This is my presentation slides at the ONR "Science of Autonomy" program review, at August 2023.
I discussed our progress on establishing the notion of guaranteed-privacy- as a robust counterpart of differential privacy- by leveraging set-valued perturbations instead of stochastic noise signals, and functional perturbations instead of perturbing data. Then, I showed how robustness against distributions and algorithms, hard accuracy bounds and nonconvexity can be addressed by this new notion of guaranteed privacy. However, I described our thoughts and plans on designing guaranteed privacy-preserving control strategies, attack mitigation techniques, and robust dynamic games in multi-agent systems.
These are slides of my presentation at the 62nd IEEE Conference on Decision and Control (CDC) in Singapore, on Dec. 2023. In this work, we synthesized interval observers to simultaneously estimate states and unknown inputs (attacks) in nonlinear discrete-time systems. The considered systems are subject to distribution-free (set-valued) noise and disturbance, and are compromised by adversarial or malicious false data injections on their sensors and actuators. We provide sufficient conditions for stability and optimality of the designed observers. The proposed framework has several applications in resilient estimations and control, attack mitigation, and input reconstruction in cyber-physical systems.
A Study on Intuitionistic Multi-Anti Fuzzy Subgroups mathsjournal
For any intuitionistic multi-fuzzy set A = { < x , µA(x) , νA(x) > : x∈X} of an universe set X, we study the set [A](α, β) called the (α, β)–lower cut of A. It is the crisp multi-set { x∈X : µi(x) ≤ αi , νi(x) ≥ βi , ∀i } of X. In this paper, an attempt has been made to study some algebraic structure of intuitionistic multi-anti fuzzy subgroups and their properties with the help of their (α, β)–lower cut sets
A Study on Intuitionistic Multi-Anti Fuzzy Subgroupsmathsjournal
This document summarizes research on intuitionistic multi-anti fuzzy subgroups. Key points:
- Intuitionistic multi-fuzzy sets allow elements to have multiple membership values. Intuitionistic multi-anti fuzzy subgroups are intuitionistic multi-fuzzy sets that satisfy certain algebraic properties under group operations.
- The (α,β)-lower cut of an intuitionistic multi-fuzzy set is the crisp multi-set of elements whose membership and non-membership values are below α and above β thresholds. Properties of (α,β)-lower cuts are used to study intuitionistic multi-anti fuzzy subgroups.
- Definitions are provided for intuitionistic multi-fuzzy sets, intuitionistic multi-anti fuzzy subgroups
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Neutrosophic Soft Topological Spaces on New OperationsIJSRED
The document summarizes a research paper on neutrosophic soft topological spaces based on new operations defined for neutrosophic soft sets. It introduces neutrosophic soft sets and operations such as union, intersection, complement, and subset. It then defines new operations for union, intersection, and difference of neutrosophic soft sets. Finally, it defines the union and intersection of a family of neutrosophic soft sets and explores properties of the new operations.
The document discusses using unusual data sources in insurance. It provides examples of using pictures, text, social media data, telematics, and satellite imagery in insurance. It also discusses challenges in analyzing complex and high-dimensional data from these sources and introduces machine learning tools like PCA, generalized linear models, and evaluating models using loss, risk, and cross-validation.
This document discusses the use of machine learning techniques in actuarial science and insurance. It begins with an overview of predictive modeling applications in insurance such as fraud detection, premium computation, and claims reserving. It then covers traditional econometric techniques like Poisson and gamma regression models and how machine learning is emerging as an alternative. The document emphasizes evaluating model goodness of fit and uncertainty, and addresses issues like price discrimination and fairness.
These are slides of my presentation at the 62nd IEEE Conference on Decision and Control (CDC) in Singapore, on Dec. 2023. In this work, we synthesized interval observers to simultaneously estimate states and unknown inputs (attacks) in nonlinear discrete-time systems. The considered systems are subject to distribution-free (set-valued) noise and disturbance, and are compromised by adversarial or malicious false data injections on their sensors and actuators. We provide sufficient conditions for stability and optimality of the designed observers. The proposed framework has several applications in resilient estimations and control, attack mitigation, and input reconstruction in cyber-physical systems.
A Study on Intuitionistic Multi-Anti Fuzzy Subgroups mathsjournal
For any intuitionistic multi-fuzzy set A = { < x , µA(x) , νA(x) > : x∈X} of an universe set X, we study the set [A](α, β) called the (α, β)–lower cut of A. It is the crisp multi-set { x∈X : µi(x) ≤ αi , νi(x) ≥ βi , ∀i } of X. In this paper, an attempt has been made to study some algebraic structure of intuitionistic multi-anti fuzzy subgroups and their properties with the help of their (α, β)–lower cut sets
A Study on Intuitionistic Multi-Anti Fuzzy Subgroupsmathsjournal
This document summarizes research on intuitionistic multi-anti fuzzy subgroups. Key points:
- Intuitionistic multi-fuzzy sets allow elements to have multiple membership values. Intuitionistic multi-anti fuzzy subgroups are intuitionistic multi-fuzzy sets that satisfy certain algebraic properties under group operations.
- The (α,β)-lower cut of an intuitionistic multi-fuzzy set is the crisp multi-set of elements whose membership and non-membership values are below α and above β thresholds. Properties of (α,β)-lower cuts are used to study intuitionistic multi-anti fuzzy subgroups.
- Definitions are provided for intuitionistic multi-fuzzy sets, intuitionistic multi-anti fuzzy subgroups
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Neutrosophic Soft Topological Spaces on New OperationsIJSRED
The document summarizes a research paper on neutrosophic soft topological spaces based on new operations defined for neutrosophic soft sets. It introduces neutrosophic soft sets and operations such as union, intersection, complement, and subset. It then defines new operations for union, intersection, and difference of neutrosophic soft sets. Finally, it defines the union and intersection of a family of neutrosophic soft sets and explores properties of the new operations.
The document discusses using unusual data sources in insurance. It provides examples of using pictures, text, social media data, telematics, and satellite imagery in insurance. It also discusses challenges in analyzing complex and high-dimensional data from these sources and introduces machine learning tools like PCA, generalized linear models, and evaluating models using loss, risk, and cross-validation.
This document discusses the use of machine learning techniques in actuarial science and insurance. It begins with an overview of predictive modeling applications in insurance such as fraud detection, premium computation, and claims reserving. It then covers traditional econometric techniques like Poisson and gamma regression models and how machine learning is emerging as an alternative. The document emphasizes evaluating model goodness of fit and uncertainty, and addresses issues like price discrimination and fairness.
The document discusses distributed online convex optimization algorithms for coordinating multiple agents. It presents a coordination algorithm where each agent performs proportional-integral feedback to minimize local objectives while sharing information with neighbors over noisy communication channels. The algorithm is proven to achieve exponential convergence of second moments to the optimal solution and an ultimate bound on the error that depends on the noise level. Simulation results on a medical diagnosis example are also presented to illustrate the algorithm's behavior.
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
This document presents three new theorems on the existence of a unique common fixed point for occasionally weakly compatible mappings on a complete fuzzy metric space. The theorems introduce integral type inequalities involving the mappings that generalize several known fixed point results. Theorem 1 establishes a unique common fixed point for four self-mappings where two pairs of mappings are occasionally weakly compatible and satisfy a particular integral inequality. Theorem 2 and 3 prove similar results but replace the integral inequality with one involving a function Φ satisfying certain properties. The theorems reduce the minimum value of the integral inequality compared to previous results.
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Common fixed point theorems with continuously subcompatible mappings in fuzz...Alexander Decker
This document introduces the concepts of continuously subcompatible maps in fuzzy metric spaces. Continuously subcompatible maps are a weaker condition than subcompatibility and subsequential continuity. A theorem is proved that if two pairs of self-mappings (A,S) and (B,T) satisfy the continuously subcompatible condition and inequality (1), then there exists a unique point z in the fuzzy metric space such that Az = Sz = Tz = Bz = z. The concepts of fuzzy metric spaces, compatible maps, weakly compatible maps, and occasionally weakly compatible maps are also defined.
A Generalized Metric Space and Related Fixed Point TheoremsIRJET Journal
This document presents a new concept of generalized metric spaces and establishes some fixed point theorems in these spaces. It begins with defining generalized metric spaces, which generalize standard metric spaces, b-metric spaces, dislocated metric spaces, and modular spaces with the Fatou property. It then proves some properties of generalized metric spaces, including conditions for convergence. Finally, it establishes an extension of the Banach contraction principle to generalized metric spaces, proving the existence and uniqueness of a fixed point under certain assumptions.
Similarity Measure Using Interval Valued Vague Sets in Multiple Criteria Deci...iosrjce
IOSR Journal of Mathematics(IOSR-JM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mathemetics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mathematics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
We present the notion of Pythagorean Fuzzy Weak Bi-Ideals (PFWBI) and interval valued Pythagorean fuzzy weak bi-ideals of Γ-near-rings and studies some of its properties. We present the notion of interval valued Pythagorean fuzzy weak bi-ideal and establish some of its properties. We study interval valued Pythagorean fuzzy weak bi-ideals of Γ-near-ring using homomorphism.
This document provides an outline and introduction to the topics of pattern recognition and machine learning. It begins with an overview of key concepts like probability theory, decision theory, and the curse of dimensionality. It then covers specific techniques like polynomial curve fitting, the Gaussian distribution, and Bayesian curve fitting. The document also includes an appendix on properties of matrices such as determinants, matrix derivatives, and the eigenvector equation.
Fixed point theorems in random fuzzy metric space throughAlexander Decker
This document defines key concepts related to fixed point theorems in random fuzzy metric spaces. It begins by introducing fuzzy metric spaces, fuzzy 2-metric spaces, and fuzzy 3-metric spaces. It then defines random fuzzy variables and random fuzzy metric spaces. The document aims to prove some fixed point theorems in random fuzzy metric spaces, random fuzzy 2-metric spaces, and random fuzzy 3-metric spaces using rational expressions. It provides 18 definitions related to t-norms, fuzzy metric spaces, convergence of sequences, completeness, and mappings to lay the groundwork for the main results.
Special Plenary Lecture at the International Conference on VIBRATION ENGINEERING AND TECHNOLOGY OF MACHINERY (VETOMAC), Lisbon, Portugal, September 10 - 13, 2018
http://www.conf.pt/index.php/v-speakers
Propagation of uncertainties in complex engineering dynamical systems is receiving increasing attention. When uncertainties are taken into account, the equations of motion of discretised dynamical systems can be expressed by coupled ordinary differential equations with stochastic coefficients. The computational cost for the solution of such a system mainly depends on the number of degrees of freedom and number of random variables. Among various numerical methods developed for such systems, the polynomial chaos based Galerkin projection approach shows significant promise because it is more accurate compared to the classical perturbation based methods and computationally more efficient compared to the Monte Carlo simulation based methods. However, the computational cost increases significantly with the number of random variables and the results tend to become less accurate for a longer length of time. In this talk novel approaches will be discussed to address these issues. Reduced-order Galerkin projection schemes in the frequency domain will be discussed to address the problem of a large number of random variables. Practical examples will be given to illustrate the application of the proposed Galerkin projection techniques.
1. The document discusses various algorithms and methods for solving optimization problems involving sparse signal recovery from underdetermined linear systems.
2. Key algorithms mentioned include iterative shrinkage-thresholding algorithms like FISTA, proximal splitting methods like ADMM, and regularization-based methods involving sparse-promoting penalties like l1-norm and sum of absolute values.
3. Applications discussed include compressed sensing, sparse signal recovery from MIMO systems, and discrete signal reconstruction problems.
This document discusses error analysis for quasi-Monte Carlo methods. It introduces the trio error identity that decomposes the error into three terms: the variation of the integrand, the discrepancy of the sampling measure from the probability measure, and the alignment between the integrand and the difference between the measures. Several examples are provided to illustrate the identity, including integration over a reproducing kernel Hilbert space. The discrepancy term can be evaluated in O(n^2) operations and converges at different rates depending on the sampling method and properties of the integrand.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
More Related Content
Similar to Guaranteed Privacy-Preserving Mechanisms in Multi-Agent Systems
The document discusses distributed online convex optimization algorithms for coordinating multiple agents. It presents a coordination algorithm where each agent performs proportional-integral feedback to minimize local objectives while sharing information with neighbors over noisy communication channels. The algorithm is proven to achieve exponential convergence of second moments to the optimal solution and an ultimate bound on the error that depends on the noise level. Simulation results on a medical diagnosis example are also presented to illustrate the algorithm's behavior.
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
This document presents three new theorems on the existence of a unique common fixed point for occasionally weakly compatible mappings on a complete fuzzy metric space. The theorems introduce integral type inequalities involving the mappings that generalize several known fixed point results. Theorem 1 establishes a unique common fixed point for four self-mappings where two pairs of mappings are occasionally weakly compatible and satisfy a particular integral inequality. Theorem 2 and 3 prove similar results but replace the integral inequality with one involving a function Φ satisfying certain properties. The theorems reduce the minimum value of the integral inequality compared to previous results.
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Common fixed point theorems with continuously subcompatible mappings in fuzz...Alexander Decker
This document introduces the concepts of continuously subcompatible maps in fuzzy metric spaces. Continuously subcompatible maps are a weaker condition than subcompatibility and subsequential continuity. A theorem is proved that if two pairs of self-mappings (A,S) and (B,T) satisfy the continuously subcompatible condition and inequality (1), then there exists a unique point z in the fuzzy metric space such that Az = Sz = Tz = Bz = z. The concepts of fuzzy metric spaces, compatible maps, weakly compatible maps, and occasionally weakly compatible maps are also defined.
A Generalized Metric Space and Related Fixed Point TheoremsIRJET Journal
This document presents a new concept of generalized metric spaces and establishes some fixed point theorems in these spaces. It begins with defining generalized metric spaces, which generalize standard metric spaces, b-metric spaces, dislocated metric spaces, and modular spaces with the Fatou property. It then proves some properties of generalized metric spaces, including conditions for convergence. Finally, it establishes an extension of the Banach contraction principle to generalized metric spaces, proving the existence and uniqueness of a fixed point under certain assumptions.
Similarity Measure Using Interval Valued Vague Sets in Multiple Criteria Deci...iosrjce
IOSR Journal of Mathematics(IOSR-JM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mathemetics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mathematics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
We present the notion of Pythagorean Fuzzy Weak Bi-Ideals (PFWBI) and interval valued Pythagorean fuzzy weak bi-ideals of Γ-near-rings and studies some of its properties. We present the notion of interval valued Pythagorean fuzzy weak bi-ideal and establish some of its properties. We study interval valued Pythagorean fuzzy weak bi-ideals of Γ-near-ring using homomorphism.
This document provides an outline and introduction to the topics of pattern recognition and machine learning. It begins with an overview of key concepts like probability theory, decision theory, and the curse of dimensionality. It then covers specific techniques like polynomial curve fitting, the Gaussian distribution, and Bayesian curve fitting. The document also includes an appendix on properties of matrices such as determinants, matrix derivatives, and the eigenvector equation.
Fixed point theorems in random fuzzy metric space throughAlexander Decker
This document defines key concepts related to fixed point theorems in random fuzzy metric spaces. It begins by introducing fuzzy metric spaces, fuzzy 2-metric spaces, and fuzzy 3-metric spaces. It then defines random fuzzy variables and random fuzzy metric spaces. The document aims to prove some fixed point theorems in random fuzzy metric spaces, random fuzzy 2-metric spaces, and random fuzzy 3-metric spaces using rational expressions. It provides 18 definitions related to t-norms, fuzzy metric spaces, convergence of sequences, completeness, and mappings to lay the groundwork for the main results.
Special Plenary Lecture at the International Conference on VIBRATION ENGINEERING AND TECHNOLOGY OF MACHINERY (VETOMAC), Lisbon, Portugal, September 10 - 13, 2018
http://www.conf.pt/index.php/v-speakers
Propagation of uncertainties in complex engineering dynamical systems is receiving increasing attention. When uncertainties are taken into account, the equations of motion of discretised dynamical systems can be expressed by coupled ordinary differential equations with stochastic coefficients. The computational cost for the solution of such a system mainly depends on the number of degrees of freedom and number of random variables. Among various numerical methods developed for such systems, the polynomial chaos based Galerkin projection approach shows significant promise because it is more accurate compared to the classical perturbation based methods and computationally more efficient compared to the Monte Carlo simulation based methods. However, the computational cost increases significantly with the number of random variables and the results tend to become less accurate for a longer length of time. In this talk novel approaches will be discussed to address these issues. Reduced-order Galerkin projection schemes in the frequency domain will be discussed to address the problem of a large number of random variables. Practical examples will be given to illustrate the application of the proposed Galerkin projection techniques.
1. The document discusses various algorithms and methods for solving optimization problems involving sparse signal recovery from underdetermined linear systems.
2. Key algorithms mentioned include iterative shrinkage-thresholding algorithms like FISTA, proximal splitting methods like ADMM, and regularization-based methods involving sparse-promoting penalties like l1-norm and sum of absolute values.
3. Applications discussed include compressed sensing, sparse signal recovery from MIMO systems, and discrete signal reconstruction problems.
This document discusses error analysis for quasi-Monte Carlo methods. It introduces the trio error identity that decomposes the error into three terms: the variation of the integrand, the discrepancy of the sampling measure from the probability measure, and the alignment between the integrand and the difference between the measures. Several examples are provided to illustrate the identity, including integration over a reproducing kernel Hilbert space. The discrepancy term can be evaluated in O(n^2) operations and converges at different rates depending on the sampling method and properties of the integrand.
Similar to Guaranteed Privacy-Preserving Mechanisms in Multi-Agent Systems (14)
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Guaranteed Privacy-Preserving Mechanisms in Multi-Agent Systems
1. Guaranteed Privacy-Preserving Mechanisms
in Multi-Agent Systems
Mohammad Khajenejad, Sonia Martinez (PI)
Department of Mechanical and Aerospace Engineering
University of California, San Diego, USA
ONR Science of Autonomy Program Review
Virtual Presentation
August 11, 2023
2. Robust, Safe, Resilient, Private, and Distributed Autonomy
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 2 / 28
3. Robust, Safe, Resilient, Private, and Distributed Autonomy
uncertainties =⇒ robustness
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 2 / 28
4. Robust, Safe, Resilient, Private, and Distributed Autonomy
uncertainties =⇒ robustness
unsafe regions =⇒ safety critical
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 2 / 28
5. Robust, Safe, Resilient, Private, and Distributed Autonomy
uncertainties =⇒ robustness
unsafe regions =⇒ safety critical
attacks =⇒ resiliency
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 2 / 28
6. Robust, Safe, Resilient, Private, and Distributed Autonomy
uncertainties =⇒ robustness
unsafe regions =⇒ safety critical
attacks =⇒ resiliency
data protection =⇒ privacy
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 2 / 28
7. Robust, Safe, Resilient, Private, and Distributed Autonomy
heterogeneous, local =⇒ networked cps
uncertainties =⇒ robustness
unsafe regions =⇒ safety critical
attacks =⇒ resiliency
data protection =⇒ privacy
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 2 / 28
8. Assured, Strategic, & Hybrid Autonomy
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 3 / 28
9. Assured, Strategic, & Hybrid Autonomy
resiliency privacy
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 3 / 28
12. Private, Secure & Strategic Decision-Making
What notion of privacy is consistent with secure and strategic
decision-making?
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 4 / 28
13. Private, Secure & Strategic Decision-Making
What notion of privacy is consistent with secure and strategic
decision-making?
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 4 / 28
14. Privacy
to protect valuable data, identity, control strategy
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 5 / 28
16. Differential Privacy
Dwork et al. (2006), Huang et al. (2015), Hale et al. (2015), Wang et al.
(2017), Han et al. (2021), Ding et al. (2022), Ye et al. (2022), ...
Pr[M(x) ∈ S] ≤ e
Pr[M(y) ∈ S] + δ
rondom perturbation
performance loss
stochastic accuracy
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 7 / 28
17. Differential Privacy
Dwork et al. (2006), Huang et al. (2015), Hale et al. (2015), Wang et al.
(2017), Han et al. (2021), Ding et al. (2022), Ye et al. (2022), ...
Pr[M(x) ∈ S] ≤ e
Pr[M(y) ∈ S] + δ
rondom perturbation
performance loss
stochastic accuracy
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 7 / 28
18. Encryption-Based Privacy
Lu et al. (2018), Darup et al. (2021), Fioravanti et al. (2022), Wang et al.
(2022), An et al. (2022), ...
security, confidentiality,
integrity
computational overhead
key loss risks
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 8 / 28
19. Encryption-Based Privacy
Lu et al. (2018), Darup et al. (2021), Fioravanti et al. (2022), Wang et al.
(2022), An et al. (2022), ...
security, confidentiality,
integrity
computational overhead
key loss risks
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 8 / 28
20. Stochastic Functional Perturbation
Chaudhuri et al. (2011), Zhang et al. (2012), Hall et al. (2013), Cortez et al.
(2016), Nozari et al. (2018), Li et al. (2020),
stochastic guarantee
limited functional space
convexity required
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 9 / 28
21. Stochastic Functional Perturbation
Chaudhuri et al. (2011), Zhang et al. (2012), Hall et al. (2013), Cortez et al.
(2016), Nozari et al. (2018), Li et al. (2020),
stochastic guarantee
limited functional space
convexity required
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 9 / 28
22. Towards Guaranteed Privacy
We require ...
hard accuracy bounds
robustness to distributions
to address nonconvexity
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 10 / 28
23. Idea
interval methods to design optimal perturbations
robust optimization to quantify error bounds
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 11 / 28
24. Guaranteed Private Distributed Optimization
(a) true objective, (b) perturbed objective
original optimization
min
x∈X0
f (x) ,
PN
i=1fi (x)
functionally perturbed optimization
min
x∈X0
g(x),
PN
i=1fi (x)+˜
fi (x)
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 12 / 28
25. Guaranteed Private Distributed Optimization
distributed nonconvex optimization
min
x∈X0
f (x) ,
PN
i=1fi (x)
(a) true objective (b) perturbed objective
to implement a range perturbation of functions to robustify
the optimization problem in a controlled manner by an gap
diam(M(F0, X)∩I)≤ e
kfi0
−f 0
i0
kV
diam(M(F, X))
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 13 / 28
26. Guaranteed Private Distributed Optimization
distributed nonconvex optimization
min
x∈X0
f (x) ,
PN
i=1fi (x)
(a) true objective (b) perturbed objective
to implement a range perturbation of functions to robustify
the optimization problem in a controlled manner by an gap
diam(M(F0, X)∩I)≤ e
kfi0
−f 0
i0
kV
diam(M(F, X))
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 13 / 28
27. Designing The Perturbations
perturbed function
z }| {
gi
(x) =
f i (x), true function
z }| {
hi
(x)
| {z }
JSS mapping
+ mi
x
|{z}
linear remainder
+
perturbation
z}|{
m̃i
x
-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
-1
-0.5
0
0.5
1
1.5
2
2.5
3
-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
-2
-1.5
-1
-0.5
0
0.5
1
1.5
2
to minimize the difference between the linear remainder and
the perturbation function
min
{ξ∈R2n+1,p1,p2∈R3n}
0
2n 1
ξ
s.t. Λξ ≤ l, p
1 d ≤ 0, p
2 d ≤ 0,
Γ
p1 = ξ, −Γ
p2 = ξ, p1 ≥ 03n, p2 ≥ 03n,
m̃∗
= (ξ∗
)
In −In 0
n
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 14 / 28
28. Designing The Perturbations
perturbed function
z }| {
gi
(x) =
f i (x), true function
z }| {
hi
(x)
| {z }
JSS mapping
+ mi
x
|{z}
linear remainder
+
perturbation
z}|{
m̃i
x
-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
-1
-0.5
0
0.5
1
1.5
2
2.5
3
-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
-2
-1.5
-1
-0.5
0
0.5
1
1.5
2
to minimize the difference between the linear remainder and
the perturbation function
min
{ξ∈R2n+1,p1,p2∈R3n}
0
2n 1
ξ
s.t. Λξ ≤ l, p
1 d ≤ 0, p
2 d ≤ 0,
Γ
p1 = ξ, −Γ
p2 = ξ, p1 ≥ 03n, p2 ≥ 03n,
m̃∗
= (ξ∗
)
In −In 0
n
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 14 / 28
29. Designing The Perturbations
perturbed function
z }| {
gi
(x) =
f i (x), true function
z }| {
hi
(x)
| {z }
JSS mapping
+ mi
x
|{z}
linear remainder
+
perturbation
z}|{
m̃i
x
-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
-1
-0.5
0
0.5
1
1.5
2
2.5
3
-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
-2
-1.5
-1
-0.5
0
0.5
1
1.5
2
to minimize the difference between the linear remainder and
the perturbation function
min
{ξ∈R2n+1,p1,p2∈R3n}
0
2n 1
ξ
s.t. Λξ ≤ l, p
1 d ≤ 0, p
2 d ≤ 0,
Γ
p1 = ξ, −Γ
p2 = ξ, p1 ≥ 03n, p2 ≥ 03n,
m̃∗
= (ξ∗
)
In −In 0
n
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 14 / 28
30. Error Bounds
distributed nonconvex optimization
min
x∈X0
f (x) ,
PN
i=1fi (x)
functional perturbation
g(x),
PN
i=1fi (x)+
unknown, deterministic
z}|{
m̃i x
(a) true objective (b) perturbed objective
Theorem
= maxi∈{1,...,N} i -guaranteed privacy is satisfied, with i = β(fi , m̃i , X0, δi )
and arbitrary m̃i such that m̃i ∆ ≤ δ∗
i
The (worst-case) accuracy error satisfies: maxx∗∈Xf ,x̃∗∈Xgkx∗−x̃∗k∞≤UB
UB = max
{y∈X0,z∈X0,θ∈R≥0}
θ
s.t − θ1n≤y−z≤θ1n, m̃i (y−z)≤0, 1≤i≤N
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 15 / 28
31. Error Bounds
distributed nonconvex optimization
min
x∈X0
f (x) ,
PN
i=1fi (x)
functional perturbation
g(x),
PN
i=1fi (x)+
unknown, deterministic
z}|{
m̃i x
(a) true objective (b) perturbed objective
Theorem
= maxi∈{1,...,N} i -guaranteed privacy is satisfied, with i = β(fi , m̃i , X0, δi )
and arbitrary m̃i such that m̃i ∆ ≤ δ∗
i
The (worst-case) accuracy error satisfies: maxx∗∈Xf ,x̃∗∈Xgkx∗−x̃∗k∞≤UB
UB = max
{y∈X0,z∈X0,θ∈R≥0}
θ
s.t − θ1n≤y−z≤θ1n, m̃i (y−z)≤0, 1≤i≤N
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 15 / 28
32. Accuracy vs Privacy: Guaranteed Upper Bounds
Left: theoretical accuracy error upper bound, as well as true accuracy error obtained
by applying several nonconvex distributed optimization algorithms
Right: comparison of the guaranteed privacy errors and upper bound with the one
from a differential private distributed optimization algorithm
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 16 / 28
34. Guaranteed Privacy-Preserving Control (ongoing)
privacy-preserving cruise control
guaranteed privacy-preserving distributed MPC
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 17 / 28
35. Guaranteed Privacy-Preserving Dynamic Control
individual and best (thick solid line) trajectories under guaranteed privacy-preserving
dynamic control with optimal measurement aggregation
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 18 / 28
36. Future Work 1
Privacy Meets Resiliency
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 19 / 28
37. Multi-Agent CPS Under Attack
Target system, x ∈ Rn
x+
= f (x, w, d)
w ∈ [w, w], d ∈ Rp
d is unknown and arbitrary
Sensor network, i = 1, . . . , N
yi
= hi
(x, vi
, d), vi
∈ [vi
, vi
]
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 20 / 28
38. Scalable Distributed Resiliency
Network update: min/max consensus
xi,t
k = max
j∈Ni
xj,t−1
k xi,t
k = min
j∈Ni
xj,t−1
k
xi
k = xi,tx
k xi
k = xi,tx
k
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 21 / 28
39. Future Work: 1. Privacy Meets Resiliency
adversary can both steal valuable data and inject attack
to simultaneously protect data and mitigate attacks
level of tolerance ⇒ privacy-preserving resilient control
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 22 / 28
40. Future Work: 1. Privacy Meets Resiliency
adversary can both steal valuable data and inject attack
to simultaneously protect data and mitigate attacks
level of tolerance ⇒ privacy-preserving resilient control
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 22 / 28
41. Future Work: 1. Privacy Meets Resiliency
adversary can both steal valuable data and inject attack
to simultaneously protect data and mitigate attacks
level of tolerance ⇒ privacy-preserving resilient control
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 22 / 28
42. Future Work 2
Strategic Heterogeneous
Adversaries
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 23 / 28
43. Future Work: 2. Strategic Heterogeneous Adversaries
strategic agents
heterogeneous beliefs/types
bounded rationality
local communication
Can we preserve privacy against strategic adversaries?
guaranteed privacy-preserving dynamic games
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 24 / 28
44. Future Work: 2. Strategic Heterogeneous Adversaries
strategic agents
heterogeneous beliefs/types
bounded rationality
local communication
Can we preserve privacy against strategic adversaries?
guaranteed privacy-preserving dynamic games
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 24 / 28
45. Future Work: 2. Strategic Heterogeneous Adversaries
strategic agents
heterogeneous beliefs/types
bounded rationality
local communication
Can we preserve privacy against strategic adversaries?
guaranteed privacy-preserving dynamic games
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 24 / 28
56. Data Attack Resiliency
Can we simultaneously obtain guaranteed estimates of states and
unknown inputs (adversarial signals) and possibly mitigate their
effect?
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 30 / 28
58. Future Vision 3. Towards Hybrid Unknown CPS
hybrid reachability and invariance properties
NSF-CPS, NASA-NSPIRES early career award,
Amazon-Automated Reasoning
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 32 / 28
59. Future Vision 3. Towards Hybrid Unknown CPS
hybrid reachability and invariance properties
nonconvex optimization
NSF-CPS, NASA-NSPIRES early career award,
Amazon-Automated Reasoning
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 32 / 28
60. Future Vision 3. Towards Hybrid Unknown CPS
hybrid reachability and invariance properties
nonconvex optimization
unknown CPS: set-membership learning
meets model-based approaches
NSF-CPS, NASA-NSPIRES early career award,
Amazon-Automated Reasoning
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 32 / 28
61. Future Vision 3. Towards Hybrid Unknown CPS
hybrid reachability and invariance properties
nonconvex optimization
unknown CPS: set-membership learning
meets model-based approaches
aleatoric+epistemic uncertainties:
random sets
NSF-CPS, NASA-NSPIRES early career award,
Amazon-Automated Reasoning
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 32 / 28
62. Future Vision 3. Towards Hybrid Unknown CPS
hybrid reachability and invariance properties
nonconvex optimization
unknown CPS: set-membership learning
meets model-based approaches
aleatoric+epistemic uncertainties:
random sets
NSF-CPS, NASA-NSPIRES early career award,
Amazon-Automated Reasoning
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 32 / 28
63. System Properties ⇒ Safe Secure Autonomy
Research Question
Can we leverage dynamic systems’ properties to obtain robust, resilient,
distributed private autonomy?
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 33 / 28
65. Possible Collaborations
Prof. Javad Velni
I set-membership learning-based model predictive control
I attack resilient safe control of unknown nonlinear systems
Prof. Beshah Ayalew
I robust data-driven CBFs for RL-based safe ACC
I game-theoretic distributed safe optimal control of traffic networks
Prof. Chris Paredis
I abstraction-based formal verification for vehicular control systems
I resilient exploration of extreme and unstructured environments for UGVs
Prof. Ge Lv
I reachability analysis-based control of exoskeletons
I hybrid invariance properties of contact dynamics in bipedal robots
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 35 / 28
66. Possible Collaborations
Prof. Javad Velni
I set-membership learning-based model predictive control
I attack resilient safe control of unknown nonlinear systems
Prof. Beshah Ayalew
I robust data-driven CBFs for RL-based safe ACC
I game-theoretic distributed safe optimal control of traffic networks
Prof. Chris Paredis
I abstraction-based formal verification for vehicular control systems
I resilient exploration of extreme and unstructured environments for UGVs
Prof. Ge Lv
I reachability analysis-based control of exoskeletons
I hybrid invariance properties of contact dynamics in bipedal robots
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 35 / 28
67. Possible Collaborations
Prof. Javad Velni
I set-membership learning-based model predictive control
I attack resilient safe control of unknown nonlinear systems
Prof. Beshah Ayalew
I robust data-driven CBFs for RL-based safe ACC
I game-theoretic distributed safe optimal control of traffic networks
Prof. Chris Paredis
I abstraction-based formal verification for vehicular control systems
I resilient exploration of extreme and unstructured environments for UGVs
Prof. Ge Lv
I reachability analysis-based control of exoskeletons
I hybrid invariance properties of contact dynamics in bipedal robots
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 35 / 28
68. Possible Collaborations
Prof. Javad Velni
I set-membership learning-based model predictive control
I attack resilient safe control of unknown nonlinear systems
Prof. Beshah Ayalew
I robust data-driven CBFs for RL-based safe ACC
I game-theoretic distributed safe optimal control of traffic networks
Prof. Chris Paredis
I abstraction-based formal verification for vehicular control systems
I resilient exploration of extreme and unstructured environments for UGVs
Prof. Ge Lv
I reachability analysis-based control of exoskeletons
I hybrid invariance properties of contact dynamics in bipedal robots
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 35 / 28
69. Future Vision: 2. Heterogeneous and Strategic Agents
heterogeneous beliefs/types
bounded rationality
strategic vs. best worst-case
local communication
robust dynamic/differential
networked games
ARL, DARPA-ARC, AFOSR-YIP
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 36 / 28
70. Teaching Interests
undergraduate:
I control integration of multi-domain dynamic systems (ME 4030)
I mechatronics system design (ME 4710)
I nonlinear dynamics chaos (ME 4500)
graduate:
I advanced dynamics (ME 8430)
I modern control engineering (ME 8200)
I applied optimal control (ME 8220)
to create:
I resilient private decision-making in networked CPS
F control theory+optimization+decision sciences
F fundamentals of resilient estimation and control
F distributed privacy-preserving mechanisms
F safety under various sources of uncertainty
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 37 / 28
71. Teaching Interests
undergraduate:
I control integration of multi-domain dynamic systems (ME 4030)
I mechatronics system design (ME 4710)
I nonlinear dynamics chaos (ME 4500)
graduate:
I advanced dynamics (ME 8430)
I modern control engineering (ME 8200)
I applied optimal control (ME 8220)
to create:
I resilient private decision-making in networked CPS
F control theory+optimization+decision sciences
F fundamentals of resilient estimation and control
F distributed privacy-preserving mechanisms
F safety under various sources of uncertainty
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 37 / 28
72. Teaching Interests
undergraduate:
I control integration of multi-domain dynamic systems (ME 4030)
I mechatronics system design (ME 4710)
I nonlinear dynamics chaos (ME 4500)
graduate:
I advanced dynamics (ME 8430)
I modern control engineering (ME 8200)
I applied optimal control (ME 8220)
to create:
I resilient private decision-making in networked CPS
F control theory+optimization+decision sciences
F fundamentals of resilient estimation and control
F distributed privacy-preserving mechanisms
F safety under various sources of uncertainty
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 37 / 28
73. Robust, Safe, Resilient, Private and Distributed Autonomy
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 38 / 28
74. Robust, Safe, Resilient, Private and Distributed Autonomy
uncertainties =⇒ robustness
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 38 / 28
75. Robust, Safe, Resilient, Private and Distributed Autonomy
uncertainties =⇒ robustness
unsafe regions =⇒ safety critical
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 38 / 28
76. Robust, Safe, Resilient, Private and Distributed Autonomy
uncertainties =⇒ robustness
unsafe regions =⇒ safety critical
attacks =⇒ resiliency
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 38 / 28
77. Robust, Safe, Resilient, Private and Distributed Autonomy
uncertainties =⇒ robustness
unsafe regions =⇒ safety critical
attacks =⇒ resiliency
data protection =⇒ privacy
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 38 / 28
78. Robust, Safe, Resilient, Private and Distributed Autonomy
heterogeneous, local =⇒ networked cps
uncertainties =⇒ robustness
unsafe regions =⇒ safety critical
attacks =⇒ resiliency
data protection =⇒ privacy
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 38 / 28
79. System Properties ⇒ Safe Secure Autonomy
Research Question
Can we leverage dynamic systems’ properties to obtain robust, resilient,
distributed private autonomy?
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 39 / 28
80. System Properties ⇒ Safe Secure Autonomy
Research Question
Can we leverage dynamic systems’ properties to obtain robust, resilient,
distributed private autonomy?
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 39 / 28
81. Past Research: Resilient Set-Valued Estimation Control
state estimation and Input reconstruction are important for
fault detection, attack mitigation, intent estimation etc.
Constrained Nonlinear System
G :
(
x+
t = f (xt, wt, dt),
yt = h(xt, vt, dt),
Motivating question
Can we simultaneously estimate “ sets” of states and unknown
inputs and possibly mitigate the effect of attacks?
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 40 / 28
82. Past Research Overview: Set-Valued Methods
Distribution-free
uncertainty sets
Robust reachability analysis
State estimation and attack mitigation
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 41 / 28
84. Current Research: Scalable Distributed Resiliency
Network update: min/max consensus
xi,t
k = max
j∈Ni
xj,t−1
k xi,t
k = min
j∈Ni
xj,t−1
k
xi
k = xi,tx
k xi
k = xi,tx
k
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 43 / 28
86. Funding Opportuinities
NSF CAREER Award ($500k / 5 years)
I All assistant profs, up to 3 attempts
Army Research Lab (ARL)
DoD Young Investigator Programs ($500k / 3 years)
I AFOSR, ONR, ARO
I Assistant profs within 5 years of PhD
DoE Early Career Award ($750k / 5 years)
I Assistant profs within 10 years of PhD
DARPA Young Faculty Award ($300k / 2 years)
I Assistant profs within 10 years of PhD
NASA Early Career Faculty Award ($600k / 3 years)
Industry grants (Google, Amazon, Ford, Toyota, etc.)
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 45 / 28
87. Future Vision: 3. Guaranteed Privacy-Preserving Mechanism Design
Existing notions of privacy: either sacrifice accuracy or incur large
computation or communication overhead
Need for hard accuracy bounds
Towards guaranteed private estimation, control and verification by
leveraging unknown but deterministic functional perturbations
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 46 / 28
88. Future Vision: 3. Guaranteed Privacy-Preserving Mechanism Design
Existing notions of privacy: either sacrifice accuracy or incur large
computation or communication overhead
Need for hard accuracy bounds
Towards guaranteed private estimation, control and verification by
leveraging unknown but deterministic functional perturbations
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 46 / 28
89. Future Vision: 3. Guaranteed Privacy-Preserving Mechanism Design
Existing notions of privacy: either sacrifice accuracy or incur large
computation or communication overhead
Need for hard accuracy bounds
Towards guaranteed private estimation, control and verification by
leveraging unknown but deterministic functional perturbations
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 46 / 28
90. Future Vision: 4. Uncertain and Hybrid Networked CPS
Hybrid reachability and invariance properties Hidden mode CPS: MM framework
Unknown CPS: set-membership learning
meets model-based approaches
Aleatoric+epistemic uncertainties:
random sets
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 47 / 28
91. Thank you! Questions?
Taha, Fatemeh, Marsa Sze Zheng Yong Sonia Martinez
My labmates
M. Khajenejad (UCSD) Guaranteed Privacy August 11, 2023 48 / 28