Zum Hauptinhalt springen

Showing 1–26 of 26 results for author: Ishii, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.18752  [pdf, other

    cs.MA eess.SY

    Resilient Average Consensus with Adversaries via Distributed Detection and Recovery

    Authors: Liwei Yuan, Hideaki Ishii

    Abstract: We study the problem of resilient average consensus in multi-agent systems where some of the agents are subject to failures or attacks. The objective of resilient average consensus is for non-faulty/normal agents to converge to the average of their initial values despite the erroneous effects from malicious agents. To this end, we propose a successful distributed iterative resilient average consen… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 16 pages

  2. arXiv:2403.07640  [pdf, other

    cs.MA eess.SY

    Asynchronous Approximate Byzantine Consensus: A Multi-hop Relay Method and Tight Graph Conditions

    Authors: Liwei Yuan, Hideaki Ishii

    Abstract: We study a multi-agent resilient consensus problem, where some agents are of the Byzantine type and try to prevent the normal ones from reaching consensus. In our setting, normal agents communicate with each other asynchronously over multi-hop relay channels with delays. To solve this asynchronous Byzantine consensus problem, we develop the multi-hop weighted mean subsequence reduced (MW-MSR) algo… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: text overlap with arXiv:2201.03214

  3. arXiv:2308.03931  [pdf, other

    cs.RO

    State Estimation of Continuum Robots: A Nonlinear Constrained Moving Horizon Approach

    Authors: Hend Abdelaziz, Ayman Nada, Hiroyuki Ishii, Haitham El-Hussieny

    Abstract: Continuum robots, made from flexible materials with continuous backbones, have several advantages over traditional rigid robots. Some of them are the ability to navigate through narrow or confined spaces, adapt to irregular or changing environments, and perform tasks in proximity to humans. However, one of the challenges in using continuum robots is the difficulty in accurately estimating their st… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

    Comments: This work has been accepted in SICE Japan 2023 conference

  4. Dynamic quantized consensus under DoS attacks: Towards a tight zooming-out factor

    Authors: Shuai Feng, Maopeng Ran, Hideaki Ishii, Shengyuan Xu

    Abstract: This paper deals with dynamic quantized consensus of dynamical agents in a general form under packet losses induced by Denial-of-Service (DoS) attacks. The communication channel has limited bandwidth and hence the transmitted signals over the network are subject to quantization. To deal with agent's output, an observer is implemented at each node. The state of the observer is quantized by a finite… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  5. arXiv:2301.11152  [pdf, ps, other

    eess.SY cs.GT cs.MA

    Cluster Forming of Multiagent Systems in Rolling Horizon Games with Non-uniform Horizons

    Authors: Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu

    Abstract: Consensus and cluster forming of multiagent systems in the face of jamming attacks along with reactive recovery actions by a defender are discussed. The attacker is capable to disable some of the edges of the network with the objective to divide the agents into a smaller size of clusters while, in response, the defender recovers some of the edges by increasing the transmission power. We consider r… ▽ More

    Submitted 26 January, 2023; originally announced January 2023.

    Comments: arXiv admin note: text overlap with arXiv:2301.03302

  6. arXiv:2301.03302  [pdf, ps, other

    eess.SY cs.GT cs.MA

    A Rolling Horizon Game Considering Network Effect in Cluster Forming for Dynamic Resilient Multiagent Systems

    Authors: Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu

    Abstract: A two-player game-theoretic problem on resilient graphs in a multiagent consensus setting is formulated. An attacker is capable to disable some of the edges of the network with the objective to divide the agents into clusters by emitting jamming signals while, in response, the defender recovers some of the edges by increasing the transmission power for the communication signals. Specifically, we c… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

  7. arXiv:2212.01570  [pdf, ps, other

    eess.SY cs.GT

    Two-Player Incomplete Games of Resilient Multiagent Systems

    Authors: Yurid Nugraha, Tomohisa Hayakawa, Hideaki Ishii, Ahmet Cetinkaya, Quanyan Zhu

    Abstract: Evolution of agents' dynamics of multiagent systems under consensus protocol in the face of jamming attacks is discussed, where centralized parties are able to influence the control signals of the agents. In this paper we focus on a game-theoretical approach of multiagent systems where the players have incomplete information on their opponents' strength. We consider repeated games with both simult… ▽ More

    Submitted 11 March, 2023; v1 submitted 3 December, 2022; originally announced December 2022.

    Comments: 9 pages, 6 figures. Accepted in IFAC-WC 2023

  8. arXiv:2210.09748  [pdf, other

    cs.RO

    Spoken Dialogue Strategy Focusing on Asymmetric Communication with Android Robots

    Authors: Daisuke Kawakubo, Hitoshi Ishii, Riku Okazawa, Shunta Nishizawa, Haruki Hatakeyama, Hiroaki Sugiyama, Masaki Shuzo, Eisaku Maeda

    Abstract: Humans are easily conscious of small differences in an android robot's (AR's) behaviors and utterances, resulting in treating the AR as not-human, while ARs treat us as humans. Thus, there exists asymmetric communication between ARs and humans. In our system at Dialogue Robot Competition 2022, this asymmetry was a considerable research target in our dialogue strategy. For example, tricky phrases s… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

    Comments: This paper is part of the proceedings of the Dialogue Robot Competition 2022

  9. Event-triggered Approximate Byzantine Consensus with Multi-hop Communication

    Authors: Liwei Yuan, Hideaki Ishii

    Abstract: In this paper, we consider a resilient consensus problem for the multi-agent network where some of the agents are subject to Byzantine attacks and may transmit erroneous state values to their neighbors. In particular, we develop an event-triggered update rule to tackle this problem as well as reduce the communication for each agent. Our approach is based on the mean subsequence reduced (MSR) algor… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

    Comments: arXiv admin note: text overlap with arXiv:2201.03214

  10. arXiv:2201.03214  [pdf, other

    cs.MA cs.DC eess.SY

    Resilient Consensus with Multi-hop Communication

    Authors: Liwei Yuan, Hideaki Ishii

    Abstract: In this paper, we study the problem of resilient consensus for a multi-agent network where some of the nodes might be adversarial, attempting to prevent consensus by transmitting faulty values. Our approach is based on that of the so-called weighted mean subsequence reduced (W-MSR) algorithm with a special emphasis on its use in agents capable to communicate with multi-hop neighbors. The MSR algor… ▽ More

    Submitted 10 January, 2022; originally announced January 2022.

  11. arXiv:2106.14153  [pdf, other

    cs.SC cs.MS math.CT math.DG math.NA

    Automatic Differentiation With Higher Infinitesimals, or Computational Smooth Infinitesimal Analysis in Weil Algebra

    Authors: Hiromi Ishii

    Abstract: We propose an algorithm to compute the $C^\infty$-ring structure of arbitrary Weil algebra. It allows us to do some analysis with higher infinitesimals numerically and symbolically. To that end, we first give a brief description of the (Forward-mode) automatic differentiation (AD) in terms of $C^\infty$-rings. The notion of a $C^\infty$-ring was introduced by Lawvere and used as the fundamental bu… ▽ More

    Submitted 4 July, 2021; v1 submitted 27 June, 2021; originally announced June 2021.

    Comments: to appear in Computer Algebra in Scientific Computing 2021

    Journal ref: Computer Algebra in Scientific Computing, pp. 174-191. CASC 2021. Lecture Notes in Computer Science, vol 12865. Springer, Cham

  12. arXiv:2103.11751  [pdf, ps, other

    cs.PL cs.LO

    Functional Pearl: Witness Me -- Constructive Arguments Must Be Guided with Concrete Witness

    Authors: Hiromi Ishii

    Abstract: Beloved Curry--Howard correspondence tells that types are intuitionistic propositions, and in constructive math, a proof of proposition can be seen as some kind of a construction, or witness, conveying the information of the proposition. We demonstrate how useful this point of view is as the guiding principle for developing dependently-typed programs.

    Submitted 22 March, 2021; originally announced March 2021.

    Comments: Submitted to Haskell'21

  13. arXiv:2103.11615  [pdf, other

    cs.SC cs.MS math.DG math.NA

    A Succinct Multivariate Lazy Multivariate Tower AD for Weil Algebra Computation

    Authors: Hiromi Ishii

    Abstract: We propose a functional implementation of \emph{Multivariate Tower Automatic Differentiation}. Our implementation is intended to be used in implementing $C^\infty$-structure computation of an arbitrary Weil algebra, which we discussed in the previous work.

    Submitted 4 July, 2021; v1 submitted 22 March, 2021; originally announced March 2021.

    Journal ref: Computer Algebra - Theory and its Applications,RIMS Kôkyûroku, No.2185 (2021). pp.104-112

  14. arXiv:2012.13757  [pdf, ps, other

    eess.SY cs.DC

    Resilient Consensus for Multi-Agent Systems under Adversarial Spreading Processes

    Authors: Yuan Wang, Hideaki Ishii, François Bonnet, Xavier Défago

    Abstract: This paper addresses novel consensus problems for multi-agent systems operating in an unreliable environment where adversaries are spreading. The dynamics of the adversarial spreading processes follows the susceptible-infected-recovered (SIR) model, where the infection induces faulty behaviors in the agents and affects their state values. Such a problem setting serves as a model of opinion dynamic… ▽ More

    Submitted 11 January, 2022; v1 submitted 26 December, 2020; originally announced December 2020.

    Comments: 16 pages, 15 figures

  15. arXiv:2006.11711  [pdf, ps, other

    eess.SY cs.DC

    Resilient Consensus Against Mobile Malicious Agents

    Authors: Yuan Wang, Hideaki Ishii, François Bonnet, Xavier Défago

    Abstract: This paper addresses novel consensus problems in the presence of adversaries that can move within the network and induce faulty behaviors in the attacked agents. By adopting several mobile adversary models from the computer science literature, we develop protocols which can mitigate the influence of such malicious agents. The algorithms follow the class of mean subsequence reduced (MSR) algorithms… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

  16. arXiv:2004.13815  [pdf, ps, other

    eess.SY cs.MA

    Dynamic Quantized Consensus of General Linear Multi-agent Systems under Denial-of-Service Attacks

    Authors: Shuai Feng, Hideaki Ishii

    Abstract: In this paper, we study multi-agent consensus problems under Denial-of-Service (DoS) attacks with data rate constraints. We first consider the leaderless consensus problem and after that we briefly present the analysis of leader-follower consensus. The dynamics of the agents take general forms modeled as homogeneous linear time-invariant systems. In our analysis, we derive lower bounds on the data… ▽ More

    Submitted 21 November, 2021; v1 submitted 28 April, 2020; originally announced April 2020.

  17. Dynamic Resilient Network Games with Applications to Multi-Agent Consensus

    Authors: Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu

    Abstract: A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of the underlying graph of the network system is reduced by an attacker who removes some of the edges whereas the defender attempts to recover them. Both players are subject to energy constraints so that their actions are restricted and cannot be… ▽ More

    Submitted 7 July, 2020; v1 submitted 30 March, 2020; originally announced March 2020.

    Comments: 12 pages, 13 figures

    Journal ref: IEEE Transactions on Control of Network Systems, vol. 8, pp: 246-259, 2021

  18. arXiv:1909.01999  [pdf, other

    eess.SY cs.IT cs.RO math.OC

    Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks

    Authors: Song Fang, Karl Henrik Johansson, Mikael Skoglund, Henrik Sandberg, Hideaki Ishii

    Abstract: In this paper, we introduce the concept of two-way coding, which originates in communication theory characterizing coding schemes for two-way channels, into control theory, particularly to facilitate the analysis and design of feedback control systems under injection attacks. Moreover, we propose the notion of attack decoupling, and show how the controller and the two-way coding can be co-designed… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

    Comments: arXiv admin note: text overlap with arXiv:1901.05420

  19. arXiv:1908.01059  [pdf, other

    cs.LG cs.CR cs.DC cs.MA eess.SY stat.ML

    Privacy-preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation

    Authors: Xin Wang, Hideaki Ishii, Linkang Du, Peng Cheng, Jiming Chen

    Abstract: With the proliferation of training data, distributed machine learning (DML) is becoming more competent for large-scale learning tasks. However, privacy concerns have to be given priority in DML, since training data may contain sensitive information of users. In this paper, we propose a privacy-preserving ADMM-based DML framework with two novel features: First, we remove the assumption commonly mad… ▽ More

    Submitted 9 September, 2019; v1 submitted 30 July, 2019; originally announced August 2019.

  20. arXiv:1904.04765  [pdf, ps, other

    cs.IT cs.LG eess.SP math.ST stat.ML

    Generic Variance Bounds on Estimation and Prediction Errors in Time Series Analysis: An Entropy Perspective

    Authors: Song Fang, Mikael Skoglund, Karl Henrik Johansson, Hideaki Ishii, Quanyan Zhu

    Abstract: In this paper, we obtain generic bounds on the variances of estimation and prediction errors in time series analysis via an information-theoretic approach. It is seen in general that the error bounds are determined by the conditional entropy of the data point to be estimated or predicted given the side information or past observations. Additionally, we discover that in order to achieve the predict… ▽ More

    Submitted 11 May, 2021; v1 submitted 9 April, 2019; originally announced April 2019.

  21. arXiv:1807.08604  [pdf, other

    eess.SY cs.RO eess.SP math.OC

    A Frequency-Domain Characterization of Optimal Error Covariance for the Kalman-Bucy Filter

    Authors: Song Fang, Hideaki Ishii, Jie Chen, Karl Henrik Johansson

    Abstract: In this paper, we discover that the trace of the division of the optimal output estimation error covariance over the noise covariance attained by the Kalman-Bucy filter can be explicitly expressed in terms of the plant dynamics and noise statistics in a frequency-domain integral characterization. Towards this end, we examine the algebraic Riccati equation associated with Kalman-Bucy filtering usin… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

  22. A Purely Functional Computer Algebra System Embedded in Haskell

    Authors: Hiromi Ishii

    Abstract: We demonstrate how methods in Functional Programming can be used to implement a computer algebra system. As a proof-of-concept, we present the computational-algebra package. It is a computer algebra system implemented as an embedded domain-specific language in Haskell, a purely functional programming language. Utilising methods in functional programming and prominent features of Haskell, this libr… ▽ More

    Submitted 20 September, 2018; v1 submitted 4 July, 2018; originally announced July 2018.

    Comments: 16 pages, Accepted to CASC 2018

    Journal ref: Computer Algebra in Scientific Computing, pp. 288-303. 20th International Workshop, CASC 2018, Lille, France, September 17-21, 2018, Proceedings

  23. arXiv:1709.08149  [pdf, other

    eess.SY cs.CR

    Stabilization of Networked Control Systems under DoS Attacks and Output Quantization

    Authors: Masashi Wakaiki, Ahmet Cetinkaya, Hideaki Ishii

    Abstract: This paper addresses quantized output feedback stabilization under Denial-of-Service (DoS) attacks. First, assuming that the duration and frequency of DoS attacks are averagely bounded and that an initial bound of the plant state is known, we propose an output encoding scheme that achieves exponential convergence with finite data rates. Next we show that a suitable state transformation allows us t… ▽ More

    Submitted 10 August, 2018; v1 submitted 24 September, 2017; originally announced September 2017.

    Comments: We have added new results in Sections 3.6 and 4

  24. Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing, Actuation, and Interaction

    Authors: Viirj Kan, Emma Vargo, Noa Machover, Hiroshi Ishii, Serena Pan, Weixuan Chen, Yasuaki Kakehi

    Abstract: In this paper we present Organic Primitives, an enabling toolbox that expands upon the library of input-output devices in HCI and facilitates the design of interactions with organic, fluid-based systems. We formulated color, odor and shape changing material primitives which act as sensor-actuators that convert pH signals into human-readable outputs. Food-grade organic molecules anthocyanin, vanill… ▽ More

    Submitted 24 February, 2017; v1 submitted 4 May, 2016; originally announced May 2016.

    Comments: Updated paper

    ACM Class: H.5.m

  25. arXiv:1304.2268  [pdf, ps, other

    eess.SY cs.SI math.OC

    Gossips and Prejudices: Ergodic Randomized Dynamics in Social Networks

    Authors: Paolo Frasca, Chiara Ravazzi, Roberto Tempo, Hideaki Ishii

    Abstract: In this paper we study a novel model of opinion dynamics in social networks, which has two main features. First, agents asynchronously interact in pairs, and these pairs are chosen according to a random process. We refer to this communication model as "gossiping". Second, agents are not completely open-minded, but instead take into account their initial opinions, which may be thought of as their "… ▽ More

    Submitted 8 April, 2013; originally announced April 2013.

    Comments: submitted for publication

  26. arXiv:1201.1170  [pdf, ps, other

    eess.SY cs.IT math.OC

    Data Rate Limitations for Stabilization of Uncertain Systems over Lossy Channels

    Authors: Kunihisa Okano, Hideaki Ishii

    Abstract: This paper considers data rate limitations for mean square stabilization of uncertain discrete-time linear systems via finite data rate and lossy channels. For a plant having parametric uncertainties, a necessary condition and a sufficient condition are derived, represented by the data rate, the packet loss probability, uncertainty bounds on plant parameters, and the unstable eigenvalues of the pl… ▽ More

    Submitted 5 January, 2012; originally announced January 2012.