Zum Hauptinhalt springen

Showing 1–29 of 29 results for author: Pajic, M

Searching in archive eess. Search in all archives.
.
  1. arXiv:2403.16956  [pdf, other

    cs.RO cs.CR eess.SY

    Bayesian Methods for Trust in Collaborative Multi-Agent Autonomy

    Authors: R. Spencer Hallyburton, Miroslav Pajic

    Abstract: Multi-agent, collaborative sensor fusion is a vital component of a multi-national intelligence toolkit. In safety-critical and/or contested environments, adversaries may infiltrate and compromise a number of agents. We analyze state of the art multi-target tracking algorithms under this compromised agent threat model. We prove that the track existence probability test ("track score") is significan… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

  2. arXiv:2403.05964  [pdf, other

    cs.RO eess.SP

    RadCloud: Real-Time High-Resolution Point Cloud Generation Using Low-Cost Radars for Aerial and Ground Vehicles

    Authors: David Hunt, Shaocheng Luo, Amir Khazraei, Xiao Zhang, Spencer Hallyburton, Tingjun Chen, Miroslav Pajic

    Abstract: In this work, we present RadCloud, a novel real time framework for directly obtaining higher-resolution lidar-like 2D point clouds from low-resolution radar frames on resource-constrained platforms commonly used in unmanned aerial and ground vehicles (UAVs and UGVs, respectively); such point clouds can then be used for accurate environmental mapping, navigating unknown environments, and other robo… ▽ More

    Submitted 9 March, 2024; originally announced March 2024.

    Comments: $©$ 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  3. arXiv:2401.09387  [pdf, other

    cs.RO eess.SY

    A Multi-Agent Security Testbed for the Analysis of Attacks and Defenses in Collaborative Sensor Fusion

    Authors: R. Spencer Hallyburton, David Hunt, Shaocheng Luo, Miroslav Pajic

    Abstract: The performance and safety of autonomous vehicles (AVs) deteriorates under adverse environments and adversarial actors. The investment in multi-sensor, multi-agent (MSMA) AVs is meant to promote improved efficiency of travel and mitigate safety risks. Unfortunately, minimal investment has been made to develop security-aware MSMA sensor fusion pipelines leaving them vulnerable to adversaries. To ad… ▽ More

    Submitted 17 January, 2024; originally announced January 2024.

  4. arXiv:2312.05794  [pdf, ps, other

    math.ST cs.LG eess.SY math.PR stat.ML

    Spectral Statistics of the Sample Covariance Matrix for High Dimensional Linear Gaussians

    Authors: Muhammad Abdullah Naeem, Miroslav Pajic

    Abstract: Performance of ordinary least squares(OLS) method for the \emph{estimation of high dimensional stable state transition matrix} $A$(i.e., spectral radius $ρ(A)<1$) from a single noisy observed trajectory of the linear time invariant(LTI)\footnote{Linear Gaussian (LG) in Markov chain literature} system $X_{-}:(x_0,x_1, \ldots,x_{N-1})$ satisfying \begin{equation} x_{t+1}=Ax_{t}+w_{t}, \hspace{10pt… ▽ More

    Submitted 10 December, 2023; originally announced December 2023.

    Comments: arXiv admin note: text overlap with arXiv:2310.10523

  5. arXiv:2311.16024  [pdf, other

    eess.SP

    MadRadar: A Black-Box Physical Layer Attack Framework on mmWave Automotive FMCW Radars

    Authors: David Hunt, Kristen Angell, Zhenzhou Qi, Tingjun Chen, Miroslav Pajic

    Abstract: Frequency modulated continuous wave (FMCW) millimeter-wave (mmWave) radars play a critical role in many of the advanced driver assistance systems (ADAS) featured on today's vehicles. While previous works have demonstrated (only) successful false-positive spoofing attacks against these sensors, all but one assumed that an attacker had the runtime knowledge of the victim radar's configuration. In th… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

  6. arXiv:2310.10523  [pdf, ps, other

    math.ST cs.LG eess.SY math.PR

    From Spectral Theorem to Statistical Independence with Application to System Identification

    Authors: Muhammad Abdullah Naeem, Amir Khazraei, Miroslav Pajic

    Abstract: High dimensional random dynamical systems are ubiquitous, including -- but not limited to -- cyber-physical systems, daily return on different stocks of S&P 1500 and velocity profile of interacting particle systems around McKeanVlasov limit. Mathematically, underlying phenomenon can be captured via a stable $n$-dimensional linear transformation `$A$' and additive randomness. System identification… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  7. arXiv:2310.04516  [pdf, other

    eess.SY

    Vulnerability Analysis of Nonlinear Control Systems to Stealthy False Data Injection Attacks

    Authors: Amir Khazraei, Miroslav Pajic

    Abstract: In this work, we focus on analyzing vulnerability of nonlinear dynamical control systems to stealthy false data injection attacks on sensors. We start by defining the stealthiness notion in the most general form where an attack is considered stealthy if it would be undetected by any intrusion detector, i.e., any intrusion detector could not do better than a random guess. Depending on the level of… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2204.03217

  8. arXiv:2305.12083  [pdf, ps, other

    math.ST eess.SY

    High Dimensional Geometry and Limitations in System Identification

    Authors: Muhammad Abdullah Naeem, Miroslav Pajic

    Abstract: We study the problem of identification of linear dynamical system from a single trajectory, via excitations of isotropic Gaussian. In stark contrast with previously reported results, Ordinary Least Squares (OLS) estimator for even \emph{stable} dynamical system contains non-vanishing error in \emph{high dimensions}; which stems from the fact that realizations of non-diagonalizable dynamics can hav… ▽ More

    Submitted 19 May, 2023; originally announced May 2023.

  9. arXiv:2303.07430  [pdf, other

    eess.SY cs.RO eess.IV

    A Modular Platform For Collaborative, Distributed Sensor Fusion

    Authors: R. Spencer Hallyburton, Nate Zelter, David Hunt, Kristen Angell, Miroslav Pajic

    Abstract: Leading autonomous vehicle (AV) platforms and testing infrastructures are, unfortunately, proprietary and closed-source. Thus, it is difficult to evaluate how well safety-critical AVs perform and how safe they truly are. Similarly, few platforms exist for much-needed multi-agent analysis. To provide a starting point for analysis of sensor fusion and collaborative & distributed sensing, we design a… ▽ More

    Submitted 29 March, 2023; v1 submitted 13 March, 2023; originally announced March 2023.

  10. arXiv:2303.03470  [pdf, other

    cs.CR eess.SY

    Partial-Information, Longitudinal Cyber Attacks on LiDAR in Autonomous Vehicles

    Authors: R. Spencer Hallyburton, Qingzhao Zhang, Z. Morley Mao, Miroslav Pajic

    Abstract: What happens to an autonomous vehicle (AV) if its data are adversarially compromised? Prior security studies have addressed this question through mostly unrealistic threat models, with limited practical relevance, such as white-box adversarial learning or nanometer-scale laser aiming and spoofing. With growing evidence that cyber threats pose real, imminent danger to AVs and cyber-physical systems… ▽ More

    Submitted 8 December, 2023; v1 submitted 6 March, 2023; originally announced March 2023.

  11. arXiv:2303.02112  [pdf, other

    cs.RO eess.SY

    Stealthy Perception-based Attacks on Unmanned Aerial Vehicles

    Authors: Amir Khazraei, Haocheng Meng, Miroslav Pajic

    Abstract: In this work, we study vulnerability of unmanned aerial vehicles (UAVs) to stealthy attacks on perception-based control. To guide our analysis, we consider two specific missions: ($i$) ground vehicle tracking (GVT), and ($ii$) vertical take-off and landing (VTOL) of a quadcopter on a moving ground vehicle. Specifically, we introduce a method to consistently attack both the sensors measurements and… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  12. arXiv:2302.02477  [pdf, other

    cs.LG eess.SP q-bio.QM

    Offline Learning of Closed-Loop Deep Brain Stimulation Controllers for Parkinson Disease Treatment

    Authors: Qitong Gao, Stephen L. Schimdt, Afsana Chowdhury, Guangyu Feng, Jennifer J. Peters, Katherine Genty, Warren M. Grill, Dennis A. Turner, Miroslav Pajic

    Abstract: Deep brain stimulation (DBS) has shown great promise toward treating motor symptoms caused by Parkinson's disease (PD), by delivering electrical pulses to the Basal Ganglia (BG) region of the brain. However, DBS devices approved by the U.S. Food and Drug Administration (FDA) can only deliver continuous DBS (cDBS) stimuli at a fixed amplitude; this energy inefficient operation reduces battery lifet… ▽ More

    Submitted 15 March, 2023; v1 submitted 5 February, 2023; originally announced February 2023.

    Comments: Accepted to International Conference on Cyber Physical Systems (ICCPS) 2023

  13. arXiv:2212.13857  [pdf, other

    cs.RO cs.SE eess.SY

    AVstack: An Open-Source, Reconfigurable Platform for Autonomous Vehicle Development

    Authors: R. Spencer Hallyburton, Shucheng Zhang, Miroslav Pajic

    Abstract: Pioneers of autonomous vehicles (AVs) promised to revolutionize the driving experience and driving safety. However, milestones in AVs have materialized slower than forecast. Two culprits are (1) the lack of verifiability of proposed state-of-the-art AV components, and (2) stagnation of pursuing next-level evaluations, e.g., vehicle-to-infrastructure (V2I) and multi-agent collaboration. In part, pr… ▽ More

    Submitted 10 March, 2023; v1 submitted 28 December, 2022; originally announced December 2022.

  14. arXiv:2206.07150  [pdf, other

    eess.SY

    Attacks on Perception-Based Control Systems: Modeling and Fundamental Limits

    Authors: Amir Khazraei, Henry Pfister, Miroslav Pajic

    Abstract: We study the performance of perception-based control systems in the presence of attacks, and provide methods for modeling and analysis of their resiliency to stealthy attacks on both physical and perception-based sensing. Specifically, we consider a general setup with a nonlinear affine physical plant controlled with a perception-based controller that maps both the physical (e.g., IMUs) and percep… ▽ More

    Submitted 27 August, 2023; v1 submitted 14 June, 2022; originally announced June 2022.

  15. arXiv:2205.12448  [pdf, ps, other

    stat.ML cs.IT cs.LG eess.SY

    Transportation-Inequalities, Lyapunov Stability and Sampling for Dynamical Systems on Continuous State Space

    Authors: Muhammad Abdullah Naeem, Miroslav Pajic

    Abstract: We study the concentration phenomenon for discrete-time random dynamical systems with an unbounded state space. We develop a heuristic approach towards obtaining exponential concentration inequalities for dynamical systems using an entirely functional analytic framework. We also show that existence of exponential-type Lyapunov function, compared to the purely deterministic setting, not only implie… ▽ More

    Submitted 7 December, 2022; v1 submitted 24 May, 2022; originally announced May 2022.

  16. arXiv:2204.06996  [pdf, other

    eess.SY

    Optimal Myopic Attacks on Nonlinear Estimation

    Authors: R. Spencer Hallyburton, Amir Khazraei, Miroslav Pajic

    Abstract: Recent high-profile incidents have exposed security risks in control systems. Particularly important and safety-critical modules for security analysis are estimation and control (E&C). Prior works have analyzed the security of E&C for linear, time-invariant systems; however, there are few analyses of nonlinear systems despite their broad use. In an effort to facilitate identifying vulnerabilities… ▽ More

    Submitted 12 September, 2022; v1 submitted 14 April, 2022; originally announced April 2022.

  17. arXiv:2204.03217  [pdf, other

    eess.SY

    Resiliency of Nonlinear Control Systems to Stealthy Sensor Attacks

    Authors: Amir Khazraei, Miroslav Pajic

    Abstract: In this work, we focus on analyzing vulnerability of nonlinear dynamical control systems to stealthy sensor attacks. We start by defining the notion of stealthy attacks in the most general form by leveraging Neyman-Pearson lemma; specifically, an attack is considered to be stealthy if it is stealthy from (i.e., undetected by) any intrusion detector -- i.e., the probability of the detection is not… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

  18. arXiv:2106.07098  [pdf, other

    cs.CR cs.LG eess.SY

    Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles

    Authors: R. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav Pajic

    Abstract: To enable safe and reliable decision-making, autonomous vehicles (AVs) feed sensor data to perception algorithms to understand the environment. Sensor fusion with multi-frame tracking is becoming increasingly popular for detecting 3D objects. Thus, in this work, we perform an analysis of camera-LiDAR fusion, in the AV context, under LiDAR spoofing attacks. Recently, LiDAR-only perception was shown… ▽ More

    Submitted 21 February, 2022; v1 submitted 13 June, 2021; originally announced June 2021.

  19. arXiv:2103.06271  [pdf, other

    cs.CR cs.LG eess.SY

    Learning-Based Vulnerability Analysis of Cyber-Physical Systems

    Authors: Amir Khazraei, Spencer Hallyburton, Qitong Gao, Yu Wang, Miroslav Pajic

    Abstract: This work focuses on the use of deep learning for vulnerability analysis of cyber-physical systems (CPS). Specifically, we consider a control architecture widely used in CPS (e.g., robotics), where the low-level control is based on e.g., the extended Kalman filter (EKF) and an anomaly detector. To facilitate analyzing the impact potential sensing attacks could have, our objective is to develop lea… ▽ More

    Submitted 7 April, 2022; v1 submitted 10 March, 2021; originally announced March 2021.

  20. arXiv:2103.05142  [pdf, other

    eess.SY cs.LG

    Formal Verification of Stochastic Systems with ReLU Neural Network Controllers

    Authors: Shiqi Sun, Yan Zhang, Xusheng Luo, Panagiotis Vlantis, Miroslav Pajic, Michael M. Zavlanos

    Abstract: In this work, we address the problem of formal safety verification for stochastic cyber-physical systems (CPS) equipped with ReLU neural network (NN) controllers. Our goal is to find the set of initial states from where, with a predetermined confidence, the system will not reach an unsafe configuration within a specified time horizon. Specifically, we consider discrete-time LTI systems with Gaussi… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

  21. arXiv:2008.01135  [pdf, other

    eess.SY

    Probabilistic Conformance for Cyber-Physical Systems

    Authors: Yu Wang, Mojtaba Zarei, Borzoo Bonakdarpoor, Miroslav Pajic

    Abstract: In system analysis, conformance indicates that two systems simultaneously satisfy the same set of specifications of interest; thus, the results from analyzing one system automatically transfer to the other, or one system can safely replace the other in practice. In this work, we study the probabilistic conformance of cyber-physical systems (CPS). We propose a notion of (approximate) probabilistic… ▽ More

    Submitted 2 March, 2021; v1 submitted 3 August, 2020; originally announced August 2020.

  22. arXiv:2006.08105  [pdf, ps, other

    math.PR cs.LG eess.SY

    Learning Expected Reward for Switched Linear Control Systems: A Non-Asymptotic View

    Authors: Muhammad Abdullah Naeem, Miroslav Pajic

    Abstract: In this work, we show existence of invariant ergodic measure for switched linear dynamical systems (SLDSs) under a norm-stability assumption of system dynamics in some unbounded subset of $\mathbb{R}^{n}$. Consequently, given a stationary Markov control policy, we derive non-asymptotic bounds for learning expected reward (w.r.t the invariant ergodic measure our closed-loop system mixes to) from ti… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  23. arXiv:2006.00044  [pdf, other

    eess.SY

    Security Analysis for Distributed IoT-Based Industrial Automation

    Authors: Vuk Lesi, Zivana Jakovljevic, Miroslav Pajic

    Abstract: With ever-expanding computation and communication capabilities of modern embedded platforms, Internet of Things (IoT) technologies enable development of Reconfigurable Manufacturing Systems---a new generation of highly modularized industrial equipment suitable for highly-customized manufacturing. Sequential control in these systems is largely based on discrete events, while their formal execution… ▽ More

    Submitted 29 May, 2020; originally announced June 2020.

  24. arXiv:2005.08122  [pdf, ps, other

    eess.SY

    Attack-Resilient State Estimation with Intermittent Data Authentication

    Authors: Amir Khazraei, Miroslav Pajic

    Abstract: Network-based attacks on control systems may alter sensor data delivered to the controller, effectively causing degradation in control performance. As a result, having access to accurate state estimates, even in the presence of attacks on sensor measurements, is of critical importance. In this paper, we analyze performance of resilient state estimators (RSEs) when any subset of sensors may be comp… ▽ More

    Submitted 16 May, 2020; originally announced May 2020.

    Comments: 12 pages, 7 figures, submitted to Journal

  25. arXiv:1904.03264  [pdf, other

    cs.FL eess.SY

    Attack-Resilient Supervisory Control of Discrete-Event Systems: A Finite-State Transducer Approach

    Authors: Yu Wang, Alper Kamil Bozkurt, Nathan Smith, Miroslav Pajic

    Abstract: Resilience to sensor and actuator attacks is a major concern in the supervisory control of discrete events in cyber-physical systems (CPS). In this work, we propose a new framework to design supervisors for CPS under attacks using finite-state transducers (FSTs) to model the effects of the discrete events. FSTs can capture a general class of regular-rewriting attacks in which an attacker can nonde… ▽ More

    Submitted 29 June, 2023; v1 submitted 5 April, 2019; originally announced April 2019.

  26. arXiv:1903.10620  [pdf, other

    math.OC cs.CR eess.SY

    An Optimal Graph-Search Method for Secure State Estimation

    Authors: Xusheng Luo, Miroslav Pajic, Michael M. Zavlanos

    Abstract: The growing complexity of modern Cyber-Physical Systems (CPS) and the frequent communication between their components make them vulnerable to malicious attacks. As a result, secure state estimation is a critical requirement for the control of these systems. Many existing secure state estimation methods suffer from combinatorial complexity which grows with the number of states and sensors in the sy… ▽ More

    Submitted 7 October, 2020; v1 submitted 25 March, 2019; originally announced March 2019.

    Comments: 16 pages, 10 figures

  27. arXiv:1902.04618  [pdf, other

    cs.GT cs.FL cs.LO cs.SE eess.SY

    Security-Aware Synthesis Using Delayed-Action Games

    Authors: Mahmoud Elfar, Yu Wang, Miroslav Pajic

    Abstract: Stochastic multiplayer games (SMGs) have gained attention in the field of strategy synthesis for multi-agent reactive systems. However, standard SMGs are limited to modeling systems where all agents have full knowledge of the state of the game. In this paper, we introduce delayed-action games (DAGs) formalism that simulates hidden-information games (HIGs) as SMGs, where hidden information is captu… ▽ More

    Submitted 29 May, 2019; v1 submitted 12 February, 2019; originally announced February 2019.

  28. arXiv:1707.02950  [pdf, other

    math.OC cs.CR eess.SY

    Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems

    Authors: Ilija Jovanov, Miroslav Pajic

    Abstract: The increase in network connectivity has also resulted in several high-profile attacks on cyber-physical systems. An attacker that manages to access a local network could remotely affect control performance by tampering with sensor measurements delivered to the controller. Recent results have shown that with network-based attacks, such as Man-in-the-Middle attacks, the attacker can introduce an un… ▽ More

    Submitted 11 January, 2018; v1 submitted 10 July, 2017; originally announced July 2017.

  29. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks

    Authors: Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas

    Abstract: This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors and actuators that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while… ▽ More

    Submitted 29 May, 2016; originally announced May 2016.

    Comments: 12 pages, accepted, IEEE Transactions on Control of Network Systems