Biblio
Filters: Author is Ozay, Necmiye [Clear All Filters]
Communication Obfuscation for Privacy and Utility against Obfuscation-Aware Eavesdroppers. 2022 American Control Conference (ACC). :3363—3363.
.
2022. Networked cyber-physical systems must balance the utility of communication for monitoring and control with the risks of revealing private information. Many of these networks, such as wireless communication, are vulnerable to eavesdrop-ping by illegitimate recipients. Obfuscation can hide information from eaves-droppers by ensuring their observations are ambiguous or misleading. At the same time, coordination with recipients can enable them to interpret obfuscated data. In this way, we propose an obfuscation framework for dynamic systems that ensures privacy against eavesdroppers while maintaining utility for legitimate recipients. We consider eavesdroppers unaware of obfuscation by requiring that their observations are consistent with the original system, as well as eaves-droppers aware of the goals of obfuscation by assuming they learn of the specific obfuscation implementation used. We present a method for bounded synthesis of solutions based upon distributed reactive synthesis and the synthesis of publicly-known obfuscators.
ISSN: 2378-5861
Towards Better Adaptive Systems by Combining MAPE, Control Theory, and Machine Learning. Proceedings of the 16th Symposium on Software Engineering for Adaptive and Self-Managing Systems, Virtual.
.
2021. Two established approaches to engineer adaptive systems are architecture-based adaptation that uses a Monitor-Analysis-Planning-Executing (MAPE) loop that reasons over architectural models (aka Knowledge) to make adaptation decisions, and control-based adaptation that relies on principles of control theory (CT) to realize adaptation. Recently, we also observe a rapidly growing interest in applying machine learning (ML) to support different adaptation mechanisms. While MAPE and CT have particular characteristics and strengths to be applied independently, in this paper, we are concerned with the question of how these approaches are related with one another and whether combining them and supporting them with ML can produce better adaptive systems. We motivate the combined use of different adaptation approaches using a scenario of a cloud-based enterprise system and illustrate the analysis when combining the different approaches. To conclude, we offer a set of open questions for further research in this interesting area.
Control Synthesis for Large Collections of Systems with Mode-Counting Constraints. Proceedings of the 19th International Conference on Hybrid Systems: Computation and Control. :205–214.
.
2016.
Correct-by-construction adaptive cruise control: Two approaches. IEEE Transactions on Control Systems Technology. 24:1294–1307.
.
2016.
Interdependence quantification for compositional control synthesis with an application in vehicle safety systems. Decision and Control (CDC), 2016 IEEE 55th Conference on. :5700–5707.
.
2016.
Synthesis of separable controlled invariant sets for modular local control design. American Control Conference (ACC), 2016. :5656–5663.
.
2016.
Passivity degradation in discrete control implementations: An approximate bisimulation approach. Decision and Control (CDC), 2015 IEEE 54th Annual Conference on. :6817–6822.
.
2015.
Incremental synthesis of switching protocols via abstraction refinement. Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on. :6246–6253.
.
2014.
Preliminary results on correct-by-construction control software synthesis for adaptive cruise control. Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on. :816–823.
.
2014.