kth.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (10 of 325) Show all publications
Chen, F., Khong, S. Z., Harnefors, L., Wang, X., Wang, D., Sandberg, H., . . . Johansson, K. H. (2025). An Extended Frequency-Domain Passivity Theory for MIMO Dynamics Specifications of Voltage-Source Inverters. IEEE transactions on power electronics, 40(2), 2943-2957
Open this publication in new window or tab >>An Extended Frequency-Domain Passivity Theory for MIMO Dynamics Specifications of Voltage-Source Inverters
Show others...
2025 (English)In: IEEE transactions on power electronics, ISSN 0885-8993, E-ISSN 1941-0107, Vol. 40, no 2, p. 2943-2957Article in journal (Refereed) Published
Abstract [en]

In grid-connected inverter systems, frequency-domain passivity theory is increasingly employed to analyze grid-inverter interactions and guide inverter control designs. However, due to difficulties in meeting sufficient passivity-based stability conditions at low frequencies, passivity theory often falls short of achieving stable system specifications. This article introduces an extended frequency-domain passivity theory. By incorporating a weighting matrix, an extended stability condition is derived. Compared to conventional passivity-based stability conditions, the proposed theory significantly reduces conservativeness and is more suited for analyzing grid-inverter interactions and guiding inverter control design. Theoretical analyses, numerical examples, and experimental results are provided to validate the effectiveness of the proposed methods.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Inverters, Power system stability, Stability criteria, Indexes, Impedance, Phase locked loops, Frequency-domain analysis, Numerical stability, Low-pass filters, Robustness, Control design, grid-connected inverters, passivity, stability
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-359488 (URN)10.1109/TPEL.2024.3488853 (DOI)001378125700042 ()2-s2.0-85208406141 (Scopus ID)
Note

QC 20250205

Available from: 2025-02-05 Created: 2025-02-05 Last updated: 2025-02-05Bibliographically approved
Kim, J., Lee, J. G., Sandberg, H. & Johansson, K. H. (2025). Complexity Reduction for Resilient State Estimation of Uniformly Observable Nonlinear Systems. IEEE Transactions on Automatic Control, 70(2), 1267-1272
Open this publication in new window or tab >>Complexity Reduction for Resilient State Estimation of Uniformly Observable Nonlinear Systems
2025 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, Vol. 70, no 2, p. 1267-1272Article in journal (Refereed) Published
Abstract [en]

A resilient state estimation scheme for uniformly observable nonlinear systems, based on a method for local identification of sensor attacks, is presented. The estimation problem is combinatorial in nature, and so many methods require substantial computational and storage resources as the number of sensors increases. To reduce the complexity, the proposed method performs the attack identification with local subsets of the measurements, not with the set of all measurements. A condition for nonlinear attack identification is introduced as a relaxed version of existing redundant observability condition. It is shown that an attack identification can be performed even when the entire state cannot be recovered from the measurements. As a result, although a portion of measurements are compromised, they can be locally identified and excluded from the state estimation, and thus, the true state can be recovered. Simulation results demonstrate the effectiveness of the proposed scheme.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Sensors, Complexity theory, Observers, Redundancy, Observability, Control systems, Sensor systems, Nonlinear detection, resilient state estimation, security, sensor attack identification
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-360056 (URN)10.1109/TAC.2024.3459413 (DOI)001410256600050 ()2-s2.0-85204206599 (Scopus ID)
Note

QC 20250217

Available from: 2025-02-17 Created: 2025-02-17 Last updated: 2025-03-26Bibliographically approved
Sasahara, H., Dán, G., Amin, S. & Sandberg, H. (2025). Green Routing Game: Pollution-Aware Mixed Fleet Logistics With Shared Charging Facilities. IEEE Transactions on Automatic Control, 1-14
Open this publication in new window or tab >>Green Routing Game: Pollution-Aware Mixed Fleet Logistics With Shared Charging Facilities
2025 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, p. 1-14Article in journal (Refereed) Epub ahead of print
Abstract [en]

Eco-friendly freight operations are crucial for decarbonizing the transportation sector. Systematic analysis of policy measures requires a principled modeling approach. While the commonly used model referred to as routing game considers the congestible nature of transportation facilities, exiting models fail to account for environmental factors. This paper aims at providing a mathematical framework to study strategic interaction between owners of mixed fleets comprising of both internal combustion engine vehicle (ICEV) and electric vehicle (EV) trucks. This study introduces a “green” routing game with incomplete information that models strategic interaction among multiple logistic operators. These players face a pollution tax imposed on ICEVs and a potential delayed delivery cost due to EV charging requirements with uncertainty. In contrast to existing models, this novel model captures the players' trade-off between lengthier congestion delay at charging stations as the share of EV trucks increases and higher pollution costs with increased ICEVs usage, with uncertainty determined by a latent state. We first provide equilibrium characterization and present a condition for essential uniqueness. We show that this equilibrium can be computed in a distributed manner using a gradient projection method. We then introduce a public information system that broadcasts real-time information about the latent state. Importantly, we analyze value of information for providing a condition for the public information to be beneficial. Finally, we present numerical examples to illustrate settings where environmental taxation and information dissemination can improve social welfare.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Green logistics, routing games, strategic learning, value of information
National Category
Control Engineering Transport Systems and Logistics
Identifiers
urn:nbn:se:kth:diva-361545 (URN)10.1109/tac.2025.3526671 (DOI)2-s2.0-85214713413 (Scopus ID)
Funder
Swedish Research Council, 2016-00861
Note

QC 20250324

Available from: 2025-03-21 Created: 2025-03-21 Last updated: 2025-03-24Bibliographically approved
Gracy, S., Paré, P. E., Liu, J., Sandberg, H., Beck, C. L., Johansson, K. H. & Başar, T. (2025). Modeling and analysis of a coupled SIS bi-virus model. Automatica, 171, Article ID 111937.
Open this publication in new window or tab >>Modeling and analysis of a coupled SIS bi-virus model
Show others...
2025 (English)In: Automatica, ISSN 0005-1098, E-ISSN 1873-2836, Vol. 171, article id 111937Article in journal (Refereed) Published
Abstract [en]

The paper deals with the setting where two viruses (say virus 1 and virus 2) coexist in a population, and they are not necessarily mutually exclusive, in the sense that infection due to one virus does not preclude the possibility of simultaneous infection due to the other. We develop a coupled bi-virus susceptible–infected–susceptible (SIS) model from a 4n-state Markov process, where n is the number of agents (i.e., individuals or subpopulation) in the population. We identify a sufficient condition for both viruses to eventually die out, and a sufficient condition for the existence, uniqueness and asymptotic stability of the endemic equilibrium of each virus. We establish a sufficient condition and multiple necessary conditions for local exponential convergence to the boundary equilibrium (i.e., one virus persists, the other one dies out) of each virus. Under mild assumptions on the healing rate, we show that there cannot exist a coexisting equilibrium where for each node there is a nonzero fraction infected only by virus 1; a nonzero fraction infected only by virus 2; but no fraction that is infected by both viruses 1 and 2. Likewise, assuming that healing rates are strictly positive, a coexisting equilibrium where for each node there is a nonzero fraction infected by both viruses 1 and 2, but no fraction is infected only by virus 1 (resp. virus 2) does not exist. Further, we provide a necessary condition for the existence of certain other kinds of coexisting equilibria. We show that, unlike the competitive bivirus model, the coupled bivirus model is not monotone. Finally, we illustrate our theoretical findings using an extensive set of simulations.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Coupled bi-virus spread, Epidemics, Spreading processes, Stability analysis
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-354282 (URN)10.1016/j.automatica.2024.111937 (DOI)001325101300001 ()2-s2.0-85204769664 (Scopus ID)
Note

QC 20241014

Available from: 2024-10-02 Created: 2024-10-02 Last updated: 2025-01-07Bibliographically approved
Ziemann, I. & Sandberg, H. (2025). Regret Lower Bounds for Learning Linear Quadratic Gaussian Systems. IEEE Transactions on Automatic Control, 70(1), 159-173
Open this publication in new window or tab >>Regret Lower Bounds for Learning Linear Quadratic Gaussian Systems
2025 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, Vol. 70, no 1, p. 159-173Article in journal (Refereed) Published
Abstract [en]

In this article, we establish regret lower bounds for adaptively controlling an unknown linear Gaussian system with quadratic costs. We combine ideas from experiment design, estimation theory, and a perturbation bound of certain information matrices to derive regret lower bounds exhibiting scaling on the order of magnitude root T in the time horizon T . Our bounds accurately capture the role of control-theoretic parameters and we are able to show that systems that are hard to control are also hard to learn to control; when instantiated to state feedback systems we recover the dimensional dependency of earlier work but with improved scaling with system-theoretic constants, such as system costs and Gramians. Furthermore, we extend our results to a class of partially observed systems and demonstrate that systems with poor observability structure also are hard to learn to control.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Costs, Observability, Adaptation models, Controllability, Adaptive control, Uncertainty, State feedback, closed loop identification, fundamental limits, statistical learning
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-358828 (URN)10.1109/TAC.2024.3439132 (DOI)001387140800013 ()2-s2.0-85200818983 (Scopus ID)
Note

QC 20250121

Available from: 2025-01-21 Created: 2025-01-21 Last updated: 2025-01-28Bibliographically approved
Byrd Victorica, M., Dán, G. & Sandberg, H. (2025). SpaNN: Detecting Multiple Adversarial Patches on CNNs by Spanning Saliency Thresholds. In: Proceedings - 2025 IEEE Conference on Secure and Trustworthy Machine Learning, SaTML 2025: . Paper presented at 2025 IEEE Conference on Secure and Trustworthy Machine Learning, SaTML 2025, Copenhagen, Denmark, Apr 9 2025 - Apr 11 2025 (pp. 459-478). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>SpaNN: Detecting Multiple Adversarial Patches on CNNs by Spanning Saliency Thresholds
2025 (English)In: Proceedings - 2025 IEEE Conference on Secure and Trustworthy Machine Learning, SaTML 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 459-478Conference paper, Published paper (Refereed)
Abstract [en]

State-of-the-art convolutional neural network models for object detection and image classification are vulnerable to physically realizable adversarial perturbations, such as patch attacks. Existing defenses have focused, implicitly or explicitly, on single-patch attacks, leaving their sensitivity to the number of patches as an open question or rendering them computationally infeasible or inefficient against attacks consisting of multiple patches in the worst cases. In this work, we propose SpaNN, an attack detector whose computational complexity is independent of the expected number of adversarial patches. The key novelty of the proposed detector is that it builds an ensemble of binarized feature maps by applying a set of saliency thresholds to the neural activations of the first convolutional layer of the victim model. It then performs clustering on the ensemble and uses the cluster features as the input to a classifier for attack detection. Contrary to existing detectors, SpaNN does not rely on a fixed saliency threshold for identifying adversarial regions, which makes it robust against white box adversarial attacks. We evaluate SpaNN on four widely used data sets for object detection and classification, and our results show that SpaNN outperforms state-of-the-art defenses by up to 11 and 27 percentage points in the case of object detection and the case of image classification, respectively. Our code is available at https://github.com/gerkbyrd/SpaNN.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
adversarial machine learning, adversarial patch attacks, Convolutional neural networks
National Category
Computer graphics and computer vision Signal Processing
Identifiers
urn:nbn:se:kth:diva-364401 (URN)10.1109/SaTML64287.2025.00032 (DOI)2-s2.0-105007307138 (Scopus ID)
Conference
2025 IEEE Conference on Secure and Trustworthy Machine Learning, SaTML 2025, Copenhagen, Denmark, Apr 9 2025 - Apr 11 2025
Note

Part of ISBN 9798331517113

QC 20250613

Available from: 2025-06-12 Created: 2025-06-12 Last updated: 2025-06-13Bibliographically approved
Nauta, T., Sandberg, H. & Maggio, M. (2025). Stealthy Computational Delay Attacks on Control Systems. In: Proceedings of the ACM/IEEE 16th International Conference on Cyber-Physical Systems, ICCPS 2025, held as part of the CPS-IoT Week 2025: . Paper presented at 16th Annual ACM/IEEE International Conference on Cyber-Physical Systems, ICCPS 2025, held as part of the CPS-IoT Week 2025, Irvine, United States of America, May 6 2025 - May 9 2025. Association for Computing Machinery (ACM), Article ID 9.
Open this publication in new window or tab >>Stealthy Computational Delay Attacks on Control Systems
2025 (English)In: Proceedings of the ACM/IEEE 16th International Conference on Cyber-Physical Systems, ICCPS 2025, held as part of the CPS-IoT Week 2025, Association for Computing Machinery (ACM) , 2025, article id 9Conference paper, Published paper (Refereed)
Abstract [en]

Cyber-Physical Systems (CPS) are integral to critical infrastructure, but their interconnected nature exposes them to sophisticated cyber threats. Traditional security mechanisms primarily focus on detecting direct manipulations of control signals or sensor data, leaving them vulnerable to more subtle attack vectors. This paper introduces a novel optimisation framework for modelling and executing stealthy computational delay attacks - -an attack class that subtly interferes with controller execution timing to degrade system performance while remaining undetected. Unlike conventional denial-of-service attacks, these stealthy attacks introduce delays selectively, ensuring that the controller fails to compute control signals in time without triggering standard anomaly detection mechanisms. We formulate the problem as a Mixed Integer Quadratically Constrained Programming (MIQCP) optimisation, allowing attackers to maximise system disruption while evading detection. Our framework is evaluated on two control systems: a simulated stable quadruple-tank process and a real-hardware implementation of an unstable Furuta pendulum. Experimental results demonstrate that even brief, undetected computational delays can lead to severe performance degradation and system destabilisation. These findings highlight the need for improved intrusion detection mechanisms that account for time-based threats, emphasising long-term activity monitoring and adaptive defence strategies to safeguard CPS integrity.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
Computational Delay Attacks, Control Systems, Security
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-364408 (URN)10.1145/3716550.3722013 (DOI)001496845100009 ()2-s2.0-105007300360 (Scopus ID)
Conference
16th Annual ACM/IEEE International Conference on Cyber-Physical Systems, ICCPS 2025, held as part of the CPS-IoT Week 2025, Irvine, United States of America, May 6 2025 - May 9 2025
Note

Part of ISBN 9798400714986

QC 20250613

Available from: 2025-06-12 Created: 2025-06-12 Last updated: 2025-06-13Bibliographically approved
Umsonst, D., Sartaş, S., Dán, G. & Sandberg, H. (2024). A Bayesian Nash Equilibrium-Based Moving Target Defense Against Stealthy Sensor Attacks. IEEE Transactions on Automatic Control, 69(3), 1659-1674
Open this publication in new window or tab >>A Bayesian Nash Equilibrium-Based Moving Target Defense Against Stealthy Sensor Attacks
2024 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, Vol. 69, no 3, p. 1659-1674Article in journal (Refereed) Published
Abstract [en]

We present a moving target defense strategy to reduce the impact of stealthy sensor attacks on feedback systems. The defender periodically and randomly switches between thresholds from a discrete set to increase the uncertainty for the attacker and make stealthy attacks detectable. However, the defender does not know the exact goal of the attacker but only the prior of the possible attacker goals. Here, we model one period with a constant threshold as a Bayesian game and use the Bayesian Nash equilibrium concept to find the distribution for the choice of the threshold in that period, which takes the defender's uncertainty about the attacker into account. To obtain the equilibrium distribution, the defender minimizes its cost consisting of the cost for false alarms and the cost induced by the attack. We present a necessary and sufficient condition for the existence of a moving target defense and formulate a linear program to determine the moving target defense. Furthermore, we present a closed-form solution for the special case when the defender knows the attacker's goals. The results are numerically evaluated on a four-tank process.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-361540 (URN)10.1109/tac.2023.3328754 (DOI)001179005900047 ()2-s2.0-85181578215 (Scopus ID)
Funder
Swedish Research Council, 2016-00861Swedish Research Council, 2020-03860
Note

QC 20250324

Available from: 2025-03-21 Created: 2025-03-21 Last updated: 2025-03-24Bibliographically approved
Sasahara, H. & Sandberg, H. (2024). Asymptotic Security using Bayesian Defense Mechanism with Application to Cyber Deception. IEEE Transactions on Automatic Control, 69(8), 5004-5019
Open this publication in new window or tab >>Asymptotic Security using Bayesian Defense Mechanism with Application to Cyber Deception
2024 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, Vol. 69, no 8, p. 5004-5019Article in journal (Refereed) Published
Abstract [en]

This paper addresses the question whether model knowledge can guide a defender to appropriate decisions, or not, when an attacker intrudes into control systems. The model-based defense scheme considered in this study, namely Bayesian defense mechanism, chooses reasonable reactions through observation of the system's behavior using models of the system's stochastic dynamics, the vulnerability to be exploited, and the attacker's objective. On the other hand, rational attackers take deceptive strategies for misleading the defender into making inappropriate decisions. In this paper, their dynamic decision making is formulated as a stochastic signaling game. It is shown that the belief of the true scenario has a limit in a stochastic sense at an equilibrium based on martingale analysis. This fact implies that there are only two possible cases: the defender asymptotically detects the attack with a firm belief, or the attacker takes actions such that the system's behavior becomes nominal after a finite number of time steps. Consequently, if different scenarios result in different stochastic behaviors, the Bayesian defense mechanism guarantees the system to be secure in an asymptotic manner provided that effective countermeasures are implemented. As an application of the finding, a defensive deception utilizing asymmetric recognition of vulnerabilities exploited by the attacker is analyzed. It is shown that the attacker possibly withdraws even if the defender is unaware of the exploited vulnerabilities, as long as the defender's unawareness is concealed by the defensive deception.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Analytical models, Bayes methods, Bayesian methods, Behavioral sciences, Control systems, game theory, Games, intrusion detection, Numerical models, security, Security, stochastic systems
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-350177 (URN)10.1109/TAC.2023.3340978 (DOI)001293894600056 ()2-s2.0-85179806383 (Scopus ID)
Note

QC 20240709

Available from: 2024-07-09 Created: 2024-07-09 Last updated: 2025-01-31Bibliographically approved
Molnö, V. & Sandberg, H. (2024). Bilinear Parameter Estimation with Application in Water Leak Localization. In: 2024 European Control Conference, ECC 2024: . Paper presented at 2024 European Control Conference, ECC 2024, Stockholm, Sweden, Jun 25 2024 - Jun 28 2024 (pp. 34-39). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Bilinear Parameter Estimation with Application in Water Leak Localization
2024 (English)In: 2024 European Control Conference, ECC 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 34-39Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we present a novel statistical convergence analysis for bilinear parameter estimators. We account for two variations of a two-stage separation technique introduced by Bai [1], where the variations differ in the second stage. It turns out for both estimators that the probability of a large error decreases as the inverse square root of the number of measurements. We numerically demonstrate the estimators' performance by solving a water leak localization problem involving bilinear parameter estimation.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
National Category
Probability Theory and Statistics
Identifiers
urn:nbn:se:kth:diva-351946 (URN)10.23919/ECC64448.2024.10591181 (DOI)001290216500006 ()2-s2.0-85200573673 (Scopus ID)
Conference
2024 European Control Conference, ECC 2024, Stockholm, Sweden, Jun 25 2024 - Jun 28 2024
Note

QC 20240829 Part of ISBN 9783907144107

Available from: 2024-08-19 Created: 2024-08-19 Last updated: 2025-04-25Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-1835-2963

Search in DiVA

Show all publications