Loading [MathJax]/extensions/MathMenu.js
Sayan Mitra - IEEE Xplore Author Profile

Showing 1-25 of 54 results

Filter Results

Show

Results

Modern autonomous vehicle systems (AVS) use complex perception and control components. Developers gradually change these components over the vehicle’s lifecycle, requiring frequent regression testing. Unfortunately, high-fidelity simulations of these complex AVS for evaluating safety are costly, and their complexity hinders the development of precise but less computationally intensive surrogate mo...Show More
The safety of satellites is an increasingly difficult requirement as launches of new satellites increase the clutter of space environments. The deployment of new, experimental controllers is important to increase the autonomous capabilities of satellites but may be at odds with safety. In this work, we consolidate these two goals by synthesizing a formally safe controller and a runtime assurance l...Show More
Vision-based formation control systems are attractive because they can use inexpensive sensors and can work in G PS-denied environments. The safety assurance for such systems is challenging: the vision component's accuracy depends on the environment in complicated ways, these errors propagate through the system and lead to incorrect control actions, and there exists no formal specification for end...Show More
Perception modules are integral in many modern autonomous systems, but their accuracy can be subject to the vagaries of the environment. In this paper, we propose a learning-based approach that can automatically characterize the error of a perception module from data and use this for safe control. The proposed approach constructs an inverse perception contract (IPC) which generates a set that cont...Show More
AI and Machine Learning could enhance autonomous systems, provided the risk of safety violations could be mitigated. Specific instances of runtime assurance (RTA) have been successful in safely testing untrusted, learning-enabled controllers, but a general design methodology for RTA remains a challenge. The problem is to create a logic that assures safety by switching to a safety (or backup) contr...Show More
A symmetry of a dynamical system is a map that transforms any trajectory to another trajectory. Abstractions have been a key building block in the theory and practice of hybrid automata analysis. We introduce a novel abstraction for hybrid automata based on the symmetries of their modes. The abstraction procedure combines different modes of a concrete automaton $\mathcal {A}$, whose trajectories a...Show More
The Stanley controller was designed for the DARPA 2005 Grand Challenge and has been widely used in real autonomous vehicles and simulation models. While the original paper presented an analysis of the tracking performance of this controller with straight roads, the analysis for general curved lanes and with perception errors is not available. We utilize Lyapunov theory to give tracking performance...Show More
This article presents a new method for model-free verification of a general class of control systems with unknown nonlinear dynamics, where the state space has both a continuum-based and a discrete component. Specifically, we focus on finding what choices of initial states or parameters maximize a given probabilistic objective function over all choices of initial states or parameters from such hyb...Show More
In this article, we extend the notion of estimation entropy of autonomous dynamical systems proposed by Liberzon and Mitra to nonlinear dynamical systems with uncertain inputs with bounded variation. We call this new notion the $\varepsilon$-estimation entropy of the system and show that it lower bounds the bit rate needed for state estimation. $\varepsilon$-estimation entropy represents the expon...Show More
Multi-player games with lexicographic cost functions can capture a variety of driving and racing scenarios and are known to have pure-strategy Nash Equilibria (NE) under certain conditions. The standard Iterated Best Response (IBR) procedure for finding such equilibria can be slow because computing the best response for each agent generally involves solving a non-convex optimization problem. In th...Show More
Deep learning (DL) models are becoming effective in solving computer-vision tasks such as semantic segmentation, object tracking, and pose estimation on real-world captured images. Reliability analysis of autonomous systems that use these DL models as part of their perception systems have to account for the performance of these models. Autonomous systems with traditional sensors have tried-and-tes...Show More
A smart manufacturing system is a complex cyber-physical system consisting of a collection of component machines and a floorplan layout defining the spatial relationship between components. Each component may be of different physical behavior with different control software. Simulation and testing on smart manufacturing systems require a software infrastructure that can orchestrate the execution o...Show More
Recent algorithms show how the availability of structural knowledge, such as symmetries, can significantly improve autonomous system verification in terms of both running time and sample complexity.Show More
Statistical model checking is a class of sequential algorithms that can verify specifications of interest on an ensemble of cyber-physical systems (e.g., whether 99% of cars from a batch meet a requirement on their functionality). These algorithms infer the probability that given specifications are satisfied by the systems with provable statistical guarantees by drawing sufficient numbers of indep...Show More
Fully formal verification of perception models is likely to remain challenging in the foreseeable future, and yet these models are being integrated into safety-critical control systems. We present a practical method for reasoning about the safety of such systems. Our method is based on systematically constructing approximations of perception models from system-level safety requirements, data, and ...Show More
We tackle the challenging problem of multi-agent cooperative motion planning for complex tasks described using signal temporal logic (STL), where robots can have nonlinear and nonholonomic dynamics. Existing methods in multi-agent motion planning, especially those based on discrete abstractions and model predictive control (MPC), suffer from limited scalability with respect to the complexity of th...Show More
We address the problem of synthesizing provably correct controllers for linear systems with reach-avoid specifications. Discrete abstraction-based controller synthesis techniques have been developed for linear and nonlinear systems with various types of specifications. However, these methods typically suffer from the state space explosion problem. Our solution decomposes the overall synthesis prob...Show More
This paper provides a new approach for probabilistic verification of control and dynamical systems in the scenario where there is a finite computational budget that must be used judiciously; it is based on leveraging multiarmed bandits theory from machine learning. We present an algorithm for formal verification and parameter synthesis of continuous state-space Markov chains, introduce our associa...Show More
The key concept for safe and efficient traffic management for Unmanned Aircraft Systems (UAS) is the notion of operation volume (OV). An OV is a 4-dimensional block of airspace and time, which can express an aircraft's intent, and can be used for planning, de-confliction, and traffic management. While there are several high-level simulators for UAS Traffic Management (UTM), we are lacking a framew...Show More
A Cyber-Physical System (CPS) is usually composed of subnetworks where each subnetwork is under ownership of one defender. Security threats on such CPS can be represented by an attack graph where the defenders are required to invest wisely their limited budget in order to protect their critical assets from being compromised. We model such CPS using hybrid input/output automaton (HIOA) where each s...Show More
Modeling is a significant piece of the puzzle in achieving safety certificates for distributed IoT and cyberphysical systems. From smart home devices to connected and autonomous vehicles, several modeling challenges like dynamic membership of participants and complex interaction patterns, span across application domains. Modeling multiple interacting vehicles can become unwieldy and impractical as...Show More
As autonomous systems begin to operate amongst humans, methods for safe interaction must be investigated. We consider an example of a small autonomous vehicle in a pedestrian zone that must safely maneuver around people in a free-form fashion. We investigate two key questions: How can we effectively integrate pedestrian intent estimation into our autonomous stack? Can we develop an online monitori...Show More
Programming languages, libraries, and development tools have transformed the application development processes for mobile computing and machine learning. This paper introduces CyPhyHouse—a toolchain that aims to provide similar programming, debugging, and deployment benefits for distributed mobile robotic applications. Users can develop hardware-agnostic, distributed applications using the high-le...Show More
Discrete manufacturing systems are complex cyber-physical systems (CPS) and their availability, performance, and quality have a big impact on the economy. Smart manufacturing promises to improve these aspects. One key approach that is being pursued in this context is the creation of centralized software-defined control (SDC) architectures and strategies that use diverse sensors and data sources to...Show More
Automated vulnerability assessment and exploit generation for computing systems have been explored for decades. However, these approaches are incomplete in assessing industrial control systems, where networks of computing devices and physical processes interact for safety-critical missions. We present an attack synthesis algorithm against such cyber-physical electricity grids. The algorithm explor...Show More