首页 > 最新文献

IEEE Transactions on Cybernetics最新文献

英文 中文
Bayesian Transfer Filtering Using Pseudo Marginal Measurement Likelihood 使用伪边际测量概率的贝叶斯转移滤波法
IF 9.4 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-18 DOI: 10.1109/TCYB.2024.3490580
Shunyi Zhao;Tianyu Zhang;Yuriy S. Shmaliy;Xiaoli Luan;Fei Liu
Integrating the advantage of the unbiased finite impulse response (UFIR) filter into the Kalman filter (KF) is a practical yet challenging issue, where how to effectively borrow knowledge across domains is a core issue. Existing methods often fall short in addressing performance degradation arising from noise uncertainties. In this article, we delve into a Bayesian transfer filter (BTF) that seamlessly integrates the UFIR filter into the KF through a knowledge-constrained mechanism. Specifically, the pseudo marginal measurement likelihood of the UFIR filter is reused as a constraint to refine the Bayesian posterior distribution in the KF. To optimize this process, we exploit the Kullback-Leibler (KL) divergence to measure and reduce discrepancies between the proposal and target distributions. This approach overcomes the limitations of traditional weight-based fusion methods and eliminates the need for error covariance. Additionally, a necessary condition based on mean square error criteria is established to prevent negative transfer. Using a moving target tracking example and a quadruple water tank experiment, we demonstrate that the proposed BTF offers superior robustness against noise uncertainties compared to existing methods.
{"title":"Bayesian Transfer Filtering Using Pseudo Marginal Measurement Likelihood","authors":"Shunyi Zhao;Tianyu Zhang;Yuriy S. Shmaliy;Xiaoli Luan;Fei Liu","doi":"10.1109/TCYB.2024.3490580","DOIUrl":"10.1109/TCYB.2024.3490580","url":null,"abstract":"Integrating the advantage of the unbiased finite impulse response (UFIR) filter into the Kalman filter (KF) is a practical yet challenging issue, where how to effectively borrow knowledge across domains is a core issue. Existing methods often fall short in addressing performance degradation arising from noise uncertainties. In this article, we delve into a Bayesian transfer filter (BTF) that seamlessly integrates the UFIR filter into the KF through a knowledge-constrained mechanism. Specifically, the pseudo marginal measurement likelihood of the UFIR filter is reused as a constraint to refine the Bayesian posterior distribution in the KF. To optimize this process, we exploit the Kullback-Leibler (KL) divergence to measure and reduce discrepancies between the proposal and target distributions. This approach overcomes the limitations of traditional weight-based fusion methods and eliminates the need for error covariance. Additionally, a necessary condition based on mean square error criteria is established to prevent negative transfer. Using a moving target tracking example and a quadruple water tank experiment, we demonstrate that the proposed BTF offers superior robustness against noise uncertainties compared to existing methods.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 2","pages":"562-573"},"PeriodicalIF":9.4,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142670650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Secure Control for Nonlinear Descriptor Multiagent Systems With Unknown Inputs Under Denial-of-Service Attacks 拒绝服务攻击下具有未知输入的非线性描述符多代理系统的分布式安全控制
IF 9.4 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-18 DOI: 10.1109/TCYB.2024.3486562
Tianbiao Shi;Fanglai Zhu
This article investigates the secure control problem for a class of Lipschitz nonlinear descriptor multiagent systems (MASs) with unknown inputs under Denial-of-Service (DoS) attacks. In order to address the presence of unknown state variables and external disturbances in both the state and output equations, a local unknown input observer (UIO) is developed for each follower agent. The proposed UIO is capable of simultaneously estimating the system state, measurement noise and unknown inputs through an interval observer. With regards to DoS attacks, we consider two types: those that maintain connectivity and those that paralyze it by disrupting the structure of the information communication topology graph. By utilizing the proposed UIO, a distributed compensation controller is designed to achieve asymptotic consensus for leader-following MASs under DoS attacks. Additionally, a comprehensive stability analysis of the closed-loop system is provided, taking into account switching systems. Finally, two simulation examples are presented to validate the effectiveness of the proposed UIO-based distributed secure control scheme.
本文研究了一类输入未知的Lipschitz非线性描述子多智能体系统在拒绝服务攻击下的安全控制问题。为了解决状态方程和输出方程中存在的未知状态变量和外部干扰,为每个跟随体开发了一个局部未知输入观测器(UIO)。该UIO能够通过区间观测器同时估计系统状态、测量噪声和未知输入。关于DoS攻击,我们考虑两种类型:那些保持连接的攻击和那些通过破坏信息通信拓扑结构使其瘫痪的攻击。利用所提出的UIO,设计了分布式补偿控制器,实现了DoS攻击下leader-follow MASs的渐近共识。此外,考虑切换系统,对闭环系统进行了全面的稳定性分析。最后,通过两个仿真实例验证了所提出的基于用户界面的分布式安全控制方案的有效性。
{"title":"Distributed Secure Control for Nonlinear Descriptor Multiagent Systems With Unknown Inputs Under Denial-of-Service Attacks","authors":"Tianbiao Shi;Fanglai Zhu","doi":"10.1109/TCYB.2024.3486562","DOIUrl":"10.1109/TCYB.2024.3486562","url":null,"abstract":"This article investigates the secure control problem for a class of Lipschitz nonlinear descriptor multiagent systems (MASs) with unknown inputs under Denial-of-Service (DoS) attacks. In order to address the presence of unknown state variables and external disturbances in both the state and output equations, a local unknown input observer (UIO) is developed for each follower agent. The proposed UIO is capable of simultaneously estimating the system state, measurement noise and unknown inputs through an interval observer. With regards to DoS attacks, we consider two types: those that maintain connectivity and those that paralyze it by disrupting the structure of the information communication topology graph. By utilizing the proposed UIO, a distributed compensation controller is designed to achieve asymptotic consensus for leader-following MASs under DoS attacks. Additionally, a comprehensive stability analysis of the closed-loop system is provided, taking into account switching systems. Finally, two simulation examples are presented to validate the effectiveness of the proposed UIO-based distributed secure control scheme.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 1","pages":"472-485"},"PeriodicalIF":9.4,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142670657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Granular Computing for Machine Learning: Pursuing New Development Horizons 机器学习的粒度计算:追求新的发展视野
IF 9.4 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-18 DOI: 10.1109/TCYB.2024.3487934
Witold Pedrycz
Undoubtedly, machine learning (ML) has demonstrated a wealth of far-reaching successes present both at the level of fundamental developments, design methodologies and numerous application areas, quite often encountered in domains requiring a high level of autonomous behavior. Over the passage of time, there are growing challenges of privacy and security, interpretability, explainability, confidence (credibility), and computational sustainability, among others. In this study, we advocate that these quests could be addressed by casting them both conceptually and algorithmically in the unified environment augmented by the principles of granular computing. It is demonstrated that the level of abstraction, delivered by granular computing plays a pivotal role in the interpretation by quantifying the level of credibility of ML constructs. The study also highlights the principles of granular computing and elaborates on its landscape. The original idea of a comprehensive and unified framework of data-knowledge environment of ML is introduced along with a detailed discussion on how data and knowledge are used in a seamless fashion by invoking granular embedding and producing relevant loss functions. Key categories of knowledge-data integration realized at the levels of data and model (involving symbolic/qualitative models and physics-oriented models) and investigated.
毫无疑问,机器学习(ML)在基础开发、设计方法和众多应用领域都取得了深远的成功,在需要高度自治行为的领域中经常遇到。随着时间的推移,隐私和安全、可解释性、可解释性、信心(可信度)和计算可持续性等方面的挑战越来越多。在这项研究中,我们主张这些任务可以通过在概念上和算法上在颗粒计算原理增强的统一环境中进行铸造来解决。研究表明,通过量化ML结构的可信度水平,颗粒计算提供的抽象水平在解释中起着关键作用。该研究还强调了颗粒计算的原理,并详细阐述了其前景。介绍了一个全面统一的ML数据-知识环境框架的最初想法,并详细讨论了如何通过调用颗粒嵌入和产生相关损失函数来无缝地使用数据和知识。在数据和模型层面实现的知识数据集成的关键类别(包括符号/定性模型和面向物理的模型)并进行了研究。
{"title":"Granular Computing for Machine Learning: Pursuing New Development Horizons","authors":"Witold Pedrycz","doi":"10.1109/TCYB.2024.3487934","DOIUrl":"10.1109/TCYB.2024.3487934","url":null,"abstract":"Undoubtedly, machine learning (ML) has demonstrated a wealth of far-reaching successes present both at the level of fundamental developments, design methodologies and numerous application areas, quite often encountered in domains requiring a high level of autonomous behavior. Over the passage of time, there are growing challenges of privacy and security, interpretability, explainability, confidence (credibility), and computational sustainability, among others. In this study, we advocate that these quests could be addressed by casting them both conceptually and algorithmically in the unified environment augmented by the principles of granular computing. It is demonstrated that the level of abstraction, delivered by granular computing plays a pivotal role in the interpretation by quantifying the level of credibility of ML constructs. The study also highlights the principles of granular computing and elaborates on its landscape. The original idea of a comprehensive and unified framework of data-knowledge environment of ML is introduced along with a detailed discussion on how data and knowledge are used in a seamless fashion by invoking granular embedding and producing relevant loss functions. Key categories of knowledge-data integration realized at the levels of data and model (involving symbolic/qualitative models and physics-oriented models) and investigated.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 1","pages":"460-471"},"PeriodicalIF":9.4,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142670651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safe Reinforcement Learning: Optimal Formation Control With Collision Avoidance of Multiple Satellite Systems 安全强化学习:避免多卫星系统碰撞的最佳编队控制
IF 9.4 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-18 DOI: 10.1109/TCYB.2024.3491582
Hui Yu;Liqian Dou;Xiuyun Zhang;Jinna Li;Qun Zong
This article addresses the collision avoidance and formation control problem for multisatellite systems. A novel safe reinforcement learning (RL) algorithm based on an adaptive dynamic programming framework is proposed. The highlights of the algorithm are the adaptive distance-varying learning method to integrate online data with historical data and the usage of the barrier function (BF) to achieve collision avoidance. First, the BF is introduced into the designed cost function such that the multisatellite formation system can achieve obstacle avoidance and guarantee the safety. Next, a safe RL algorithm is developed through the critic network structure. A distance-varying weight is introduced, which combines experience replay samples with extrapolation samples. By minimizing the cost function, the optimal formation control policy can be obtained with an adaptive formation and self-learning ability. Then, the stability and safety of the proposed algorithm are analyzed. Finally, the effectiveness and superiority of the proposed algorithm are verified by numerical simulations.
本文研究了多卫星系统的避碰与编队控制问题。提出了一种基于自适应动态规划框架的安全强化学习(RL)算法。该算法的亮点是采用自适应变距离学习方法将在线数据与历史数据相结合,并利用屏障函数(BF)实现碰撞避免。首先,将BF引入到设计的代价函数中,使多卫星编队系统能够实现避障和安全。其次,通过临界网络结构,提出了一种安全的强化学习算法。引入了一种结合经验重放样本和外推样本的距离变化权值。通过最小化代价函数,获得具有自适应编队和自学习能力的最优编队控制策略。然后,对该算法的稳定性和安全性进行了分析。最后,通过数值仿真验证了所提算法的有效性和优越性。
{"title":"Safe Reinforcement Learning: Optimal Formation Control With Collision Avoidance of Multiple Satellite Systems","authors":"Hui Yu;Liqian Dou;Xiuyun Zhang;Jinna Li;Qun Zong","doi":"10.1109/TCYB.2024.3491582","DOIUrl":"10.1109/TCYB.2024.3491582","url":null,"abstract":"This article addresses the collision avoidance and formation control problem for multisatellite systems. A novel safe reinforcement learning (RL) algorithm based on an adaptive dynamic programming framework is proposed. The highlights of the algorithm are the adaptive distance-varying learning method to integrate online data with historical data and the usage of the barrier function (BF) to achieve collision avoidance. First, the BF is introduced into the designed cost function such that the multisatellite formation system can achieve obstacle avoidance and guarantee the safety. Next, a safe RL algorithm is developed through the critic network structure. A distance-varying weight is introduced, which combines experience replay samples with extrapolation samples. By minimizing the cost function, the optimal formation control policy can be obtained with an adaptive formation and self-learning ability. Then, the stability and safety of the proposed algorithm are analyzed. Finally, the effectiveness and superiority of the proposed algorithm are verified by numerical simulations.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 1","pages":"447-459"},"PeriodicalIF":9.4,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142670653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hierarchical Surrogate-Assisted Differential Evolution With Core Space Localization 具有核心空间定位功能的分层代理辅助差分进化论
IF 11.8 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-18 DOI: 10.1109/tcyb.2024.3489885
Laiqi Yu, Zhenyu Meng, Haibin Zhu
{"title":"A Hierarchical Surrogate-Assisted Differential Evolution With Core Space Localization","authors":"Laiqi Yu, Zhenyu Meng, Haibin Zhu","doi":"10.1109/tcyb.2024.3489885","DOIUrl":"https://doi.org/10.1109/tcyb.2024.3489885","url":null,"abstract":"","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"33 1","pages":""},"PeriodicalIF":11.8,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142670655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Observer-Based Human-in-the-Loop Optimal Output Cluster Synchronization Control for Multiagent Systems: A Model-Free Reinforcement Learning Method 基于观测器的多代理系统人在环最优输出簇同步控制:一种无模型强化学习方法
IF 9.4 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-18 DOI: 10.1109/TCYB.2024.3490602
Zongsheng Huang;Tieshan Li;Yue Long;Hongjing Liang
This article investigates the observer-based human-in-the-loop (HiTL) optimal output cluster synchronization control problem for nonlinear multiagent systems (MASs). First, the leader is designed to be nonautonomous, with the unknown time-varying input monitored by the human operator directly. To address the problem that leader’s output is not available to each follower, an observer is designed. This observer features practical prescribed-time convergence, and independence of prior knowledge of leader’s input. Then, an augmented system consisting of observer dynamics and follower dynamics is constructed and a cost function is formulated. Accordingly, the HiTL optimal output cluster synchronization control problem is transformed into a solution to the Hamilton-Jacobian–Bellman equation (HJBE). Subsequently, the off-policy reinforcement learning algorithm is utilized to learn the solution to HJBE without complete knowledge of the system dynamics. To alleviate computational burden, the single critic neural network (NN) is employed for the algorithm implementation, with the least square method applied for training the NN weights. Finally, the simulation results are presented to verify the validity of the designed control scheme.
{"title":"Observer-Based Human-in-the-Loop Optimal Output Cluster Synchronization Control for Multiagent Systems: A Model-Free Reinforcement Learning Method","authors":"Zongsheng Huang;Tieshan Li;Yue Long;Hongjing Liang","doi":"10.1109/TCYB.2024.3490602","DOIUrl":"10.1109/TCYB.2024.3490602","url":null,"abstract":"This article investigates the observer-based human-in-the-loop (HiTL) optimal output cluster synchronization control problem for nonlinear multiagent systems (MASs). First, the leader is designed to be nonautonomous, with the unknown time-varying input monitored by the human operator directly. To address the problem that leader’s output is not available to each follower, an observer is designed. This observer features practical prescribed-time convergence, and independence of prior knowledge of leader’s input. Then, an augmented system consisting of observer dynamics and follower dynamics is constructed and a cost function is formulated. Accordingly, the HiTL optimal output cluster synchronization control problem is transformed into a solution to the Hamilton-Jacobian–Bellman equation (HJBE). Subsequently, the off-policy reinforcement learning algorithm is utilized to learn the solution to HJBE without complete knowledge of the system dynamics. To alleviate computational burden, the single critic neural network (NN) is employed for the algorithm implementation, with the least square method applied for training the NN weights. Finally, the simulation results are presented to verify the validity of the designed control scheme.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 2","pages":"649-660"},"PeriodicalIF":9.4,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142670656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Trajectory Planning Method for Autonomous Ground Vehicles Confronting Sudden and Moving Obstacles Based on LSTM-Attention Network 基于 LSTM-注意力网络的地面自主飞行器面对突发性移动障碍物时的在线轨迹规划方法
IF 9.4 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-14 DOI: 10.1109/TCYB.2024.3486004
Zhida Xing;Runqi Chai;Kaiyuan Chen;Yuanqing Xia;Senchun Chai
This article presents a novel online obstacle avoidance trajectory planning method for autonomous ground vehicles (AGVs) based on long short-term memory-attention (LSTM-Attention) networks. The proposed method can guide AGVs to perform emergency maneuvers when encountering sudden and moving obstacles, while also ensuring high levels of real-time performance and optimality. It consists of two parts: 1) offline training and 2) online planning. In the offline training phase, an AGV obstacle avoidance trajectory dataset is generated using numerical trajectory optimization methods to train the LSTM-Attention network. This training allows the network to capture the mapping between the relative information of the vehicle and the obstacles and the optimal control actions. The trained network is then used for online trajectory planning to achieve optimal feedback obstacle avoidance control for AGVs facing sudden obstacles. Furthermore, to address situations involving sudden obstacles in different directions and moving obstacles, a rotation coordinate system method is proposed, significantly expanding the application scenarios of the proposed approach. The effectiveness and real-time performance of the designed method are comprehensively validated through extensive simulation and physical experiments.
提出了一种基于长短期记忆-注意(LSTM-Attention)网络的自动地面车辆避障轨迹在线规划方法。该方法可以指导agv在遇到突发和移动障碍物时进行紧急机动,同时保证高水平的实时性和最优性。它由两部分组成:1)线下培训和2)在线规划。在离线训练阶段,采用数值轨迹优化方法生成AGV避障轨迹数据集,对LSTM-Attention网络进行训练。这种训练使网络能够捕获车辆与障碍物的相对信息和最优控制动作之间的映射。将训练好的网络用于在线轨迹规划,实现agv面对突发性障碍物的最优反馈避障控制。此外,针对不同方向突然障碍物和移动障碍物的情况,提出了一种旋转坐标系方法,大大扩展了该方法的应用场景。通过大量的仿真和物理实验,全面验证了所设计方法的有效性和实时性。
{"title":"Online Trajectory Planning Method for Autonomous Ground Vehicles Confronting Sudden and Moving Obstacles Based on LSTM-Attention Network","authors":"Zhida Xing;Runqi Chai;Kaiyuan Chen;Yuanqing Xia;Senchun Chai","doi":"10.1109/TCYB.2024.3486004","DOIUrl":"10.1109/TCYB.2024.3486004","url":null,"abstract":"This article presents a novel online obstacle avoidance trajectory planning method for autonomous ground vehicles (AGVs) based on long short-term memory-attention (LSTM-Attention) networks. The proposed method can guide AGVs to perform emergency maneuvers when encountering sudden and moving obstacles, while also ensuring high levels of real-time performance and optimality. It consists of two parts: 1) offline training and 2) online planning. In the offline training phase, an AGV obstacle avoidance trajectory dataset is generated using numerical trajectory optimization methods to train the LSTM-Attention network. This training allows the network to capture the mapping between the relative information of the vehicle and the obstacles and the optimal control actions. The trained network is then used for online trajectory planning to achieve optimal feedback obstacle avoidance control for AGVs facing sudden obstacles. Furthermore, to address situations involving sudden obstacles in different directions and moving obstacles, a rotation coordinate system method is proposed, significantly expanding the application scenarios of the proposed approach. The effectiveness and real-time performance of the designed method are comprehensively validated through extensive simulation and physical experiments.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 1","pages":"421-435"},"PeriodicalIF":9.4,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142637321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Event-Triggered Sliding Mode Secure Control for Autonomous Vehicles Under Actuator Attacks 致动器攻击下自动驾驶汽车的数据驱动事件触发式滑动模式安全控制
IF 9.4 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-14 DOI: 10.1109/TCYB.2024.3490656
Hong-Tao Sun;Xinran Chen;Zhengqiang Zhang;Xiaohua Ge;Chen Peng
This article investigates a comprehensive data-driven event-triggered secure lateral control of autonomous vehicles under actuator attacks. We consider stabilization issues of autonomous vehicles subject to modeling difficulties, limited communication resources, and actuator attacks. The dynamic model decomposition (DMD) from data is exploited to characterize the inherent lateral dynamics model of autonomous vehicles, the event-triggered transmission scheme is utilized to alleviate communication burden for limited bandwidth network, and the sliding mode control scheme is designed to ensure the security of autonomous vehicles under actuator attacks. The stability analysis and the stabilization method as well as its algorithm are presented. The proposed secure control scheme can actively counteract the malicious effects caused by actuator attacks and integrates the advantages of both data-driven modeling and model-based control design. Finally, several comparative case studies show the effectiveness of the proposed secure control scheme.
本文研究了一种全面的数据驱动事件触发的自动驾驶汽车在执行器攻击下的安全横向控制。我们考虑了受建模困难、有限通信资源和执行器攻击影响的自动驾驶汽车的稳定问题。利用数据的动态模型分解(DMD)来表征自动驾驶汽车固有的横向动力学模型,利用事件触发传输方案减轻有限带宽网络的通信负担,设计滑模控制方案以确保自动驾驶汽车在执行器攻击下的安全性。给出了系统的稳定性分析、稳定方法及其算法。所提出的安全控制方案能够主动抵消执行器攻击所带来的恶意影响,并融合了数据驱动建模和基于模型的控制设计的优点。最后,通过几个比较案例验证了所提安全控制方案的有效性。
{"title":"Data-Driven Event-Triggered Sliding Mode Secure Control for Autonomous Vehicles Under Actuator Attacks","authors":"Hong-Tao Sun;Xinran Chen;Zhengqiang Zhang;Xiaohua Ge;Chen Peng","doi":"10.1109/TCYB.2024.3490656","DOIUrl":"10.1109/TCYB.2024.3490656","url":null,"abstract":"This article investigates a comprehensive data-driven event-triggered secure lateral control of autonomous vehicles under actuator attacks. We consider stabilization issues of autonomous vehicles subject to modeling difficulties, limited communication resources, and actuator attacks. The dynamic model decomposition (DMD) from data is exploited to characterize the inherent lateral dynamics model of autonomous vehicles, the event-triggered transmission scheme is utilized to alleviate communication burden for limited bandwidth network, and the sliding mode control scheme is designed to ensure the security of autonomous vehicles under actuator attacks. The stability analysis and the stabilization method as well as its algorithm are presented. The proposed secure control scheme can actively counteract the malicious effects caused by actuator attacks and integrates the advantages of both data-driven modeling and model-based control design. Finally, several comparative case studies show the effectiveness of the proposed secure control scheme.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 1","pages":"436-446"},"PeriodicalIF":9.4,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142637322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extended Kalman Filtering-Based Nonlinear Model Predictive Control for Underactuated Systems With Multiple Constraints and Obstacle Avoidance 基于卡尔曼滤波的扩展非线性模型预测控制,适用于具有多重约束条件和避障功能的欠驱动系统
IF 9.4 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-13 DOI: 10.1109/TCYB.2024.3488371
Meng Zhai;Tong Yang;Qingxiang Wu;Shudong Guo;Ruiping Pang;Ning Sun
Underactuated systems are a class of systems in which the number of control inputs is less than the degrees of freedom (DoFs) to be controlled. With the increasing demand for the control performance of underactuated systems, the current research on their optimization of steady-state performance is no longer sufficient. However, owing to limited control inputs, ensuring their transient performance is often difficult. Moreover, some specific composite variables in underactuated systems should be kept within the preset ranges, which poses a significant challenge to collision avoidance safety. In addition, the sensor noises are also an issue that cannot be ignored. To this end, an extended Kalman filtering-based nonlinear model predictive control method for underactuated systems is developed in this article. The key feature of this method is that it simultaneously ensures accurate positioning, multiple constraints, and obstacle avoidance. Specifically, by adding an artificial potential field as an obstacle avoidance penalty term in the cost function and dynamically assigning weight coefficients, efficient collision avoidance control is achieved. Furthermore, it is combined with the extended Kalman filtering and jointly applied to underactuated systems with sensor noises. To the best of our knowledge, it is the first control method that simultaneously considers full-state constraints, specific composite variable constraints, control input and its increment constraints, as well as obstacle avoidance in underactuated systems. The satisfactory control performance of the proposed method is validated by implementing it on two typical underactuated systems, that is, four-DoF overhead cranes and five-DoF tower cranes.
欠驱动系统是一类控制输入数小于被控制自由度的系统。随着对欠驱动系统控制性能要求的不断提高,目前对欠驱动系统稳态性能优化的研究已经不够。然而,由于控制输入有限,确保它们的瞬态性能往往是困难的。此外,欠驱动系统中某些特定的复合变量需要保持在预设范围内,这对避碰安全性提出了重大挑战。此外,传感器噪声也是一个不容忽视的问题。为此,本文提出了一种基于扩展卡尔曼滤波的欠驱动系统非线性模型预测控制方法。该方法的主要特点是能同时保证精确定位、多约束和避障。具体而言,通过在代价函数中加入人工势场作为避障惩罚项,并动态分配权系数,实现有效的避障控制。并将其与扩展卡尔曼滤波相结合,共同应用于具有传感器噪声的欠驱动系统。据我们所知,它是欠驱动系统中第一个同时考虑全状态约束、特定复合变量约束、控制输入及其增量约束以及避障的控制方法。通过对四自由度桥式起重机和五自由度塔式起重机两种典型欠驱动系统的控制,验证了所提方法的控制性能。
{"title":"Extended Kalman Filtering-Based Nonlinear Model Predictive Control for Underactuated Systems With Multiple Constraints and Obstacle Avoidance","authors":"Meng Zhai;Tong Yang;Qingxiang Wu;Shudong Guo;Ruiping Pang;Ning Sun","doi":"10.1109/TCYB.2024.3488371","DOIUrl":"10.1109/TCYB.2024.3488371","url":null,"abstract":"Underactuated systems are a class of systems in which the number of control inputs is less than the degrees of freedom (DoFs) to be controlled. With the increasing demand for the control performance of underactuated systems, the current research on their optimization of steady-state performance is no longer sufficient. However, owing to limited control inputs, ensuring their transient performance is often difficult. Moreover, some specific composite variables in underactuated systems should be kept within the preset ranges, which poses a significant challenge to collision avoidance safety. In addition, the sensor noises are also an issue that cannot be ignored. To this end, an extended Kalman filtering-based nonlinear model predictive control method for underactuated systems is developed in this article. The key feature of this method is that it simultaneously ensures accurate positioning, multiple constraints, and obstacle avoidance. Specifically, by adding an artificial potential field as an obstacle avoidance penalty term in the cost function and dynamically assigning weight coefficients, efficient collision avoidance control is achieved. Furthermore, it is combined with the extended Kalman filtering and jointly applied to underactuated systems with sensor noises. To the best of our knowledge, it is the first control method that simultaneously considers full-state constraints, specific composite variable constraints, control input and its increment constraints, as well as obstacle avoidance in underactuated systems. The satisfactory control performance of the proposed method is validated by implementing it on two typical underactuated systems, that is, four-DoF overhead cranes and five-DoF tower cranes.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 1","pages":"369-382"},"PeriodicalIF":9.4,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142610721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Supervised Learning for Intuitive Control of Prosthetic Hand Movements via Sonomyography 通过超声造影进行自我监督学习以直观控制假手运动
IF 9.4 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-13 DOI: 10.1109/TCYB.2024.3489438
Xingchen Yang;Zongtian Yin;Yixuan Sheng;Dario Farina;Honghai Liu
As a primary effector of humans, the hand plays a crucial role in many aspects of daily life. Recognizing multidegree-of-freedom hand movements from muscle activity helps infer human motion intentions. Solving this problem has direct applications in prosthetic and exoskeleton control. Here, we propose a self-supervised learning algorithm inspired by muscle synergies to achieve simultaneous estimation of wrist rotation (supination/pronation) and hand grasp (open/close) from sonomyography—the muscle deformation detected by a wearable ultrasound array. Unlike conventional methods collecting both muscle activity and hand kinematics for supervised model calibration, this algorithm only uses unlabeled forearm ultrasound signals for self-supervised wrist and hand movement estimation, where movement labels are auto-generated. The performance of the proposed algorithm was experimentally evaluated with ten participants including an amputee. Offline analysis demonstrated that the proposed algorithm can accurately estimate simultaneous wrist rotation and hand grasp movements ( $r_{textrm {wrist}}$ and $r_{textrm {hand}}$ were 0.98 and 0.94 for the able-bodied, and 0.98 and 0.90 for the amputee, respectively). Notably, the performance of the self-supervised learning was superior to the supervised learning for the amputee. Online experiments demonstrated that intended wrist and hand movements can be deciphered in real time, enabling accurate control of a virtual hand. This study will open up a new avenue for the sonomyographic human-machine interaction.
作为人类的主要影响者,手在日常生活的许多方面起着至关重要的作用。从肌肉活动中识别多自由度的手部运动有助于推断人类的运动意图。解决这一问题对假肢和外骨骼控制有直接的应用价值。在这里,我们提出了一种受肌肉协同作用启发的自监督学习算法,以实现从声纳图中同时估计手腕旋转(旋后/旋前)和手握(打开/闭合)-可穿戴超声阵列检测到的肌肉变形。与传统方法收集肌肉活动和手部运动学进行监督模型校准不同,该算法仅使用未标记的前臂超声信号进行自监督手腕和手部运动估计,其中运动标签是自动生成的。该算法的性能进行了实验评估与十个参与者包括一个截肢者。离线分析表明,该算法可以准确估计腕部旋转和手抓动作的同时进行(健全者$r_{textrm {wrist}}$和截肢者$r_{textrm {hand}}$分别为0.98和0.94,截肢者$r_{textrm {wrist}}$和0.98和0.90)。值得注意的是,自监督学习的表现优于监督学习的截肢者。在线实验表明,腕部和手部的预期动作可以实时破译,从而实现对虚拟手的精确控制。本研究将为声速学人机交互开辟一条新的途径。
{"title":"Self-Supervised Learning for Intuitive Control of Prosthetic Hand Movements via Sonomyography","authors":"Xingchen Yang;Zongtian Yin;Yixuan Sheng;Dario Farina;Honghai Liu","doi":"10.1109/TCYB.2024.3489438","DOIUrl":"10.1109/TCYB.2024.3489438","url":null,"abstract":"As a primary effector of humans, the hand plays a crucial role in many aspects of daily life. Recognizing multidegree-of-freedom hand movements from muscle activity helps infer human motion intentions. Solving this problem has direct applications in prosthetic and exoskeleton control. Here, we propose a self-supervised learning algorithm inspired by muscle synergies to achieve simultaneous estimation of wrist rotation (supination/pronation) and hand grasp (open/close) from sonomyography—the muscle deformation detected by a wearable ultrasound array. Unlike conventional methods collecting both muscle activity and hand kinematics for supervised model calibration, this algorithm only uses unlabeled forearm ultrasound signals for self-supervised wrist and hand movement estimation, where movement labels are auto-generated. The performance of the proposed algorithm was experimentally evaluated with ten participants including an amputee. Offline analysis demonstrated that the proposed algorithm can accurately estimate simultaneous wrist rotation and hand grasp movements (\u0000<inline-formula> <tex-math>$r_{textrm {wrist}}$ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$r_{textrm {hand}}$ </tex-math></inline-formula>\u0000 were 0.98 and 0.94 for the able-bodied, and 0.98 and 0.90 for the amputee, respectively). Notably, the performance of the self-supervised learning was superior to the supervised learning for the amputee. Online experiments demonstrated that intended wrist and hand movements can be deciphered in real time, enabling accurate control of a virtual hand. This study will open up a new avenue for the sonomyographic human-machine interaction.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 1","pages":"409-420"},"PeriodicalIF":9.4,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142610701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Cybernetics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1