-
Deep asymptotic expansion method for solving singularly perturbed time-dependent reaction-advection-diffusion equations
Authors:
Qiao Zhu,
Dmitrii Chaikovskii,
Bangti Jin,
Ye Zhang
Abstract:
Physics-informed neural network (PINN) has shown great potential in solving differential equations. However, it faces challenges when dealing with problems involving steep gradients. For singularly perturbed time-dependent reaction-advection-diffusion equations, which exhibit internal transition layers with sharp gradients, we propose a deep asymptotic expansion (DAE) method that leverages deep le…
▽ More
Physics-informed neural network (PINN) has shown great potential in solving differential equations. However, it faces challenges when dealing with problems involving steep gradients. For singularly perturbed time-dependent reaction-advection-diffusion equations, which exhibit internal transition layers with sharp gradients, we propose a deep asymptotic expansion (DAE) method that leverages deep learning to obtain explicit smooth approximate solutions. Inspired by asymptotic analysis, we first derive the governing equations for transition layers and then solve them using PINN. Numerical experiments show that DAE outperforms PINN, gPINN and PINN with adaptive sampling. We also show its robustness with respect to training point distributions, network architectures, and random seeds.
△ Less
Submitted 28 May, 2025;
originally announced May 2025.
-
Extending structures for pre-Poisson algebras and pre-Poisson bialgebras
Authors:
Qianwen Zhu,
Guilai Liu,
Qinxiu Sun
Abstract:
In this paper, we explore the extending structures problem by the unified product for pre-Poisson algebras. In particular, the crossed product and the factorization problem are investigated. Furthermore, a special case of extending structures is studied under the case of pre-Poisson algebras, which leads to the discussion of bicrossed products and matched pairs of pre-Poisson algebras. We develop…
▽ More
In this paper, we explore the extending structures problem by the unified product for pre-Poisson algebras. In particular, the crossed product and the factorization problem are investigated. Furthermore, a special case of extending structures is studied under the case of pre-Poisson algebras, which leads to the discussion of bicrossed products and matched pairs of pre-Poisson algebras. We develop a bialgebra theory for pre-Poisson algebras and establish the equivalence between matched pairs and pre-Poisson bialgebras. We study coboundary pre-Poisson bialgebras, which lead to the introduction of the pre-Poisson Yang-Baxter equation (PPYBE). A symmetric solution of the PPYBE naturally gives a coboundary pre-Poisson bialgebra.
△ Less
Submitted 21 April, 2025;
originally announced April 2025.
-
Effective Rank and the Staircase Phenomenon: New Insights into Neural Network Training Dynamics
Authors:
Jiang Yang,
Yuxiang Zhao,
Quanhui Zhu
Abstract:
In recent years, deep learning, powered by neural networks, has achieved widespread success in solving high-dimensional problems, particularly those with low-dimensional feature structures. This success stems from their ability to identify and learn low dimensional features tailored to the problems. Understanding how neural networks extract such features during training dynamics remains a fundamen…
▽ More
In recent years, deep learning, powered by neural networks, has achieved widespread success in solving high-dimensional problems, particularly those with low-dimensional feature structures. This success stems from their ability to identify and learn low dimensional features tailored to the problems. Understanding how neural networks extract such features during training dynamics remains a fundamental question in deep learning theory. In this work, we propose a novel perspective by interpreting the neurons in the last hidden layer of a neural network as basis functions that represent essential features. To explore the linear independence of these basis functions throughout the deep learning dynamics, we introduce the concept of 'effective rank'. Our extensive numerical experiments reveal a notable phenomenon: the effective rank increases progressively during the learning process, exhibiting a staircase-like pattern, while the loss function concurrently decreases as the effective rank rises. We refer to this observation as the 'staircase phenomenon'. Specifically, for deep neural networks, we rigorously prove the negative correlation between the loss function and effective rank, demonstrating that the lower bound of the loss function decreases with increasing effective rank. Therefore, to achieve a rapid descent of the loss function, it is critical to promote the swift growth of effective rank. Ultimately, we evaluate existing advanced learning methodologies and find that these approaches can quickly achieve a higher effective rank, thereby avoiding redundant staircase processes and accelerating the rapid decline of the loss function.
△ Less
Submitted 9 January, 2025; v1 submitted 6 December, 2024;
originally announced December 2024.
-
Mean Field Control by Stochastic Koopman Operator via a Spectral Method
Authors:
Yuhan Zhao,
Juntao Chen,
Yingdong Lu,
Quanyan Zhu
Abstract:
Mean field control provides a robust framework for coordinating large-scale populations with complex interactions and has wide applications across diverse fields. However, the inherent nonlinearity and the presence of unknown system dynamics pose significant challenges for developing effective analytic or numerical solutions. There is a pressing need for data-driven methodologies to construct accu…
▽ More
Mean field control provides a robust framework for coordinating large-scale populations with complex interactions and has wide applications across diverse fields. However, the inherent nonlinearity and the presence of unknown system dynamics pose significant challenges for developing effective analytic or numerical solutions. There is a pressing need for data-driven methodologies to construct accurate models and facilitate efficient planning and control.
To this end, we leverage Koopman operator theory to advance solution methods for mean field control problems. Our approach involves exploring stochastic Koopman operators using spectral analysis techniques. Through Koopman decomposition, we derive a linear model for mean field control problems in a data-driven fashion. Finally, we develop a model predictive control framework to achieve robust control and reduce the computational complexity for mean field control problems, thereby enhancing the efficacy and applicability of mean field control solutions in various domains.
△ Less
Submitted 9 November, 2024;
originally announced November 2024.
-
Governing equation discovery of a complex system from snapshots
Authors:
Qunxi Zhu,
Bolin Zhao,
Jingdong Zhang,
Peiyang Li,
Wei Lin
Abstract:
Complex systems in physics, chemistry, and biology that evolve over time with inherent randomness are typically described by stochastic differential equations (SDEs). A fundamental challenge in science and engineering is to determine the governing equations of a complex system from snapshot data. Traditional equation discovery methods often rely on stringent assumptions, such as the availability o…
▽ More
Complex systems in physics, chemistry, and biology that evolve over time with inherent randomness are typically described by stochastic differential equations (SDEs). A fundamental challenge in science and engineering is to determine the governing equations of a complex system from snapshot data. Traditional equation discovery methods often rely on stringent assumptions, such as the availability of the trajectory information or time-series data, and the presumption that the underlying system is deterministic. In this work, we introduce a data-driven, simulation-free framework, called Sparse Identification of Differential Equations from Snapshots (SpIDES), that discovers the governing equations of a complex system from snapshots by utilizing the advanced machine learning techniques to perform three essential steps: probability flow reconstruction, probability density estimation, and Bayesian sparse identification. We validate the effectiveness and robustness of SpIDES by successfully identifying the governing equation of an over-damped Langevin system confined within two potential wells. By extracting interpretable drift and diffusion terms from the SDEs, our framework provides deeper insights into system dynamics, enhances predictive accuracy, and facilitates more effective strategies for managing and simulating stochastic systems.
△ Less
Submitted 22 October, 2024;
originally announced October 2024.
-
A novel second order scheme with one step for forward backward stochastic differential equations
Authors:
Qiang Han,
Shihao Lan,
Quanxin Zhu
Abstract:
In this paper, we present a novel explicit second order scheme with one step for solving the forward backward stochastic differential equations, with the Crank-Nicolson method as a specific instance within our proposed framework. We first present a rigorous stability result, followed by precise error estimates that confirm the proposed novel scheme achieves second-order convergence. The theoretica…
▽ More
In this paper, we present a novel explicit second order scheme with one step for solving the forward backward stochastic differential equations, with the Crank-Nicolson method as a specific instance within our proposed framework. We first present a rigorous stability result, followed by precise error estimates that confirm the proposed novel scheme achieves second-order convergence. The theoretical results for the proposed methods are supported by numerical experiments.
△ Less
Submitted 11 September, 2024;
originally announced September 2024.
-
Cornell University Uses Integer Programming to Optimize Final Exam Scheduling
Authors:
Tinghan Ye,
Adam Jovine,
Willem van Osselaer,
Qihan Zhu,
David Shmoys
Abstract:
This paper presents an integer programming-based optimization framework designed to effectively address the complex final exam scheduling challenges encountered at Cornell University. With high flexibility, the framework is specifically tailored to accommodate a variety of different constraints, including the front-loading of large courses and the exclusion of specific time slots during the exam p…
▽ More
This paper presents an integer programming-based optimization framework designed to effectively address the complex final exam scheduling challenges encountered at Cornell University. With high flexibility, the framework is specifically tailored to accommodate a variety of different constraints, including the front-loading of large courses and the exclusion of specific time slots during the exam period. By generating multiple scheduling model variants and incorporating heuristic approaches, our framework enables comprehensive comparisons of different schedules. This empowers the University Registrar to make informed decisions, considering trade-offs in terms of schedule comfort measured by different levels of exam conflicts. Our results demonstrate significant advantage over the historical lecture time-based approach, providing time and effort savings for the university administration while enhancing student and faculty satisfaction.
△ Less
Submitted 25 June, 2025; v1 submitted 7 September, 2024;
originally announced September 2024.
-
Residuals-Based Contextual Distributionally Robust Optimization with Decision-Dependent Uncertainty
Authors:
Qing Zhu,
Xian Yu,
Guzin Bayraksan
Abstract:
We consider a residuals-based distributionally robust optimization model, where the underlying uncertainty depends on both covariate information and our decisions. We adopt regression models to learn the latent decision dependency and construct a nominal distribution (thereby ambiguity sets) around the learned model using empirical residuals from the regressions. Ambiguity sets can be formed via t…
▽ More
We consider a residuals-based distributionally robust optimization model, where the underlying uncertainty depends on both covariate information and our decisions. We adopt regression models to learn the latent decision dependency and construct a nominal distribution (thereby ambiguity sets) around the learned model using empirical residuals from the regressions. Ambiguity sets can be formed via the Wasserstein distance, a sample robust approach, or with the same support as the nominal empirical distribution (e.g., phi-divergences), where both the nominal distribution and the radii of the ambiguity sets could be decision- and covariate-dependent. We provide conditions under which desired statistical properties, such as asymptotic optimality, rates of convergence, and finite sample guarantees, are satisfied. Via cross-validation, we devise data-driven approaches to find the best radii for different ambiguity sets, which can be decision-(in)dependent and covariate-(in)dependent. Through numerical experiments, we illustrate the effectiveness of our approach and the benefits of integrating decision dependency into a residuals-based DRO framework.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
FESSNC: Fast Exponentially Stable and Safe Neural Controller
Authors:
Jingdong Zhang,
Luan Yang,
Qunxi Zhu,
Wei Lin
Abstract:
In order to stabilize nonlinear systems modeled by stochastic differential equations, we design a Fast Exponentially Stable and Safe Neural Controller (FESSNC) for fast learning controllers. Our framework is parameterized by neural networks, and realizing both rigorous exponential stability and safety guarantees. Concretely, we design heuristic methods to learn the exponentially stable and the saf…
▽ More
In order to stabilize nonlinear systems modeled by stochastic differential equations, we design a Fast Exponentially Stable and Safe Neural Controller (FESSNC) for fast learning controllers. Our framework is parameterized by neural networks, and realizing both rigorous exponential stability and safety guarantees. Concretely, we design heuristic methods to learn the exponentially stable and the safe controllers, respectively, in light of the classic stochastic exponential stability theory and our established theorem on guaranteeing the almost-sure safety for stochastic dynamics. More significantly, to rigorously ensure the stability and the safety guarantees for the learned controllers, we develop a projection operator, projecting to the space of exponentially-stable and safe controllers. To reduce the high computation cost of solving the projection operation, approximate projection operators are delicately proposed with closed forms that map the learned controllers to the target controller space. Furthermore, we employ Hutchinson's trace estimator for a scalable unbiased estimate of the Hessian matrix that is used in the projection operator, which thus allows for computation cost reduction and therefore can accelerate the training and testing processes. More importantly, our approximate projection operations can be applied to the nonparametric control methods to improve their stability and safety performance. We empirically demonstrate the superiority of the FESSNC over the existing methods.
△ Less
Submitted 18 May, 2024;
originally announced May 2024.
-
Double-activation neural network for solving parabolic equations with time delay
Authors:
Qiumei Huang,
Qiao Zhu
Abstract:
This paper presents the double-activation neural network (DANN), a novel network architecture designed for solving parabolic equations with time delay. In DANN, each neuron is equipped with two activation functions to augment the network's nonlinear expressive capacity. Additionally, a new parameter is introduced for the construction of the quadratic terms in one of two activation functions, which…
▽ More
This paper presents the double-activation neural network (DANN), a novel network architecture designed for solving parabolic equations with time delay. In DANN, each neuron is equipped with two activation functions to augment the network's nonlinear expressive capacity. Additionally, a new parameter is introduced for the construction of the quadratic terms in one of two activation functions, which further enhances the network's ability to capture complex nonlinear relationships. To address the issue of low fitting accuracy caused by the discontinuity of solution's derivative, a piecewise fitting approach is proposed by dividing the global solving domain into several subdomains. The convergence of the loss function is proven. Numerical results are presented to demonstrate the superior accuracy and faster convergence of DANN compared to the traditional physics-informed neural network (PINN).
△ Less
Submitted 14 May, 2024;
originally announced May 2024.
-
Non-abelian extensions of relative Rota-Baxter Lie algebras and Wells type exact sequences
Authors:
Qinxiu Sun,
Qianwen Zhu
Abstract:
In this paper, we explore non-abelian extensions of relative Rota-Baxter Lie algebras and classify the non-abelian extensions by introducing the non-abelian second cohomology group. We also study the inducibility of a pair of automorphisms about a non-abelian extension of relative Rota-Baxter Lie algebras and derive the Wells type exact sequences. Finally, we investigate the inducibility problem o…
▽ More
In this paper, we explore non-abelian extensions of relative Rota-Baxter Lie algebras and classify the non-abelian extensions by introducing the non-abelian second cohomology group. We also study the inducibility of a pair of automorphisms about a non-abelian extension of relative Rota-Baxter Lie algebras and derive the Wells type exact sequences. Finally, we investigate the inducibility problem of pairs of derivations about an abelian extension of relative Rota-Baxter Lie algebras and give an exact sequence of Wells type.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
Disentangling Resilience from Robustness: Contextual Dualism, Interactionism, and Game-Theoretic Paradigms
Authors:
Quanyan Zhu,
Tamer Basar
Abstract:
This article explains the distinctions between robustness and resilience in control systems. Resilience confronts a distinct set of challenges, posing new ones for designing controllers for feedback systems, networks, and machines that prioritize resilience over robustness. The concept of resilience is explored through a three-stage model, emphasizing the need for a proactive preparation and autom…
▽ More
This article explains the distinctions between robustness and resilience in control systems. Resilience confronts a distinct set of challenges, posing new ones for designing controllers for feedback systems, networks, and machines that prioritize resilience over robustness. The concept of resilience is explored through a three-stage model, emphasizing the need for a proactive preparation and automated response to elastic events. A toy model is first used to illustrate the tradeoffs between resilience and robustness. Then, it delves into contextual dualism and interactionism, and introduces game-theoretic paradigms as a unifying framework to consolidate resilience and robustness. The article concludes by discussing the interplay between robustness and resilience, suggesting that a comprehensive theory of resilience and quantification metrics, and formalization through game-theoretic frameworks are necessary. The exploration extends to system-of-systems resilience and various mechanisms, including the integration of AI techniques and non-technical solutions, like cyber insurance, to achieve comprehensive resilience in control systems. As we approach 2030, the systems and control community is at the opportune moment to lay scientific foundations of resilience by bridging feedback control theory, game theory, and learning theory. Resilient control systems will enhance overall quality of life, enable the development of a resilient society, and create a societal-scale impact amid global challenges such as climate change, conflicts, and cyber insecurity.
△ Less
Submitted 10 March, 2024;
originally announced March 2024.
-
Dynamic Information Manipulation Game
Authors:
Shutian Liu,
Quanyan Zhu
Abstract:
We propose a dynamic information manipulation game (DIMG) to investigate the incentives of an information manipulator (IM) to influence the observation rules of a partially observable Markov decision process (POMDP). DIMG is a hierarchical game where the upper-level IM stealthily designs the POMDP's joint state distributions to influence the lower-level controller's actions. DIMP's fundamental fea…
▽ More
We propose a dynamic information manipulation game (DIMG) to investigate the incentives of an information manipulator (IM) to influence the observation rules of a partially observable Markov decision process (POMDP). DIMG is a hierarchical game where the upper-level IM stealthily designs the POMDP's joint state distributions to influence the lower-level controller's actions. DIMP's fundamental feature is characterized by a stage-wise constraint that ensures the consistency between the unobservable marginals of the designed and the original kernels. In an equilibrium of information distortion, the IM minimizes cumulative cost that depends on the controller's informationally manipulated actions generated by the optimal policy to the POMDP. We characterize ex ante and interim equilibria of information distortion and show their connections. The IM's impact is characterized by a tight upper-bound on the performance degradation of the POMDP, which consists of the stage-wise instantaneous informational differences scaled by the amplifications at subsequent stages.
△ Less
Submitted 15 April, 2024; v1 submitted 12 December, 2023;
originally announced December 2023.
-
Matrix-based implementation and GPU acceleration of linearized ordinary state-based peridynamic models in MATLAB
Authors:
Tao Ni,
Mirco Zaccariotto,
Qizhi Zhu,
Ugo Galvanetto
Abstract:
Ordinary state-based peridynamic (OSB-PD) models have an unparalleled capability to simulate crack propagation phenomena in solids with arbitrary Poisson's ratio. However, their non-locality also leads to prohibitively high computational cost. In this paper, a fast solution scheme for OSB-PD models based on matrix operation is introduced, with which, the graphics processing units (GPUs) are used t…
▽ More
Ordinary state-based peridynamic (OSB-PD) models have an unparalleled capability to simulate crack propagation phenomena in solids with arbitrary Poisson's ratio. However, their non-locality also leads to prohibitively high computational cost. In this paper, a fast solution scheme for OSB-PD models based on matrix operation is introduced, with which, the graphics processing units (GPUs) are used to accelerate the computation. For the purpose of comparison and verification, a commonly used solution scheme based on loop operation is also presented. An in-house software is developed in MATLAB. Firstly, the vibration of a cantilever beam is solved for validating the loop- and matrix-based schemes by comparing the numerical solutions to those produced by a FEM software. Subsequently, two typical dynamic crack propagation problems are simulated to illustrate the effectiveness of the proposed schemes in solving dynamic fracture problems. Finally, the simulation of the Brokenshire torsion experiment is carried out by using the matrix-based scheme, and the similarity in the shapes of the experimental and numerical broken specimens further demonstrates the ability of the proposed approach to deal with 3D non-planar fracture problems. In addition, the speed-up of the matrix-based scheme with respect to the loop-based scheme and the performance of the GPU acceleration are investigated. The results emphasize the high computational efficiency of the matrix-based implementation scheme.
△ Less
Submitted 20 September, 2023;
originally announced September 2023.
-
Extra Connectivity of Strong Product of Graphs
Authors:
Qinze Zhu,
Yingzhi Tian
Abstract:
The $g$-$extra$ $connectivity$ $Îş_{g}(G)$ of a connected graph $G$ is the minimum cardinality of a set of vertices, if it exists, whose deletion makes $G$ disconnected and leaves each remaining component with more than $g$ vertices, where $g$ is a non-negative integer. The $strong$ $product$ $G_1 \boxtimes G_2$ of graphs $G_1$ and $G_2$ is the graph with vertex set…
▽ More
The $g$-$extra$ $connectivity$ $Îş_{g}(G)$ of a connected graph $G$ is the minimum cardinality of a set of vertices, if it exists, whose deletion makes $G$ disconnected and leaves each remaining component with more than $g$ vertices, where $g$ is a non-negative integer. The $strong$ $product$ $G_1 \boxtimes G_2$ of graphs $G_1$ and $G_2$ is the graph with vertex set $V(G_1 \boxtimes G_2)=V(G_1)\times V(G_2)$, where two distinct vertices $(x_{1}, y_{1}),(x_{2}, y_{2}) \in V(G_1)\times V(G_2)$ are adjacent in $G_1 \boxtimes G_2$ if and only if $x_{1}=x_{2}$ and $y_{1} y_{2} \in E(G_2)$ or $y_{1}=y_{2}$ and $x_{1} x_{2} \in E(G_1)$ or $x_{1} x_{2} \in E(G_1)$ and $y_{1} y_{2} \in E(G_2)$. In this paper, we give the $g\ (\leq 3)$-$extra$ $connectivity$ of $G_1\boxtimes G_2$, where $G_i$ is a maximally connected $k_i\ (\geq 2)$-regular graph for $i=1,2$. As a byproduct, we get $g\ (\leq 3)$-$extra$ conditional fault-diagnosability of $G_1\boxtimes G_2$ under $PMC$ model.
△ Less
Submitted 27 June, 2023;
originally announced June 2023.
-
Stabilization of stochastic nonlinear systems via double-event-triggering mechanisms and switching controls
Authors:
Xuetao Yang,
Quanxin Zhu
Abstract:
In this paper, we concentrate on the exponential stabilization of stochastic nonlinear systems. Different from the single event-triggering mechanism in traditional deterministic/stochastic control systems, based on two stopping time sequences, we put forward a double-event-triggering mechanism (DETM) to update control signals and make two different controls switch in order. Also, this novel DETM a…
▽ More
In this paper, we concentrate on the exponential stabilization of stochastic nonlinear systems. Different from the single event-triggering mechanism in traditional deterministic/stochastic control systems, based on two stopping time sequences, we put forward a double-event-triggering mechanism (DETM) to update control signals and make two different controls switch in order. Also, this novel DETM allows aperiodic time updating and guarantees a positive lower bound on the inter-event times. Together with this DETM, we introduce a switching control law, including a primary control and a secondary control for a non-switched stochastic system to obtain the exponential stabilization and boundedness results. Finally, an illustrative example with simulation figures is given to demonstrate the obtained results.
△ Less
Submitted 30 May, 2023;
originally announced May 2023.
-
Small mass limit of expected signature for physical Brownian motion
Authors:
Siran Li,
Hao Ni,
Qianyu Zhu
Abstract:
The model of physical Brownian motion describes the dynamics of a Brownian particle experiencing both friction and external magnetic field. It was investigated as a physically meaningful approach to realising the standard ''mathematical'' Brownian motion, via sending the mass $m \to 0^+$ and performing natural scaling. In this paper, we are concerned with the singular limit analysis of a generalis…
▽ More
The model of physical Brownian motion describes the dynamics of a Brownian particle experiencing both friction and external magnetic field. It was investigated as a physically meaningful approach to realising the standard ''mathematical'' Brownian motion, via sending the mass $m \to 0^+$ and performing natural scaling. In this paper, we are concerned with the singular limit analysis of a generalised stochastic differential equation (SDE) model, motivated by and encompassing the physical Brownian motion. We show that the expected signature of the solution $\left\{P_t\right\}_{t \geq 0}$ for the generalised SDE converges in the limit $m \to 0^+$ to a nontrivial tensor, at each degree of tensors and on each compact time interval $[0,T]$. The solution $\left\{P_t\right\}_{t \geq 0}$, viewed as a rough path, generalises the momentum of particle in classical physical Brownian motion. This singular limit is identified through a delicate convergence analysis based on the graded PDE system for the expected signature of ItĂ´ diffusion processes. Explicit closed-form solutions exhibiting intriguing combinatorial patterns are obtained when the coefficient matrix $\mathbf{M}$ in our SDE, which generalises the stress tensor in physical Brownian motion, is diagonalisable. Our work appears among the very first endeavours to study the singular limit of expected signature of diffusion processes, in addition to the literature on the analysis of the expected signature of stochastic processes.
△ Less
Submitted 29 April, 2023;
originally announced May 2023.
-
Neural Delay Differential Equations: System Reconstruction and Image Classification
Authors:
Qunxi Zhu,
Yao Guo,
Wei Lin
Abstract:
Neural Ordinary Differential Equations (NODEs), a framework of continuous-depth neural networks, have been widely applied, showing exceptional efficacy in coping with representative datasets. Recently, an augmented framework has been developed to overcome some limitations that emerged in the application of the original framework. In this paper, we propose a new class of continuous-depth neural net…
▽ More
Neural Ordinary Differential Equations (NODEs), a framework of continuous-depth neural networks, have been widely applied, showing exceptional efficacy in coping with representative datasets. Recently, an augmented framework has been developed to overcome some limitations that emerged in the application of the original framework. In this paper, we propose a new class of continuous-depth neural networks with delay, named Neural Delay Differential Equations (NDDEs). To compute the corresponding gradients, we use the adjoint sensitivity method to obtain the delayed dynamics of the adjoint. Differential equations with delays are typically seen as dynamical systems of infinite dimension that possess more fruitful dynamics. Compared to NODEs, NDDEs have a stronger capacity of nonlinear representations. We use several illustrative examples to demonstrate this outstanding capacity. Firstly, we successfully model the delayed dynamics where the trajectories in the lower-dimensional phase space could be mutually intersected and even chaotic in a model-free or model-based manner. Traditional NODEs, without any argumentation, are not directly applicable for such modeling. Secondly, we achieve lower loss and higher accuracy not only for the data produced synthetically by complex models but also for the CIFAR10, a well-known image dataset. Our results on the NDDEs demonstrate that appropriately articulating the elements of dynamical systems into the network design is truly beneficial in promoting network performance.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
On the Impact of Gaslighting on Partially Observed Stochastic Control
Authors:
Shutian Liu,
Quanyan Zhu
Abstract:
Recent years have witnessed a significant increase in cyber crimes and system failures caused by misinformation. Many of these instances can be classified as gaslighting, which involves manipulating the perceptions of others through the use of information. In this paper, we propose a dynamic game-theoretic framework built on a partially observed stochastic control system to study gaslighting. The…
▽ More
Recent years have witnessed a significant increase in cyber crimes and system failures caused by misinformation. Many of these instances can be classified as gaslighting, which involves manipulating the perceptions of others through the use of information. In this paper, we propose a dynamic game-theoretic framework built on a partially observed stochastic control system to study gaslighting. The decision-maker (DM) in the game only accesses partial observations, and she determines the controls by constructing information states that capture her perceptions of the system. The gaslighter in the game influences the system indirectly by designing the observations to manipulate the DM's perceptions and decisions. We analyze the impact of the gaslighter's efforts using robustness analysis of the information states and optimal value to deviations in the observations. A stealthiness constraint is introduced to restrict the power of the gaslighter and to help him stay undetected. We consider approximate feedback Stackelberg equilibrium as the solution concept and estimate the cost of gaslighting.
△ Less
Submitted 3 April, 2023;
originally announced April 2023.
-
Detection in Human-sensor Systems under Quantum Prospect Theory using Bayesian Persuasion Frameworks
Authors:
Yinan Hu,
Quanyan Zhu
Abstract:
Human-sensor systems have a wide range of applications in fields such as robotics, healthcare, and finance. These systems utilize sensors to observe the true state of nature and generate strategically designed signals, aiding humans in making more accurate decisions regarding the state of nature. We adopt a Bayesian persuasion framework that is integrated with quantum prospect theories. In this fr…
▽ More
Human-sensor systems have a wide range of applications in fields such as robotics, healthcare, and finance. These systems utilize sensors to observe the true state of nature and generate strategically designed signals, aiding humans in making more accurate decisions regarding the state of nature. We adopt a Bayesian persuasion framework that is integrated with quantum prospect theories. In this framework, we develop a detection scheme where humans aim to determine the true state by observing the realization of quantum states from the sensor. We derive the optimal signaling rule for the sensor and the optimal decision rule for humans. We discover that this scenario violates the total law of probability. Furthermore, we examine how the concepts of rationality can influence the human detection performance and the signaling rules employed by the sensor.
△ Less
Submitted 19 October, 2023; v1 submitted 20 March, 2023;
originally announced March 2023.
-
Integrative Modeling and Analysis of the Interplay Between Epidemic and News Propagation Processes
Authors:
Madhu Dhiman,
Chen Peng,
Veeraruna Kavitha,
Quanyan Zhu
Abstract:
The COVID-19 pandemic has witnessed the role of online social networks (OSNs) in the spread of infectious diseases. The rise in severity of the epidemic augments the need for proper guidelines, but also promotes the propagation of fake news-items. The popularity of a news-item can reshape the public health behaviors and affect the epidemic processes. There is a clear inter-dependency between the e…
▽ More
The COVID-19 pandemic has witnessed the role of online social networks (OSNs) in the spread of infectious diseases. The rise in severity of the epidemic augments the need for proper guidelines, but also promotes the propagation of fake news-items. The popularity of a news-item can reshape the public health behaviors and affect the epidemic processes. There is a clear inter-dependency between the epidemic process and the spreading of news-items. This work creates an integrative framework to understand the interplay. We first develop a population-dependent `saturated branching process' to continually track the propagation of trending news-items on OSNs. A two-time scale dynamical system is obtained by integrating the news-propagation model with SIRS epidemic model, to analyze the holistic system. It is observed that a pattern of periodic infections emerges under a linear behavioral influence, which explains the waves of infection and reinfection that we have experienced in the pandemic. We use numerical experiments to corroborate the results and use Twitter and COVID-19 data-sets to recreate the historical infection curve using the integrative model.
△ Less
Submitted 8 March, 2023;
originally announced March 2023.
-
Random attractors of a stochastic Hopfield neural network model with delays
Authors:
Wenjie Hu,
Quanxin Zhu,
Peter E. Kloeden
Abstract:
The global asymptotic behavior of a stochastic Hopfield neural network model (HNNM) with delays is explored by studying the existence and structure of random attractors. It is first proved that the trajectory field of the stochastic delayed HNNM admits an almost sure continuous version, which is compact for $t>Ď„$ (where $Ď„$ is the delay) by a delicate construction based on the random semiflow gene…
▽ More
The global asymptotic behavior of a stochastic Hopfield neural network model (HNNM) with delays is explored by studying the existence and structure of random attractors. It is first proved that the trajectory field of the stochastic delayed HNNM admits an almost sure continuous version, which is compact for $t>Ď„$ (where $Ď„$ is the delay) by a delicate construction based on the random semiflow generated by the diffusion term. Then, this version is shown to generate a random dynamical system (RDS) by piece-wise linear approximation, after which the existence of a random absorbing set is obtained by a careful uniform apriori estimate of the solutions. Subsequently, the pullback asymptotic compactness of the RDS generated by the stochastic delayed HNNM is proved and hence the existence of random attractors is obtained. Moreover, sufficient conditions under which the attractors turn out to be an exponential attracting stationary solution are given. Numerical simulations are also conducted at last to illustrate the effectiveness of the established results.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
Invariant manifolds for stochastic delayed partial differential equations of parabolic type
Authors:
Wenjie Hu,
Quanxin Zhu,
Tomás Caraballo
Abstract:
The aim of this paper is to prove the existence and smoothness of stable and unstable invariant manifolds for a stochastic delayed partial differential equation of parabolic type. The stochastic delayed partial differential equation is firstly transformed into a random delayed partial differential equation by a conjugation, which is then recast into a Hilbert space. For the auxiliary equation, the…
▽ More
The aim of this paper is to prove the existence and smoothness of stable and unstable invariant manifolds for a stochastic delayed partial differential equation of parabolic type. The stochastic delayed partial differential equation is firstly transformed into a random delayed partial differential equation by a conjugation, which is then recast into a Hilbert space. For the auxiliary equation, the variation of constants formula holds and we show the existence of Lipschitz continuous stable and unstable manifolds by the Lyapunov-Perron method. Subsequently, we prove the smoothness of these invariant manifolds under appropriate spectral gap condition by carefully investigating the smoothness of auxiliary equation, after which, we obtain the invariant manifolds of the original equation by projection and inverse transformation. Eventually, we illustrate the obtained theoretical results by their application to a stochastic single-species population model.
△ Less
Submitted 12 June, 2023; v1 submitted 10 February, 2023;
originally announced February 2023.
-
Random attractors for a stochastic nonlocal delayed reaction-diffusion equation on a semi-infinite interval
Authors:
Wenjie Hu,
Quanxin Zhu,
Tomás Caraballo
Abstract:
The aim of this paper is to prove the existence and qualitative property of random attractors for a stochastic nonlocal delayed reaction-diffusion equation (SNDRDE) on a semi-infinite interval with a Dirichlet boundary condition on the finite end. This equation models the spatial-temporal evolution of the mature individuals for a two-stage species whose juvenile and adults both diffuse that lives…
▽ More
The aim of this paper is to prove the existence and qualitative property of random attractors for a stochastic nonlocal delayed reaction-diffusion equation (SNDRDE) on a semi-infinite interval with a Dirichlet boundary condition on the finite end. This equation models the spatial-temporal evolution of the mature individuals for a two-stage species whose juvenile and adults both diffuse that lives on a semi-infinite domain and subject to random perturbations. By transforming the SNDRDE into a random evolution equation with delay, by means of a stationary conjugate transformation, we first establish the global existence and uniqueness of solutions to the equation, after which we show the solutions generate a random dynamical system. Then, we deduce uniform a priori estimates of the solutions and show the existence of bounded random absorbing sets. Subsequently, we prove the pullback asymptotic compactness of the random dynamical system generated by the SNDRDE with respect to the compact open topology, and hence obtain the existence of random attractors. At last, it is proved that the random attractor is an exponentially attracting stationary solution under appropriate conditions.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
Cognitive Level-$k$ Meta-Learning for Safe and Pedestrian-Aware Autonomous Driving
Authors:
Haozhe Lei,
Quanyan Zhu
Abstract:
The potential market for modern self-driving cars is enormous, as they are developing remarkably rapidly. At the same time, however, accidents of pedestrian fatalities caused by autonomous driving have been recorded in the case of street crossing. To ensure traffic safety in self-driving environments and respond to vehicle-human interaction challenges such as jaywalking, we propose Level-$k$ Meta…
▽ More
The potential market for modern self-driving cars is enormous, as they are developing remarkably rapidly. At the same time, however, accidents of pedestrian fatalities caused by autonomous driving have been recorded in the case of street crossing. To ensure traffic safety in self-driving environments and respond to vehicle-human interaction challenges such as jaywalking, we propose Level-$k$ Meta Reinforcement Learning (LK-MRL) algorithm. It takes into account the cognitive hierarchy of pedestrian responses and enables self-driving vehicles to adapt to various human behaviors. %which takes into account pedestrian responses while learning the optimal strategies. As a self-driving vehicle algorithm, the LK-MRL combines level-$k$ thinking into MAML to prepare for heterogeneous pedestrians and improve intersection safety based on the combination of meta-reinforcement learning and human cognitive hierarchy framework. We evaluate the algorithm in two cognitive confrontation hierarchy scenarios in an urban traffic simulator and illustrate its role in ensuring road safety by demonstrating its capability of conjectural and higher-level reasoning.
△ Less
Submitted 1 February, 2023; v1 submitted 17 December, 2022;
originally announced December 2022.
-
Finitely Repeated Adversarial Quantum Hypothesis Testing
Authors:
Yinan Hu,
Quanyan Zhu
Abstract:
We formulate a passive quantum detector based on a quantum hypothesis testing framework under the setting of finite sample size. In particular, we exploit the fundamental limits of performance of the passive quantum detector asymptotically. Under the assumption that the attacker adopts separable optimal strategies, we derive that the worst-case average error bound converges to zero exponentially i…
▽ More
We formulate a passive quantum detector based on a quantum hypothesis testing framework under the setting of finite sample size. In particular, we exploit the fundamental limits of performance of the passive quantum detector asymptotically. Under the assumption that the attacker adopts separable optimal strategies, we derive that the worst-case average error bound converges to zero exponentially in terms of the number of repeated observations, which serves as a variation of quantum Sanov's theorem. We illustrate the general decaying results of miss rate numerically, depicting that the `naive' detector manages to achieve a miss rate and a false alarm rate both exponentially decaying to zero given infinitely many quantum states, although the miss rate decays to zero at a much slower rate than a quantum non-adversarial counterpart. Finally we adopt our formulations upon a case study of detection with quantum radars.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
Deep unfolding as iterative regularization for imaging inverse problems
Authors:
Zhuo-Xu Cui,
Qingyong Zhu,
Jing Cheng,
Dong Liang
Abstract:
Recently, deep unfolding methods that guide the design of deep neural networks (DNNs) through iterative algorithms have received increasing attention in the field of inverse problems. Unlike general end-to-end DNNs, unfolding methods have better interpretability and performance. However, to our knowledge, their accuracy and stability in solving inverse problems cannot be fully guaranteed. To bridg…
▽ More
Recently, deep unfolding methods that guide the design of deep neural networks (DNNs) through iterative algorithms have received increasing attention in the field of inverse problems. Unlike general end-to-end DNNs, unfolding methods have better interpretability and performance. However, to our knowledge, their accuracy and stability in solving inverse problems cannot be fully guaranteed. To bridge this gap, we modified the training procedure and proved that the unfolding method is an iterative regularization method. More precisely, we jointly learn a convex penalty function adversarially by an input-convex neural network (ICNN) to characterize the distance to a real data manifold and train a DNN unfolded from the proximal gradient descent algorithm with this learned penalty. Suppose the real data manifold intersects the inverse problem solutions with only the unique real solution. We prove that the unfolded DNN will converge to it stably. Furthermore, we demonstrate with an example of MRI reconstruction that the proposed method outperforms conventional unfolding methods and traditional regularization methods in terms of reconstruction quality, stability and convergence speed.
△ Less
Submitted 24 November, 2022;
originally announced November 2022.
-
Quantum Man-in-the-middle Attacks: a Game-theoretic Approach with Applications to Radars
Authors:
Yinan Hu,
Quanyan Zhu
Abstract:
The detection and discrimination of quantum states serve a crucial role in quantum signal processing, a discipline that studies methods and techniques to process signals that obey the quantum mechanics frameworks. However, just like classical detection, evasive behaviors also exist in quantum detection. In this paper, we formulate an adversarial quantum detection scenario where the detector is pas…
▽ More
The detection and discrimination of quantum states serve a crucial role in quantum signal processing, a discipline that studies methods and techniques to process signals that obey the quantum mechanics frameworks. However, just like classical detection, evasive behaviors also exist in quantum detection. In this paper, we formulate an adversarial quantum detection scenario where the detector is passive and does not know the quantum states have been distorted by an attacker. We compare the performance of a passive detector with the one of a non-adversarial detector to demonstrate how evasive behaviors can undermine the performance of quantum detection. We use a case study of target detection with quantum radars to corroborate our analytical results.
△ Less
Submitted 27 January, 2023; v1 submitted 3 November, 2022;
originally announced November 2022.
-
Neural Stochastic Control
Authors:
Jingdong Zhang,
Qunxi Zhu,
Wei Lin
Abstract:
Control problems are always challenging since they arise from the real-world systems where stochasticity and randomness are of ubiquitous presence. This naturally and urgently calls for developing efficient neural control policies for stabilizing not only the deterministic equations but the stochastic systems as well. Here, in order to meet this paramount call, we propose two types of controllers,…
▽ More
Control problems are always challenging since they arise from the real-world systems where stochasticity and randomness are of ubiquitous presence. This naturally and urgently calls for developing efficient neural control policies for stabilizing not only the deterministic equations but the stochastic systems as well. Here, in order to meet this paramount call, we propose two types of controllers, viz., the exponential stabilizer (ES) based on the stochastic Lyapunov theory and the asymptotic stabilizer (AS) based on the stochastic asymptotic stability theory. The ES can render the controlled systems exponentially convergent but it requires a long computational time; conversely, the AS makes the training much faster but it can only assure the asymptotic (not the exponential) attractiveness of the control targets. These two stochastic controllers thus are complementary in applications. We also investigate rigorously the linear controller and the proposed neural stochastic controllers in both convergence time and energy cost and numerically compare them in these two indexes. More significantly, we use several representative physical systems to illustrate the usefulness of the proposed controllers in stabilization of dynamical systems.
△ Less
Submitted 15 September, 2022;
originally announced September 2022.
-
The $g$-extra connectivity of the strong product of paths and cycles
Authors:
Qinze Zhu,
Yingzhi Tian
Abstract:
Let $G$ be a connected graph and $g$ be a non-negative integer. The $g$-extra connectivity of $G$ is the minimum cardinality of a set of vertices in $G$, if it exists, whose removal disconnects $G$ and leaves every component with more than $g$ vertices. The strong product $G_1 \boxtimes G_2$ of graphs $G_1=(V_{1}, E_{1})$ and $G_2=(V_{2}, E_{2})$ is the graph with vertex set…
▽ More
Let $G$ be a connected graph and $g$ be a non-negative integer. The $g$-extra connectivity of $G$ is the minimum cardinality of a set of vertices in $G$, if it exists, whose removal disconnects $G$ and leaves every component with more than $g$ vertices. The strong product $G_1 \boxtimes G_2$ of graphs $G_1=(V_{1}, E_{1})$ and $G_2=(V_{2}, E_{2})$ is the graph with vertex set $V(G_1 \boxtimes G_2)=V_{1} \times V_{2}$, where two distinct vertices $(x_{1}, x_{2}), (y_{1}, y_{2}) \in V_{1} \times V_{2}$ are adjacent in $G_1 \boxtimes G_2$ if and only if $x_{i}=y_{i}$ or $x_{i} y_{i} \in E_{i}$ for $i=1, 2$. In this paper, we obtain the $g$-extra connectivity of the strong product of two paths, the strong product of a path and a cycle, and the strong product of two cycles.
△ Less
Submitted 17 August, 2022;
originally announced August 2022.
-
The Inverse Problem of Linear-Quadratic Differential Games: When is a Control Strategies Profile Nash?
Authors:
Yunhan Huang,
Tao Zhang,
Quanyan Zhu
Abstract:
This paper aims to formulate and study the inverse problem of non-cooperative linear quadratic games: Given a profile of control strategies, find cost parameters for which this profile of control strategies is Nash. We formulate the problem as a leader-followers problem, where a leader aims to implant a desired profile of control strategies among selfish players. In this paper, we leverage frequen…
▽ More
This paper aims to formulate and study the inverse problem of non-cooperative linear quadratic games: Given a profile of control strategies, find cost parameters for which this profile of control strategies is Nash. We formulate the problem as a leader-followers problem, where a leader aims to implant a desired profile of control strategies among selfish players. In this paper, we leverage frequency-domain techniques to develop a necessary and sufficient condition on the existence of cost parameters for a given profile of stabilizing control strategies to be Nash under a given linear system. The necessary and sufficient condition includes the circle criterion for each player and a rank condition related to the transfer function of each player. The condition provides an analytical method to check the existence of such cost parameters, while previous studies need to solve a convex feasibility problem numerically to answer the same question. We develop an identity in frequency-domain representation to characterize the cost parameters, which we refer to as the Kalman equation. The Kalman equation reduces redundancy in the time-domain analysis that involves solving a convex feasibility problem. Using the Kalman equation, we also show the leader can enforce the same Nash profile by applying penalties on the shared state instead of penalizing the player for other players' actions to avoid the impression of unfairness.
△ Less
Submitted 13 July, 2022; v1 submitted 12 July, 2022;
originally announced July 2022.
-
A Modification Piecewise Convexification Method for Box-Constrained Non-Convex Optimization Programs
Authors:
Qiao Zhu,
Liping Tang,
Xinmin Yang
Abstract:
This paper presents a piecewise convexification method to approximate the whole approximate optimal solution set of non-convex optimization problems with box constraints. In the process of box division, we first classify the sub-boxes and only continue to divide only some sub-boxes in the subsequent division. At the same time, applying the $α$-based Branch-and-Bound ({\rm$α$BB}) method, we constru…
▽ More
This paper presents a piecewise convexification method to approximate the whole approximate optimal solution set of non-convex optimization problems with box constraints. In the process of box division, we first classify the sub-boxes and only continue to divide only some sub-boxes in the subsequent division. At the same time, applying the $α$-based Branch-and-Bound ({\rm$α$BB}) method, we construct a series of piecewise convex relax sub-problems, which are collectively called the piecewise convexification problem of the original problem. Then, we define the (approximate) solution set of the piecewise convexification problem based on the classification result of sub-boxes. Subsequently, we derive that these sets can be used to approximate the global solution set with a predefined quality. Finally, a piecewise convexification algorithm with a new selection rule of sub-box for the division and two new termination tests is proposed. Several instances verify that these techniques are beneficial to improve the performance of the algorithm.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
Stackelberg Risk Preference Design
Authors:
Shutian Liu,
Quanyan Zhu
Abstract:
Risk measures are commonly used to capture the risk preferences of decision-makers (DMs). The decisions of DMs can be nudged or manipulated when their risk preferences are influenced by factors such as the availability of information about the uncertainties. This work proposes a Stackelberg risk preference design (STRIPE) problem to capture a designer's incentive to influence DMs' risk preferences…
▽ More
Risk measures are commonly used to capture the risk preferences of decision-makers (DMs). The decisions of DMs can be nudged or manipulated when their risk preferences are influenced by factors such as the availability of information about the uncertainties. This work proposes a Stackelberg risk preference design (STRIPE) problem to capture a designer's incentive to influence DMs' risk preferences. STRIPE consists of two levels. In the lower level, individual DMs in a population, known as the followers, respond to uncertainties according to their risk preference types. In the upper level, the leader influences the distribution of the types to induce targeted decisions and steers the follower's preferences to it. Our analysis centers around the solution concept of approximate Stackelberg equilibrium that yields suboptimal behaviors of the players. We show the existence of the approximate Stackelberg equilibrium. The primitive risk perception gap, defined as the Wasserstein distance between the original and the target type distributions, is important in estimating the optimal design cost. We connect the leader's optimality compromise on the cost with her ambiguity tolerance on the follower's approximate solutions leveraging Lipschitzian properties of the lower level solution mapping. To obtain the Stackelberg equilibrium, we reformulate STRIPE into a single-level optimization problem using the spectral representations of law-invariant coherent risk measures. We create a data-driven approach for computation and study its performance guarantees. We apply STRIPE to contract design problems under approximate incentive compatibility. Moreover, we connect STRIPE with meta-learning problems and derive adaptation performance estimates of the meta-parameters.
△ Less
Submitted 27 November, 2023; v1 submitted 26 June, 2022;
originally announced June 2022.
-
A Piecewise Convexification Method for Non-Convex Multi-Objective Optimization Programs with Box Constraints
Authors:
Q. Zhu,
L. P. Tang,
X. M. Yang
Abstract:
This paper presents a piecewise convexification method for solving non-convex multi-objective optimization problems with box constraints. Based on the ideas of the $α$-based Branch and Bound (${\rm αBB}$) method of global optimization and the interval subdivision, a series of convex relaxation sub-multiobjective problems for this non-convex multi-objective optimization problem are firstly obtained…
▽ More
This paper presents a piecewise convexification method for solving non-convex multi-objective optimization problems with box constraints. Based on the ideas of the $α$-based Branch and Bound (${\rm αBB}$) method of global optimization and the interval subdivision, a series of convex relaxation sub-multiobjective problems for this non-convex multi-objective optimization problem are firstly obtained, and these sub-problems constitute a piecewise convexification problem of the original problem on the whole box. We then construct the (approximate, weakly) efficient solution set of this piecewise convexification problem, and use these sets to approximate the globally (weakly) efficient solution set of the original problem. Furthermore, we propose a piecewise convexification algorithm and show that this algorithm can also obtain approximate globally efficient solutions by calculating a finite subset of the efficient solution set of the multi-objective convex sub-problems only. Finally, its performance is demonstrated with various test instances.
△ Less
Submitted 25 June, 2022;
originally announced June 2022.
-
Priori Error Estimate of Deep Mixed Residual Method for Elliptic PDEs
Authors:
Lingfeng Li,
Xue-cheng Tai,
Jiang Yang,
Quanhui Zhu
Abstract:
In this work, we derive a priori error estimate of the mixed residual method when solving some elliptic PDEs. Our work is the first theoretical study of this method. We prove that the neural network solutions will converge if we increase the training samples and network size without any constraint on the ratio of training samples to the network size. Besides, our results suggest that the mixed res…
▽ More
In this work, we derive a priori error estimate of the mixed residual method when solving some elliptic PDEs. Our work is the first theoretical study of this method. We prove that the neural network solutions will converge if we increase the training samples and network size without any constraint on the ratio of training samples to the network size. Besides, our results suggest that the mixed residual method can recover high order derivatives better than the deep Ritz method, which has also been verified by our numerical experiments.
△ Less
Submitted 15 June, 2022;
originally announced June 2022.
-
On the Rational Bredon Cohomology of Equivariant Configuration Spaces
Authors:
Qiaofeng Zhu
Abstract:
Bredon cohomology is a cohomology theory that applies to topological spaces equipped with the group actions. For any group G, given a real linear representation V , the configuration space of V has a natural diagonal G-action. In the paper we study this group action on the configuration space and give a decomposition of the homology Bredon coefficient system of the configuration space and apply th…
▽ More
Bredon cohomology is a cohomology theory that applies to topological spaces equipped with the group actions. For any group G, given a real linear representation V , the configuration space of V has a natural diagonal G-action. In the paper we study this group action on the configuration space and give a decomposition of the homology Bredon coefficient system of the configuration space and apply this to compute rational Bredon cohomology of the configuration space for small nonabelian group G.
△ Less
Submitted 19 April, 2022;
originally announced April 2022.
-
Reinforcement Learning for Linear Quadratic Control is Vulnerable Under Cost Manipulation
Authors:
Yunhan Huang,
Quanyan Zhu
Abstract:
In this work, we study the deception of a Linear-Quadratic-Gaussian (LQG) agent by manipulating the cost signals. We show that a small falsification of the cost parameters will only lead to a bounded change in the optimal policy. The bound is linear on the amount of falsification the attacker can apply to the cost parameters. We propose an attack model where the attacker aims to mislead the agent…
▽ More
In this work, we study the deception of a Linear-Quadratic-Gaussian (LQG) agent by manipulating the cost signals. We show that a small falsification of the cost parameters will only lead to a bounded change in the optimal policy. The bound is linear on the amount of falsification the attacker can apply to the cost parameters. We propose an attack model where the attacker aims to mislead the agent into learning a `nefarious' policy by intentionally falsifying the cost parameters. We formulate the attack's problem as a convex optimization problem and develop necessary and sufficient conditions to check the achievability of the attacker's goal.
We showcase the adversarial manipulation on two types of LQG learners: the batch RL learner and the other is the adaptive dynamic programming (ADP) learner. Our results demonstrate that with only 2.296% of falsification on the cost data, the attacker misleads the batch RL into learning the 'nefarious' policy that leads the vehicle to a dangerous position. The attacker can also gradually trick the ADP learner into learning the same `nefarious' policy by consistently feeding the learner a falsified cost signal that stays close to the actual cost signal. The paper aims to raise people's awareness of the security threats faced by RL-enabled control systems.
△ Less
Submitted 7 April, 2022; v1 submitted 11 March, 2022;
originally announced March 2022.
-
Neural Piecewise-Constant Delay Differential Equations
Authors:
Qunxi Zhu,
Yifei Shen,
Dongsheng Li,
Wei Lin
Abstract:
Continuous-depth neural networks, such as the Neural Ordinary Differential Equations (ODEs), have aroused a great deal of interest from the communities of machine learning and data science in recent years, which bridge the connection between deep neural networks and dynamical systems. In this article, we introduce a new sort of continuous-depth neural network, called the Neural Piecewise-Constant…
▽ More
Continuous-depth neural networks, such as the Neural Ordinary Differential Equations (ODEs), have aroused a great deal of interest from the communities of machine learning and data science in recent years, which bridge the connection between deep neural networks and dynamical systems. In this article, we introduce a new sort of continuous-depth neural network, called the Neural Piecewise-Constant Delay Differential Equations (PCDDEs). Here, unlike the recently proposed framework of the Neural Delay Differential Equations (DDEs), we transform the single delay into the piecewise-constant delay(s). The Neural PCDDEs with such a transformation, on one hand, inherit the strength of universal approximating capability in Neural DDEs. On the other hand, the Neural PCDDEs, leveraging the contributions of the information from the multiple previous time steps, further promote the modeling capability without augmenting the network dimension. With such a promotion, we show that the Neural PCDDEs do outperform the several existing continuous-depth neural frameworks on the one-dimensional piecewise-constant delay population dynamics and real-world datasets, including MNIST, CIFAR10, and SVHN.
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
Supercritical Spatial SIR Epidemics: Spreading Speed and Herd Immunity
Authors:
Xinghua Zheng,
Qingsan Zhu
Abstract:
We study supercritical spatial SIR epidemics on $\mathbb{Z}^2\times \{1,2,\ldots, N\}$, where each site in $\mathbb{Z}^2$ represents a village and $N$ stands for the village size. We establish several key asymptotic results as $N\to\infty$. In particular, we derive the probability that the epidemic will last forever if the epidemic is started by one infected individual. Moreover, conditional on th…
▽ More
We study supercritical spatial SIR epidemics on $\mathbb{Z}^2\times \{1,2,\ldots, N\}$, where each site in $\mathbb{Z}^2$ represents a village and $N$ stands for the village size. We establish several key asymptotic results as $N\to\infty$. In particular, we derive the probability that the epidemic will last forever if the epidemic is started by one infected individual. Moreover, conditional on that the epidemic lasts forever, we show that the epidemic spreads out linearly in all directions and derive an explicit formula for the spreading speed. Furthermore, we prove that the ultimate proportion of infection converges to a number that is constant over space and find its explicit value. An important message is that if there is no vaccination, then the ultimate proportion of population who will be infected can be \emph{much higher} than the vaccination proportion that is needed in order to prevent sustained spread of the infection.
△ Less
Submitted 29 November, 2021;
originally announced November 2021.
-
On trees with extremal extended spectral radius
Authors:
Junli Hu,
Xiaodan Chen,
Qiuyun Zhu
Abstract:
Let G be a simple connected graph with n vertices, and let d_i be the degree of the vertex v_i in G. The extended adjacency matrix of G is defined so that the ij-entry is 1/2(d_i/d_j+d_j/d_i) if the vertices v_i and v_j are adjacent in G, and 0 otherwise. This matrix was originally introduced for developing novel topological indices used in the QSPR/QSAR studies. In this paper, we consider extrema…
▽ More
Let G be a simple connected graph with n vertices, and let d_i be the degree of the vertex v_i in G. The extended adjacency matrix of G is defined so that the ij-entry is 1/2(d_i/d_j+d_j/d_i) if the vertices v_i and v_j are adjacent in G, and 0 otherwise. This matrix was originally introduced for developing novel topological indices used in the QSPR/QSAR studies. In this paper, we consider extremal problems of the largest eigenvalue of the extended adjacency matrix (also known as the extended spectral radius) of trees. We show that among all trees of order n>= 5, the path Pn(resp., the star Sn) uniquely minimizes (resp., maximizes) the extended spectral radius. We also determine the first five trees with the maximal extended spectral radius.
△ Less
Submitted 18 November, 2021;
originally announced November 2021.
-
RADAMS: Resilient and Adaptive Alert and Attention Management Strategy against Informational Denial-of-Service (IDoS) Attacks
Authors:
Linan Huang,
Quanyan Zhu
Abstract:
Attacks exploiting human attentional vulnerability have posed severe threats to cybersecurity. In this work, we identify and formally define a new type of proactive attentional attacks called Informational Denial-of-Service (IDoS) attacks that generate a large volume of feint attacks to overload human operators and hide real attacks among feints. We incorporate human factors (e.g., levels of exper…
▽ More
Attacks exploiting human attentional vulnerability have posed severe threats to cybersecurity. In this work, we identify and formally define a new type of proactive attentional attacks called Informational Denial-of-Service (IDoS) attacks that generate a large volume of feint attacks to overload human operators and hide real attacks among feints. We incorporate human factors (e.g., levels of expertise, stress, and efficiency) and empirical psychological results (e.g., the Yerkes-Dodson law and the sunk cost fallacy) to model the operators' attention dynamics and their decision-making processes along with the real-time alert monitoring and inspection. To assist human operators in dismissing the feints and escalating the real attacks timely and accurately, we develop a Resilient and Adaptive Data-driven alert and Attention Management Strategy (RADAMS) that de-emphasizes alerts selectively based on the abstracted category labels of the alerts. RADAMS uses reinforcement learning to achieve a customized and transferable design for various human operators and evolving IDoS attacks. The integrated modeling and theoretical analysis lead to the Product Principle of Attention (PPoA), fundamental limits, and the tradeoff among crucial human and economic factors. Experimental results corroborate that the proposed strategy outperforms the default strategy and can reduce the IDoS risk by as much as 20%. Besides, the strategy is resilient to large variations of costs, attack frequencies, and human attention capacities. We have recognized interesting phenomena such as attentional risk equivalency, attacker's dilemma, and the half-truth optimal attack strategy.
△ Less
Submitted 21 July, 2022; v1 submitted 1 November, 2021;
originally announced November 2021.
-
A Generalized Frank-Wolfe Method With "Dual Averaging" for Strongly Convex Composite Optimization
Authors:
Renbo Zhao,
Qiuyun Zhu
Abstract:
We propose a simple variant of the generalized Frank-Wolfe method for solving strongly convex composite optimization problems, by introducing an additional averaging step on the dual variables. We show that in this variant, one can choose a simple constant step-size and obtain a linear convergence rate on the duality gaps. By leveraging the convergence analysis of this variant, we then analyze the…
▽ More
We propose a simple variant of the generalized Frank-Wolfe method for solving strongly convex composite optimization problems, by introducing an additional averaging step on the dual variables. We show that in this variant, one can choose a simple constant step-size and obtain a linear convergence rate on the duality gaps. By leveraging the convergence analysis of this variant, we then analyze the local convergence rate of the logistic fictitious play algorithm, which is well-established in game theory but lacks any form of convergence rate guarantees. We show that, with high probability, this algorithm converges locally at rate $O(1/t)$, in terms of certain expected duality gap.
△ Less
Submitted 25 October, 2022; v1 submitted 29 June, 2021;
originally announced June 2021.
-
Assets Defending Differential Games with Partial Information and Selected Observations
Authors:
Yunhan Huang,
Juntao Chen,
Quanyan Zhu
Abstract:
In this paper, we consider a linear-quadratic-Gaussian defending assets differential game (DADG) where the attacker and the defender do not know each other's state information while they know the trajectory of a moving asset. Both players can choose to observe the other player's state information by paying a cost. The defender and the attacker have to craft both control strategies and observation…
▽ More
In this paper, we consider a linear-quadratic-Gaussian defending assets differential game (DADG) where the attacker and the defender do not know each other's state information while they know the trajectory of a moving asset. Both players can choose to observe the other player's state information by paying a cost. The defender and the attacker have to craft both control strategies and observation strategies. We obtain a closed-form feedback solution that characterizes the Nash control strategies. We show that the trajectory of the asset does not affect both players' observation choices. Moreover, we show that the observation choices of the defender and the attacker can be decoupled and the Nash observation strategies can be found by solving two independent optimization problems. A set of necessary conditions is developed to characterize the optimal observation instances. Based on the necessary conditions, an effective algorithm is proposed to numerically compute the optimal observation instances. A case study is presented to demonstrate the effectiveness of the optimal observation instances.
△ Less
Submitted 24 March, 2021;
originally announced March 2021.
-
A Local Deep Learning Method for Solving High Order Partial Differential Equations
Authors:
Quanhui Zhu,
Jiang Yang
Abstract:
At present, deep learning based methods are being employed to resolve the computational challenges of high-dimensional partial differential equations (PDEs). But the computation of the high order derivatives of neural networks is costly, and high order derivatives lack robustness for training purposes. We propose a novel approach to solving PDEs with high order derivatives by simultaneously approx…
▽ More
At present, deep learning based methods are being employed to resolve the computational challenges of high-dimensional partial differential equations (PDEs). But the computation of the high order derivatives of neural networks is costly, and high order derivatives lack robustness for training purposes. We propose a novel approach to solving PDEs with high order derivatives by simultaneously approximating the function value and derivatives. We introduce intermediate variables to rewrite the PDEs into a system of low order differential equations as what is done in the local discontinuous Galerkin method. The intermediate variables and the solutions to the PDEs are simultaneously approximated by a multi-output deep neural network. By taking the residual of the system as a loss function, we can optimize the network parameters to approximate the solution. The whole process relies on low order derivatives. Numerous numerical examples are carried out to demonstrate that our local deep learning is efficient, robust, flexible, and is particularly well-suited for high-dimensional PDEs with high order derivatives.
△ Less
Submitted 16 March, 2021;
originally announced March 2021.
-
Neural Delay Differential Equations
Authors:
Qunxi Zhu,
Yao Guo,
Wei Lin
Abstract:
Neural Ordinary Differential Equations (NODEs), a framework of continuous-depth neural networks, have been widely applied, showing exceptional efficacy in coping with some representative datasets. Recently, an augmented framework has been successfully developed for conquering some limitations emergent in application of the original framework. Here we propose a new class of continuous-depth neural…
▽ More
Neural Ordinary Differential Equations (NODEs), a framework of continuous-depth neural networks, have been widely applied, showing exceptional efficacy in coping with some representative datasets. Recently, an augmented framework has been successfully developed for conquering some limitations emergent in application of the original framework. Here we propose a new class of continuous-depth neural networks with delay, named as Neural Delay Differential Equations (NDDEs), and, for computing the corresponding gradients, we use the adjoint sensitivity method to obtain the delayed dynamics of the adjoint. Since the differential equations with delays are usually seen as dynamical systems of infinite dimension possessing more fruitful dynamics, the NDDEs, compared to the NODEs, own a stronger capacity of nonlinear representations. Indeed, we analytically validate that the NDDEs are of universal approximators, and further articulate an extension of the NDDEs, where the initial function of the NDDEs is supposed to satisfy ODEs. More importantly, we use several illustrative examples to demonstrate the outstanding capacities of the NDDEs and the NDDEs with ODEs' initial value. Specifically, (1) we successfully model the delayed dynamics where the trajectories in the lower-dimensional phase space could be mutually intersected, while the traditional NODEs without any argumentation are not directly applicable for such modeling, and (2) we achieve lower loss and higher accuracy not only for the data produced synthetically by complex models but also for the real-world image datasets, i.e., CIFAR10, MNIST, and SVHN. Our results on the NDDEs reveal that appropriately articulating the elements of dynamical systems into the network design is truly beneficial to promoting the network performance.
△ Less
Submitted 22 February, 2021;
originally announced February 2021.
-
Self-Triggered Markov Decision Processes
Authors:
Yunhan Huang,
Quanyan Zhu
Abstract:
In this paper, we study Markov Decision Processes (MDPs) with self-triggered strategies, where the idea of self-triggered control is extended to more generic MDP models. This extension broadens the application of self-triggering policies to a broader range of systems. We study the co-design problems of the control policy and the triggering policy to optimize two pre-specified cost criteria. The fi…
▽ More
In this paper, we study Markov Decision Processes (MDPs) with self-triggered strategies, where the idea of self-triggered control is extended to more generic MDP models. This extension broadens the application of self-triggering policies to a broader range of systems. We study the co-design problems of the control policy and the triggering policy to optimize two pre-specified cost criteria. The first cost criterion is introduced by incorporating a pre-specified update penalty into the traditional MDP cost criteria to reduce the use of communication resources. Under this criteria, a novel dynamic programming (DP) equation called DP equation with optimized lookahead to proposed to solve for the self-triggering policy under this criteria. The second self-triggering policy is to maximize the triggering time while still guaranteeing a pre-specified level of sub-optimality. Theoretical underpinnings are established for the computation and implementation of both policies. Through a gridworld numerical example, we illustrate the two policies' effectiveness in reducing sources consumption and demonstrate the trade-offs between resource consumption and system performance.
△ Less
Submitted 16 February, 2021;
originally announced February 2021.
-
A Pursuit-Evasion Differential Game with Strategic Information Acquisition
Authors:
Yunhan Huang,
Quanyan Zhu
Abstract:
This paper studies a two-person linear-quadratic-Gaussian pursuit-evasion differential game with costly but controlled information. One player can decide when to observe the other player's state. However, one observation of another player's state comes with two costs: the direct cost of observing and the implicit cost of exposing his state. We call games of this type a Pursuit-Evasion-Exposure-Con…
▽ More
This paper studies a two-person linear-quadratic-Gaussian pursuit-evasion differential game with costly but controlled information. One player can decide when to observe the other player's state. However, one observation of another player's state comes with two costs: the direct cost of observing and the implicit cost of exposing his state. We call games of this type a Pursuit-Evasion-Exposure-Concealment (PEEC) game. The PEEC game constitutes two types of strategies: The control strategies and the observation strategies. We fully characterize the Nash control strategies of the PEEC game using techniques such as completing squares and the calculus of variations. We show that the derivation of the Nash observation strategies and the Nash control strategies can be decoupled. We develop a set of necessary conditions that facilitate the numerical computation of the Nash observation strategies. We show, in theory, that players with less maneuverability prefer concealment to exposure. We also show that when the game's horizon goes to infinity, the Nash observation strategy is to observe periodically, and the expected distance between the pursuer and the evader goes to zero with a bounded second moment. We conducted a series of numerical experiments to study the proposed PEEC game. We illustrate the numerical results using both figures and animation. Numerical results show that the pursuer can maintain high-grade performance even when the number of observations is limited. We also show that an evader with low maneuverability can still escape if the evader increases his stealthiness.
△ Less
Submitted 24 April, 2022; v1 submitted 10 February, 2021;
originally announced February 2021.
-
Feedback Capacity of Parallel ACGN Channels and Kalman Filter: Power Allocation with Feedback
Authors:
Song Fang,
Quanyan Zhu
Abstract:
In this paper, we relate the feedback capacity of parallel additive colored Gaussian noise (ACGN) channels to a variant of the Kalman filter. By doing so, we obtain lower bounds on the feedback capacity of such channels, as well as the corresponding feedback (recursive) coding schemes, which are essentially power allocation policies with feedback, to achieve the bounds. The results are seen to red…
▽ More
In this paper, we relate the feedback capacity of parallel additive colored Gaussian noise (ACGN) channels to a variant of the Kalman filter. By doing so, we obtain lower bounds on the feedback capacity of such channels, as well as the corresponding feedback (recursive) coding schemes, which are essentially power allocation policies with feedback, to achieve the bounds. The results are seen to reduce to existing lower bounds in the case of a single ACGN feedback channel, whereas when it comes to parallel additive white Gaussian noise (AWGN) channels with feedback, the recursive coding scheme reduces to a feedback "water-filling" power allocation policy.
△ Less
Submitted 15 February, 2021; v1 submitted 4 February, 2021;
originally announced February 2021.
-
Infinite-Horizon Linear-Quadratic-Gaussian Control with Costly Measurements
Authors:
Yunhan Huang,
Quanyan Zhu
Abstract:
In this paper, we consider an infinite horizon Linear-Quadratic-Gaussian control problem with controlled and costly measurements. A control strategy and a measurement strategy are co-designed to optimize the trade-off among control performance, actuating costs, and measurement costs. We address the co-design and co-optimization problem by establishing a dynamic programming equation with controlled…
▽ More
In this paper, we consider an infinite horizon Linear-Quadratic-Gaussian control problem with controlled and costly measurements. A control strategy and a measurement strategy are co-designed to optimize the trade-off among control performance, actuating costs, and measurement costs. We address the co-design and co-optimization problem by establishing a dynamic programming equation with controlled lookahead. By leveraging the dynamic programming equation, we fully characterize the optimal control strategy and the measurement strategy analytically. The optimal control is linear in the state estimate that depends on the measurement strategy. We prove that the optimal measurement strategy is independent of the measured state and is periodic. And the optimal period length is determined by the cost of measurements and system parameters. We demonstrate the potential application of the co-design and co-optimization problem in an optimal self-triggered control paradigm. Two examples are provided to show the effectiveness of the optimal measurement strategy in reducing the overhead of measurements while keeping the system performance.
△ Less
Submitted 29 December, 2020;
originally announced December 2020.
-
Fundamental Limits of Controlled Stochastic Dynamical Systems: An Information-Theoretic Approach
Authors:
Song Fang,
Quanyan Zhu
Abstract:
In this paper, we examine the fundamental performance limitations in the control of stochastic dynamical systems; more specifically, we derive generic $\mathcal{L}_p$ bounds that hold for any causal (stabilizing) controllers and any stochastic disturbances, by an information-theoretic analysis. We first consider the scenario where the plant (i.e., the dynamical system to be controlled) is linear t…
▽ More
In this paper, we examine the fundamental performance limitations in the control of stochastic dynamical systems; more specifically, we derive generic $\mathcal{L}_p$ bounds that hold for any causal (stabilizing) controllers and any stochastic disturbances, by an information-theoretic analysis. We first consider the scenario where the plant (i.e., the dynamical system to be controlled) is linear time-invariant, and it is seen in general that the lower bounds are characterized by the unstable poles (or nonminimum-phase zeros) of the plant as well as the conditional entropy of the disturbance. We then analyze the setting where the plant is assumed to be (strictly) causal, for which case the lower bounds are determined by the conditional entropy of the disturbance. We also discuss the special cases of $p = 2$ and $p = \infty$, which correspond to minimum-variance control and controlling the maximum deviations, respectively. In addition, we investigate the power-spectral characterization of the lower bounds as well as its relation to the Kolmogorov-Szegö formula.
△ Less
Submitted 3 June, 2021; v1 submitted 22 December, 2020;
originally announced December 2020.