SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Sandberg Henrik) srt2:(2020-2024)"

Sökning: WFRF:(Sandberg Henrik) > (2020-2024)

  • Resultat 1-10 av 121
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Sasahara, Hampei, et al. (författare)
  • Distributed Design of Glocal Controllers via Hierarchical Model Decomposition
  • 2023
  • Ingår i: IEEE Transactions on Automatic Control. - : Institute of Electrical and Electronics Engineers (IEEE). - 0018-9286 .- 1558-2523. ; 68:10, s. 6146-6159
  • Tidskriftsartikel (refereegranskat)abstract
    • This article proposes a distributed design method of controllers with a glocal (global/local) information structure for large-scale network systems. The glocal controller of interest has a hierarchical structure, wherein a global subcontroller coordinates a set of disjoint local subcontrollers. The global subcontroller regulates interarea oscillations among subsystems, while local subcontrollers individually regulate intraarea oscillations of the respective subsystem. The distributed design of the glocal controller is addressed to enhance the scalability of controller synthesis, where the global subcontroller and all local subcontrollers are designed independently of each other. A design problem is formulated for subcontroller sets such that any combination of subcontrollers each of which belongs to its corresponding set guarantees stability of the closed-loop system. The core idea of the proposed method is to represent the original network system as a hierarchical cascaded system composed of reduced-order models representing the interarea and intraarea dynamics, referred to as hierarchical model decomposition. Distributed design is achieved by virtue of the cascade structure. The primary findings of this study are twofold. First, a tractable solution to the distributed design problem and an existence condition of the hierarchical model decomposition are presented. Second, a clustering method appropriate for the proposed framework and a robust extension are provided. Numerical examples of a power grid highlight the practical relevance of the proposed method.
  •  
3.
  • Alanwar, Amr, et al. (författare)
  • Data-Driven Set-Based Estimation using Matrix Zonotopes with Set Containment Guarantees
  • 2022
  • Ingår i: 2022 EUROPEAN CONTROL CONFERENCE (ECC). - : IEEE. ; , s. 875-881
  • Konferensbidrag (refereegranskat)abstract
    • We propose a method to perform set-based state estimation of an unknown dynamical linear system using a data-driven set propagation function. Our method comes with set-containment guarantees, making it applicable to safety-critical systems. The method consists of two phases: (1) an offline learning phase where we collect noisy input-output data to determine a function to propagate the state-set ahead in time; and (2) an online estimation phase consisting of a time update and a measurement update. It is assumed that known finite sets bound measurement noise and disturbances, but we assume no knowledge of their statistical properties. These sets are described using zonotopes, allowing efficient propagation and intersection operations. We propose a new approach to compute a set of models consistent with the data and noise-bound, given input-output data in the offline phase. The set of models is utilized in replacing the unknown dynamics in the data-driven set propagation function in the online phase. Then, we propose two approaches to perform the measurement update. Simulations show that the proposed estimator yields state sets comparable in volume to the 3 sigma confidence bounds obtained by a Kalman filter approach, but with the addition of state set-containment guarantees. We observe that using constrained zonotopes yields smaller sets but with higher computational costs than unconstrained ones.
  •  
4.
  • Alanwar, Amr, et al. (författare)
  • Privacy-preserving set-based estimation using partially homomorphic encryption
  • 2023
  • Ingår i: European Journal of Control. - : Elsevier BV. - 0947-3580 .- 1435-5671. ; 71, s. 100786-
  • Tidskriftsartikel (refereegranskat)abstract
    • The set-based estimation has gained a lot of attention due to its ability to guarantee state enclosures for safety-critical systems. However, collecting measurements from distributed sensors often requires out-sourcing the set-based operations to an aggregator node, raising many privacy concerns. To address this problem, we present set-based estimation protocols using partially homomorphic encryption that pre-serve the privacy of the measurements and sets bounding the estimates. We consider a linear discrete-time dynamical system with bounded modeling and measurement uncertainties. Sets are represented by zonotopes and constrained zonotopes as they can compactly represent high-dimensional sets and are closed under linear maps and Minkowski addition. By selectively encrypting parameters of the set repre-sentations, we establish the notion of encrypted sets and intersect sets in the encrypted domain, which enables guaranteed state estimation while ensuring privacy. In particular, we show that our protocols achieve computational privacy using the cryptographic notion of computational indistinguishability. We demonstrate the efficiency of our approach by localizing a real mobile quadcopter using ultra-wideband wireless devices.
  •  
5.
  • Alanärä, Anders, et al. (författare)
  • Utsättning av djur för jakt och fiske
  • 2021
  • Bok (populärvet., debatt m.m.)abstract
    • SLUs vetenskapliga råd för djurskydd har fått i uppdrag av Jordbruksverket att sammanställa aktuell forskning kring utsättning av djur för jakt och fiske samt att belysa eventuella kunskapsluckor på området. Uppdraget omfattar gräsand, rapphöna, fasan och laxfiskar. Bruket att föda upp fåglar och fiskar för utsättning i syfte att gynna jakt och fiske ifrågasätts inte sällan av etiska skäl, men den diskussionen ligger utanför fokus för denna rapport. Utsättning av fågel och fisk är en antropogen verksamhet som, till skillnad från många andra typer av mänsklig påverkan, syftar till att gynna arterna i fråga. Det kan handla om naturvårdsinsatser, att återinföra försvunna arter eller att på andra sätt berika ekosystemet, inte sällan med ökade möjligheter till jakt eller fiske som slutändamål. Ofta förbereds och åtföljs utsättningar av habitatförbättrande åtgärder som inte endast gynnar de utsatta individerna och deras artfränder, utan även har positiva konsekvenser för biologisk mångfald och ekosystemet i stort. I utarbetandet av regelverket knutet till utsättning av fågel och fisk är det viktigt att även beakta de positiva föresatserna och de konsekvenser som verksamheten kan medföra. Annars riskerar man att engagemang och incitament förloras, till men för biologisk mångfald och en rik och levande landsbygd.
  •  
6.
  • Alisic, Rijad, et al. (författare)
  • Change time estimation uncertainty in nonlinear dynamical systems with applications to COVID-19
  • 2022
  • Ingår i: International Journal of Robust and Nonlinear Control. - : Wiley. - 1049-8923 .- 1099-1239.
  • Tidskriftsartikel (refereegranskat)abstract
    • The impact that each individual non-pharmaceutical intervention (NPI) had on the spread rate of COVID-19 is difficult to estimate, since several NPIs were implemented in rapid succession in most countries. In this article, we analyze the detectability of sudden changes in a parameter of nonlinear dynamical systems, which could be used to represent NPIs or mutations of the virus, in the presence of measurement noise. Specifically, by taking an agnostic approach, we provide necessary conditions for when the best possible unbiased estimator is able to isolate the effect of a sudden change in a model parameter, by using the Hammersley–Chapman–Robbins (HCR) lower bound. Several simplifications to the calculation of the HCR lower bound are given, which depend on the amplitude of the sudden change and the dynamics of the system. We further define the concept of the most informative sample based on the largest (Formula presented.) distance between two output trajectories, which is a good indicator of when the HCR lower bound converges. These results are thereafter used to analyze the susceptible-infected-removed model. For instance, we show that performing analysis using the number of recovered/deceased, as opposed to the cumulative number of infected, may be an inferior signal to use since sudden changes are fundamentally more difficult to estimate and seem to require more samples. Finally, these results are verified by simulations and applied to real data from the spread of COVID-19 in France.
  •  
7.
  • Alisic, Rijad, et al. (författare)
  • Data-injection Attacks Using Historical Inputs and Outputs
  • 2021
  • Ingår i: Proceedings European Control Conference, ECC 2021. - : Institute of Electrical and Electronics Engineers (IEEE). ; , s. 1399-1405
  • Konferensbidrag (refereegranskat)abstract
    • Data-driven, model-free control has become popular in recent years, due to their ease of implementation and minimal information requirement about the system. In this paper, we investigate whether the same methods could be used by an adversary to synthesize undetectable data-injection attacks on cyber-physical systems using Willems' Fundamental Lemma. We show that if the adversary is able to upper bound the order of a linear, time-invariant system and read all its inputs and outputs, then the adversary will be able to generate undetectable attack signals in the form of covert attacks. Additionally, we provide conditions on the disclosed data set that enable the adversary to generate zero dynamics attacks. These conditions give operators insights into when enough information about the system has been revealed for an adversary to conduct an undetectable attack. Finally, the different attack strategies are verified through a numerical example.
  •  
8.
  • Alisic, Rijad (författare)
  • Defense of Cyber-Physical Systems Against Learning-based Attackers
  • 2023
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Cyberattacks against critical infrastructures pose a serious threat to society, as they can have devastating consequences on the economy, security, or public health. These infrastructures rely on a large network of cyber components, such as sensors, controllers, computers, and communication devices, to monitor and control their physical processes. An adversary can exploit the vulnerabilities in these cyber components to gain access to the system and manipulate its behavior or functionality.This thesis proposes methods that can be employed as a first line of defense against such attacks for Cyber-Physical Systems. In the first part of the thesis, we consider how uninformed attackers can learn to attack a Cyber-Physical System by eavesdropping through the cyber component. By learning to manipulate the plant, the attacker could figure out how to destroy the physical system before it is too late or completely take it over without raising any alarms. Stopping the attacker at the learning stage would force the attacker to act obliviously, increasing the chances of detecting them.We analyze how homomorphic encryption, a technique that allows computation on encrypted data, hinders an attacker's learning process and reduces its capabilities to attack the system. Specifically, we show that an attacker must solve challenging lattice problems to find attacks that are difficult to detect. Additionally, we show how the detection probability is affected by the attacker's solution to the problems and what parameters of the encryption scheme can be tweaked to increase the detection probability. We also develop a novel method that enables anomaly detection over homomorphically encrypted data without revealing the actual signals to the detector, thereby discouraging attackers from launching attacks on the detector. The detection can be performed using a hypothesis test. However, special care must be taken to ensure that fresh samples are used to detect changes from nominal behavior. We also explore how the adversary can try to evade detection using the same test and how the system can be designed to make detection easier for the defender and more challenging for the attacker.In the second part of the thesis, we study how information leakage about changes in the system depends on the system's dynamics. We use a mathematical tool called the Hammersley-Chapman-Robbins lower bound to measure how much information is leaked and how to minimize it. Specifically, we study how structured input sequences, which we call events, can be obtained through the output of a dynamical system and how this information can be hidden by adding noise or changing the inputs. The system’s speed and sensor locations affect how much information is leaked. We also consider balancing the system’s performance and privacy when using optimal control. Finally, we show how to estimate when the adversary’s knowledge of the event becomes accurate enough to launch an attack and how to change the system before that happens. These results are then used to aid the operator in detecting privacy vulnerabilities when designing a Cyber-Physical System, which increases the overall security when removed.
  •  
9.
  • Alisic, Rijad, et al. (författare)
  • Ensuring privacy of occupancy changes in smart buildings
  • 2020
  • Ingår i: CCTA 2020 - 4th IEEE Conference on Control Technology and Applications. - : Institute of Electrical and Electronics Engineers Inc.. ; , s. 871-876
  • Konferensbidrag (refereegranskat)abstract
    • Smart building management systems rely on sensors to optimize the operation of buildings. If an unauthorized user gains access to these sensors, a privacy leak may occur. This paper considers such a potential leak of privacy in a smart residential building, and how it may be mitigated by corrupting the measurements with additive Gaussian noise. This corruption is done in order to hide when the occupancy changes in an apartment. A lower bound on the variance of any estimator that estimates the change time is derived. The bound is then used to analyze how different model parameters affect the variance. It is shown that the signal to noise ratio and the system dynamics are the main factors that affect the bound. These results are then verified on a simulator of the KTH Live-In Lab Testbed, showing good correspondence with theoretical results.
  •  
10.
  • Alisic, Rijad, et al. (författare)
  • Maximizing Privacy in MIMO Cyber-Physical Systems Using the Chapman-Robbins Bound
  • 2020
  • Ingår i: Proceedings of the IEEE Conference on Decision and Control. - : Institute of Electrical and Electronics Engineers Inc.. ; , s. 6272-6277
  • Konferensbidrag (refereegranskat)abstract
    • Privacy breaches of cyber-physical systems could expose vulnerabilities to an adversary. Here, privacy leaks of step inputs to linear time-invariant systems are mitigated through additive Gaussian noise. Fundamental lower bounds on the privacy are derived, which are based on the variance of any estimator that seeks to recreate the input. Fully private inputs are investigated and related to transmission zeros. Thereafter, a method to increase the privacy of optimal step inputs is presented and a privacy-utility trade-off bound is derived. Finally, these results are verified on data from the KTH Live-In Lab Testbed, showing good correspondence with theoretical results. 
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 121
Typ av publikation
tidskriftsartikel (51)
konferensbidrag (41)
rapport (11)
doktorsavhandling (7)
bokkapitel (4)
licentiatavhandling (3)
visa fler...
forskningsöversikt (2)
bok (1)
annan publikation (1)
visa färre...
Typ av innehåll
refereegranskat (95)
övrigt vetenskapligt/konstnärligt (24)
populärvet., debatt m.m. (2)
Författare/redaktör
Sandberg, Henrik (79)
Johansson, Karl H., ... (28)
Berg, Lotta (9)
Hultgren, Jan (9)
Herlin, Anders Henri ... (9)
Jacobson, Magdalena (9)
visa fler...
Keeling, Linda (9)
Sandberg, Eva (9)
Steen, Margareta (9)
Sandberg, Henrik, Pr ... (8)
Rydhmer, Lotta (7)
Alisic, Rijad (7)
Pare, Philip E. (7)
Jarmar, Anna (6)
Lundmark Hedman, Fri ... (6)
Åsbjer, Elina (5)
Wall, Helena (5)
Hansson, Helena (4)
Pålsson, Henrik (4)
Sandberg, Dick, 1967 ... (4)
Dán, György (4)
He, Xingkang (4)
Lindsjö, Johan (4)
Kim, Junsoo (4)
Sandberg, Erik (3)
Svennerstam, Henrik (3)
Broman, Olof (3)
Alanwar, Amr (3)
Österman, Sara (3)
Olivecrona, Henrik (3)
Paré, P. E. (3)
Johansson, Karl H., ... (3)
Skoglund, Mikael, 19 ... (3)
Hagberg, Henrik, 195 ... (2)
Sandberg, Olof (2)
Ren, X. (2)
Tanaka, Takashi (2)
Berg, Charlotte (2)
Mallard, Carina, 196 ... (2)
Molinari, Marco (2)
Fall, Nils (2)
De Koning, Dirk-Jan (2)
Teixeira, André (2)
Svedin, Pernilla, 19 ... (2)
Oja, Johan (2)
Ardalan, Maryam, 197 ... (2)
Chumak, Tetyana, 198 ... (2)
Proutiere, Alexandre ... (2)
Nordström, Maria (2)
Nekouei, Ehsan (2)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (87)
Sveriges Lantbruksuniversitet (9)
Lunds universitet (7)
Uppsala universitet (6)
Luleå tekniska universitet (6)
Göteborgs universitet (5)
visa fler...
Linköpings universitet (4)
Karolinska Institutet (4)
Umeå universitet (3)
Högskolan Kristianstad (1)
Högskolan i Halmstad (1)
Stockholms universitet (1)
Högskolan Väst (1)
Örebro universitet (1)
Naturvårdsverket (1)
Chalmers tekniska högskola (1)
RISE (1)
Naturhistoriska riksmuseet (1)
Sophiahemmet Högskola (1)
Röda Korsets Högskola (1)
visa färre...
Språk
Engelska (108)
Svenska (13)
Forskningsämne (UKÄ/SCB)
Teknik (78)
Naturvetenskap (21)
Lantbruksvetenskap (14)
Medicin och hälsovetenskap (10)
Samhällsvetenskap (4)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy