首页 > 最新文献

2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)最新文献

英文 中文
AlgebraicSystems: Compositional Verification for Autonomous System Design 代数系统:自治系统设计的组成验证
Pub Date : 2022-03-03 DOI: 10.48550/arXiv.2203.16343
Georgios Bakirtzis, U. Topcu
Autonomous systems require the management of several model views to assure properties such as safety and security among oth-ers. A crucial issue in autonomous systems design assurance is the notion of emergent behavior; we cannot use their parts in isolation to examine their overall behavior or performance. Compositional verification attempts to combat emergence by implementing model transformation as structure-preserving maps between model views. AlgebraicDynamics relies on categorical semantics to draw relation-ships between algebras and model views. We propose AlgebraicSystems, a conglomeration of algebraic methods to assign semantics and categorical primitives to give computational meaning to relationships between models so that the formalisms and resulting tools are interoperable through vertical and horizontal composition.
自治系统需要管理多个模型视图,以确保安全性等属性。自治系统设计保证中的一个关键问题是紧急行为的概念;我们不能孤立地使用它们的部件来检查它们的整体行为或性能。组合验证试图通过将模型转换实现为模型视图之间保持结构的映射来对抗突现。AlgebraicDynamics依靠范畴语义来绘制代数和模型视图之间的关系。我们提出了代数系统,这是一种代数方法的集合,用于分配语义和分类原语,为模型之间的关系赋予计算意义,从而使形式化和结果工具通过垂直和水平组合可互操作。
{"title":"AlgebraicSystems: Compositional Verification for Autonomous System Design","authors":"Georgios Bakirtzis, U. Topcu","doi":"10.48550/arXiv.2203.16343","DOIUrl":"https://doi.org/10.48550/arXiv.2203.16343","url":null,"abstract":"Autonomous systems require the management of several model views to assure properties such as safety and security among oth-ers. A crucial issue in autonomous systems design assurance is the notion of emergent behavior; we cannot use their parts in isolation to examine their overall behavior or performance. Compositional verification attempts to combat emergence by implementing model transformation as structure-preserving maps between model views. AlgebraicDynamics relies on categorical semantics to draw relation-ships between algebras and model views. We propose AlgebraicSystems, a conglomeration of algebraic methods to assign semantics and categorical primitives to give computational meaning to relationships between models so that the formalisms and resulting tools are interoperable through vertical and horizontal composition.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123425948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physics-Aware Safety-Assured Design of Hierarchical Neural Network based Planner 基于分层神经网络的规划器的物理感知安全保证设计
Pub Date : 2022-01-22 DOI: 10.1109/iccps54341.2022.00019
Xiangguo Liu, Chao Huang, Yixuan Wang, Bowen Zheng, Qi Zhu
Neural networks have shown great promises in planning, control, and general decision making for learning-enabled cyber-physical systems (LE-CPSs), especially in improving performance under complex scenarios. However, it is very challenging to formally analyze the behavior of neural network based planners for ensuring system safety, which significantly impedes their applications in safety-critical domains such as autonomous driving. In this work, we propose a hierarchical neural network based planner that analyzes the underlying physical scenarios of the system and learns a system-level behavior planning scheme with multiple scenario-specific motion-planning strategies. We then develop an efficient verification method that incorporates overapproximation of the system state reachable set and novel partition and union techniques for formally ensuring system safety under our physics-aware planner. With theoretical analysis, we show that considering the different physical scenarios and building a hierarchical planner based on such analysis may improve system safety and verifiability. We also empirically demonstrate the effectiveness of our approach and its advantage over other baselines in practical case studies of unprotected left turn and highway merging, two common challenging safety-critical tasks in autonomous driving.
神经网络在学习网络物理系统(le - cps)的规划、控制和一般决策制定方面显示出巨大的前景,特别是在复杂场景下提高性能方面。然而,正式分析基于神经网络的规划器的行为以确保系统安全是非常具有挑战性的,这极大地阻碍了它们在安全关键领域(如自动驾驶)的应用。在这项工作中,我们提出了一个基于分层神经网络的规划器,该规划器分析了系统的底层物理场景,并学习了具有多个场景特定运动规划策略的系统级行为规划方案。然后,我们开发了一种有效的验证方法,该方法结合了系统状态可达集的过近似值和新的分区和联合技术,以在我们的物理感知计划器下正式确保系统安全。通过理论分析表明,考虑不同的物理场景并在此基础上构建分层规划器可以提高系统的安全性和可验证性。在无保护的左转和高速公路合并的实际案例研究中,我们也通过经验证明了我们方法的有效性及其优于其他基线的优势,这是自动驾驶中两个常见的具有挑战性的安全关键任务。
{"title":"Physics-Aware Safety-Assured Design of Hierarchical Neural Network based Planner","authors":"Xiangguo Liu, Chao Huang, Yixuan Wang, Bowen Zheng, Qi Zhu","doi":"10.1109/iccps54341.2022.00019","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00019","url":null,"abstract":"Neural networks have shown great promises in planning, control, and general decision making for learning-enabled cyber-physical systems (LE-CPSs), especially in improving performance under complex scenarios. However, it is very challenging to formally analyze the behavior of neural network based planners for ensuring system safety, which significantly impedes their applications in safety-critical domains such as autonomous driving. In this work, we propose a hierarchical neural network based planner that analyzes the underlying physical scenarios of the system and learns a system-level behavior planning scheme with multiple scenario-specific motion-planning strategies. We then develop an efficient verification method that incorporates overapproximation of the system state reachable set and novel partition and union techniques for formally ensuring system safety under our physics-aware planner. With theoretical analysis, we show that considering the different physical scenarios and building a hierarchical planner based on such analysis may improve system safety and verifiability. We also empirically demonstrate the effectiveness of our approach and its advantage over other baselines in practical case studies of unprotected left turn and highway merging, two common challenging safety-critical tasks in autonomous driving.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128630495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
HydraFusion: Context-Aware Selective Sensor Fusion for Robust and Efficient Autonomous Vehicle Perception 液压融合:用于鲁棒和高效自动驾驶车辆感知的环境感知选择性传感器融合
Pub Date : 2022-01-17 DOI: 10.1109/iccps54341.2022.00013
A. Malawade, Trier Mortlock, M. A. Faruque
Although autonomous vehicles (AVs) are expected to revolutionize transportation, robust perception across a wide range of driving contexts remains a significant challenge. Techniques to fuse sensor data from camera, radar, and lidar sensors have been proposed to improve AV perception. However, existing methods are insufficiently robust in difficult driving contexts (e.g., bad weather, low light, sensor obstruction) due to rigidity in their fusion implementations. These methods fall into two broad categories: (i) early fusion, which fails when sensor data is noisy or obscured, and (ii) late fusion, which cannot leverage features from multiple sensors and thus produces worse estimates. To address these limitations, we propose HydraFusion: a selective sensor fusion framework that learns to identify the current driving context and fuses the best combination of sensors to maximize robustness without compromising efficiency. HydraFusion is the first approach to propose dynamically adjusting between early fusion, late fusion, and combinations in-between, thus varying both how and when fusion is applied. We show that, on average, Hydrafusionoutperforms early and late fusion approaches by 13.66% and 14.54%, respectively, without increasing computational complexity or energy consumption on the industry-standard Nvidia Drive PX2 AV hardware platform. We also propose and evaluate both static and deep-learning-based context identification strategies. Our open-source code and model implementation are available at https://github.com/AICPS/hydrafusion.
尽管自动驾驶汽车(AVs)有望彻底改变交通运输,但在广泛的驾驶环境中实现强大的感知仍然是一个重大挑战。融合来自相机、雷达和激光雷达传感器的传感器数据的技术已经被提出,以改善自动驾驶感知。然而,现有的方法在困难的驾驶环境下(例如,恶劣天气、低光、传感器障碍物)由于其融合实现的刚性而不够稳健。这些方法分为两大类:(i)早期融合,当传感器数据有噪声或模糊时失败;(ii)晚期融合,不能利用多个传感器的特征,因此产生较差的估计。为了解决这些限制,我们提出了HydraFusion:一种选择性传感器融合框架,可以学习识别当前驾驶环境,并融合传感器的最佳组合,在不影响效率的情况下最大化鲁棒性。HydraFusion是第一个提出在早期融合、晚期融合和两者之间的组合之间进行动态调整的方法,从而改变融合的方式和时间。我们发现,在行业标准Nvidia Drive PX2 AV硬件平台上,hydrfusion在不增加计算复杂性或能耗的情况下,平均比早期和晚期融合方法分别高出13.66%和14.54%。我们还提出并评估了静态和基于深度学习的上下文识别策略。我们的开源代码和模型实现可在https://github.com/AICPS/hydrafusion上获得。
{"title":"HydraFusion: Context-Aware Selective Sensor Fusion for Robust and Efficient Autonomous Vehicle Perception","authors":"A. Malawade, Trier Mortlock, M. A. Faruque","doi":"10.1109/iccps54341.2022.00013","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00013","url":null,"abstract":"Although autonomous vehicles (AVs) are expected to revolutionize transportation, robust perception across a wide range of driving contexts remains a significant challenge. Techniques to fuse sensor data from camera, radar, and lidar sensors have been proposed to improve AV perception. However, existing methods are insufficiently robust in difficult driving contexts (e.g., bad weather, low light, sensor obstruction) due to rigidity in their fusion implementations. These methods fall into two broad categories: (i) early fusion, which fails when sensor data is noisy or obscured, and (ii) late fusion, which cannot leverage features from multiple sensors and thus produces worse estimates. To address these limitations, we propose HydraFusion: a selective sensor fusion framework that learns to identify the current driving context and fuses the best combination of sensors to maximize robustness without compromising efficiency. HydraFusion is the first approach to propose dynamically adjusting between early fusion, late fusion, and combinations in-between, thus varying both how and when fusion is applied. We show that, on average, Hydrafusionoutperforms early and late fusion approaches by 13.66% and 14.54%, respectively, without increasing computational complexity or energy consumption on the industry-standard Nvidia Drive PX2 AV hardware platform. We also propose and evaluate both static and deep-learning-based context identification strategies. Our open-source code and model implementation are available at https://github.com/AICPS/hydrafusion.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130898435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Querying Labelled Data with Scenario Programs for Sim-to-Real Validation 用模拟到真实验证的场景程序查询标记数据
Pub Date : 2021-12-01 DOI: 10.1109/iccps54341.2022.00010
Edward Kim, Jay Shenoy, Sebastian Junges, Daniel J. Fremont, A. Sangiovanni-Vincentelli, S. Seshia
Simulation-based testing of autonomous vehicles (AVs) has become an essential complement to road testing to ensure safety. Conse-quently, substantial research has focused on searching for failure scenarios in simulation. However, a fundamental question remains: are AV failure scenarios identified in simulation meaningful in re-ality - i.e., are they reproducible on the real system? Due to the sim-to-real gap arising from discrepancies between simulated and real sensor data, a failure scenario identified in simulation can be either a spurious artifact of the synthetic sensor data or an actual failure that persists with real sensor data. An approach to validate simulated failure scenarios is to identify instances of the scenario in a corpus of real data, and check if the failure persists on the real data. To this end, we propose a formal definition of what it means for a labelled data item to match an abstract scenario, encoded as a scenario program using the Scenic probabilistic programming language. Using this definition, we develop a querying algorithm which, given a scenario program and a labelled dataset, finds the subset of data matching the scenario. Experiments demonstrate that our algorithm is accurate and efficient on a variety of realistic traffic scenarios, and scales to a reasonable number of agents.
基于仿真的自动驾驶汽车测试已经成为道路测试的重要补充,以确保安全。因此,大量的研究集中在寻找仿真中的失效场景上。然而,一个基本的问题仍然存在:在模拟中识别的自动驾驶故障场景在现实中有意义吗?也就是说,它们在真实系统上是否可重现?由于模拟和真实传感器数据之间的差异导致模拟到真实的差距,在模拟中识别的故障场景可能是合成传感器数据的虚假工件,也可能是真实传感器数据持续存在的实际故障。验证模拟故障场景的一种方法是在真实数据语料库中识别场景的实例,并检查故障是否在真实数据上持续存在。为此,我们提出了一个正式的定义,即标记的数据项与抽象场景相匹配意味着什么,使用Scenic概率编程语言将其编码为场景程序。使用这个定义,我们开发了一个查询算法,该算法给定一个场景程序和一个标记的数据集,找到与场景匹配的数据子集。实验表明,我们的算法在各种现实交通场景下是准确和高效的,并且可以扩展到合理数量的智能体。
{"title":"Querying Labelled Data with Scenario Programs for Sim-to-Real Validation","authors":"Edward Kim, Jay Shenoy, Sebastian Junges, Daniel J. Fremont, A. Sangiovanni-Vincentelli, S. Seshia","doi":"10.1109/iccps54341.2022.00010","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00010","url":null,"abstract":"Simulation-based testing of autonomous vehicles (AVs) has become an essential complement to road testing to ensure safety. Conse-quently, substantial research has focused on searching for failure scenarios in simulation. However, a fundamental question remains: are AV failure scenarios identified in simulation meaningful in re-ality - i.e., are they reproducible on the real system? Due to the sim-to-real gap arising from discrepancies between simulated and real sensor data, a failure scenario identified in simulation can be either a spurious artifact of the synthetic sensor data or an actual failure that persists with real sensor data. An approach to validate simulated failure scenarios is to identify instances of the scenario in a corpus of real data, and check if the failure persists on the real data. To this end, we propose a formal definition of what it means for a labelled data item to match an abstract scenario, encoded as a scenario program using the Scenic probabilistic programming language. Using this definition, we develop a querying algorithm which, given a scenario program and a labelled dataset, finds the subset of data matching the scenario. Experiments demonstrate that our algorithm is accurate and efficient on a variety of realistic traffic scenarios, and scales to a reasonable number of agents.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116055899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Monotonic Safety for Scalable and Data-Efficient Probabilistic Safety Analysis 可扩展数据高效概率安全分析的单调安全性
Pub Date : 2021-11-04 DOI: 10.1109/iccps54341.2022.00015
Matthew Cleaveland, I. Ruchkin, O. Sokolsky, Insup Lee
Autonomous systems with machine learning-based perception can exhibit unpredictable behaviors that are difficult to quantify, let alone verify. Such behaviors are convenient to capture in proba-bilistic models, but probabilistic model checking of such models is difficult to scale - largely due to the non-determinism added to models as a prerequisite for provable conservatism. Statistical model checking (SMC) has been proposed to address the scalabil-ity issue. However it requires large amounts of data to account for the aforementioned non-determinism, which in turn limits its scalability. This work introduces a general technique for reduction of non-determinism based on assumptions of “monotonic safety”, which define a partial order between system states in terms of their probabilities of being safe. We exploit these assumptions to remove non-determinism from controller/plant models to drasti-cally speed up probabilistic model checking and statistical model checking while providing provably conservative estimates as long as the safety is indeed monotonic. Our experiments demonstrate model-checking speed-ups of an order of magnitude while main-taining acceptable accuracy and require much less data for accurate estimates when running SMC - even when monotonic safety does not perfectly hold and provable conservatism is not achieved.
具有基于机器学习感知的自主系统可能会表现出难以量化的不可预测行为,更不用说验证了。这种行为在概率模型中很容易被捕获,但是这种模型的概率模型检查很难扩展——很大程度上是由于作为可证明保守性的先决条件而添加到模型中的非确定性。统计模型检查(SMC)被提出来解决可扩展性问题。然而,它需要大量的数据来解释前面提到的不确定性,这反过来又限制了它的可伸缩性。这项工作介绍了一种基于“单调安全”假设来减少非确定性的一般技术,它根据系统状态的安全概率定义了系统状态之间的偏序。我们利用这些假设来消除控制器/对象模型的不确定性,从而大大加快了概率模型检查和统计模型检查的速度,同时提供了可证明的保守估计,只要安全性确实是单调的。我们的实验表明,在保持可接受的精度的同时,模型检查的速度提高了一个数量级,并且在运行SMC时需要更少的数据进行准确估计-即使在单调安全性不能完全保持并且无法实现可证明的保守性时也是如此。
{"title":"Monotonic Safety for Scalable and Data-Efficient Probabilistic Safety Analysis","authors":"Matthew Cleaveland, I. Ruchkin, O. Sokolsky, Insup Lee","doi":"10.1109/iccps54341.2022.00015","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00015","url":null,"abstract":"Autonomous systems with machine learning-based perception can exhibit unpredictable behaviors that are difficult to quantify, let alone verify. Such behaviors are convenient to capture in proba-bilistic models, but probabilistic model checking of such models is difficult to scale - largely due to the non-determinism added to models as a prerequisite for provable conservatism. Statistical model checking (SMC) has been proposed to address the scalabil-ity issue. However it requires large amounts of data to account for the aforementioned non-determinism, which in turn limits its scalability. This work introduces a general technique for reduction of non-determinism based on assumptions of “monotonic safety”, which define a partial order between system states in terms of their probabilities of being safe. We exploit these assumptions to remove non-determinism from controller/plant models to drasti-cally speed up probabilistic model checking and statistical model checking while providing provably conservative estimates as long as the safety is indeed monotonic. Our experiments demonstrate model-checking speed-ups of an order of magnitude while main-taining acceptable accuracy and require much less data for accurate estimates when running SMC - even when monotonic safety does not perfectly hold and provable conservatism is not achieved.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133301748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Confidence Composition for Monitors of Verification Assumptions 核查假设监测员的置信度组成
Pub Date : 2021-11-03 DOI: 10.1109/iccps54341.2022.00007
I. Ruchkin, Matthew Cleaveland, Radoslav Ivanov, Pengyuan Lu, Taylor J. Carpenter, O. Sokolsky, Insup Lee
Closed-loop verification of cyberphysical systems with neural network controllers offers strong safety guarantees under certain assumptions. It is, however, difficult to determine whether these guar-antees apply at run time because verification assumptions may be violated. To predict safety violations in a verified system, we propose a three-step confidence composition (CoCo) framework for monitoring verification assumptions. First, we represent the sufficient condition for verified safety with a propositional logical formula over assumptions. Second, we build calibrated confidence monitors that evaluate the probability that each assumption holds. Third, we obtain the confidence in the verification guarantees by composing the assumption monitors using a composition function suitable for the logical formula. Our CoCo framework provides theoretical bounds on the calibration and conservatism of compositional monitors. Two case studies show that compositional monitors are calibrated better than their constituents and successfully predict safety violations.
基于神经网络控制器的网络物理系统闭环验证在一定的假设条件下提供了强有力的安全保证。然而,很难确定这些保证在运行时是否适用,因为可能违反验证假设。为了预测验证系统中的安全违规行为,我们提出了一个三步置信度组成(CoCo)框架来监测验证假设。首先,我们用假设上的命题逻辑公式表示了验证安全性的充分条件。其次,我们建立校准的信心监视器,评估每个假设成立的概率。第三,利用适合于逻辑公式的组合函数组合假设监视器,获得验证保证的置信度。我们的CoCo框架为组合监视器的校准和保守性提供了理论界限。两个案例研究表明,成分监测器的校准比其成分更好,并成功地预测了安全违规。
{"title":"Confidence Composition for Monitors of Verification Assumptions","authors":"I. Ruchkin, Matthew Cleaveland, Radoslav Ivanov, Pengyuan Lu, Taylor J. Carpenter, O. Sokolsky, Insup Lee","doi":"10.1109/iccps54341.2022.00007","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00007","url":null,"abstract":"Closed-loop verification of cyberphysical systems with neural network controllers offers strong safety guarantees under certain assumptions. It is, however, difficult to determine whether these guar-antees apply at run time because verification assumptions may be violated. To predict safety violations in a verified system, we propose a three-step confidence composition (CoCo) framework for monitoring verification assumptions. First, we represent the sufficient condition for verified safety with a propositional logical formula over assumptions. Second, we build calibrated confidence monitors that evaluate the probability that each assumption holds. Third, we obtain the confidence in the verification guarantees by composing the assumption monitors using a composition function suitable for the logical formula. Our CoCo framework provides theoretical bounds on the calibration and conservatism of compositional monitors. Two case studies show that compositional monitors are calibrated better than their constituents and successfully predict safety violations.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124797595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Multi-Objective Controller Synthesis with Uncertain Human Preferences 具有不确定人类偏好的多目标控制器综合
Pub Date : 2021-05-10 DOI: 10.1109/iccps54341.2022.00022
Shenghui Chen, Kayla Boggess, D. Parker, Lu Feng
Complex real-world applications of cyber-physical systems give rise to the need for multi-objective controller synthesis, which con-cerns the problem of computing an optimal controller subject to multiple (possibly conflicting) criteria. The relative importance of objectives is often specified by human decision-makers. However, there is inherent uncertainty in human preferences (e.g., due to artifacts resulting from different preference elicitation methods). In this paper, we formalize the notion of uncertain human preferences, and present a novel approach that accounts for this uncertainty in the context of multi-objective controller synthesis for Markov decision processes (MDPs). Our approach is based on mixed-integer linear programming and synthesizes an optimally permissive multi-strategy that satisfies uncertain human preferences with respect to a multi-objective property. Experimental results on a range of large case studies show that the proposed approach is feasible and scalable across varying MDP model sizes and uncertainty levels of human preferences. Evaluation via an online user study also demon-strates the quality and benefits of the synthesized controllers.
网络物理系统的复杂实际应用产生了对多目标控制器综合的需求,这涉及到计算受多个(可能相互冲突的)标准约束的最优控制器的问题。目标的相对重要性通常由人类决策者指定。然而,人类偏好存在固有的不确定性(例如,由于不同偏好激发方法产生的人为因素)。在本文中,我们形式化了不确定人类偏好的概念,并提出了一种在马尔可夫决策过程(mdp)的多目标控制器综合背景下解释这种不确定性的新方法。我们的方法基于混合整数线性规划,并综合了一种最优允许的多策略,该策略满足了关于多目标特性的不确定人类偏好。一系列大型案例研究的实验结果表明,所提出的方法是可行的,并且可扩展到不同的MDP模型大小和人类偏好的不确定性水平。通过在线用户研究的评估也证明了合成控制器的质量和效益。
{"title":"Multi-Objective Controller Synthesis with Uncertain Human Preferences","authors":"Shenghui Chen, Kayla Boggess, D. Parker, Lu Feng","doi":"10.1109/iccps54341.2022.00022","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00022","url":null,"abstract":"Complex real-world applications of cyber-physical systems give rise to the need for multi-objective controller synthesis, which con-cerns the problem of computing an optimal controller subject to multiple (possibly conflicting) criteria. The relative importance of objectives is often specified by human decision-makers. However, there is inherent uncertainty in human preferences (e.g., due to artifacts resulting from different preference elicitation methods). In this paper, we formalize the notion of uncertain human preferences, and present a novel approach that accounts for this uncertainty in the context of multi-objective controller synthesis for Markov decision processes (MDPs). Our approach is based on mixed-integer linear programming and synthesizes an optimally permissive multi-strategy that satisfies uncertain human preferences with respect to a multi-objective property. Experimental results on a range of large case studies show that the proposed approach is feasible and scalable across varying MDP model sizes and uncertainty levels of human preferences. Evaluation via an online user study also demon-strates the quality and benefits of the synthesized controllers.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134188300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Learning-Based Vulnerability Analysis of Cyber-Physical Systems 基于学习的网络物理系统漏洞分析
Pub Date : 2021-03-10 DOI: 10.1109/iccps54341.2022.00030
Amir Khazraei, S. Hallyburton, Qitong Gao, Yu Wang, M. Pajic
This work focuses on the use of deep learning for vulnerability analysis of cyber-physical systems (CPS). Specifically, we consider a control architecture widely used in CPS, where the low-level control is based on a feedback controller and an observer (e.g., the extended Kalman filter (EKF)), while also employing an anomaly detector. To facilitate analyzing the impact potential sensing attacks could have on systems with general nonlinear dynamics, we develop learning-enabled attack generators capable of designing stealthy attacks that maximally degrade system operation. We show how such problem can be cast within a learning-based grey-box framework where only parts of the runtime information are known to the attacker. We then introduce two methods for generating effective stealthy attacks, based on feed-forward neural networks (FNN) and recurrent neural networks (RNN). Both types of attack-generator models are trained offline, using a cost function that combines the attack impact on the estimation error (and thus control) and the residual signal used for anomaly detection; this enables the trained models to recursively generate effective yet stealthy sensor attacks in real-time while requiring different levels of system information at runtime. The effectiveness of the proposed methods is demonstrated on several case studies with varying levels of complexity and nonlinearity: inverted pendulum, autonomous driving vehicles (ADV), and unmanned areal vehicles (UAVs).
这项工作的重点是使用深度学习进行网络物理系统(CPS)的漏洞分析。具体来说,我们考虑了在CPS中广泛使用的控制体系结构,其中低级控制基于反馈控制器和观测器(例如,扩展卡尔曼滤波器(EKF)),同时还采用异常检测器。为了便于分析潜在的传感攻击可能对具有一般非线性动力学的系统产生的影响,我们开发了能够设计最大限度地降低系统运行的隐形攻击的学习攻击生成器。我们展示了如何在一个基于学习的灰盒框架中处理这样的问题,在这个框架中,攻击者只知道部分运行时信息。然后,我们介绍了基于前馈神经网络(FNN)和递归神经网络(RNN)的两种生成有效隐形攻击的方法。这两种类型的攻击生成器模型都是离线训练的,使用的代价函数结合了攻击对估计误差的影响(从而控制)和用于异常检测的剩余信号;这使得经过训练的模型能够递归地实时生成有效而隐蔽的传感器攻击,同时在运行时需要不同级别的系统信息。所提出方法的有效性在几个不同复杂程度和非线性的案例研究中得到了证明:倒立摆、自动驾驶车辆(ADV)和无人驾驶区域车辆(uav)。
{"title":"Learning-Based Vulnerability Analysis of Cyber-Physical Systems","authors":"Amir Khazraei, S. Hallyburton, Qitong Gao, Yu Wang, M. Pajic","doi":"10.1109/iccps54341.2022.00030","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00030","url":null,"abstract":"This work focuses on the use of deep learning for vulnerability analysis of cyber-physical systems (CPS). Specifically, we consider a control architecture widely used in CPS, where the low-level control is based on a feedback controller and an observer (e.g., the extended Kalman filter (EKF)), while also employing an anomaly detector. To facilitate analyzing the impact potential sensing attacks could have on systems with general nonlinear dynamics, we develop learning-enabled attack generators capable of designing stealthy attacks that maximally degrade system operation. We show how such problem can be cast within a learning-based grey-box framework where only parts of the runtime information are known to the attacker. We then introduce two methods for generating effective stealthy attacks, based on feed-forward neural networks (FNN) and recurrent neural networks (RNN). Both types of attack-generator models are trained offline, using a cost function that combines the attack impact on the estimation error (and thus control) and the residual signal used for anomaly detection; this enables the trained models to recursively generate effective yet stealthy sensor attacks in real-time while requiring different levels of system information at runtime. The effectiveness of the proposed methods is demonstrated on several case studies with varying levels of complexity and nonlinearity: inverted pendulum, autonomous driving vehicles (ADV), and unmanned areal vehicles (UAVs).","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114710084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1