no code implementations • 30 Nov 2023 • Lei Xin, George Chiu, Shreyas Sundaram
We develop a data-dependent threshold that can be used in our test that allows one to achieve a pre-specified upper bound on the probability of making a false alarm.
no code implementations • 16 Sep 2023 • Tong Yao, Shreyas Sundaram
We propose an online algorithm to estimate the sparse inverse covariance (i. e., precision) matrix despite this corruption.
no code implementations • 15 Sep 2023 • Lei Xin, George Chiu, Shreyas Sundaram
Identifying a linear system model from data has wide applications in control theory.
no code implementations • 29 Aug 2023 • JiaMing Wang, Jiqian Dong, Sikai Chen, Shreyas Sundaram, Samuel Labi
In the first component of the framework, we develop a realistic reinforcement learning environment termed "ChargingEnv" which incorporates a reliable charging simulation system that accounts for common practical issues in wireless charging deployment, specifically, the charging panel misalignment.
no code implementations • 15 Mar 2023 • Jiajun Shen, Kananart Kuwaranancharoen, Raid Ayoub, Pietro Mercati, Shreyas Sundaram
Model-based Reinforcement Learning (RL) integrates learning and planning and has received increasing attention in recent years.
Model-based Reinforcement Learning Reinforcement Learning (RL)
no code implementations • 8 Feb 2023 • Lei Xin, Lintao Ye, George Chiu, Shreyas Sundaram
We consider the problem of learning the dynamics of a linear system when one has access to data generated by an auxiliary system that shares similar (but not identical) dynamics, in addition to data from the true system.
no code implementations • 17 Sep 2022 • Tong Yao, Shreyas Sundaram
We study robust mean estimation in an online and distributed scenario in the presence of adversarial data attacks.
no code implementations • 12 Sep 2022 • Lei Xin, George Chiu, Shreyas Sundaram
We provide non-asymptotic bounds on the estimation error, leveraging the statistical properties of the underlying model.
no code implementations • 3 Sep 2022 • Baike She, Shreyas Sundaram, Philip E. Paré
Distinct from existing works on leveraging control strategies in epidemic spreading, we propose a testing strategy by overestimating the seriousness of the epidemic and study the feasibility of the system under the impact of model parameter uncertainty.
no code implementations • 12 Jun 2022 • Xuan Wang, Shaoshuai Mou, Shreyas Sundaram
By applying this new device to multi-agent systems, we introduce network and constraint redundancy conditions under which resilient constrained consensus can be achieved with an exponential convergence rate.
no code implementations • 25 May 2022 • Mohammad Pirani, Aritra Mitra, Shreyas Sundaram
As the scale of networked control systems increases and interactions between different subsystems become more sophisticated, questions of the resilience of such networks increase in importance.
1 code implementation • 11 Apr 2022 • Lei Xin, Lintao Ye, George Chiu, Shreyas Sundaram
We study the problem of identifying the dynamics of a linear system when one has access to samples generated by a similar (but not identical) system, in addition to data from the true system.
no code implementations • 24 Mar 2022 • Lei Xin, George Chiu, Shreyas Sundaram
Existing results on learning rate and consistency of autonomous linear system identification rely on observations of steady state behaviors from a single long trajectory, and are not applicable to unstable systems.
no code implementations • 29 Sep 2021 • Baike She, Humphrey C. H. Leung, Shreyas Sundaram, Philip E. Paré
We propose an SIR epidemic model coupled with opinion dynamics to study an epidemic and opinions spreading in a network of communities.
no code implementations • 24 Sep 2021 • Tong Yao, Shreyas Sundaram
Learning the relationships between various entities from time-series data is essential in many applications.
no code implementations • 11 May 2021 • Lintao Ye, Philip E. Paré, Shreyas Sundaram
We study the problem of estimating the parameters (i. e., infection rate and recovery rate) governing the spread of epidemics in networks.
no code implementations • 7 Apr 2021 • Yijing Xie, Shaoshuai Mou, Shreyas Sundaram
This paper considers the multi-agent reinforcement learning (MARL) problem for a networked (peer-to-peer) system in the presence of Byzantine agents.
no code implementations • 5 Mar 2021 • Mustafa Abdallah, Timothy Cason, Saurabh Bagchi, Shreyas Sundaram
Each node has a certain value to the attacker and the defender, along with a probability of being successfully compromised, which is a function of the investments in that node by both players.
no code implementations • 25 Feb 2021 • Baike She, Ji Liu, Shreyas Sundaram, Philip E. Paré
We propose a mathematical model to study coupled epidemic and opinion dynamics in a network of communities.
no code implementations • 6 Jan 2021 • Yanwen Mao, Aritra Mitra, Shreyas Sundaram, Paulo Tabuada
To better understand this, we show that when the $\mathbf{A}$ matrix of the linear system has unitary geometric multiplicity, the gap disappears, i. e., eigenvalue observability coincides with sparse observability, and there exists a polynomial time algorithm to reconstruct the state provided the state can be reconstructed.
no code implementations • 21 Nov 2020 • Lintao Ye, Aritra Mitra, Shreyas Sundaram
We then show that the data source selection problem can be transformed into an instance of the submodular set covering problem studied in the literature, and provide a standard greedy algorithm to solve the data source selection problem with provable performance guarantees.
no code implementations • 12 Nov 2020 • Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi
We model the behavioral biases of human decision-making in securing interdependent systems and show that such behavioral decision-making leads to a suboptimal pattern of resource allocation compared to non-behavioral (rational) decision-making.
no code implementations • 4 Apr 2020 • Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi
We model the security investment decisions made by the defenders as a security game.
Cryptography and Security Computer Science and Game Theory
no code implementations • 2 Apr 2020 • Shreyas Sundaram, Aritra Mitra
We consider the problem of distributed hypothesis testing (or social learning) where a network of agents seeks to identify the true state of the world from a finite set of hypotheses, based on a series of stochastic signals that each agent receives.
no code implementations • 2 Apr 2020 • Aritra Mitra, John A. Richards, Saurabh Bagchi, Shreyas Sundaram
We prove that our rule guarantees convergence to the true state exponentially fast almost surely despite sparse communication, and that it has the potential to significantly reduce information flow from uninformative agents to informative agents.
no code implementations • 4 Sep 2019 • Aritra Mitra, John A. Richards, Shreyas Sundaram
We introduce a simple time-triggered protocol to achieve communication-efficient non-Bayesian learning over a network.
no code implementations • 5 Jul 2019 • Aritra Mitra, John A. Richards, Shreyas Sundaram
We study a setting where a group of agents, each receiving partially informative private signals, seek to collaboratively learn the true underlying state of the world (from a finite set of hypotheses) that generates their joint observation profiles.
no code implementations • 14 Mar 2019 • Aritra Mitra, John A. Richards, Shreyas Sundaram
Under minimal requirements on the signal structures of the agents and the underlying communication graph, we establish consistency of the proposed belief update rule, i. e., we show that the actual beliefs of the agents asymptotically concentrate on the true state almost surely.
no code implementations • 29 Jun 2016 • Shreyas Sundaram, Bahman Gharesifard
We then propose a resilient distributed optimization algorithm that guarantees that the non-adversarial nodes converge to the convex hull of the minimizers of their local functions under certain conditions on the graph topology, regardless of the actions of a certain number of adversarial nodes.
Systems and Control Distributed, Parallel, and Cluster Computing Optimization and Control