-
A Safe First-Order Method for Pricing-Based Resource Allocation in Safety-Critical Networks
Authors:
Berkay Turan,
Spencer Hutchinson,
Mahnoosh Alizadeh
Abstract:
We introduce a novel algorithm for solving network utility maximization (NUM) problems that arise in resource allocation schemes over networks with known safety-critical constraints, where the constraints form an arbitrary convex and compact feasible set. Inspired by applications where customers' demand can only be affected through posted prices and real-time two-way communication with customers i…
▽ More
We introduce a novel algorithm for solving network utility maximization (NUM) problems that arise in resource allocation schemes over networks with known safety-critical constraints, where the constraints form an arbitrary convex and compact feasible set. Inspired by applications where customers' demand can only be affected through posted prices and real-time two-way communication with customers is not available, we require an algorithm to generate ``safe prices''. This means that at no iteration should the realized demand in response to the posted prices violate the safety constraints of the network. Thus, in contrast to existing distributed first-order methods, our algorithm, called safe pricing for NUM (SPNUM), is guaranteed to produce feasible primal iterates at all iterations. At the heart of the algorithm lie two key steps that must go hand in hand to guarantee safety and convergence: 1) applying a projected gradient method on a shrunk feasible set to get the desired demand, and 2) estimating the price response function of the users and determining the price so that the induced demand is close to the desired demand. We ensure safety by adjusting the shrinkage to account for the error between the induced demand and the desired demand. In addition, by gradually reducing the amount of shrinkage and the step size of the gradient method, we prove that the primal iterates produced by the SPNUM achieve a sublinear static regret of ${\cal O}(\log{(T)})$ after $T$ time steps.
△ Less
Submitted 17 May, 2024; v1 submitted 5 October, 2023;
originally announced October 2023.
-
The Impact of the Geometric Properties of the Constraint Set in Safe Optimization with Bandit Feedback
Authors:
Spencer Hutchinson,
Berkay Turan,
Mahnoosh Alizadeh
Abstract:
We consider a safe optimization problem with bandit feedback in which an agent sequentially chooses actions and observes responses from the environment, with the goal of maximizing an arbitrary function of the response while respecting stage-wise constraints. We propose an algorithm for this problem, and study how the geometric properties of the constraint set impact the regret of the algorithm. I…
▽ More
We consider a safe optimization problem with bandit feedback in which an agent sequentially chooses actions and observes responses from the environment, with the goal of maximizing an arbitrary function of the response while respecting stage-wise constraints. We propose an algorithm for this problem, and study how the geometric properties of the constraint set impact the regret of the algorithm. In order to do so, we introduce the notion of the sharpness of a particular constraint set, which characterizes the difficulty of performing learning within the constraint set in an uncertain setting. This concept of sharpness allows us to identify the class of constraint sets for which the proposed algorithm is guaranteed to enjoy sublinear regret. Simulation results for this algorithm support the sublinear regret bound and provide empirical evidence that the sharpness of the constraint set impacts the performance of the algorithm.
△ Less
Submitted 1 May, 2023;
originally announced May 2023.
-
Safe Dual Gradient Method for Network Utility Maximization Problems
Authors:
Berkay Turan,
Mahnoosh Alizadeh
Abstract:
In this paper, we introduce a novel first-order dual gradient algorithm for solving network utility maximization problems that arise in resource allocation schemes over networks with safety-critical constraints. Inspired by applications where customers' demand can only be affected through posted prices and real-time two-way communication with customers is not available, we require an algorithm to…
▽ More
In this paper, we introduce a novel first-order dual gradient algorithm for solving network utility maximization problems that arise in resource allocation schemes over networks with safety-critical constraints. Inspired by applications where customers' demand can only be affected through posted prices and real-time two-way communication with customers is not available, we require an algorithm to generate \textit{safe prices}. This means that at no iteration should the realized demand in response to the posted prices violate the safety constraints of the network. Thus, in contrast to existing first-order methods, our algorithm, called the safe dual gradient method (SDGM), is guaranteed to produce feasible primal iterates at all iterations. We ensure primal feasibility by 1) adding a diminishing safety margin to the constraints, and 2) using a sign-based dual update method with different step sizes for plus and minus directions. In addition, we prove that the primal iterates produced by the SDGM achieve a sublinear static regret of ${\cal O}(\sqrt{T})$.
△ Less
Submitted 8 August, 2022;
originally announced August 2022.
-
Robust Distributed Optimization With Randomly Corrupted Gradients
Authors:
Berkay Turan,
Cesar A. Uribe,
Hoi-To Wai,
Mahnoosh Alizadeh
Abstract:
In this paper, we propose a first-order distributed optimization algorithm that is provably robust to Byzantine failures-arbitrary and potentially adversarial behavior, where all the participating agents are prone to failure. We model each agent's state over time as a two-state Markov chain that indicates Byzantine or trustworthy behaviors at different time instants. We set no restrictions on the…
▽ More
In this paper, we propose a first-order distributed optimization algorithm that is provably robust to Byzantine failures-arbitrary and potentially adversarial behavior, where all the participating agents are prone to failure. We model each agent's state over time as a two-state Markov chain that indicates Byzantine or trustworthy behaviors at different time instants. We set no restrictions on the maximum number of Byzantine agents at any given time. We design our method based on three layers of defense: 1) temporal robust aggregation, 2) spatial robust aggregation, and 3) gradient normalization. We study two settings for stochastic optimization, namely Sample Average Approximation and Stochastic Approximation. We provide convergence guarantees of our method for strongly convex and smooth non-convex cost functions.
△ Less
Submitted 17 June, 2022; v1 submitted 28 June, 2021;
originally announced June 2021.
-
On Robustness of the Normalized Subgradient Method with Randomly Corrupted Subgradients
Authors:
Berkay Turan,
Cesar A. Uribe,
Hoi-To Wai,
Mahnoosh Alizadeh
Abstract:
Numerous modern optimization and machine learning algorithms rely on subgradient information being trustworthy and hence, they may fail to converge when such information is corrupted. In this paper, we consider the setting where subgradient information may be arbitrarily corrupted (with a given probability) and study the robustness properties of the normalized subgradient method. Under the probabi…
▽ More
Numerous modern optimization and machine learning algorithms rely on subgradient information being trustworthy and hence, they may fail to converge when such information is corrupted. In this paper, we consider the setting where subgradient information may be arbitrarily corrupted (with a given probability) and study the robustness properties of the normalized subgradient method. Under the probabilistic corruption scenario, we prove that the normalized subgradient method, whose updates rely solely on directional information of the subgradient, converges to a minimizer for convex, strongly convex, and weakly-pseudo convex functions satisfying certain conditions. Numerical evidence on linear regression and logistic classification problems support our results.
△ Less
Submitted 21 March, 2021; v1 submitted 28 September, 2020;
originally announced September 2020.
-
Competition in Electric Autonomous Mobility on Demand Systems
Authors:
Berkay Turan,
Mahnoosh Alizadeh
Abstract:
This paper investigates the impacts of competition in autonomous mobility-on-demand systems. By adopting a network-flow based formulation, we first determine the optimal strategies of profit-maximizing platform operators in monopoly and duopoly markets, including the optimal prices of rides. Furthermore, we characterize the platform operator's profits and the consumer surplus. We show that for the…
▽ More
This paper investigates the impacts of competition in autonomous mobility-on-demand systems. By adopting a network-flow based formulation, we first determine the optimal strategies of profit-maximizing platform operators in monopoly and duopoly markets, including the optimal prices of rides. Furthermore, we characterize the platform operator's profits and the consumer surplus. We show that for the duopoly, the equilibrium prices for rides have to be symmetric between the firms. Then, in order to study the benefits of introducing competition in the market, we derive universal theoretical bounds on the ratio of prices for rides, aggregate demand served, profits of the firms, and consumer surplus between the monopolistic and the duopolistic setting. We discuss how consumers' firm loyalty affects each of the aforementioned metrics. Finally, using the Manhattan network and demand data, we quantify the efficacy of static pricing and routing policies and compare it to real-time model predictive policies.
△ Less
Submitted 15 July, 2021; v1 submitted 12 July, 2020;
originally announced July 2020.
-
Resilient Primal-Dual Optimization Algorithms for Distributed Resource Allocation
Authors:
Berkay Turan,
Cesar A. Uribe,
Hoi-To Wai,
Mahnoosh Alizadeh
Abstract:
Distributed algorithms for multi-agent resource allocation can provide privacy and scalability over centralized algorithms in many cyber-physical systems. However, the distributed nature of these algorithms can render these systems vulnerable to man-in-the-middle attacks that can lead to non-convergence and infeasibility of resource allocation schemes. In this paper, we propose attack-resilient di…
▽ More
Distributed algorithms for multi-agent resource allocation can provide privacy and scalability over centralized algorithms in many cyber-physical systems. However, the distributed nature of these algorithms can render these systems vulnerable to man-in-the-middle attacks that can lead to non-convergence and infeasibility of resource allocation schemes. In this paper, we propose attack-resilient distributed algorithms based on primal-dual optimization when Byzantine attackers are present in the system. In particular, we design attack-resilient primal-dual algorithms for static and dynamic impersonation attacks by means of robust statistics. For static impersonation attacks, we formulate a robustified optimization model and show that our algorithm guarantees convergence to a neighborhood of the optimal solution of the robustified problem. On the other hand, a robust optimization model is not required for the dynamic impersonation attack scenario and we are able to design an algorithm that is shown to converge to a near-optimal solution of the original problem. We analyze the performances of our algorithms through both theoretical and computational studies.
△ Less
Submitted 15 September, 2020; v1 submitted 2 January, 2020;
originally announced January 2020.
-
A note on the equivalence of some metric, non-Newtonian and multiplicative metric results
Authors:
Bahri Turan,
Cuneyt Cevik
Abstract:
In this short note is on the equivalence between non-Newtonian metric (particularly multiplicative metric) and metric. We present a different proof the fact that the notion of a non-Newtonian metric space is not more general than that of a metric space. Also, we emphasize that a lot of fixed point results in the non-Newtonian metric setting can be directly obtained from their metric counterparts.
In this short note is on the equivalence between non-Newtonian metric (particularly multiplicative metric) and metric. We present a different proof the fact that the notion of a non-Newtonian metric space is not more general than that of a metric space. Also, we emphasize that a lot of fixed point results in the non-Newtonian metric setting can be directly obtained from their metric counterparts.
△ Less
Submitted 11 March, 2016;
originally announced March 2016.