we are also able to replace the nonlinear charging expense term with a piecewise quadratic one, thus guaranteeing solution optimality. Our numerical studies demonstrate that different traffic demands can have an impact on charging patterns and the power network can effectively incentivize charging at low-price nodes through price setting.
△ Less
Submitted 5 September, 2023; v1 submitted 21 April, 2023;
originally announced April 2023.
-
LQG Control Over SWIPT-enabled Wireless Communication Network
Authors:
Huiwen Yang,
Lingying Huang,
Yuzhe Li,
Subhrakanti Dey,
Ling Shi
Abstract:
In this paper, we consider using simultaneous wireless information and power transfer (SWIPT) to recharge the sensor in the LQG control, which provides a new approach to prolonging the network lifetime. We analyze the stability of the proposed system model and show that there exist two critical values for the power splitting ratio α. Then, we propose an optimization problem to derive the optimal v…
▽ More
In this paper, we consider using simultaneous wireless information and power transfer (SWIPT) to recharge the sensor in the LQG control, which provides a new approach to prolonging the network lifetime. We analyze the stability of the proposed system model and show that there exist two critical values for the power splitting ratio α. Then, we propose an optimization problem to derive the optimal value of α. This problem is non-convex but its numerical solution can be derived by our proposed algorithm efficiently. Moreover, we provide the feasible condition of the proposed optimization problem. Finally, simulation results are presented to verify and illustrate the main theoretical results.
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
STEP: Stochastic Traversability Evaluation and Planning for Risk-Aware Off-road Navigation; Results from the DARPA Subterranean Challenge
Authors:
Anushri Dixit,
David D. Fan,
Kyohei Otsu,
Sharmita Dey,
Ali-Akbar Agha-Mohammadi,
Joel W. Burdick
Abstract:
Although autonomy has gained widespread usage in structured and controlled environments, robotic autonomy in unknown and off-road terrain remains a difficult problem. Extreme, off-road, and unstructured environments such as undeveloped wilderness, caves, rubble, and other post-disaster sites pose unique and challenging problems for autonomous navigation. Based on our participation in the DARPA Sub…
▽ More
Although autonomy has gained widespread usage in structured and controlled environments, robotic autonomy in unknown and off-road terrain remains a difficult problem. Extreme, off-road, and unstructured environments such as undeveloped wilderness, caves, rubble, and other post-disaster sites pose unique and challenging problems for autonomous navigation. Based on our participation in the DARPA Subterranean Challenge, we propose an approach to improve autonomous traversal of robots in subterranean environments that are perceptually degraded and completely unknown through a traversability and planning framework called STEP (Stochastic Traversability Evaluation and Planning). We present 1) rapid uncertainty-aware mapping and traversability evaluation, 2) tail risk assessment using the Conditional Value-at-Risk (CVaR), 3) efficient risk and constraint-aware kinodynamic motion planning using sequential quadratic programming-based (SQP) model predictive control (MPC), 4) fast recovery behaviors to account for unexpected scenarios that may cause failure, and 5) risk-based gait adaptation for quadrupedal robots. We illustrate and validate extensive results from our experiments on wheeled and legged robotic platforms in field studies at the Valentine Cave, CA (cave environment), Kentucky Underground, KY (mine environment), and Louisville Mega Cavern, KY (final competition site for the DARPA Subterranean Challenge with tunnel, urban, and cave environments).
△ Less
Submitted 2 March, 2023;
originally announced March 2023.
-
Cross-Corpora Spoken Language Identification with Domain Diversification and Generalization
Authors:
Spandan Dey,
Md Sahidullah,
Goutam Saha
Abstract:
This work addresses the cross-corpora generalization issue for the low-resourced spoken language identification (LID) problem. We have conducted the experiments in the context of Indian LID and identified strikingly poor cross-corpora generalization due to corpora-dependent non-lingual biases. Our contribution to this work is twofold. First, we propose domain diversification, which diversifies the…
▽ More
This work addresses the cross-corpora generalization issue for the low-resourced spoken language identification (LID) problem. We have conducted the experiments in the context of Indian LID and identified strikingly poor cross-corpora generalization due to corpora-dependent non-lingual biases. Our contribution to this work is twofold. First, we propose domain diversification, which diversifies the limited training data using different audio data augmentation methods. We then propose the concept of maximally diversity-aware cascaded augmentations and optimize the augmentation fold-factor for effective diversification of the training data. Second, we introduce the idea of domain generalization considering the augmentation methods as pseudo-domains. Towards this, we investigate both domain-invariant and domain-aware approaches. Our LID system is based on the state-of-the-art emphasized channel attention, propagation, and aggregation based time delay neural network (ECAPA-TDNN) architecture. We have conducted extensive experiments with three widely used corpora for Indian LID research. In addition, we conduct a final blind evaluation of our proposed methods on the Indian subset of VoxLingua107 corpus collected in the wild. Our experiments demonstrate that the proposed domain diversification is more promising over commonly used simple augmentation methods. The study also reveals that domain generalization is a more effective solution than domain diversification. We also notice that domain-aware learning performs better for same-corpora LID, whereas domain-invariant learning is more suitable for cross-corpora generalization. Compared to basic ECAPA-TDNN, its proposed domain-invariant extensions improve the cross-corpora EER up to 5.23%. In contrast, the proposed domain-aware extensions also improve performance for same-corpora test scenarios.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
Can't Touch This: Real-Time, Safe Motion Planning and Control for Manipulators Under Uncertainty
Authors:
Jonathan Michaux,
Patrick Holmes,
Bohao Zhang,
Che Chen,
Baiyue Wang,
Shrey Sahgal,
Tiancheng Zhang,
Sidhartha Dey,
Shreyas Kousik,
Ram Vasudevan
Abstract:
Ensuring safe, real-time motion planning in arbitrary environments requires a robotic manipulator to avoid collisions, obey joint limits, and account for uncertainties in the mass and inertia of objects and the robot itself. This paper proposes Autonomous Robust Manipulation via Optimization with Uncertainty-aware Reachability (ARMOUR), a provably-safe, receding-horizon trajectory planner and trac…
▽ More
Ensuring safe, real-time motion planning in arbitrary environments requires a robotic manipulator to avoid collisions, obey joint limits, and account for uncertainties in the mass and inertia of objects and the robot itself. This paper proposes Autonomous Robust Manipulation via Optimization with Uncertainty-aware Reachability (ARMOUR), a provably-safe, receding-horizon trajectory planner and tracking controller framework for robotic manipulators to address these challenges. ARMOUR first constructs a robust controller that tracks desired trajectories with bounded error despite uncertain dynamics. ARMOUR then uses a novel recursive Newton-Euler method to compute all inputs required to track any trajectory within a continuum of desired trajectories. Finally, ARMOUR over-approximates the swept volume of the manipulator; this enables one to formulate an optimization problem that can be solved in real-time to synthesize provably-safe motions. This paper compares ARMOUR to state of the art methods on a set of challenging manipulation examples in simulation and demonstrates its ability to ensure safety on real hardware in the presence of model uncertainty without sacrificing performance. Project page: https://roahmlab.github.io/armour/.
△ Less
Submitted 1 November, 2023; v1 submitted 30 January, 2023;
originally announced January 2023.
-
An Overview of Indian Spoken Language Recognition from Machine Learning Perspective
Authors:
Spandan Dey,
Md Sahidullah,
Goutam Saha
Abstract:
Automatic spoken language identification (LID) is a very important research field in the era of multilingual voice-command-based human-computer interaction (HCI). A front-end LID module helps to improve the performance of many speech-based applications in the multilingual scenario. India is a populous country with diverse cultures and languages. The majority of the Indian population needs to use t…
▽ More
Automatic spoken language identification (LID) is a very important research field in the era of multilingual voice-command-based human-computer interaction (HCI). A front-end LID module helps to improve the performance of many speech-based applications in the multilingual scenario. India is a populous country with diverse cultures and languages. The majority of the Indian population needs to use their respective native languages for verbal interaction with machines. Therefore, the development of efficient Indian spoken language recognition systems is useful for adapting smart technologies in every section of Indian society. The field of Indian LID has started gaining momentum in the last two decades, mainly due to the development of several standard multilingual speech corpora for the Indian languages. Even though significant research progress has already been made in this field, to the best of our knowledge, there are not many attempts to analytically review them collectively. In this work, we have conducted one of the very first attempts to present a comprehensive review of the Indian spoken language recognition research field. In-depth analysis has been presented to emphasize the unique challenges of low-resource and mutual influences for developing LID systems in the Indian contexts. Several essential aspects of the Indian LID research, such as the detailed description of the available speech corpora, the major research contributions, including the earlier attempts based on statistical modeling to the recent approaches based on different neural network architectures, and the future research trends are discussed. This review work will help assess the state of the present Indian LID research by any active researcher or any research enthusiasts from related fields.
△ Less
Submitted 30 November, 2022;
originally announced December 2022.
-
Safe Human Robot-Interaction using Switched Model Reference Admittance Control
Authors:
Chayan Kumar Paul,
Bhabani Shankar Dey,
Udayan Banerjee,
Indra Narayan Kar
Abstract:
Physical Human-Robot Interaction (pHRI) task involves tight coupling between safety constraints and compliance with human intentions. In this paper, a novel switched model reference admittance controller is developed to maintain compliance with the external force while upholding safety constraints in the workspace for an n-link manipulator involved in pHRI. A switched reference model is designed f…
▽ More
Physical Human-Robot Interaction (pHRI) task involves tight coupling between safety constraints and compliance with human intentions. In this paper, a novel switched model reference admittance controller is developed to maintain compliance with the external force while upholding safety constraints in the workspace for an n-link manipulator involved in pHRI. A switched reference model is designed for the admittance controller to generate the reference trajectory within the safe workspace. The stability analysis of the switched reference model is carried out by an appropriate selection of the Common Quadratic Lyapunov Function (CQLF) so that asymptotic convergence of the trajectory tracking error is ensured. The efficacy of the proposed controller is validated in simulation on a two-link robot manipulator.
△ Less
Submitted 27 November, 2022;
originally announced November 2022.
-
DLKoopman: A deep learning software package for Koopman theory
Authors:
Sourya Dey,
Eric Davis
Abstract:
We present DLKoopman -- a software package for Koopman theory that uses deep learning to learn an encoding of a nonlinear dynamical system into a linear space, while simultaneously learning the linear dynamics. While several previous efforts have either restricted the ability to learn encodings, or been bespoke efforts designed for specific systems, DLKoopman is a generalized tool that can be appl…
▽ More
We present DLKoopman -- a software package for Koopman theory that uses deep learning to learn an encoding of a nonlinear dynamical system into a linear space, while simultaneously learning the linear dynamics. While several previous efforts have either restricted the ability to learn encodings, or been bespoke efforts designed for specific systems, DLKoopman is a generalized tool that can be applied to data-driven learning and optimization of any dynamical system. It can either be trained on data from individual states (snapshots) of a system and used to predict its unknown states, or trained on data from trajectories of a system and used to predict unknown trajectories for new initial states. DLKoopman is available on the Python Package Index (PyPI) as 'dlkoopman', and includes extensive documentation and tutorials. Additional contributions of the package include a novel metric called Average Normalized Absolute Error for evaluating performance, and a ready-to-use hyperparameter search module for improving performance.
△ Less
Submitted 23 June, 2023; v1 submitted 15 November, 2022;
originally announced November 2022.
-
Dynamic Mode Decomposition and Koopman Theory
Authors:
Sourya Dey
Abstract:
Dynamic Mode Decomposition (DMD) is a technique to approximate generally non-linear dynamical systems using linear techniques, which are better understood and easier to analyze. Koopman theory extends DMD by transforming the original system into a new domain which facilitates linearization. This is a technical report on DMD and Koopman theory, with primary focus on explaining the underlying mathem…
▽ More
Dynamic Mode Decomposition (DMD) is a technique to approximate generally non-linear dynamical systems using linear techniques, which are better understood and easier to analyze. Koopman theory extends DMD by transforming the original system into a new domain which facilitates linearization. This is a technical report on DMD and Koopman theory, with primary focus on explaining the underlying mathematics in clear and concise form. We include dimensions of vectors and marices, and step-by-step derivations of equations in order to assist the user in easily comprehending these concepts. This report will also enable users to implement DMD and Koopman theory in code.
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
Leveraging unsupervised data and domain adaptation for deep regression in low-cost sensor calibration
Authors:
Swapnil Dey,
Vipul Arora,
Sachchida Nand Tripathi
Abstract:
Air quality monitoring is becoming an essential task with rising awareness about air quality. Low cost air quality sensors are easy to deploy but are not as reliable as the costly and bulky reference monitors. The low quality sensors can be calibrated against the reference monitors with the help of deep learning. In this paper, we translate the task of sensor calibration into a semi-supervised dom…
▽ More
Air quality monitoring is becoming an essential task with rising awareness about air quality. Low cost air quality sensors are easy to deploy but are not as reliable as the costly and bulky reference monitors. The low quality sensors can be calibrated against the reference monitors with the help of deep learning. In this paper, we translate the task of sensor calibration into a semi-supervised domain adaptation problem and propose a novel solution for the same. The problem is challenging because it is a regression problem with covariate shift and label gap. We use histogram loss instead of mean squared or mean absolute error, which is commonly used for regression, and find it useful against covariate shift. To handle the label gap, we propose weighting of samples for adversarial entropy optimization. In experimental evaluations, the proposed scheme outperforms many competitive baselines, which are based on semi-supervised and supervised domain adaptation, in terms of R2 score and mean absolute error. Ablation studies show the relevance of each proposed component in the entire scheme.
△ Less
Submitted 2 October, 2022;
originally announced October 2022.
-
Robust Artificial Delay based Impedance Control of Robotic Manipulators with Uncertain Dynamics
Authors:
Udayan Banerjee,
Bhabani Shankar Dey,
Indra Narayan Kar,
Subir Kumar Saha
Abstract:
In this paper an artificial delay based impedance controller is proposed for robotic manipulators with uncertainty in dynamics. The control law unites the time delayed estimation (TDE) framework with a second order switching controller of super twisting algorithm (STA) type via a novel generalized filtered tracking error (GFTE). While time delayed estimation framework eliminates the need for accur…
▽ More
In this paper an artificial delay based impedance controller is proposed for robotic manipulators with uncertainty in dynamics. The control law unites the time delayed estimation (TDE) framework with a second order switching controller of super twisting algorithm (STA) type via a novel generalized filtered tracking error (GFTE). While time delayed estimation framework eliminates the need for accurate modelling of robot dynamics by estimating the uncertain robot dynamics and interaction forces from immediate past data of state and control effort, the second order switching control law in the outer loop provides robustness against the time delayed estimation (TDE) error that arises due to approximation of the manipulator dynamics. Thus, the proposed control law tries to establish a desired impedance model between the robot end effector variables i.e. force and motion in presence of uncertainties, both when it is encountering smooth contact forces and during free motion. Simulation results for a two link manipulator using the proposed controller along with convergence analysis are shown to validate the proposition.
△ Less
Submitted 20 August, 2022; v1 submitted 18 August, 2022;
originally announced August 2022.
-
Exploring The Resilience of Control Execution Skips against False Data Injection Attacks
Authors:
Ipsita Koley,
Sunandan Adhikary,
Soumyajit Dey
Abstract:
Modern Cyber-Physical Systems (CPSs) are often designed as networked, software-based controller implementations which have been found to be vulnerable to network-level and physical level attacks. A number of research works have proposed CPS-specific attack detection schemes as well as techniques for attack resilient controller design. However, such schemes also incur platform-level overheads. In t…
▽ More
Modern Cyber-Physical Systems (CPSs) are often designed as networked, software-based controller implementations which have been found to be vulnerable to network-level and physical level attacks. A number of research works have proposed CPS-specific attack detection schemes as well as techniques for attack resilient controller design. However, such schemes also incur platform-level overheads. In this regard, some recent works have leveraged the use of skips in control execution to enhance the resilience of a CPS against false data injection (FDI) attacks.
In this paper, we provide an analytical discussion on when and how skipping a control execution can improve the resilience of the system against FDI attacks while maintaining the control performance requirement. We also propose a methodology to synthesize such optimal control execution patterns. To the best of our knowledge, no previous work has provided any quantitative analysis about the trade-off between attack resilience and control performance for such aperiodic control execution. Finally, we evaluate the proposed method on several safety-critical CPS benchmarks.
△ Less
Submitted 16 July, 2022;
originally announced July 2022.
-
A contraction theory approach to observer-based controller design for glucose regulation in type 1 diabetes with intra-patient variability
Authors:
Bhabani Shankar Dey,
Anirudh Nath,
Abhilash Patel,
Indra Narayan Kar
Abstract:
While the Artificial Pancreas is effective in regulating the blood glucose in the safe range of 70-180 mg/dl in type 1 diabetic patients, the high intra-patient variability, as well as exogenous meal disturbances, poses a serious challenge. The existing control algorithms thus require additional safety algorithms and feed-forward actions. Moreover, the unavailability of insulin sensors in Artifici…
▽ More
While the Artificial Pancreas is effective in regulating the blood glucose in the safe range of 70-180 mg/dl in type 1 diabetic patients, the high intra-patient variability, as well as exogenous meal disturbances, poses a serious challenge. The existing control algorithms thus require additional safety algorithms and feed-forward actions. Moreover, the unavailability of insulin sensors in Artificial Pancreas makes this task more difficult. In the present work, a subcutaneous model of type 1 diabetes (T1D) is considered for observer-based controller design in the framework of contraction analysis. A variety of realistic multiple-meal scenarios for three virtual T1D patients have been investigated with +30 % and -30 % of parametric variability. The average time spent by the three T1D patients is found to be 77 %, 73 % and 76 %, respectively. A significant reduction in the time spent in hyperglycemia (>180 mg/dl) is achieved without any feed-forward action for meal compensation.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
A CAD Framework for Simulation of Network Level Attack on Platoons
Authors:
Ipsita Koley,
Sunandan Adhikary,
Rohit Rohit,
Soumyajit Dey
Abstract:
Recent developments in the smart mobility domain have transformed automobiles into networked transportation agents helping realize new age, large-scale intelligent transportation systems (ITS). The motivation behind such networked transportation is to improve road safety as well as traffic efficiency. In this setup, vehicles can share information about their speed and/or acceleration values among…
▽ More
Recent developments in the smart mobility domain have transformed automobiles into networked transportation agents helping realize new age, large-scale intelligent transportation systems (ITS). The motivation behind such networked transportation is to improve road safety as well as traffic efficiency. In this setup, vehicles can share information about their speed and/or acceleration values among themselves and infrastructures can share traffic signal data with them. This enables the connected vehicles (CVs) to stay informed about their surroundings while moving. However, the inter-vehicle communication channels significantly broaden the attack surface. The inter-vehicle network enables an attacker to remotely launch attacks. An attacker can create collision as well as hamper performance by reducing the traffic efficiency. Thus, security vulnerabilities must be taken into consideration in the early phase of the development cycle of CVs. To the best of our knowledge, there exists no such automated simulation tool using which engineers can verify the performance of CV prototypes in the presence of an attacker. In this work, we present an automated tool flow that facilitates false data injection attack synthesis and simulation on customizable platoon structure and vehicle dynamics. This tool can be used to simulate as well as design and verify control-theoretic light-weight attack detection and mitigation algorithms for CVs.
△ Less
Submitted 2 May, 2022;
originally announced May 2022.