Electrical and Electronic Engineering - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 6 of 6
  • Item
    No Preview Available
    TRACKING AND REGRET BOUNDS FOR ONLINE ZEROTH-ORDER EUCLIDEAN AND RIEMANNIAN OPTIMIZATION
    Maass, A ; Manzie, C ; Nesic, D ; Manton, JH ; Shames, I (SIAM PUBLICATIONS, 2022)
  • Item
    Thumbnail Image
    Asynchronous Distributed Optimization via Dual Decomposition and Block Coordinate Subgradient Methods
    Lin, Y ; Shames, I ; Nesic, D (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2021-09)
    In this article, we study the problem of minimizing the sum of potentially nondifferentiable convex cost functions with partially overlapping dependences in an asynchronous manner, where communication in the network is not coordinated. We study the behavior of an asynchronous algorithm based on dual decomposition and block coordinate subgradient methods under assumptions weaker than those used in the literature. At the same time, we allow different agents to use local stepsizes with no global coordination. Sufficient conditions are provided for almost sure convergence to the solution of the optimization problem. Under additional assumptions, we establish a sublinear convergence rate that, in turn, can be strengthened to the linear convergence rate if the problem is strongly convex and has Lipschitz gradients. We also extend available results in the literature by allowing multiple and potentially overlapping blocks to be updated at the same time with nonuniform and potentially time-varying probabilities assigned to different blocks. A numerical example is provided to illustrate the effectiveness of the algorithm.
  • Item
    Thumbnail Image
    Security metrics and synthesis of secure control systems
    Murguia, C ; Shames, I ; Ruths, J ; Nešić, D (Elsevier Inc., 2020-05-01)
    The term stealthy has come to encompass a variety of techniques that attackers can employ to avoid being detected. In this manuscript, for a class of perturbed linear time-invariant systems, we propose two security metrics to quantify the potential impact that stealthy attacks could have on the system dynamics by tampering with sensor measurements. We provide analysis tools to quantify these metrics for given system dynamics, control, and system monitor. Then, we provide synthesis tools (in terms of semidefinite programs) to redesign controllers and monitors such that the impact of stealthy attacks is minimized and the required attack-free system performance is guaranteed.
  • Item
    Thumbnail Image
    Privacy Against State Estimation: An Optimization Framework based on the Data Processing Inequality
    Murguia, C ; Shames, I ; Farokhi, F ; Nesic, D (ELSEVIER, 2020-01-01)
    Information about the system state is obtained through noisy sensor measurements. This data is coded and transmitted to a trusted user through an unsecured communication network. We aim at keeping the system state private; however, because the network is not secure, opponents might access sensor data, which can be used to estimate the state. To prevent this, before transmission, we randomize coded sensor data by passing it through a probabilistic mapping, and send the corrupted data to the trusted user. Making use of the data processing inequality, we cast the synthesis of the probabilistic mapping as a convex program where we minimize the mutual information (our privacy metric) between two estimators, one constructed using the randomized sensor data and the other using the actual undistorted sensor measurements, for a desired level of distortion–how different coded sensor measurements and distorted data are allowed to be.
  • Item
    Thumbnail Image
    On Privacy of Dynamical Systems: An Optimal Probabilistic Mapping Approach
    Murguia, C ; Shames, I ; Farokhi, F ; Nesic, D ; Poor, HV (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2021)
    We address the problem of maximizing privacy of stochastic dynamical systems whose state information is released through quantized sensor data. In particular, we consider the setting where information about the system state is obtained using noisy sensor measurements. This data is quantized and transmitted to a (possibly untrustworthy) remote station through a public/unsecured communication network. We aim at keeping (part of) the state of the system private; however, because the network (and/or the remote station) might be unsecure, adversaries might have access to sensor data, which can be used to estimate the system state. To prevent such adversaries from obtaining an accurate state estimate, before transmission, we randomize quantized sensor data using additive random vectors, and send the corrupted data to the remote station instead. We design the joint probability distribution of these additive vectors (over a time window) to minimize the mutual information (our privacy metric) between some linear function of the system state (a desired private output) and the randomized sensor data for a desired level of distortion-how different quantized sensor measurements and distorted data are allowed to be. We pose the problem of synthesising the joint probability distribution of the additive vectors as a convex program subject to linear constraints. Simulation experiments are presented to illustrate our privacy scheme.
  • Item
    Thumbnail Image
    Tuning of multivariable model predictive controllers through expert bandit feedback
    Ira, AS ; Manzie, C ; Shames, I ; Chin, R ; Nesic, D ; Nakada, H ; Sano, T (TAYLOR & FRANCIS LTD, 2021-10-03)
    For certain industrial control applications an explicit function capturing the non-trivial trade-off between competing objectives in closed loop performance is not available. In such scenarios it is common practice to use the human innate ability to implicitly learn such a relationship and manually tune the corresponding controller to achieve the desirable closed loop performance. This approach has its deficiencies because of individual variations due to experience levels and preferences in the absence of an explicit calibration metric. Moreover, as the complexity of the underlying system and/or the controller increase, in the effort to achieve better performance, so does the tuning time and the associated tuning cost. To reduce the overall tuning cost, a tuning framework is proposed herein, whereby a supervised machine learning is used to extract the human-learned cost function and an optimisation algorithm that can efficiently deal with a large number of variables, is used for optimising the extracted cost function. Given the interest in the implementation across many industrial domains and the associated high degree of freedom present in the corresponding tuning process, a Model Predictive Controller applied to air path control in a diesel engine is tuned for the purpose of demonstrating the potential of the framework.