-
Distributed Multi-agent Coordination over Cellular Sheaves
Authors:
Tyler Hanks,
Hans Riess,
Samuel Cohen,
Trevor Gross,
Matthew Hale,
James Fairbanks
Abstract:
Techniques for coordination of multi-agent systems are vast and varied, often utilizing purpose-built solvers or controllers with tight coupling to the types of systems involved or the coordination goal. In this paper, we introduce a general unified framework for heterogeneous multi-agent coordination using the language of cellular sheaves and nonlinear sheaf Laplacians, which are generalizations…
▽ More
Techniques for coordination of multi-agent systems are vast and varied, often utilizing purpose-built solvers or controllers with tight coupling to the types of systems involved or the coordination goal. In this paper, we introduce a general unified framework for heterogeneous multi-agent coordination using the language of cellular sheaves and nonlinear sheaf Laplacians, which are generalizations of graphs and graph Laplacians. Specifically, we introduce the concept of a nonlinear homological program encompassing a choice of cellular sheaf on an undirected graph, nonlinear edge potential functions, and constrained convex node objectives, which constitutes a standard form for a wide class of coordination problems. We use the alternating direction method of multipliers to derive a distributed optimization algorithm for solving these nonlinear homological programs. To demonstrate the applicability of this framework, we show how heterogeneous coordination goals including combinations of consensus, formation, and flocking can be formulated as nonlinear homological programs and provide numerical simulations showing the efficacy of our distributed solution algorithm.
△ Less
Submitted 3 April, 2025; v1 submitted 2 April, 2025;
originally announced April 2025.
-
Distributed Nonconvex Optimization with Exponential Convergence Rate via Hybrid Systems Methods
Authors:
Katherine R. Hendrickson,
Dawn M. Hustig-Schultz,
Matthew T. Hale,
Ricardo G. Sanfelice
Abstract:
We present a hybrid systems framework for distributed multi-agent optimization in which agents execute computations in continuous time and communicate in discrete time. The optimization algorithm is analogous to a continuous-time form of parallelized coordinate descent. Agents implement an update-and-hold strategy in which gradients are computed at communication times and held constant during flow…
▽ More
We present a hybrid systems framework for distributed multi-agent optimization in which agents execute computations in continuous time and communicate in discrete time. The optimization algorithm is analogous to a continuous-time form of parallelized coordinate descent. Agents implement an update-and-hold strategy in which gradients are computed at communication times and held constant during flows between communications. The completeness of solutions under these hybrid dynamics is established. Then, we prove that this system is globally exponentially stable to a minimizer of a possibly nonconvex, smooth objective function that satisfies the Polyak-Lojasiewicz (PL) condition. Simulation results are presented for four different applications and illustrate the convergence rates and the impact of initial conditions upon convergence.
△ Less
Submitted 20 January, 2025;
originally announced February 2025.
-
Differentially Private Linear Programming: Reduced Sub-Optimality and Guaranteed Constraint Satisfaction
Authors:
Alexander Benvenuti,
Brendan Bialy,
Miriam Dennis,
Matthew Hale
Abstract:
Linear programming is a fundamental tool in a wide range of decision systems. However, without privacy protections, sharing the solution to a linear program may reveal information about the underlying data used to formulate it, which may be sensitive. Therefore, in this paper, we introduce an approach for protecting sensitive data while formulating and solving a linear program. First, we prove tha…
▽ More
Linear programming is a fundamental tool in a wide range of decision systems. However, without privacy protections, sharing the solution to a linear program may reveal information about the underlying data used to formulate it, which may be sensitive. Therefore, in this paper, we introduce an approach for protecting sensitive data while formulating and solving a linear program. First, we prove that this method perturbs objectives and constraints in a way that makes them differentially private. Then, we show that (i) privatized problems always have solutions, and (ii) their solutions satisfy the constraints in their corresponding original, non-private problems. The latter result solves an open problem in the literature. Next, we analytically bound the expected sub-optimality of solutions that is induced by privacy. Numerical simulations show that, under a typical privacy setup, the solution produced by our method yields a $65\%$ reduction in sub-optimality compared to the state of the art.
△ Less
Submitted 31 January, 2025;
originally announced January 2025.
-
Deceptive Sequential Decision-Making via Regularized Policy Optimization
Authors:
Yerin Kim,
Alexander Benvenuti,
Bo Chen,
Mustafa Karabag,
Abhishek Kulkarni,
Nathaniel D. Bastian,
Ufuk Topcu,
Matthew Hale
Abstract:
Autonomous systems are increasingly expected to operate in the presence of adversaries, though an adversary may infer sensitive information simply by observing a system, without even needing to interact with it. Therefore, in this work we present a deceptive decision-making framework that not only conceals sensitive information, but in fact actively misleads adversaries about it. We model autonomo…
▽ More
Autonomous systems are increasingly expected to operate in the presence of adversaries, though an adversary may infer sensitive information simply by observing a system, without even needing to interact with it. Therefore, in this work we present a deceptive decision-making framework that not only conceals sensitive information, but in fact actively misleads adversaries about it. We model autonomous systems as Markov decision processes, and we consider adversaries that attempt to infer their reward functions using inverse reinforcement learning. To counter such efforts, we present two regularization strategies for policy synthesis problems that actively deceive an adversary about a system's underlying rewards. The first form of deception is ``diversionary'', and it leads an adversary to draw any false conclusion about what the system's reward function is. The second form of deception is ``targeted'', and it leads an adversary to draw a specific false conclusion about what the system's reward function is. We then show how each form of deception can be implemented in policy optimization problems, and we analytically bound the loss in total accumulated reward that is induced by deception. Next, we evaluate these developments in a multi-agent sequential decision-making problem with one real agent and multiple decoys. We show that diversionary deception can cause the adversary to believe that the most important agent is the least important, while attaining a total accumulated reward that is $98.83\%$ of its optimal, non-deceptive value. Similarly, we show that targeted deception can make any decoy appear to be the most important agent, while still attaining a total accumulated reward that is $99.25\%$ of its optimal, non-deceptive value.
△ Less
Submitted 30 January, 2025;
originally announced January 2025.
-
Distributed Asynchronous Time-Varying Quadratic Programming with Asynchronous Objective Sampling
Authors:
Gabriel Behrendt,
Zachary I. Bell,
Matthew Hale
Abstract:
We present a distributed algorithm to track the fixed points of time-varying quadratic programs when agents can (i) sample their objective function asynchronously, (ii) compute new iterates asynchronously, and (iii) communicate asynchronously. We show that even for a time-varying strongly convex quadratic program, asynchronous sampling of objectives can cause agents to minimize a certain form of n…
▽ More
We present a distributed algorithm to track the fixed points of time-varying quadratic programs when agents can (i) sample their objective function asynchronously, (ii) compute new iterates asynchronously, and (iii) communicate asynchronously. We show that even for a time-varying strongly convex quadratic program, asynchronous sampling of objectives can cause agents to minimize a certain form of nonconvex "aggregate" objective function. Then, we show that by minimizing the aggregate objective, agents still track the solution of the original quadratic program to within an error ball dependent upon (i) agents' tracking error when solving the aggregate problem, and (ii) the time variation of the original quadratic objective. Lastly, we show that this work generalizes existing work, in the sense that synchronizing the agents' behaviors recovers existing convergence results (up to constants). Simulations show the robustness of our algorithm to asynchrony.
△ Less
Submitted 18 November, 2024;
originally announced November 2024.
-
Distributed Asynchronous Mixed-Integer Linear Programming with Feasibility Guarantees
Authors:
Luke Fina,
Christopher Petersen,
Matthew Hale
Abstract:
In this paper we solve mixed-integer linear programs (MILPs) via distributed asynchronous saddle point computation. This work is motivated by the MILPs being able to model problems in multi-agent autonomy, such as task assignment problems and trajectory planning with collision avoidance constraints in multi-robot systems. To solve a MILP, we relax it with a linear program approximation. We first s…
▽ More
In this paper we solve mixed-integer linear programs (MILPs) via distributed asynchronous saddle point computation. This work is motivated by the MILPs being able to model problems in multi-agent autonomy, such as task assignment problems and trajectory planning with collision avoidance constraints in multi-robot systems. To solve a MILP, we relax it with a linear program approximation. We first show that if the linear program relaxation satisfies Slater's condition, then relaxing the problem, solving it, and rounding the relaxed solution produces a point that is guaranteed to satisfy the constraints of the original MILP. Next, we form a Lagrangian saddle point problem that is equivalent to the linear program relaxation, and then we regularize the Lagrangian in both the primal and dual spaces. Doing so gives a regularized Lagrangian that is strongly convex-strongly concave. We then develop a parallelized algorithm to compute saddle points of the regularized Lagrangian, and we show that it is tolerant to asynchrony in the computations and communications of primal and dual variables. Suboptimality bounds and convergence rates are presented for convergence to a saddle point. The suboptimality bound accounts for (i) the error induced by regularizing the Lagrangian and (ii) the suboptimality gap between the solution to the original MILP and the solution to its relaxed form. Simulation results illustrate these theoretical developments in practice, and show that relaxation and regularization combined typically have only a mild impact on the suboptimality of the solution obtained.
△ Less
Submitted 27 September, 2024;
originally announced October 2024.
-
Guaranteed Feasibility in Differentially Private Linearly Constrained Convex Optimization
Authors:
Alexander Benvenuti,
Brendan Bialy,
Miriam Dennis,
Matthew Hale
Abstract:
Convex programming with linear constraints plays an important role in the operation of a number of everyday systems. However, absent any additional protections, revealing or acting on the solutions to such problems may reveal information about their constraints, which can be sensitive. Therefore, in this paper, we introduce a method for solving convex programs while keeping linear constraints priv…
▽ More
Convex programming with linear constraints plays an important role in the operation of a number of everyday systems. However, absent any additional protections, revealing or acting on the solutions to such problems may reveal information about their constraints, which can be sensitive. Therefore, in this paper, we introduce a method for solving convex programs while keeping linear constraints private. First, we prove that this method is differentially private and always generates a feasible optimization problem (i.e., one whose solution exists). Then we show that the solution to the privatized problem also satisfies the original, non-private constraints. Next, we bound the expected loss in performance from privacy, which is measured by comparing the cost with privacy to that without privacy. Simulation results apply this framework to constrained policy synthesis in a Markov decision process, and they show that a typical privacy implementation induces only an approximately $9\%$ loss in solution quality.
△ Less
Submitted 12 September, 2024;
originally announced September 2024.
-
Technical Report: A Totally Asynchronous Nesterov's Accelerated Gradient Method for Convex Optimization
Authors:
Ellie Pond,
April Sebok,
Zachary Bell,
Matthew Hale
Abstract:
We present a totally asynchronous algorithm for convex optimization that is based on a novel generalization of Nesterov's accelerated gradient method. This algorithm is developed for fast convergence under "total asynchrony," i.e., allowing arbitrarily long delays between agents' computations and communications without assuming any form of delay bound. These conditions may arise, for example, due…
▽ More
We present a totally asynchronous algorithm for convex optimization that is based on a novel generalization of Nesterov's accelerated gradient method. This algorithm is developed for fast convergence under "total asynchrony," i.e., allowing arbitrarily long delays between agents' computations and communications without assuming any form of delay bound. These conditions may arise, for example, due to jamming by adversaries. Our framework is block-based, in the sense that each agent is only responsible for computing updates to (and communicating the values of) a small subset of the network-level decision variables. In our main result, we present bounds on the algorithm's parameters that guarantee linear convergence to an optimizer. Then, we quantify the relationship between (i) the total number of computations and communications executed by the agents and (ii) the agents' collective distance to an optimum. Numerical simulations show that this algorithm requires 28% fewer iterations than the heavy ball algorithm and 61% fewer iterations than gradient descent under total asynchrony.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
Technical Report: Pose Graph Optimization over Planar Unit Dual Quaternions: Improved Accuracy with Provably Convergent Riemannian Optimization
Authors:
William D. Warke,
J. Humberto Ramos,
Prashant Ganesh,
Kevin M. Brink,
Matthew T. Hale
Abstract:
It is common in pose graph optimization (PGO) algorithms to assume that noise in the translations and rotations of relative pose measurements is uncorrelated. However, existing work shows that in practice these measurements can be highly correlated, which leads to degradation in the accuracy of PGO solutions that rely on this assumption. Therefore, in this paper we develop a novel algorithm derive…
▽ More
It is common in pose graph optimization (PGO) algorithms to assume that noise in the translations and rotations of relative pose measurements is uncorrelated. However, existing work shows that in practice these measurements can be highly correlated, which leads to degradation in the accuracy of PGO solutions that rely on this assumption. Therefore, in this paper we develop a novel algorithm derived from a realistic, correlated model of relative pose uncertainty, and we quantify the resulting improvement in the accuracy of the solutions we obtain relative to state-of-the-art PGO algorithms. Our approach utilizes Riemannian optimization on the planar unit dual quaternion (PUDQ) manifold, and we prove that it converges to first-order stationary points of a Lie-theoretic maximum likelihood objective. Then we show experimentally that, compared to state-of-the-art PGO algorithms, this algorithm produces estimation errors that are lower by 10% to 25% across several orders of magnitude of noise levels and graph sizes.
△ Less
Submitted 28 January, 2025; v1 submitted 9 March, 2024;
originally announced April 2024.
-
A Compositional Framework for First-Order Optimization
Authors:
Tyler Hanks,
Matthew Klawonn,
Evan Patterson,
Matthew Hale,
James Fairbanks
Abstract:
Optimization decomposition methods are a fundamental tool to develop distributed solution algorithms for large scale optimization problems arising in fields such as machine learning and optimal control. In this paper, we present an algebraic framework for hierarchically composing optimization problems defined on hypergraphs and automatically generating distributed solution algorithms that respect…
▽ More
Optimization decomposition methods are a fundamental tool to develop distributed solution algorithms for large scale optimization problems arising in fields such as machine learning and optimal control. In this paper, we present an algebraic framework for hierarchically composing optimization problems defined on hypergraphs and automatically generating distributed solution algorithms that respect the given hierarchical structure. The central abstractions of our framework are operads, operad algebras, and algebra morphisms, which formalize notions of syntax, semantics, and structure preserving semantic transformations respectively. These abstractions allow us to formally relate composite optimization problems to the distributed algorithms that solve them. Specifically, we show that certain classes of optimization problems form operad algebras, and a collection of first-order solution methods, namely gradient descent, Uzawa's algorithm (also called gradient ascent-descent), and their subgradient variants, yield algebra morphisms from these problem algebras to algebras of dynamical systems. Primal and dual decomposition methods are then recovered by applying these morphisms to certain classes of composite problems. Using this framework, we also derive a novel sufficient condition for when a problem defined by compositional data is solvable by a decomposition method. We show that the minimum cost network flow problem satisfies this condition, thereby allowing us to automatically derive a hierarchical dual decomposition algorithm for finding minimum cost flows on composite flow networks. We implement our operads, algebras, and algebra morphisms in a Julia package called AlgebraicOptimization.jl and use our implementation to empirically demonstrate that hierarchical dual decomposition outperforms standard dual decomposition on classes of flow networks with hierarchical structure.
△ Less
Submitted 8 March, 2024;
originally announced March 2024.
-
Distributed Asynchronous Discrete-Time Feedback Optimization
Authors:
Gabriel Behrendt,
Matthew Longmire,
Zachary I. Bell,
Matthew Hale
Abstract:
In this article, we present an algorithm that drives the outputs of a network of agents to jointly track the solutions of time-varying optimization problems in a way that is robust to asynchrony in the agents' operations. We consider three operations that can be asynchronous: (1) computations of control inputs, (2) measurements of network outputs, and (3) communications of agents' inputs and outpu…
▽ More
In this article, we present an algorithm that drives the outputs of a network of agents to jointly track the solutions of time-varying optimization problems in a way that is robust to asynchrony in the agents' operations. We consider three operations that can be asynchronous: (1) computations of control inputs, (2) measurements of network outputs, and (3) communications of agents' inputs and outputs. We first show that our algorithm converges to the solution of a time-invariant feedback optimization problem in linear time. Next, we show that our algorithm drives outputs to track the solution of time-varying feedback optimization problems within a bounded error dependent upon the movement of the minimizers and degree of asynchrony in a way that we make precise. These convergence results are extended to quantify agents' asymptotic behavior as the length of their time horizon approaches infinity. Then, to ensure satisfactory network performance, we specify the timing of agents' operations relative to changes in the objective function that ensure a desired error bound. Numerical experiments confirm these developments and show the success of our distributed feedback optimization algorithm under asynchrony.
△ Less
Submitted 1 December, 2023;
originally announced December 2023.
-
Modeling Model Predictive Control: A Category Theoretic Framework for Multistage Control Problems
Authors:
Tyler Hanks,
Baike She,
Matthew Hale,
Evan Patterson,
Matthew Klawonn,
James Fairbanks
Abstract:
Model predictive control (MPC) is an optimal control technique which involves solving a sequence of constrained optimization problems across a given time horizon. In this paper, we introduce a category theoretic framework for constructing complex MPC problem formulations by composing subproblems. Specifically, we construct a monoidal category - called Para(Conv) - whose objects are Euclidean space…
▽ More
Model predictive control (MPC) is an optimal control technique which involves solving a sequence of constrained optimization problems across a given time horizon. In this paper, we introduce a category theoretic framework for constructing complex MPC problem formulations by composing subproblems. Specifically, we construct a monoidal category - called Para(Conv) - whose objects are Euclidean spaces and whose morphisms represent constrained convex optimization problems. We then show that the multistage structure of typical MPC problems arises from sequential composition in Para(Conv), while parallel composition can be used to model constraints across multiple stages of the prediction horizon. This framework comes equipped with a rigorous, diagrammatic syntax, allowing for easy visualization and modification of complex problems. Finally, we show how this framework allows a simple software realization in the Julia programming language by integrating with existing mathematical programming libraries to provide high-level, graphical abstractions for MPC.
△ Less
Submitted 9 March, 2024; v1 submitted 5 May, 2023;
originally announced May 2023.
-
Anomaly Search Over Many Sequences With Switching Costs
Authors:
Matthew Ubl,
Benjamin D. Robinson,
Matthew T. Hale
Abstract:
This paper considers the quickest search problem to identify anomalies among large numbers of data streams. These streams can model, for example, disjoint regions monitored by a mobile robot. A particular challenge is a version of the problem in which the experimenter must suffer a cost each time the data stream being sampled changes, such as the time the robot must spend moving between regions. I…
▽ More
This paper considers the quickest search problem to identify anomalies among large numbers of data streams. These streams can model, for example, disjoint regions monitored by a mobile robot. A particular challenge is a version of the problem in which the experimenter must suffer a cost each time the data stream being sampled changes, such as the time the robot must spend moving between regions. In this paper, we propose an algorithm which accounts for switching costs by varying a confidence threshold that governs when the algorithm switches to a new data stream. Our main contributions are easily computable approximations for both the optimal value of this threshold and the optimal value of the parameter that determines when a stream must be re-sampled. Further, we empirically show (i) a uniform improvement for switching costs of interest and (ii) roughly equivalent performance for small switching costs when comparing to the closest available algorithm.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
Node and Edge Differential Privacy for Graph Laplacian Spectra: Mechanisms and Scaling Laws
Authors:
Calvin Hawkins,
Bo Chen,
Kasra Yazdani,
Matthew Hale
Abstract:
This paper develops a framework for privatizing the spectrum of the graph Laplacian of an undirected graph using differential privacy. We consider two privacy formulations. The first obfuscates the presence of edges in the graph and the second obfuscates the presence of nodes. We compare these two privacy formulations and show that the privacy formulation that considers edges is better suited to m…
▽ More
This paper develops a framework for privatizing the spectrum of the graph Laplacian of an undirected graph using differential privacy. We consider two privacy formulations. The first obfuscates the presence of edges in the graph and the second obfuscates the presence of nodes. We compare these two privacy formulations and show that the privacy formulation that considers edges is better suited to most engineering applications. We use the bounded Laplace mechanism to provide differential privacy to the eigenvalues of a graph Laplacian, and we pay special attention to the algebraic connectivity, which is the Laplacian's second smallest eigenvalue. Analytical bounds are presented on the the accuracy of the mechanisms and on certain graph properties computed with private spectra. A suite of numerical examples confirms the accuracy of private spectra in practice.
△ Less
Submitted 28 November, 2022;
originally announced November 2022.
-
Technical Report: Distributed Asynchronous Large-Scale Mixed-Integer Linear Programming via Saddle Point Computation
Authors:
Luke Fina,
Matthew Hale
Abstract:
We solve large-scale mixed-integer linear programs (MILPs) via distributed asynchronous saddle point computation. This is motivated by the MILPs being able to model problems in multi-agent autonomy, e.g., task assignment problems and trajectory planning with collision avoidance constraints in multi-robot systems. To solve a MILP, we relax it with a nonlinear program approximation whose accuracy ti…
▽ More
We solve large-scale mixed-integer linear programs (MILPs) via distributed asynchronous saddle point computation. This is motivated by the MILPs being able to model problems in multi-agent autonomy, e.g., task assignment problems and trajectory planning with collision avoidance constraints in multi-robot systems. To solve a MILP, we relax it with a nonlinear program approximation whose accuracy tightens as the number of agents increases relative to the number of coupled constraints. Next, we form an equivalent Lagrangian saddle point problem, and then regularize the Lagrangian in both the primal and dual spaces to create a regularized Lagrangian that is strongly-convex-strongly-concave. We then develop a parallelized algorithm to compute saddle points of the regularized Lagrangian. This algorithm partitions problems into blocks, which are either scalars or sub-vectors of the primal or dual decision variables, and it is shown to tolerate asynchrony in the computations and communications of primal and dual variables. Suboptimality bounds and convergence rates are presented for convergence to a saddle point. The suboptimality bound includes (i) the regularization error induced by regularizing the Lagrangian and (ii) the suboptimality gap between solutions to the original MILP and its relaxed form. Simulation results illustrate these theoretical developments in practice, and show that relaxation and regularization together have only a mild impact on the quality of solution obtained.
△ Less
Submitted 21 November, 2022;
originally announced November 2022.
-
Autonomous Satellite Rendezvous and Proximity Operations with Time-Constrained Sub-Optimal Model Predictive Control
Authors:
Gabriel Behrendt,
Alexander Soderlund,
Matthew Hale,
Sean Phillips
Abstract:
This paper presents a time-constrained model predictive control strategy for the 6 degree-of-freedom (6DOF) autonomous rendezvous and docking problem between a controllable "deputy" spacecraft and an uncontrollable "chief" spacecraft. The control strategy accounts for computational time constraints due to limited onboard processing speed. The translational dynamics model is derived from the Clohes…
▽ More
This paper presents a time-constrained model predictive control strategy for the 6 degree-of-freedom (6DOF) autonomous rendezvous and docking problem between a controllable "deputy" spacecraft and an uncontrollable "chief" spacecraft. The control strategy accounts for computational time constraints due to limited onboard processing speed. The translational dynamics model is derived from the Clohessy-Wiltshire equations and the angular dynamics are modeled on gas jet actuation about the deputy's center of mass. Simulation results are shown to achieve the docking configuration under computational time constraints by limiting the number of allowed algorithm iterations when computing each input. Specifically, we show that upwards of 90% of computations can be eliminated from a model predictive control implementation without significantly harming control performance.
△ Less
Submitted 21 November, 2022;
originally announced November 2022.
-
Differentially Private Formation Control: Privacy and Network Co-Design
Authors:
Calvin Hawkins,
Matthew Hale
Abstract:
As multi-agent systems proliferate, there is increasing need for coordination protocols that protect agents' sensitive information while still allowing them to collaborate. Often, a network system and controller are first designed and implemented, and then privacy is only incorporated after that. However, the absence of privacy from the design process can make it difficult to implement without sig…
▽ More
As multi-agent systems proliferate, there is increasing need for coordination protocols that protect agents' sensitive information while still allowing them to collaborate. Often, a network system and controller are first designed and implemented, and then privacy is only incorporated after that. However, the absence of privacy from the design process can make it difficult to implement without significantly harming system performance. To help address this need, this paper presents a co-design framework for multi-agent networks and private controllers that we apply to the problem of private formation control. Agents' state trajectories are protected using differential privacy, which is a statistical notion of privacy that protects data by adding noise to it. Privacy noise alters the performance of the network, which we quantify by computing a bound for the steady-state error for private formations. Then, we analyze tradeoffs between privacy level, system performance, and connectedness of the network's communication topology. These trade-offs are used to formulate a co-design optimization framework to design the optimal communication topology alongside the optimal privacy parameters for a network running differentially private formation control. Simulation results illustrate the scalability of our proposed privacy/network co-design problem to large multi-agent networks, as well as the high quality of formations one can attain, even with privacy implemented.
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
Linear Regularizers Enforce the Strict Saddle Property
Authors:
Matthew Ubl,
Kasra Yazdani,
Matthew T. Hale
Abstract:
Satisfaction of the strict saddle property has become a standard assumption in non-convex optimization, and it ensures that many first-order optimization algorithms will almost always escape saddle points. However, functions exist in machine learning that do not satisfy this property, such as the loss function of a neural network with at least two hidden layers. First-order methods such as gradien…
▽ More
Satisfaction of the strict saddle property has become a standard assumption in non-convex optimization, and it ensures that many first-order optimization algorithms will almost always escape saddle points. However, functions exist in machine learning that do not satisfy this property, such as the loss function of a neural network with at least two hidden layers. First-order methods such as gradient descent may converge to non-strict saddle points of such functions, and there do not currently exist any first-order methods that reliably escape non-strict saddle points. To address this need, we demonstrate that regularizing a function with a linear term enforces the strict saddle property, and we provide justification for only regularizing locally, i.e., when the norm of the gradient falls below a certain threshold. We analyze bifurcations that may result from this form of regularization, and then we provide a selection rule for regularizers that depends only on the gradient of an objective function. This rule is shown to guarantee that gradient descent will escape the neighborhoods around a broad class of non-strict saddle points, and this behavior is demonstrated on numerical examples of non-strict saddle points common in the optimization literature.
△ Less
Submitted 19 August, 2022; v1 submitted 18 May, 2022;
originally announced May 2022.
-
Faster Asynchronous Nonconvex Block Coordinate Descent with Locally Chosen Stepsizes
Authors:
Matthew Ubl,
Matthew T. Hale
Abstract:
Distributed nonconvex optimization problems underlie many applications in learning and autonomy, and such problems commonly face asynchrony in agents' computations and communications. When delays in these operations are bounded, they are called partially asynchronous. In this paper, we present an uncoordinated stepsize selection rule for partially asynchronous block coordinate descent that only re…
▽ More
Distributed nonconvex optimization problems underlie many applications in learning and autonomy, and such problems commonly face asynchrony in agents' computations and communications. When delays in these operations are bounded, they are called partially asynchronous. In this paper, we present an uncoordinated stepsize selection rule for partially asynchronous block coordinate descent that only requires local information to implement, and it leads to faster convergence for a class of nonconvex problems than existing stepsize rules, which require global information in some form. The problems we consider satisfy the error bound condition, and the stepsize rule we present only requires each agent to know (i) a certain type of Lipschitz constant of its block of the gradient of the objective and (ii) the communication delays experienced between it and its neighbors. This formulation requires less information to be available to each agent than existing approaches, typically allows for agents to use much larger stepsizes, and alleviates the impact of stragglers while still guaranteeing convergence to a stationary point. Simulation results provide comparisons and validate the faster convergence attained by the stepsize rule we develop.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
Technical Report: A Totally Asynchronous Algorithm for Tracking Solutions to Time-Varying Convex Optimization Problems
Authors:
Gabriel Behrendt,
Matthew Hale
Abstract:
This paper presents a decentralized algorithm for a team of agents to track time-varying fixed points that are the solutions to time-varying convex optimization problems. The algorithm is first-order, and it allows for total asynchrony in the communications and computations of all agents, i.e., all such operations can occur with arbitrary timing and arbitrary (finite) delays. Convergence rates are…
▽ More
This paper presents a decentralized algorithm for a team of agents to track time-varying fixed points that are the solutions to time-varying convex optimization problems. The algorithm is first-order, and it allows for total asynchrony in the communications and computations of all agents, i.e., all such operations can occur with arbitrary timing and arbitrary (finite) delays. Convergence rates are computed in terms of the communications and computations that agents execute, without specifying when they must occur. These rates apply to convergence to the minimum of each individual objective function, as well as agents' long-run behavior as their objective functions change. Then, to improve the usage of limited communication and computation resources, we optimize the timing of agents' operations relative to changes in their objective functions to minimize total fixed point tracking error over time. Simulation results are presented to illustrate these developments in practice and empirically assess their robustness to uncertainties in agents' update laws.
△ Less
Submitted 13 October, 2021;
originally announced October 2021.
-
Totally Asynchronous Primal-Dual Convex Optimization in Blocks
Authors:
Katherine Hendrickson,
Matthew Hale
Abstract:
We present a parallelized primal-dual algorithm for solving constrained convex optimization problems. The algorithm is "block-based," in that vectors of primal and dual variables are partitioned into blocks, each of which is updated only by a single processor. We consider four possible forms of asynchrony: in updates to primal variables, updates to dual variables, communications of primal variable…
▽ More
We present a parallelized primal-dual algorithm for solving constrained convex optimization problems. The algorithm is "block-based," in that vectors of primal and dual variables are partitioned into blocks, each of which is updated only by a single processor. We consider four possible forms of asynchrony: in updates to primal variables, updates to dual variables, communications of primal variables, and communications of dual variables. We construct a family of explicit counterexamples to show the need to eliminate asynchronous communication of dual variables, though the other forms of asynchrony are permitted, all without requiring bounds on delays. A first-order primal-dual update law is developed and shown to be robust to asynchrony. We then derive convergence rates to a Lagrangian saddle point in terms of the operations agents execute, without specifying any timing or pattern with which they must be executed. These convergence rates include an "asynchrony penalty" that we quantify and present ways to mitigate. Numerical results illustrate these developments.
△ Less
Submitted 3 May, 2022; v1 submitted 21 July, 2021;
originally announced July 2021.
-
Exponentially Converging Distributed Gradient Descent with Intermittent Communication via Hybrid Methods
Authors:
Katherine Hendrickson,
Dawn Hustig-Schultz,
Matthew Hale,
Ricardo G. Sanfelice
Abstract:
We present a hybrid systems framework for multi-agent optimization in which agents execute computations in continuous time and communicate in discrete time. The optimization algorithm is a hybrid version of parallelized coordinate descent. Agents implement a sample-and-hold strategy in which gradients are computed at communication times and held constant during flows between communications. Comple…
▽ More
We present a hybrid systems framework for multi-agent optimization in which agents execute computations in continuous time and communicate in discrete time. The optimization algorithm is a hybrid version of parallelized coordinate descent. Agents implement a sample-and-hold strategy in which gradients are computed at communication times and held constant during flows between communications. Completeness of maximal solutions under these hybrid dynamics is established. Under assumptions of smoothness and strong convexity, we show that this system exponentially converges to the minimizer of an objective function. Simulation results illustrate this convergence rate.
△ Less
Submitted 30 September, 2021; v1 submitted 20 April, 2021;
originally announced April 2021.
-
Asynchronous Parallel Nonconvex Optimization Under the Polyak-Lojasiewicz Condition
Authors:
Kasra Yazdani,
Matthew Hale
Abstract:
Communication delays and synchronization are major bottlenecks for parallel computing, and tolerating asynchrony is therefore crucial for accelerating parallel computation. Motivated by optimization problems that do not satisfy convexity assumptions, we present an asynchronous block coordinate descent algorithm for nonconvex optimization problems whose objective functions satisfy the Polyak-Lojasi…
▽ More
Communication delays and synchronization are major bottlenecks for parallel computing, and tolerating asynchrony is therefore crucial for accelerating parallel computation. Motivated by optimization problems that do not satisfy convexity assumptions, we present an asynchronous block coordinate descent algorithm for nonconvex optimization problems whose objective functions satisfy the Polyak-Lojasiewicz condition. This condition is a generalization of strong convexity to nonconvex problems and requires neither convexity nor uniqueness of minimizers. Under only assumptions of mild smoothness of objective functions and bounded delays, we prove that a linear convergence rate is obtained. Numerical experiments for logistic regression problems are presented to illustrate the impact of asynchrony upon convergence.
△ Less
Submitted 23 May, 2021; v1 submitted 8 February, 2021;
originally announced February 2021.
-
Totally Asynchronous Large-Scale Quadratic Programming: Regularization, Convergence Rates, and Parameter Selection
Authors:
Matthew Ubl,
Matthew T. Hale
Abstract:
Quadratic programs arise in robotics, communications, smart grids, and many other applications. As these problems grow in size, finding solutions becomes more computationally demanding, and new algorithms are needed to efficiently solve them at massive scales. Targeting large-scale problems, we develop a multi-agent quadratic programming framework in which each agent updates only a small number of…
▽ More
Quadratic programs arise in robotics, communications, smart grids, and many other applications. As these problems grow in size, finding solutions becomes more computationally demanding, and new algorithms are needed to efficiently solve them at massive scales. Targeting large-scale problems, we develop a multi-agent quadratic programming framework in which each agent updates only a small number of the total decision variables in a problem. Agents communicate their updated values to each other, though we do not impose any restrictions on the timing with which they do so, nor on the delays in these transmissions. Furthermore, we allow weak parametric coupling among agents, in the sense that they are free to independently choose their step sizes, subject to mild restrictions. We further provide the means for agents to independently regularize the problems they solve, thereby improving convergence properties while preserving agents' independence in selecting parameters and ensuring a global bound on regularization error is satisfied. Larger regularizations accelerate convergence but increase error in the solution obtained, and we quantify the trade off between convergence rates and quality of solutions. Simulation results are presented to illustrate these developments.
△ Less
Submitted 15 June, 2020;
originally announced June 2020.
-
Towards Totally Asynchronous Primal-Dual Convex Optimization in Blocks
Authors:
Katherine Hendrickson,
Matthew Hale
Abstract:
We present a parallelized primal-dual algorithm for solving constrained convex optimization problems. The algorithm is "block-based," in that vectors of primal and dual variables are partitioned into blocks, each of which is updated only by a single processor. We consider four possible forms of asynchrony: in updates to primal variables, updates to dual variables, communications of primal variable…
▽ More
We present a parallelized primal-dual algorithm for solving constrained convex optimization problems. The algorithm is "block-based," in that vectors of primal and dual variables are partitioned into blocks, each of which is updated only by a single processor. We consider four possible forms of asynchrony: in updates to primal variables, updates to dual variables, communications of primal variables, and communications of dual variables. We explicitly construct a family of counterexamples to rule out permitting asynchronous communication of dual variables, though the other forms of asynchrony are permitted, all without requiring bounds on delays. A first-order update law is developed and shown to be robust to asynchrony. We then derive convergence rates to a Lagrangian saddle point in terms of the operations agents execute, without specifying any timing or pattern with which they must be executed. These convergence rates contain a synchronous algorithm as a special case and are used to quantify an "asynchrony penalty." Numerical results illustrate these developments.
△ Less
Submitted 28 August, 2020; v1 submitted 10 April, 2020;
originally announced April 2020.
-
Differentially Private Formation Control
Authors:
Calvin Hawkins,
Matthew Hale
Abstract:
As multi-agent systems proliferate, there is increasing demand for coordination protocols that protect agents' sensitive information while allowing them to collaborate. To help address this need, this paper presents a differentially private formation control framework. Agents' state trajectories are protected using differential privacy, which is a statistical notion of privacy that protects data b…
▽ More
As multi-agent systems proliferate, there is increasing demand for coordination protocols that protect agents' sensitive information while allowing them to collaborate. To help address this need, this paper presents a differentially private formation control framework. Agents' state trajectories are protected using differential privacy, which is a statistical notion of privacy that protects data by adding noise to it. We provide a private formation control implementation and analyze the impact of privacy upon the system. Specifically, we quantify tradeoffs between privacy level, system performance, and connectedness of the network's communication topology. These tradeoffs are used to develop guidelines for calibrating privacy in terms of control theoretic quantities, such as steady-state error, without requiring in-depth knowledge of differential privacy. Additional guidelines are also developed for treating privacy levels and network topologies as design parameters to tune the network's performance. Simulation results illustrate these tradeoffs and show that strict privacy is inherently compatible with strong system performance.
△ Less
Submitted 13 September, 2020; v1 submitted 6 April, 2020;
originally announced April 2020.
-
Non-Asymptotic Connectivity of Random Graphs and Their Unions
Authors:
Beth Bjorkman,
Matthew Hale,
Thomas Lamkin,
Benjamin Robinson,
Craig Thompson
Abstract:
Graph-theoretic methods have seen wide use throughout the literature on multi-agent control and optimization. When communications are intermittent and unpredictable, such networks have been modeled using random communication graphs. When graphs are time-varying, it is common to assume that their unions are connected over time, yet, to the best of our knowledge, there are not results that determine…
▽ More
Graph-theoretic methods have seen wide use throughout the literature on multi-agent control and optimization. When communications are intermittent and unpredictable, such networks have been modeled using random communication graphs. When graphs are time-varying, it is common to assume that their unions are connected over time, yet, to the best of our knowledge, there are not results that determine the number of finite-size random graphs needed to attain a connected union. Therefore, this paper bounds the probability that individual random graphs are connected and bounds the same probability for connectedness of unions of random graphs. The random graph model used is a generalization of the classic Erdos-Renyi model which allows some edges never to appear. Numerical results are presented to illustrate the analytical developments made.
△ Less
Submitted 11 August, 2020; v1 submitted 12 November, 2019;
originally announced November 2019.
-
Bidirectional Information Flow and the Roles of Privacy Masks in Cloud-Based Control
Authors:
Ali Reza Pedram,
Takashi Tanaka,
Matthew Hale
Abstract:
We consider a cloud-based control architecture for a linear plant with Gaussian process noise, where the state of the plant contains a client's sensitive information. We assume that the cloud tries to estimate the state while executing a designated control algorithm. The mutual information between the client's actual state and the cloud's estimate is adopted as a measure of privacy loss. We discus…
▽ More
We consider a cloud-based control architecture for a linear plant with Gaussian process noise, where the state of the plant contains a client's sensitive information. We assume that the cloud tries to estimate the state while executing a designated control algorithm. The mutual information between the client's actual state and the cloud's estimate is adopted as a measure of privacy loss. We discuss the necessity of uplink and downlink privacy masks. After observing that privacy is not necessarily a monotone function of the noise levels of privacy masks, we discuss the joint design procedure for uplink and downlink privacy masks. Finally, the trade-off between privacy and control performance is explored.
△ Less
Submitted 17 May, 2019;
originally announced May 2019.
-
Totally Asynchronous Distributed Quadratic Programming with Independent Stepsizes and Regularizations
Authors:
Matthew Ubl,
Matthew Hale
Abstract:
Quadratic programs arise in robotics, communications, smart grids, and many other applications. As these problems grow in size, finding solutions becomes much more computationally demanding, and new algorithms are needed to efficiently solve them. Targeting large-scale problems, we develop a multi-agent quadratic programming framework in which each agent updates only a small number of the total de…
▽ More
Quadratic programs arise in robotics, communications, smart grids, and many other applications. As these problems grow in size, finding solutions becomes much more computationally demanding, and new algorithms are needed to efficiently solve them. Targeting large-scale problems, we develop a multi-agent quadratic programming framework in which each agent updates only a small number of the total decision variables in a problem. Agents communicate their updated values to each other, though we do not impose any restrictions on the timing with which they do so, nor on the delays in these transmissions. Furthermore, we allow weak parametric coupling among agents, in the sense that they are free to independently choose their stepsizes, subject to mild restrictions. We show that these stepsize restrictions depend upon a problem's condition number. We further provide the means for agents to independently regularize the problem they solve, thereby improving condition numbers and, as we will show, convergence properties, while preserving agents' independence in selecting parameters. Simulation results are provided to demonstrate the success of this framework on a practical quadratic program.
△ Less
Submitted 20 March, 2019;
originally announced March 2019.
-
Error Bounds and Guidelines for Privacy Calibration in Differentially Private Kalman Filtering
Authors:
Kasra Yazdani,
Matthew Hale
Abstract:
Differential privacy has emerged as a formal framework for protecting sensitive information in control systems. One key feature is that it is immune to post-processing, which means that arbitrary post-hoc computations can be performed on privatized data without weakening differential privacy. It is therefore common to filter private data streams. To characterize this setup, in this paper we presen…
▽ More
Differential privacy has emerged as a formal framework for protecting sensitive information in control systems. One key feature is that it is immune to post-processing, which means that arbitrary post-hoc computations can be performed on privatized data without weakening differential privacy. It is therefore common to filter private data streams. To characterize this setup, in this paper we present error and entropy bounds for Kalman filtering differentially private state trajectories. We consider systems in which an output trajectory is privatized in order to protect the state trajectory that produced it. We provide bounds on a priori and a posteriori error and differential entropy of a Kalman filter which is processing the privatized output trajectories. Using the error bounds we develop, we then provide guidelines to calibrate privacy levels in order to keep filter error within pre-specified bounds. Simulation results are presented to demonstrate these developments.
△ Less
Submitted 23 September, 2019; v1 submitted 19 March, 2019;
originally announced March 2019.
-
Differentially Private Smart Metering: Implementation, Analytics, and Billing
Authors:
Matthew Hale,
Prabir Barooah,
Kendall Parker,
Kasra Yazdani
Abstract:
Smart power grids offer to revolutionize power distribution by sharing granular power usage data, though this same data sharing can reveal a great deal about users, and there are serious privacy concerns for customers. In this paper, we address these concerns using differential privacy. Differential privacy is a statistical notion of privacy that adds carefully-calibrated noise to sensitive data b…
▽ More
Smart power grids offer to revolutionize power distribution by sharing granular power usage data, though this same data sharing can reveal a great deal about users, and there are serious privacy concerns for customers. In this paper, we address these concerns using differential privacy. Differential privacy is a statistical notion of privacy that adds carefully-calibrated noise to sensitive data before sharing it, and we apply it to provide strong privacy guarantees to individual customers. Under this implementation, we quantify the impact of privacy upon smart grid analytics, which are of interest to utilities, to quantify the loss in accuracy incurred by privacy. Simultaneously, we quantify the financial impact of privacy through bounding deviations in customers' utility bills. Simulation results are provided using actual power usage data, demonstrating the viability of this approach in practice.
△ Less
Submitted 17 February, 2019;
originally announced February 2019.
-
Stability and Sustainability of Resource Consumption Networks
Authors:
Matthew T. Hale,
Sebastian F. Ruf,
Talha Manzoor,
Abubakr Muhammad
Abstract:
In this paper, we examine both stability and sustainability of a network-based model of natural resource consumption. Stability is studied from a dynamical systems perspective, though we argue that sustainability is a fundamentally different notion from stability in social-ecological systems. Accordingly, we also present a criterion for sustainability that is guided by the existing literature on s…
▽ More
In this paper, we examine both stability and sustainability of a network-based model of natural resource consumption. Stability is studied from a dynamical systems perspective, though we argue that sustainability is a fundamentally different notion from stability in social-ecological systems. Accordingly, we also present a criterion for sustainability that is guided by the existing literature on sustainable development. Assuming a generic social network of consuming agents' interactions, we derive sufficient conditions for both the stability and sustainability of the model as constraints on the network structure itself. We complement these analytical results with numerical simulations and discuss the implications of our findings for policy-making for sustainable resource governance.
△ Less
Submitted 10 January, 2019;
originally announced January 2019.
-
Towards Differential Privacy for Symbolic Systems
Authors:
Austin Jones,
Kevin Leahy,
Matthew Hale
Abstract:
In this paper, we develop a privacy implementation for symbolic control systems. Such systems generate sequences of non-numerical data, and these sequences can be represented by words or strings over a finite alphabet. This work uses the framework of differential privacy, which is a statistical notion of privacy that makes it unlikely that privatized data will reveal anything meaningful about unde…
▽ More
In this paper, we develop a privacy implementation for symbolic control systems. Such systems generate sequences of non-numerical data, and these sequences can be represented by words or strings over a finite alphabet. This work uses the framework of differential privacy, which is a statistical notion of privacy that makes it unlikely that privatized data will reveal anything meaningful about underlying sensitive data. To bring differential privacy to symbolic control systems, we develop an exponential mechanism that approximates a sensitive word using a randomly chosen word that is likely to be near it. The notion of "near" is given by the Levenshtein distance, which counts the number of operations required to change one string into another. We then develop a Levenshtein automaton implementation of our exponential mechanism that efficiently generates privatized output words. This automaton has letters as its states, and this work develops transition probabilities among these states that give overall output words obeying the distribution required by the exponential mechanism. Numerical results are provided to demonstrate this technique for both strings of English words and runs of a deterministic transition system, demonstrating in both cases that privacy can be provided in this setting while maintaining a reasonable degree of accuracy.
△ Less
Submitted 23 September, 2018;
originally announced September 2018.
-
Differentially Private LQ Control
Authors:
Kasra Yazdani,
Austin Jones,
Kevin Leahy,
Matthew Hale
Abstract:
As multi-agent systems proliferate and share more user data, new approaches are needed to protect sensitive data while still enabling system operation. To address this need, this paper presents a private multi-agent LQ control framework. Agents' state trajectories can be sensitive and we therefore protect them using differential privacy. We quantify the impact of privacy along three dimensions: th…
▽ More
As multi-agent systems proliferate and share more user data, new approaches are needed to protect sensitive data while still enabling system operation. To address this need, this paper presents a private multi-agent LQ control framework. Agents' state trajectories can be sensitive and we therefore protect them using differential privacy. We quantify the impact of privacy along three dimensions: the amount of information shared under privacy, the control-theoretic cost of privacy, and the tradeoffs between privacy and performance. These analyses are done in conventional control-theoretic terms, which we use to develop guidelines for calibrating privacy as a function of system parameters. Numerical results indicate that system performance remains within desirable ranges, even under strict privacy requirements.
△ Less
Submitted 14 February, 2022; v1 submitted 12 July, 2018;
originally announced July 2018.
-
Technical Report: Infinite Horizon Discrete-Time Linear Quadratic Gaussian Tracking Control Derivation
Authors:
Kasra Yazdani,
Matthew Hale
Abstract:
This technical report is an accompaniment to the paper "Differentially Private LQ Control" that is currently under review. This technical report provides a complete derivation of the infinite horizon discrete-time linear quadratic Gaussian tracking controller, which we were unable to find in the existing literature.
This technical report is an accompaniment to the paper "Differentially Private LQ Control" that is currently under review. This technical report provides a complete derivation of the infinite horizon discrete-time linear quadratic Gaussian tracking controller, which we were unable to find in the existing literature.
△ Less
Submitted 6 December, 2018; v1 submitted 12 July, 2018;
originally announced July 2018.
-
Asynchronous Distributed Optimization with Heterogeneous Regularizations and Normalizations
Authors:
Stefan Hochhaus,
Matthew Hale
Abstract:
As multi-agent networks grow in size and scale, they become increasingly difficult to synchronize, though agents must work together even when generating and sharing different information at different times. Targeting such cases, this paper presents an asynchronous optimization framework in which the time between successive communications and computations is unknown and unspecified for each agent.…
▽ More
As multi-agent networks grow in size and scale, they become increasingly difficult to synchronize, though agents must work together even when generating and sharing different information at different times. Targeting such cases, this paper presents an asynchronous optimization framework in which the time between successive communications and computations is unknown and unspecified for each agent. Agents' updates are carried out in blocks, with each agent updating only a small subset of all decision variables. To provide robustness to asynchrony, each agent uses an independently chosen Tikhonov regularization. Convergence is measured with respect to a weighted block-maximum norm in which convergence of agents' blocks can be measured in different p-norms and weighted differently to heterogeneously normalize problems. Asymptotic convergence is shown and convergence rates are derived explicitly in terms of a problem's parameters, with only mild restrictions imposed upon them. Simulation results are provided to verify the theoretical developments made.
△ Less
Submitted 17 September, 2018; v1 submitted 21 March, 2018;
originally announced March 2018.
-
Differential Privacy for Sets in Euclidean Space
Authors:
Matthew T. Hale
Abstract:
As multi-agent systems become more numerous and more data-driven, novel forms of privacy are needed in order to protect data types that are not accounted for by existing privacy frameworks. In this paper, we present a new form of privacy for set-valued data which extends the notion of differential privacy to sets which users want to protect. While differential privacy is typically defined in terms…
▽ More
As multi-agent systems become more numerous and more data-driven, novel forms of privacy are needed in order to protect data types that are not accounted for by existing privacy frameworks. In this paper, we present a new form of privacy for set-valued data which extends the notion of differential privacy to sets which users want to protect. While differential privacy is typically defined in terms of probability distributions, we show that it is more natural here to define privacy for sets over their capacity functionals, which capture the probability of a random set intersecting some other set. In terms of sets' capacity functionals, we provide a novel definition of differential privacy for set-valued data. Based on this definition, we introduce the Laplacian Perturbation Mechanism (so named because it applies random perturbations to sets), and show that it provides ?-differential privacy as prescribed by our definition. These theoretical results are supported by numerical results, demonstrating the practical applicability of the developments made.
△ Less
Submitted 3 October, 2017;
originally announced October 2017.
-
Privacy in Feedback: The Differentially Private LQG
Authors:
Matthew Hale,
Austin Jones,
Kevin Leahy
Abstract:
Information communicated within cyber-physical systems (CPSs) is often used in determining the physical states of such systems, and malicious adversaries may intercept these communications in order to infer future states of a CPS or its components. Accordingly, there arises a need to protect the state values of a system. Recently, the notion of differential privacy has been used to protect state t…
▽ More
Information communicated within cyber-physical systems (CPSs) is often used in determining the physical states of such systems, and malicious adversaries may intercept these communications in order to infer future states of a CPS or its components. Accordingly, there arises a need to protect the state values of a system. Recently, the notion of differential privacy has been used to protect state trajectories in dynamical systems, and it is this notion of privacy that we use here to protect the state trajectories of CPSs. We incorporate a cloud computer to coordinate the agents comprising the CPSs of interest, and the cloud offers the ability to remotely coordinate many agents, rapidly perform computations, and broadcast the results, making it a natural fit for systems with many interacting agents or components. Striving for broad applicability, we solve infinite-horizon linear-quadratic-regulator (LQR) problems, and each agent protects its own state trajectory by adding noise to its states before they are sent to the cloud. The cloud then uses these state values to generate optimal inputs for the agents. As a result, private data is fed into feedback loops at each iteration, and each noisy term affects every future state of every agent. In this paper, we show that the differentially private LQR problem can be related to the well-studied linear-quadratic-Gaussian (LQG) problem, and we provide bounds on how agents' privacy requirements affect the cloud's ability to generate optimal feedback control values for the agents. These results are illustrated in numerical simulations.
△ Less
Submitted 15 March, 2019; v1 submitted 8 September, 2017;
originally announced September 2017.
-
Differentially Private Cloud-Based Multi-Agent Optimization with Constraints
Authors:
Matthew Hale,
Magnus Egerstedt
Abstract:
We present an optimization framework that solves constrained multi-agent optimization problems while keeping each agent's state differentially private. The agents in the network seek to optimize a local objective function in the presence of global constraints. Agents communicate only through a trusted cloud computer and the cloud also performs computations based on global information. The cloud co…
▽ More
We present an optimization framework that solves constrained multi-agent optimization problems while keeping each agent's state differentially private. The agents in the network seek to optimize a local objective function in the presence of global constraints. Agents communicate only through a trusted cloud computer and the cloud also performs computations based on global information. The cloud computer modifies the results of such computations before they are sent to the agents in order to guarantee that the agents' states are kept private. We show that under mild conditions each agent's optimization problem converges in mean-square to its unique solution while each agent's state is kept differentially private. A numerical simulation is provided to demonstrate the viability of this approach.
△ Less
Submitted 28 August, 2017;
originally announced August 2017.
-
Monotonic properties of the shift and penetration factors
Authors:
Carl R. Brune,
Gerald M. Hale,
Mark W. Paris
Abstract:
We study derivatives of the shift and penetration factors of collision theory with respect to energy, angular momentum, and charge. Definitive results for the signs of these derivatives are found for the repulsive Coulomb case. In particular, we find that the derivative of the shift factor with respect to energy is positive for the repulsive Coulomb case, a long anticipated but heretofore unproven…
▽ More
We study derivatives of the shift and penetration factors of collision theory with respect to energy, angular momentum, and charge. Definitive results for the signs of these derivatives are found for the repulsive Coulomb case. In particular, we find that the derivative of the shift factor with respect to energy is positive for the repulsive Coulomb case, a long anticipated but heretofore unproven result. These results are closely connected to the properties of the sum of squares of the regular and irregular Coulomb functions; we also present investigations of this quantity.
△ Less
Submitted 7 February, 2018; v1 submitted 22 August, 2017;
originally announced August 2017.
-
On the Connectivity of Unions of Random Graphs
Authors:
Matthew T. Hale
Abstract:
Graph-theoretic tools and techniques have seen wide use in the multi-agent systems literature, and the unpredictable nature of some multi-agent communications has been successfully modeled using random communication graphs. Across both network control and network optimization, a common assumption is that the union of agents' communication graphs is connected across any finite interval of some pres…
▽ More
Graph-theoretic tools and techniques have seen wide use in the multi-agent systems literature, and the unpredictable nature of some multi-agent communications has been successfully modeled using random communication graphs. Across both network control and network optimization, a common assumption is that the union of agents' communication graphs is connected across any finite interval of some prescribed length, and some convergence results explicitly depend upon this length. Despite the prevalence of this assumption and the prevalence of random graphs in studying multi-agent systems, to the best of our knowledge, there has not been a study dedicated to determining how many random graphs must be in a union before it is connected. To address this point, this paper solves two related problems. The first bounds the number of random graphs required in a union before its expected algebraic connectivity exceeds the minimum needed for connectedness. The second bounds the probability that a union of random graphs is connected. The random graph model used is the Erdős-Rényi model, and, in solving these problems, we also bound the expectation and variance of the algebraic connectivity of unions of such graphs. Numerical results for several use cases are given to supplement the theoretical developments made.
△ Less
Submitted 15 September, 2017; v1 submitted 22 March, 2017;
originally announced March 2017.
-
Convergence Rate Estimates for Consensus over Random Graphs
Authors:
Matthew T. Hale,
Magnus Egerstedt
Abstract:
Multi-agent coordination algorithms with randomized interactions have seen use in a variety of settings in the multi-agent systems literature. In some cases, these algorithms can be random by design, as in a gossip-like algorithm, and in other cases they are random due to external factors, as in the case of intermittent communications. Targeting both of these scenarios, we present novel convergenc…
▽ More
Multi-agent coordination algorithms with randomized interactions have seen use in a variety of settings in the multi-agent systems literature. In some cases, these algorithms can be random by design, as in a gossip-like algorithm, and in other cases they are random due to external factors, as in the case of intermittent communications. Targeting both of these scenarios, we present novel convergence rate estimates for consensus problems solved over random graphs. Established results provide asymptotic convergence in this setting, and we provide estimates of the rate of convergence in two forms. First, we estimate decreases in a quadratic Lyapunov function over time to bound how quickly the agents' disagreement decays, and second we bound the probability of being at least a given distance from the point of agreement. Both estimates rely on (approximately) computing eigenvalues of the expected matrix exponential of a random graph's Laplacian, which we do explicitly in terms of the network's size and edge probability, without assuming that any relationship between them holds. Simulation results are provided to support the theoretical developments made.
△ Less
Submitted 21 March, 2017; v1 submitted 21 October, 2016;
originally announced October 2016.
-
Asynchronous Multi-Agent Primal-Dual Optimization
Authors:
Matthew T. Hale,
Angelia Nedich,
Magnus Egerstedt
Abstract:
We present a framework for asynchronously solving convex optimization problems over networks of agents which are augmented by the presence of a centralized cloud computer. This framework uses a Tikhonov-regularized primal-dual approach in which the agents update the system's primal variables and the cloud updates its dual variables. To minimize coordination requirements placed upon the system, the…
▽ More
We present a framework for asynchronously solving convex optimization problems over networks of agents which are augmented by the presence of a centralized cloud computer. This framework uses a Tikhonov-regularized primal-dual approach in which the agents update the system's primal variables and the cloud updates its dual variables. To minimize coordination requirements placed upon the system, the times of communications and computations among the agents are allowed to be arbitrary, provided they satisfy mild conditions. Communications from the agents to the cloud are likewise carried out without any coordination in their timing. However, we require that the cloud keep the dual variable's value synchronized across the agents, and a counterexample is provided that demonstrates that this level of synchrony is indeed necessary for convergence. Convergence rate estimates are provided in both the primal and dual spaces, and simulation results are presented that demonstrate the operation and convergence of the proposed algorithm.
△ Less
Submitted 13 October, 2016; v1 submitted 6 June, 2016;
originally announced June 2016.
-
Hamiltonian-Based Algorithm for Optimal Control
Authors:
M. T. Hale,
Y. Wardi,
H. Jaleel,
M. Egerstedt
Abstract:
This paper proposes an algorithmic technique for a class of optimal control problems where it is easy to compute a pointwise minimizer of the Hamiltonian associated with every applied control. The algorithm operates in the space of relaxed controls and projects the final result into the space of ordinary controls. It is based on the descent direction from a given relaxed control towards a pointwis…
▽ More
This paper proposes an algorithmic technique for a class of optimal control problems where it is easy to compute a pointwise minimizer of the Hamiltonian associated with every applied control. The algorithm operates in the space of relaxed controls and projects the final result into the space of ordinary controls. It is based on the descent direction from a given relaxed control towards a pointwise minimizer of the Hamiltonian. This direction comprises a form of gradient projection and for some systems, is argued to have computational advantages over direct gradient directions. The algorithm is shown to be applicable to a class of hybrid optimal control problems. The theoretical results, concerning convergence of the algorithm, are corroborated by simulation examples on switched-mode hybrid systems as well as on a problem of balancing transmission- and motion energy in a mobile robotic system.
△ Less
Submitted 8 March, 2016;
originally announced March 2016.
-
Approximately Truthful Multi-Agent Optimization Using Cloud-Enforced Joint Differential Privacy
Authors:
M. T. Hale,
M. Egerstedt
Abstract:
Multi-agent coordination problems often require agents to exchange state information in order to reach some collective goal, such as agreement on a final state value. In some cases, it is feasible that opportunistic agents may deceptively report false state values for their own benefit, e.g., to claim a larger portion of shared resources. Motivated by such cases, this paper presents a multi-agent…
▽ More
Multi-agent coordination problems often require agents to exchange state information in order to reach some collective goal, such as agreement on a final state value. In some cases, it is feasible that opportunistic agents may deceptively report false state values for their own benefit, e.g., to claim a larger portion of shared resources. Motivated by such cases, this paper presents a multi-agent coordination framework which disincentivizes opportunistic misreporting of state information. This paper focuses on multi-agent coordination problems that can be stated as nonlinear programs, with non-separable constraints coupling the agents. In this setting, an opportunistic agent may be tempted to skew the problem's constraints in its favor to reduce its local cost, and this is exactly the behavior we seek to disincentivize. The framework presented uses a primal-dual approach wherein the agents compute primal updates and a centralized cloud computer computes dual updates. All computations performed by the cloud are carried out in a way that enforces joint differential privacy, which adds noise in order to dilute any agent's influence upon the value of its cost function in the problem. We show that this dilution deters agents from intentionally misreporting their states to the cloud, and present bounds on the possible cost reduction an agent can attain through misreporting its state. This work extends our earlier work on incorporating ordinary differential privacy into multi-agent optimization, and we show that this work can be modified to provide a disincentivize for misreporting states to the cloud. Numerical results are presented to demonstrate convergence of the optimization algorithm under joint differential privacy.
△ Less
Submitted 8 November, 2016; v1 submitted 27 September, 2015;
originally announced September 2015.
-
Cloud-Based Centralized/Decentralized Multi-Agent Optimization with Communication Delays
Authors:
Matthew T. Hale,
Angelia Nedic,
Magnus Egerstedt
Abstract:
We present and analyze a computational hybrid architecture for performing multi-agent optimization. The optimization problems under consideration have convex objective and constraint functions with mild smoothness conditions imposed on them. For such problems, we provide a primal-dual algorithm implemented in the hybrid architecture, which consists of a decentralized network of agents into which c…
▽ More
We present and analyze a computational hybrid architecture for performing multi-agent optimization. The optimization problems under consideration have convex objective and constraint functions with mild smoothness conditions imposed on them. For such problems, we provide a primal-dual algorithm implemented in the hybrid architecture, which consists of a decentralized network of agents into which centralized information is occasionally injected, and we establish its convergence properties. To accomplish this, a central cloud computer aggregates global information, carries out computations of the dual variables based on this information, and then distributes the updated dual variables to the agents. The agents update their (primal) state variables and also communicate among themselves with each agent sharing and receiving state information with some number of its neighbors. Throughout, communications with the cloud are not assumed to be synchronous or instantaneous, and communication delays are explicitly accounted for in the modeling and analysis of the system. Experimental results are presented to support the theoretical developments made.
△ Less
Submitted 25 August, 2015;
originally announced August 2015.
-
Cloud-Enabled Differentially Private Multi-Agent Optimization with Constraints
Authors:
Matthew Hale,
Magnus Egerstedt
Abstract:
We present an optimization framework for solving multi-agent nonlinear programs subject to inequality constraints while keeping the agents' state trajectories private. Each agent has an objective function depending only upon its own state and the agents are collectively subject to global constraints. The agents do not directly communicate with each other but instead route messages through a truste…
▽ More
We present an optimization framework for solving multi-agent nonlinear programs subject to inequality constraints while keeping the agents' state trajectories private. Each agent has an objective function depending only upon its own state and the agents are collectively subject to global constraints. The agents do not directly communicate with each other but instead route messages through a trusted cloud computer. The cloud computer adds noise to data being sent to the agents in accordance with the framework of differential privacy in order to keep each agent's state trajectory private from all other agents and any eavesdroppers. This private problem can be viewed as a stochastic variational inequality and is solved using a projection-based method for solving variational inequalities that resembles a noisy primal-dual gradient algorithm. Convergence of the optimization algorithm in the presence of noise is proven and a quantifiable trade-off between privacy and convergence is extracted from this proof. Simulation results are provided that demonstrate numerical convergence for both $ε$-differential privacy and $(ε, δ)$-differential privacy.
△ Less
Submitted 2 August, 2016; v1 submitted 15 July, 2015;
originally announced July 2015.
-
Cloud-Based Optimization: A Quasi-Decentralized Approach to Multi-Agent Coordination
Authors:
Matthew Hale,
Magnus Egerstedt
Abstract:
New architectures and algorithms are needed to reflect the mixture of local and global information that is available as multi-agent systems connect over the cloud. We present a novel architecture for multi-agent coordination where the cloud is assumed to be able to gather information from all agents, perform centralized computations, and disseminate the results in an intermittent manner. This arch…
▽ More
New architectures and algorithms are needed to reflect the mixture of local and global information that is available as multi-agent systems connect over the cloud. We present a novel architecture for multi-agent coordination where the cloud is assumed to be able to gather information from all agents, perform centralized computations, and disseminate the results in an intermittent manner. This architecture is used to solve a multi-agent optimization problem in which each agent has a local objective function unknown to the other agents and in which the agents are collectively subject to global inequality constraints. Leveraging the cloud, a dual problem is formulated and solved by finding a saddle point of the associated Lagrangian.
△ Less
Submitted 22 September, 2014; v1 submitted 31 March, 2014;
originally announced April 2014.