Skip to main content

Showing 1–23 of 23 results for author: Ruths, J

Searching in archive eess. Search in all archives.
.
  1. arXiv:2503.15336  [pdf, other

    eess.SY

    Automated Functional Decomposition for Hybrid Zonotope Over-approximations with Application to LSTM Networks

    Authors: Jonah J. Glunt, Jacob A. Siefert, Andrew F. Thompson, Justin Ruths, Herschel C. Pangborn

    Abstract: Functional decomposition is a powerful tool for systems analysis because it can reduce a function of arbitrary input dimensions to the sum and superposition of functions of a single variable, thereby mitigating (or potentially avoiding) the exponential scaling often associated with analyses over high-dimensional spaces. This paper presents automated methods for constructing functional decompositio… ▽ More

    Submitted 19 March, 2025; originally announced March 2025.

  2. arXiv:2310.15426  [pdf, other

    eess.SY

    zonoLAB: A MATLAB toolbox for set-based control systems analysis using hybrid zonotopes

    Authors: Justin Koeln, Trevor J. Bird, Jacob Siefert, Justin Ruths, Herschel Pangborn, Neera Jain

    Abstract: This paper introduces zonoLAB, a MATLAB-based toolbox for set-based control system analysis using the hybrid zonotope set representation. Hybrid zonotopes have proven to be an expressive set representation that can exactly represent the reachable sets of mixed-logical dynamical systems and tightly approximate the reachable sets of nonlinear dynamic systems. Moreover, hybrid zonotopes can exactly r… ▽ More

    Submitted 10 June, 2024; v1 submitted 23 October, 2023; originally announced October 2023.

  3. arXiv:2304.02755  [pdf, other

    cs.LG eess.SY

    Hybrid Zonotopes Exactly Represent ReLU Neural Networks

    Authors: Joshua Ortiz, Alyssa Vellucci, Justin Koeln, Justin Ruths

    Abstract: We show that hybrid zonotopes offer an equivalent representation of feed-forward fully connected neural networks with ReLU activation functions. Our approach demonstrates that the complexity of binary variables is equal to the total number of neurons in the network and hence grows linearly in the size of the network. We demonstrate the utility of the hybrid zonotope formulation through three case… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

  4. arXiv:2304.02324  [pdf, ps, other

    eess.SY cs.NE cs.RO

    Convex Optimization-based Policy Adaptation to Compensate for Distributional Shifts

    Authors: Navid Hashemi, Justin Ruths, Jyotirmoy V. Deshmukh

    Abstract: Many real-world systems often involve physical components or operating environments with highly nonlinear and uncertain dynamics. A number of different control algorithms can be used to design optimal controllers for such systems, assuming a reasonably high-fidelity model of the actual system. However, the assumptions made on the stochastic dynamics of the model when designing the optimal controll… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

  5. arXiv:2107.08912  [pdf, other

    math.MG eess.SP eess.SY

    Generalized Outer Bounds on the Finite Geometric Sum of Ellipsoids

    Authors: Navid Hashemi, Justin Ruths

    Abstract: General results on convex bodies are reviewed and used to derive an exact closed-form parametric formula for the boundary of the geometric (Minkowski) sum of $k$ ellipsoids in $n$-dimensional Euclidean space. Previously this was done through iterative algorithms in which each new ellipsoid was added to an ellipsoid approximation of the sum of the previous ellipsoids. Here we provide one shot formu… ▽ More

    Submitted 8 June, 2021; originally announced July 2021.

    Comments: arXiv admin note: text overlap with arXiv:2006.08739

  6. arXiv:2105.12239  [pdf, ps, other

    eess.SY

    Finite sample guarantees for quantile estimation: An application to detector threshold tuning

    Authors: David Umsonst, Justin Ruths, Henrik Sandberg

    Abstract: In threshold-based anomaly detection, we want to tune the threshold of a detector to achieve an acceptable false alarm rate. However, tuning the threshold is often a non-trivial task due to unknown detector output distributions. A detector threshold that provides an acceptable false alarm rate is equivalent to a specific quantile of the detector output distribution. Therefore, we use quantile esti… ▽ More

    Submitted 28 April, 2022; v1 submitted 25 May, 2021; originally announced May 2021.

    Comments: 8 pages, 5 figures

  7. Anomaly Detection Under Multiplicative Noise Model Uncertainty

    Authors: Venkatraman Renganathan, Benjamin J. Gravell, Justin Ruths, Tyler H. Summers

    Abstract: State estimators are crucial components of anomaly detectors that are used to monitor cyber-physical systems. Many frequently-used state estimators are susceptible to model risk as they rely critically on the availability of an accurate state-space model. Modeling errors make it more difficult to distinguish whether deviations from expected behavior are due to anomalies or simply a lack of knowled… ▽ More

    Submitted 18 December, 2021; v1 submitted 28 March, 2021; originally announced March 2021.

    Journal ref: IEEE Control Systems Letters 2022

  8. arXiv:2103.12141  [pdf, other

    cs.LG eess.SY

    Performance Bounds for Neural Network Estimators: Applications in Fault Detection

    Authors: Navid Hashemi, Mahyar Fazlyab, Justin Ruths

    Abstract: We exploit recent results in quantifying the robustness of neural networks to input variations to construct and tune a model-based anomaly detector, where the data-driven estimator model is provided by an autoregressive neural network. In tuning, we specifically provide upper bounds on the rate of false alarms expected under normal operation. To accomplish this, we provide a theory extension to al… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

  9. Higher-Order Moment-Based Anomaly Detection

    Authors: Venkatraman Renganathan, Navid Hashemi, Justin Ruths, Tyler H. Summers

    Abstract: The identification of anomalies is a critical component of operating complex, and possibly large-scale and geo-graphically distributed cyber-physical systems. While designing anomaly detectors, it is common to assume Gaussian noise models to maintain tractability; however, this assumption can lead to the actual false alarm rate being significantly higher than expected. Here we design a distributio… ▽ More

    Submitted 6 February, 2021; v1 submitted 30 October, 2020; originally announced November 2020.

    Comments: arXiv admin note: text overlap with arXiv:1909.12506

  10. arXiv:2006.08739  [pdf, other

    eess.SY

    Generalized Outer Bounds on the Finite Geometric Sum of Ellipsoids

    Authors: Navid Hashemi, Justin Ruths

    Abstract: General results on convex bodies are reviewed and used to derive an exact closed-form parametric formula for the boundary of the geometric (Minkowski) sum of $k$ ellipsoids in $n$-dimensional Euclidean space. Previously this was done through iterative algorithms in which each new ellipsoid was added to an ellipsoid approximation of the sum of the previous ellipsoids. Here we provide one shot formu… ▽ More

    Submitted 5 July, 2021; v1 submitted 15 June, 2020; originally announced June 2020.

  11. arXiv:1909.12506  [pdf, other

    eess.SY

    Distributionally Robust Tuning of Anomaly Detectors in Cyber-Physical Systems with Stealthy Attacks

    Authors: Venkatraman Renganathan, Navid Hashemi, Justin Ruths, Tyler H. Summers

    Abstract: Designing resilient control strategies for mitigating stealthy attacks is a crucial task in emerging cyber-physical systems. In the design of anomaly detectors, it is common to assume Gaussian noise models to maintain tractability; however, this assumption can lead the actual false alarm rate to be significantly higher than expected. We propose a distributionally robust anomaly detector for noise… ▽ More

    Submitted 27 September, 2019; originally announced September 2019.

    Journal ref: 2020 Annual American Control Conference (ACC)

  12. arXiv:1909.12452  [pdf, other

    eess.SY

    Co-design for Security and Performance: LMI Tools

    Authors: Navid Hashemi, Justin Ruths

    Abstract: We present a convex optimization to reduce the impact of sensor falsification attacks in linear time invariant systems controlled by observer-based feedback. We accomplish this by finding optimal observer and controller gain matrices that minimize the size of the reachable set of attack-induced states. To avoid trivial solutions, we integrate a covariance-based $\|H\|_2$ closed-loop performance co… ▽ More

    Submitted 28 June, 2020; v1 submitted 26 September, 2019; originally announced September 2019.

  13. Filtering Approaches for Dealing with Noise in Anomaly Detection

    Authors: Navid Hashemi, Eduardo Verdugo German, Jonatan Pena Ramirez, Justin Ruths

    Abstract: The leading workhorse of anomaly (and attack) detection in the literature has been residual-based detectors, where the residual is the discrepancy between the observed output provided by the sensors (inclusive of any tampering along the way) and the estimated output provided by an observer. These techniques calculate some statistic of the residual and apply a threshold to determine whether or not… ▽ More

    Submitted 3 September, 2019; originally announced September 2019.

    Journal ref: 2019 IEEE Conference on Decision and Control (CDC)

  14. arXiv:1909.01469  [pdf, other

    eess.SY

    Generalized chi-squared detector for LTI systems with non-Gaussian noise

    Authors: Navid Hashemi, Justin Ruths

    Abstract: Previously, we derived exact relationships between the properties of a linear time-invariant control system and properties of an anomaly detector that quantified the impact an attacker can have on the system if that attacker aims to remain stealthy to the detector. A necessary first step in this process is to be able to precisely tune the detector to a desired level of performance (false alarm rat… ▽ More

    Submitted 3 September, 2019; originally announced September 2019.

    Journal ref: 2019 Annual American Control Conference (ACC)

  15. arXiv:1809.01808  [pdf, other

    eess.SY

    Security Metrics of Networked Control Systems under Sensor Attacks (extended preprint)

    Authors: Carlos Murguia, Iman Shames, Justin Ruths, Dragan Nesic

    Abstract: As more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade detection. The term stealthy has come to encompass a variety of techniques that attackers can employ to avoid being detected. In this manuscript, for a class of perturbed linear ti… ▽ More

    Submitted 3 June, 2019; v1 submitted 5 September, 2018; originally announced September 2018.

  16. arXiv:1710.11276  [pdf, ps, other

    eess.SY

    Synchronization in Networks of Diffusively Coupled Nonlinear Systems: Robustness Against Time-Delays

    Authors: Carlos Murguia, Henk Nijmeijer, Justin Ruths

    Abstract: In this manuscript, we study the problem of robust synchronization in networks of diffusively time-delayed coupled nonlinear systems. In particular, we prove that, under some mild conditions on the input-output dynamics of the systems and the network topology, there always exists a unimodal region in the parameter space (coupling strength versus time-delay), such that if they belong to this region… ▽ More

    Submitted 30 October, 2017; originally announced October 2017.

  17. arXiv:1710.06967  [pdf, ps, other

    eess.SY

    On Reachable Sets of Hidden CPS Sensor Attacks

    Authors: Carlos Murguia, Justin Ruths

    Abstract: For given system dynamics, observer structure, and observer-based fault/attack detection procedure, we provide mathematical tools -- in terms of Linear Matrix Inequalities (LMIs) -- for computing outer ellipsoidal bounds on the set of estimation errors that attacks can induce while maintaining the alarm rate of the detector equal to its attack-free false alarm rate. We refer to these sets to as hi… ▽ More

    Submitted 18 October, 2017; originally announced October 2017.

  18. arXiv:1710.04407  [pdf, ps, other

    eess.SY

    Characterization of Model-Based Detectors for CPS Sensor Faults/Attacks

    Authors: Carlos Murguia, Justin Ruths

    Abstract: A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying faulty/falsified sensor measurements. First, given the system dynamics, we derive tools for tuning the CUSUM procedure in the fault/attack free case to fulfill a desired detection performance (in terms of false alarm rate). We use the widely-used chi-squared fault/attack detection procedure as a benchmark to c… ▽ More

    Submitted 12 October, 2017; originally announced October 2017.

    Comments: Submitted to IEEE Transactions on Control Systems Technology

  19. arXiv:1710.02597  [pdf, other

    eess.SY math.DS math.OC

    A Comparison of Stealthy Sensor Attacks on Control Systems

    Authors: Navid Hashemi, Carlos Murguia, Justin Ruths

    Abstract: As more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade detection. The term stealthy has come to encompass a variety of techniques that attackers can employ to avoid detection. Here we show how the states of the system (in particular, t… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

  20. arXiv:1710.02576  [pdf, other

    eess.SY math.DS math.OC

    Constraining Attacker Capabilities Through Actuator Saturation

    Authors: Sahand Hadizadeh Kafash, Jairo Giraldo, Carlos Murguia, Alvaro A. Cardenas, Justin Ruths

    Abstract: For LTI control systems, we provide mathematical tools - in terms of Linear Matrix Inequalities - for computing outer ellipsoidal bounds on the reachable sets that attacks can induce in the system when they are subject to the physical limits of the actuators. Next, for a given set of dangerous states, states that (if reached) compromise the integrity or safe operation of the system, we provide too… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

  21. arXiv:1710.02573  [pdf, other

    eess.SY math.DS math.OC

    Tuning Windowed Chi-Squared Detectors for Sensor Attacks

    Authors: Tunga R, Carlos Murguia, Justin Ruths

    Abstract: A model-based windowed chi-squared procedure is proposed for identifying falsified sensor measurements. We employ the widely-used static chi-squared and the dynamic cumulative sum (CUSUM) fault/attack detection procedures as benchmarks to compare the performance of the windowed chi-squared detector. In particular, we characterize the state degradation that a class of attacks can induce to the syst… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

  22. arXiv:1707.04528  [pdf, ps, other

    math.OC eess.SY

    Performance bounds for optimal feedback control in networks

    Authors: Tyler Summers, Justin Ruths

    Abstract: Many important complex networks, including critical infrastructure and emerging industrial automation systems, are becoming increasingly intricate webs of interacting feedback control loops. A fundamental concern is to quantify the control properties and performance limitations of the network as a function of its dynamical structure and control architecture. We study performance bounds for network… ▽ More

    Submitted 14 July, 2017; originally announced July 2017.

  23. arXiv:1102.3713  [pdf, ps, other

    math.OC eess.SY quant-ph

    Optimal Control of Inhomogeneous Ensembles

    Authors: Justin Ruths, Jr-Shin Li

    Abstract: Inhomogeneity, in its many forms, appears frequently in practical physical systems. Readily apparent in quantum systems, inhomogeneity is caused by hardware imperfections, measurement inaccuracies, and environmental variations, and subsequently limits the performance and efficiency achievable in current experiments. In this paper, we provide a systematic methodology to mathematically characterize… ▽ More

    Submitted 17 February, 2011; originally announced February 2011.

    Comments: 21 pages, 4 figures