-
Physics-Informed Deep B-Spline Networks for Dynamical Systems
Authors:
Zhuoyuan Wang,
Raffaele Romagnoli,
Jasmine Ratchford,
Yorie Nakahira
Abstract:
Physics-informed machine learning provides an approach to combining data and governing physics laws for solving complex partial differential equations (PDEs). However, efficiently solving PDEs with varying parameters and changing initial conditions and boundary conditions (ICBCs) with theoretical guarantees remains an open challenge. We propose a hybrid framework that uses a neural network to lear…
▽ More
Physics-informed machine learning provides an approach to combining data and governing physics laws for solving complex partial differential equations (PDEs). However, efficiently solving PDEs with varying parameters and changing initial conditions and boundary conditions (ICBCs) with theoretical guarantees remains an open challenge. We propose a hybrid framework that uses a neural network to learn B-spline control points to approximate solutions to PDEs with varying system and ICBC parameters. The proposed network can be trained efficiently as one can directly specify ICBCs without imposing losses, calculate physics-informed loss functions through analytical formulas, and requires only learning the weights of B-spline functions as opposed to both weights and basis as in traditional neural operator learning methods. We provide theoretical guarantees that the proposed B-spline networks serve as universal approximators for the set of solutions of PDEs with varying ICBCs under mild conditions and establish bounds on the generalization errors in physics-informed learning. We also demonstrate in experiments that the proposed B-spline network can solve problems with discontinuous ICBCs and outperforms existing methods, and is able to learn solutions of 3D dynamics with diverse initial conditions.
△ Less
Submitted 20 March, 2025;
originally announced March 2025.
-
Control-Oriented Models Inform Synthetic Biology Strategies in CAR T Cell Immunotherapy
Authors:
Raffaele Romagnoli
Abstract:
Chimeric antigen receptor (CAR) T cell therapy is revolutionizing the treatment of blood cancers. Mathematical models that can predict the effectiveness of immunotherapies such as CAR T are of increasing interest due to their ability to reduce the number of experiments performed and to guide the theoretical development of new therapeutic strategies. {Following this rationale, we propose the use of…
▽ More
Chimeric antigen receptor (CAR) T cell therapy is revolutionizing the treatment of blood cancers. Mathematical models that can predict the effectiveness of immunotherapies such as CAR T are of increasing interest due to their ability to reduce the number of experiments performed and to guide the theoretical development of new therapeutic strategies. {Following this rationale, we propose the use of control-oriented models to guide the augmentation of CAR T therapy with synthetic gene circuitry. Here we present an initial investigation where we adapt a previously developed CAR T model for control-oriented purposes. We then explore the impact of realistic alternative activation methods as control inputs to ensure effective tumor clearance.
△ Less
Submitted 12 November, 2024;
originally announced November 2024.
-
Building Hybrid B-Spline And Neural Network Operators
Authors:
Raffaele Romagnoli,
Jasmine Ratchford,
Mark H. Klein
Abstract:
Control systems are indispensable for ensuring the safety of cyber-physical systems (CPS), spanning various domains such as automobiles, airplanes, and missiles. Safeguarding CPS necessitates runtime methodologies that continuously monitor safety-critical conditions and respond in a verifiably safe manner. A fundamental aspect of many safety approaches involves predicting the future behavior of sy…
▽ More
Control systems are indispensable for ensuring the safety of cyber-physical systems (CPS), spanning various domains such as automobiles, airplanes, and missiles. Safeguarding CPS necessitates runtime methodologies that continuously monitor safety-critical conditions and respond in a verifiably safe manner. A fundamental aspect of many safety approaches involves predicting the future behavior of systems. However, achieving this requires accurate models that can operate in real time. Motivated by DeepONets, we propose a novel strategy that combines the inductive bias of B-splines with data-driven neural networks to facilitate real-time predictions of CPS behavior. We introduce our hybrid B-spline neural operator, establishing its capability as a universal approximator and providing rigorous bounds on the approximation error. These findings are applicable to a broad class of nonlinear autonomous systems and are validated through experimentation on a controlled 6-degree-of-freedom (DOF) quadrotor with a 12 dimensional state space. Furthermore, we conduct a comparative analysis of different network architectures, specifically fully connected networks (FCNN) and recurrent neural networks (RNN), to elucidate the practical utility and trade-offs associated with each architecture in real-world scenarios.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Safety-Aware Multi-Agent Learning for Dynamic Network Bridging
Authors:
Raffaele Galliera,
Konstantinos Mitsopoulos,
Niranjan Suri,
Raffaele Romagnoli
Abstract:
Addressing complex cooperative tasks in safety-critical environments poses significant challenges for multi-agent systems, especially under conditions of partial observability. We focus on a dynamic network bridging task, where agents must learn to maintain a communication path between two moving targets. To ensure safety during training and deployment, we integrate a control-theoretic safety filt…
▽ More
Addressing complex cooperative tasks in safety-critical environments poses significant challenges for multi-agent systems, especially under conditions of partial observability. We focus on a dynamic network bridging task, where agents must learn to maintain a communication path between two moving targets. To ensure safety during training and deployment, we integrate a control-theoretic safety filter that enforces collision avoidance through local setpoint updates. We develop and evaluate multi-agent reinforcement learning safety-informed message passing, showing that encoding safety filter activations as edge-level features improves coordination. The results suggest that local safety enforcement and decentralized learning can be effectively combined in distributed multi-agent tasks.
△ Less
Submitted 3 April, 2025; v1 submitted 1 April, 2024;
originally announced April 2024.
-
Reinforcement Learning-based Optimal Control and Software Rejuvenation for Safe and Efficient UAV Navigation
Authors:
Angela Chen,
Konstantinos Mitsopoulos,
Raffaele Romagnoli
Abstract:
Unmanned autonomous vehicles (UAVs) rely on effective path planning and tracking control to accomplish complex tasks in various domains. Reinforcement Learning (RL) methods are becoming increasingly popular in control applications, as they can learn from data and deal with unmodelled dynamics. Cyber-physical systems (CPSs), such as UAVs, integrate sensing, network communication, control, and compu…
▽ More
Unmanned autonomous vehicles (UAVs) rely on effective path planning and tracking control to accomplish complex tasks in various domains. Reinforcement Learning (RL) methods are becoming increasingly popular in control applications, as they can learn from data and deal with unmodelled dynamics. Cyber-physical systems (CPSs), such as UAVs, integrate sensing, network communication, control, and computation to solve challenging problems. In this context, Software Rejuvenation (SR) is a protection mechanism that refreshes the control software to mitigate cyber-attacks, but it can affect the tracking controller's performance due to discrepancies between the control software and the physical system state. Traditional approaches to mitigate this effect are conservative, hindering the overall system performance. In this paper, we propose a novel approach that incorporates Deep Reinforcement Learning (Deep RL) into SR to design a safe and high-performing tracking controller. Our approach optimizes safety and performance, and we demonstrate its effectiveness during UAV simulations. We compare our approach with traditional methods and show that it improves the system's performance while maintaining safety constraints.
△ Less
Submitted 27 August, 2023;
originally announced August 2023.
-
Reducing Attack Opportunities Through Decentralized Event-Triggered Control
Authors:
Paul Griffioen,
Raffaele Romagnoli,
Bruce H. Krogh,
Bruno Sinopoli
Abstract:
Decentralized control systems are widely used in a number of situations and applications. In order for these systems to function properly and achieve their desired goals, information must be propagated between agents, which requires connecting to a network. To reduce opportunities for attacks that may be carried out through the network, we design an event-triggered mechanism for network connection…
▽ More
Decentralized control systems are widely used in a number of situations and applications. In order for these systems to function properly and achieve their desired goals, information must be propagated between agents, which requires connecting to a network. To reduce opportunities for attacks that may be carried out through the network, we design an event-triggered mechanism for network connection and communication that minimizes the amount of time agents must be connected to the network, in turn decreasing communication costs. This mechanism is a function of only local information and ensures stability for the overall system in attack-free scenarios. Our approach distinguishes itself from current decentralized event-triggered control strategies by considering scenarios where agents are not always connected to the network to receive critical information from other agents and by considering scenarios where the communication graph is undirected and connected. An algorithm describing this network connection and communication protocol is provided, and our approach is illustrated via simulation.
△ Less
Submitted 30 July, 2022;
originally announced August 2022.
-
Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems
Authors:
Dario Stabili,
Raffaele Romagnoli,
Mirco Marchetti,
Bruno Sinopoli,
Michele Colajanni
Abstract:
This paper proposes a novel approach for the study of cyber-attacks against the powertrain of a generic vehicle. The proposed model is composed by a a generic Internal Combustion engine and a speed controller, that communicate through a Controller Area Network (CAN) bus. We consider a threat model composed by three representative attack scenarios designed to modify the output of the model, thus af…
▽ More
This paper proposes a novel approach for the study of cyber-attacks against the powertrain of a generic vehicle. The proposed model is composed by a a generic Internal Combustion engine and a speed controller, that communicate through a Controller Area Network (CAN) bus. We consider a threat model composed by three representative attack scenarios designed to modify the output of the model, thus affecting the rotational speed of the engine. Two attack scenarios target both vehicle sensor systems and CAN communication, while one attack scenario only requires injection of CAN messages. To the best of our knowledge, this is the first attempt of modeling the consequences of realistic cyber attacks against a modern vehicle.
△ Less
Submitted 1 February, 2022;
originally announced February 2022.
-
Physical Watermarking for Replay Attack Detection in Continuous-time Systems
Authors:
Bahram Yaghooti,
Raffaele Romagnoli,
Bruno Sinopoli
Abstract:
Physical watermarking is a well established technique for replay attack detection in cyber-physical systems (CPSs). Most of the watermarking methods proposed in the literature are designed for discrete-time systems. In general, real physical systems evolve in continuous time. In this paper, we analyze the effect of watermarking on sampled-data continuous-time systems controlled via a Zero-Order Ho…
▽ More
Physical watermarking is a well established technique for replay attack detection in cyber-physical systems (CPSs). Most of the watermarking methods proposed in the literature are designed for discrete-time systems. In general, real physical systems evolve in continuous time. In this paper, we analyze the effect of watermarking on sampled-data continuous-time systems controlled via a Zero-Order Hold. We investigate the effect of sampling on detection performance and we provide a procedure to find a suitable sampling period that ensures detectability and acceptable control performance. Simulations on a quadrotor system are used to illustrate the effectiveness of the theoretical results.
△ Less
Submitted 1 March, 2021;
originally announced March 2021.
-
Design of Software Rejuvenation for CPS Security Using Invariant Sets
Authors:
Raffaele Romagnoli,
Bruce H. Krogh,
Bruno Sinopoli
Abstract:
Software rejuvenation has been proposed as a strategy to protect cyber-physical systems (CSPs) against unanticipated and undetectable cyber attacks. The basic idea is to refresh the system periodically with a secure and trusted copy of the online software so as to eliminate all effects of malicious modifications to the run-time code and data. Following each software refresh a safety controller ass…
▽ More
Software rejuvenation has been proposed as a strategy to protect cyber-physical systems (CSPs) against unanticipated and undetectable cyber attacks. The basic idea is to refresh the system periodically with a secure and trusted copy of the online software so as to eliminate all effects of malicious modifications to the run-time code and data. Following each software refresh a safety controller assures the CPS is driven to a safe state before returning to the mission control mode when the CPS is again vulnerable attacks. This paper considers software rejuvenation design from a control-theoretic perspective. Invariant sets for the Lyapunov function for the safety controller are used to derive bounds on the time that the CPS can operate in mission control mode before the software must be refreshed and the maximum time the safety controller will require to bring the CPS to a safe operating state. With these results it can be guaranteed that the CPS will remain safe under cyber attacks against the run-time system and will be able to execute missions successfully if the attacks are not persistent. The general approach is illustrated using simulation of the nonlinear dynamics of a quadrotor system. The concluding section discusses directions for further research.
△ Less
Submitted 24 October, 2018;
originally announced October 2018.
-
Software Rejuvenation for Secure Tracking Control
Authors:
Raffaele Romagnoli,
Bruce H. Krogh,
Dionisio de Niz,
Bruno Sinopoli
Abstract:
Software rejuvenation protects cyber-physical systems (CSPs) against cyber attacks on the run-time code by periodically refreshing the system with an uncorrupted software image. The system is vulnerable to attacks when it is communicating with other agents. Security is guaranteed during the software refresh and re-initialization by turning off all communication. Although the effectiveness of softw…
▽ More
Software rejuvenation protects cyber-physical systems (CSPs) against cyber attacks on the run-time code by periodically refreshing the system with an uncorrupted software image. The system is vulnerable to attacks when it is communicating with other agents. Security is guaranteed during the software refresh and re-initialization by turning off all communication. Although the effectiveness of software rejuvenation has been demonstrated for some simple systems, many problems need to be addressed to make it viable for real applications. This paper expands the scope of CPS applications for which software rejuvenation can be implemented by introducing architectural and algorithmic features to support trajectory tracking. Following each software refresh, while communication is still off, a safety controller is executed to assure the system state is within a sufficiently small neighborhood of the current point on the reference trajectory. Communication is then re-established and the reference trajectory tracking control is resumed. A protected, verified hypervisor manages the software rejuvenation sequence and delivers trusted reference trajectory points, which may be received from untrusted communication, but are verified using an authentication process. We present the approach to designing the tracking and safety controllers and timing parameters and demonstrate the secure tracking control for a 6 DOF quadrotor using the PX4 jMAVSim quadrotor simulator. The concluding section discusses directions for further research.
△ Less
Submitted 24 October, 2018;
originally announced October 2018.
-
Steady-state input calculation for achieving a desired steady-state output of a linear systems
Authors:
Raffaele Romagnoli,
Emanuele Garone
Abstract:
In this note we provide an algorithm for the computation of the steady-state input able to achieve the steady-state output tracking of any desired output signal representable as a rational transfer function.
In this note we provide an algorithm for the computation of the steady-state input able to achieve the steady-state output tracking of any desired output signal representable as a rational transfer function.
△ Less
Submitted 7 March, 2018;
originally announced April 2018.