Change search
Refine search result
1 - 9 of 9
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Johansson, Alexander
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Nekouei, Ehsan
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Johansson, Karl Henrik
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Mårtensson, Jonas
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Multi-Fleet Platoon Matching: A Game-Theoretic Approach2018In: 2018 21ST INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), IEEE , 2018, p. 2980-2985Conference paper (Refereed)
    Abstract [en]

    We consider the platoon matching problem for a set of trucks with the same origin, but different destinations. It is assumed that the vehicles benefit from traveling in a platoon for instance through reduced fuel consumption. The vehicles belong to different fleet owners and their strategic interaction is modeled as a non-cooperative game where the vehicle actions are their departure times. Each truck has a preferred departure time and its utility function is defined as the difference between its benefit from platooning and the cost of deviating from its preferred departure time. We show that the platoon matching game is an exact potential game. An algorithm based on best response dynamics is proposed for finding a Nash equilibrium of the game. At a Nash equilibrium, vehicles with the same departure time are matched to form a platoon. Finally, the total fuel reduction at the Nash equilibrium is studied and compared with that of a cooperative matching solution where a common utility function for all vehicles is optimized.

  • 2.
    Nekouei, Ehsan
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Alpcan, T.
    Evans, R. J.
    Impact of quantized inter-agent communications on game-theoretic and distributed optimization algorithms2018In: Uncertainty in Complex Networked Systems, Birkhauser , 2018, p. 501-532Chapter in book (Refereed)
    Abstract [en]

    Quantized inter-agent communications in game-theoretic and distributed optimization algorithms generate uncertainty that affects the asymptotic and transient behavior of such algorithms. This chapter uses the information-theoretic notion of differential entropy power to establish universal bounds on the maximum exponential convergence rates of primal-dual and gradient-based Nash seeking algorithms under quantized communications. These bounds depend on the inter-agent data rate and the local behavior of the agents’ objective functions, and are independent of the quantizer structure. The presented results provide trade-offs between the speed of exponential convergence, the agents’ objective functions, the communication bit rates, and the number of agents and constraints. For the proposed Nash seeking algorithm, the transient performance is studied and an upper bound on the average time required to settle inside a specified ball around the Nash equilibrium is derived under uniform quantization. Furthermore, an upper bound on the probability that the agents’ actions lie outside this ball is established. This bound decays double exponentially with time.

  • 3.
    Nekouei, Ehsan
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Tanaka, Takashi
    Univ Texas Austin, Austin, TX 78712 USA..
    Skoglund, Mikael
    KTH, School of Electrical Engineering and Computer Science (EECS), Information Science and Engineering.
    Johansson, Karl H.
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control. KTH, School of Electrical Engineering and Computer Science (EECS), Centres, ACCESS Linnaeus Centre.
    Information-theoretic approaches to privacy in estimation and control2019In: Annual Reviews in Control, ISSN 1367-5788, E-ISSN 1872-9088, Vol. 47, p. 412-422Article, review/survey (Refereed)
    Abstract [en]

    Network control systems (NCSs) heavily rely on information and communication technologies for sharing information between sensors and controllers as well as controllers and actuators. When estimation, control or actuation tasks in a NCS are performed by an untrusted party, sharing information might result in the leakage of private information. The current paper reviews some of the recent results on the privacy-aware decision-making problems in NCSs. In particular, we focus on static and dynamic decision-making problems wherein privacy is measured using information-theoretic notions. We also review the applications of these problems in smart buildings and smart grids. 

  • 4.
    Pirani, Mohammad
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).
    Nekouei, Ehsan
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).
    Dibaji, Seyed Mehran
    MIT, Dept Mech Engn, Cambridge, MA 02139 USA..
    Sandberg, Henrik
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).
    Johansson, Karl H.
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).
    Design of Attack-Resilient Consensus Dynamics: A Game-Theoretic Approach2019In: Proceedings 2019 18th European Control Conference (ECC), IEEE , 2019, p. 2227-2232Conference paper (Refereed)
    Abstract [en]

    We propose a game-theoretic framework for improving the resilience of multi-agent consensus dynamics in the presence of a strategic attacker. In this game, the attacker selects a set of network nodes to inject the attack signals. The attacker's objective is to minimize the required energy for steering the consensus towards its desired direction. This energy is captured by the trace of controllability Gramian of the system when the input is the attack signal. The defender improves the resilience of dynamics by adding self-feedback loops to certain nodes of the system and its objective is to maximize the trace of controllability Gramian. The Stackelberg equilibrium of the game is studied with the defender as the game leader. When the underlying network topology is a tree and the defender can select only one node, we show that the optimal strategy of the defender is determined by a specific distance-based network centrality measure, called network's f-center. In addition, we show that the degree-based centralities solutions may lead to undesirable payoffs for the defender. At the end, we discuss the case of multiple attack and defense nodes on general graphs.

  • 5.
    Pirani, Mohammad
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Nekouei, Ehsan
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Sandberg, Henrik
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Johansson, Karl H.
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    A game-theoretic framework for security-aware sensor placement problem in networked control systems2019In: Proceedings of the American Control Conference, Institute of Electrical and Electronics Engineers (IEEE), 2019, p. 114-119, article id 8814443Conference paper (Refereed)
    Abstract [en]

    This paper studies the sensor placement problem in a networked control system for improving its security against cyber-physical attacks. The problem is formulated as a zero-sum game between an attacker and a detector. The attacker's decision is to select f nodes of the network to attack whereas the detector's decision is to place f sensors to detect the presence of the attack signals. In our formulation, the attacker minimizes its visibility, defined as the system L2 gain from the attack signals to the deployed sensors' outputs, and the detector maximizes the visibility of the attack signals. The equilibrium strategy of the game determines the optimal locations of the sensors. The existence of Nash equilibrium for the attacker-detector game is studied when the underlying connectivity graph is a directed or an undirected tree. When the game does not admit a Nash equilibrium, it is shown that the Stackelberg equilibrium of the game, with the detector as the game leader, can be computed efficiently. Our results show that, under the optimal sensor placement strategy, an undirected topology provides a higher security level for a networked control system compared with its corresponding directed topology.

  • 6. Tanaka, Takashi
    et al.
    Nekouei, Ehsan
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Johansson, Karl H.
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Linearly Solvable Mean-Field Road Traffic Games2018In: 56th Annual Allerton Conference on Communication, Control, and Computing, IEEE , 2018, p. 283-289Conference paper (Refereed)
    Abstract [en]

    We analyze the behavior of a large number of strategic drivers traveling er an urban traffic network using the mean-field game framework. We sume an incentive mechanism for congestion mitigation under which each iver selecting a particular route is charged a tax penalty that is fine in the logarithm of the number of agents selecting the same ute. We show that the mean-field approximation of such a rge-population dynamic game leads to the so-called linearly solvable rkov decision process, implying that an open-loop epsilon-Nash uilibrium of the original game can be found simply by solving a nite-dimensional linear system.

  • 7.
    Umsonst, David
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).
    Nekouei, Ehsan
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).
    Teixeira, A.
    Sandberg, Henrik
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).
    On the confidentiality of linear anomaly detector states2019In: Proceedings of the American Control Conference, Institute of Electrical and Electronics Engineers (IEEE), 2019, p. 397-403, article id 8814731Conference paper (Refereed)
    Abstract [en]

    A malicious attacker with access to the sensor channel in a feedback control system can severely affect the physical system under control, while simultaneously being hard to detect. A properly designed anomaly detector can restrict the impact of such attacks, however. Anomaly detectors with an internal state (stateful detectors) have gained popularity because they seem to be able to mitigate these attacks more than detectors without a state (stateless detectors). In the analysis of attacks against control systems with anomaly detectors, it has been assumed that the attacker has access to the detector's internal state, or designs its attack such that it is not detected regardless of the detector's state. In this paper, we show how an attacker can realize the first case by breaking the confidentiality of a stateful detector state evolving with linear dynamics, while remaining undetected and imitating the statistics of the detector under nominal conditions. The realization of the attack is posed in a convex optimization framework using the notion of Kullback-Leibler divergence. Further, the attack is designed such that the maximum mean estimation error of the Kalman filter is maximized at each time step by exploiting dual norms. A numerical example is given to illustrate the results.

  • 8.
    Wei, Jieqiang
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Nekouei, Ehsan
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Wu, J.
    Cvetkovic, Vladimir D.
    KTH, School of Architecture and the Built Environment (ABE), Sustainable development, Environmental science and Engineering, Resources, Energy and Infrastructure.
    Johansson, Karl H.
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
    Steady-state analysis of a human-social behavior model: A neural-cognition perspective2019In: Proceedings of the American Control Conference, Institute of Electrical and Electronics Engineers (IEEE), 2019, p. 199-204, article id 8814786Conference paper (Refereed)
    Abstract [en]

    We consider an extension of the Rescorla-Wagner model which bridges the gap between conditioning and learning on a neural-cognitive, individual psychological level, and the social population level. In this model, the interaction among individuals is captured by a Markov process. The resulting human-social behavior model is a recurrent iterated function system which behaves differently from the classical Rescorla-Wagner model due to randomness. A sufficient condition for the convergence of the forward process starting with arbitrary initial distribution is provided. Furthermore, the ergodicity properties of the internal states of agents in the proposed model are studied.

  • 9.
    Yoo, Jaehyun
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control. KTH, School of Electrical Engineering and Computer Science (EECS), Centres, ACCESS Linnaeus Centre.
    Nekouei, Ehsan
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control. KTH, School of Electrical Engineering and Computer Science (EECS), Centres, ACCESS Linnaeus Centre.
    Johansson, Karl Henrik
    KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control. KTH, School of Electrical Engineering and Computer Science (EECS), Centres, ACCESS Linnaeus Centre.
    Event-based Observer and MPC with Disturbance Attenuation using ERM Learning2018In: 2018 European Control Conference, ECC 2018, Institute of Electrical and Electronics Engineers (IEEE), 2018, p. 1894-1899, article id 8550289Conference paper (Refereed)
    Abstract [en]

    This paper presents a learning-based approach for disturbance attenuation for a non-linear dynamical system with event-based observer and model predictive control (MPC). Using the empirical risk minimization (ERM) method, we can obtain a learning error bound which is function of the number of samples, learning parameters, and model complexity. It enables us to analyze the closed-loop stability in terms of the learning property, where the state estimation error by the ERM learning is guaranteed to be bounded. Simulation results underline the learning's capability, the control performance and the event-triggering efficiency in comparison to the conventional event-triggered control scheme.

1 - 9 of 9
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf