Search Results for author: Liyong Lin

Found 11 papers, 1 papers with code

Scheduling Distributed Flexible Assembly Lines using Safe Reinforcement Learning with Soft Shielding

no code implementations21 Nov 2023 Lele Li, Liyong Lin

Moreover, a Monte-Carlo tree search based soft shielding component is developed to help address long-sequence dependent unsafe behaviors and monitor the risk of overdue scheduling.

Safe Reinforcement Learning Scheduling

On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers

no code implementations29 Jul 2023 Ruochen Tai, Liyong Lin, Rong Su

We also discuss how to extend the decidability result to the case against the worst-case attacker.

Supervisor Obfuscation Against Covert Actuator Attackers

no code implementations5 May 2022 Ruochen Tai, Liyong Lin, Rong Su

This work investigates the problem of synthesizing obfuscated supervisors against covert actuator attackers.

Synthesis of the Supremal Covert Attacker Against Unknown Supervisors by Using Observations

no code implementations16 Mar 2022 Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su

In this paper, we consider the problem of synthesizing the supremal covert damage-reachable attacker, in the setup where the model of the supervisor is unknown to the adversary but the adversary has recorded a (prefix-closed) finite set of observations of the runs of the closed-loop system.

Identification of System Vulnerability under a Smart Sensor Attack via Attack Model Reduction

no code implementations25 Jan 2022 Ruochen Tai, Liyong Lin, Rong Su

In this work, we investigate how to make use of model reduction techniques to identify the vulnerability of a closed-loop system, consisting of a plant and a supervisor, that might invite attacks.

Synthesis of Maximally Permissive Covert Attackers Against Unknown Supervisors by Using Observations

no code implementations23 Jun 2021 Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su

In this paper, we consider the problem of synthesis of maximally permissive covert damage-reachable attackers in the setup where the model of the supervisor is unknown to the adversary but the adversary has recorded a (prefix-closed) finite set of observations of the runs of the closed-loop system.

Privacy-Preserving Co-synthesis Against Sensor-Actuator Eavesdropping Intruder

no code implementations30 Apr 2021 Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su

Our approach is to model the co-synthesis problem as a distributed supervisor synthesis problem in the Ramadge-Wonham supervisory control framework, and we propose an incremental synthesis heuristic to incrementally synthesize a dynamic mask, an edit function, and a supervisor, which consists of three steps: 1) we first synthesize an ensemble ME of dynamic mask and edit function to ensure the opacity and the covertness against a sensor eavesdropping but command non-eavesdropping intruder, and marker-reachability; 2) we then decompose ME into a dynamic mask and an edit function by using a constraint-based approach, with the help of a Boolean satisfiability (SAT) solver; 3) finally, we synthesize a supervisor such that opacity and covertness can be ensured against the sensor-actuator eavesdropping intruder, and at the same time safety and nonblockingness requirement can be ensured.

Privacy Preserving

Privacy-Preserving Supervisory Control of Discrete-Event Systems via Co-Synthesis of Edit Function and Supervisor for Opacity Enforcement and Requirement Satisfaction

no code implementations9 Apr 2021 Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su

We focus on the class of edit functions that satisfy the following properties: 1) the observation capability of the edit function in general can be different from those of the supervisor and the intruder; 2) the edit function can implement insertion, deletion, and replacement operations; 3) the edit function performs bounded edit operations, i. e., the length of each string output of the edit function is upper bounded by a given constant.

Privacy Preserving

Observation-Assisted Heuristic Synthesis of Covert Attackers Against Unknown Supervisors

no code implementations20 Mar 2021 Liyong Lin, Ruochen Tai, Yuting Zhu, Rong Su

In this work, we address the problem of synthesis of covert attackers in the setup where the model of the plant is available, but the model of the supervisor is unknown, to the adversary.

Automatic Generation of Optimal Reductions of Distributions

1 code implementation29 Mar 2018 Liyong Lin, Tomáš Masopust, W. Murray Wonham, Rong Su

A (partial) solution to this problem is provided, which consists of 1) an incremental algorithm for the production of candidate reductions and 2) a reduction validation procedure.

Systems and Control Formal Languages and Automata Theory Optimization and Control

Cannot find the paper you are looking for? You can Submit a new open access paper.