Electrical and Electronic Engineering - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 6 of 6
  • Item
    Thumbnail Image
    Optimal contract design for effort-averse sensors
    Farokhi, F ; Shames, I ; Cantoni, M (Taylor & Francis, 2018-06-28)
    A central planner wishes to engage a collection of sensors to measure a quantity. Each sensor seeks to trade-off the effort it invests to obtain and report a measurement, against contracted reward. Assuming that measurement quality improves as a sensor increases the effort it invests, the problem of reward contract design is investigated. To this end, a game is formulated between the central planner and the sensors. Using this game, it is established that the central planner can enhance the quality of the estimate by rewarding each sensor based on the distance between the average of the received measurements and the measurement provided by the sensor. Optimal contracts are designed from the perspective of the budget required to achieve a specified level of error performance.
  • Item
    Thumbnail Image
    Ensuring privacy with constrained additive noise by minimizing Fisher information
    Farokhi, F ; Sandberg, H (PERGAMON-ELSEVIER SCIENCE LTD, 2019-01)
    The problem of preserving the privacy of individual entries of a database when responding to linear or nonlinear queries with constrained additive noise is considered. For privacy protection, the response to the query is systematically corrupted with an additive random noise whose support is a subset or equal to a pre-defined constraint set. A measure of privacy using the inverse of the trace of the Fisher information matrix is developed. The Cramér–Rao bound relates the variance of any estimator of the database entries to the introduced privacy measure. The probability density that minimizes the trace of the Fisher information (as a proxy for maximizing the measure of privacy) is computed. An extension to dynamic problems is also presented. Finally, the results are compared to the differential privacy methodology.
  • Item
    Thumbnail Image
    Optimal Stochastic Evasive Maneuvers Using the Schrodinger's Equation
    Farokhi, F ; Egerstedt, M (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2019-07)
    In this letter, preys with stochastic evasion policies are considered. The stochasticity adds unpredictable changes to the prey's path for avoiding predator's attacks. The prey's cost function is composed of two terms balancing the unpredictability factor (by using stochasticity to make the task of forecasting its future positions by the predator difficult) and energy consumption (the least amount of energy required for performing a maneuver). The optimal probability density functions of the actions of the prey for trading-off unpredictability and energy consumption is shown to be characterized by the stationary Schrödinger's equation.
  • Item
    Thumbnail Image
    Development and Analysis of Deterministic Privacy-Preserving Policies Using Non- Stochastic Information Theory
    Farokhi, F (IEEE, 2019-10)
    A deterministic privacy metric using non-stochastic information theory is developed. Particularly, maximin information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy. Anyone can submit a query to a trusted agent with access to a non-stochastic uncertain private dataset. Optimal deterministic privacy-preserving policies for responding to the submitted query are computed by maximizing the measure of privacy subject to a constraint on the worst-case quality of the response (i.e., the worst-case difference between the response by the agent and the output of the query computed on the private dataset). The optimal privacy-preserving policy is proved to be a piecewise constant function in the form of a quantization operator applied on the output of the submitted query. The measure of privacy is also used to analyze $k$ -anonymity (a popular deterministic mechanism for privacy-preserving release of datasets using suppression and generalization techniques), proving that it is in fact not privacy preserving.
  • Item
    Thumbnail Image
    Security analysis of cyber-physical systems using H-2 norm
    Shames, I ; Farokhi, F ; Summers, TH (INST ENGINEERING TECHNOLOGY-IET, 2017-07-14)
    In this paper, we study the effect of attacks on networked systems and propose a new security index to analyze the impact of such attacks using H2 norms of attacks to target and monitoring outputs. In addition, we pose, and subsequently solve, optimisation problems for selecting inputs or outputs that point to attacks with maximum impact and least detectability. To demonstrate the applicability of the analysis methods proposed in this paper IEEE 9-bus and 50-generator 145- bus systems are considered as test cases.
  • Item
    Thumbnail Image
    Promoting Truthful Behavior in Participatory-Sensing Mechanisms
    Farokhi, F ; Shames, I ; Cantoni, M (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2015-10)