Visible to the public BiblioConflict Detection Enabled

Found 159 results

2021-08-11
Alexander Trende, Anirudh Unni, Jochem Rieger, Martin Fraenzle.  2021.  Modelling Turning Intention in Unsignalized Intersections with Bayesian Networks. International Conference on Human-Computer Interaction. :289-296.
Turning through oncoming traffic at unsignalized intersections can lead to safety-critical situations contributing to 7.4% of all non-severe vehicle crashes. One of the main reasons for these crashes are human errors in the form of incorrect estimation of the gap size with respect to the Principle Other Vehicle (POV). Vehicle-to-vehicle (V2V) technology promises to increase safety in various traffic situations. V2V infrastructure combined with further integration of sensor technology and human intention prediction could help reduce the frequency of these safety-critical situations by predicting dangerous turning manoeuvres in advance, thus, allowing the POV to prepare an appropriate reaction. We performed a driving simulator study to investigate turning decisions at unsignalized intersections. Over the course of the experiments, we recorded over 5000 turning decisions with respect to different gap sizes. Afterwards, the participants filled out a questionnaire featuring demographic and driving style related items. The behavioural and questionnaire data was then used to fit a Bayesian Network model to predict the turning intention of the subject vehicle. We evaluate the model and present the results of a feature importance analysis. The model is able to correctly predict the turning intention with an accuracy of 74%. Furthermore, the feature importance analysis indicates that user specific information is a valuable contribution to the model. We discuss how a working turning intension prediction could reduce the number of safety-critical situations.
Birte Kramer, Christian Neurohr, Matthias Büker, Eckard Böde, Martin Fränzle, Werner Damm.  2020.  Identification and Quantification of Hazardous Scenarios for Automated Driving. Model-Based Safety and Assessment. :163–178.
We present an integrated method for safety assessment of automated driving systems which covers the aspects of functional safety and safety of the intended functionality (SOTIF), including identification and quantification of hazardous scenarios. The proposed method uses and combines established exploration and analytical tools for hazard analysis and risk assessment in the automotive domain, while adding important enhancements to enable their applicability to the uncharted territory of safety analyses for automated driving. The method is tailored to support existing safety processes mandated by the standards ISO 26262 and ISO/PAS 21448 and complements them where necessary. It has been developed in close cooperation with major German automotive manufacturers and suppliers within the PEGASUS project (https://www.pegasusprojekt.de/en). Practical evaluation has been carried out by applying the method to the PEGASUS Highway-Chauffeur, a conceptual automated driving function considered as a common reference system within the project.
Poechhacker, Nikolaus, Kacianka, Severin.  2021.  Algorithmic Accountability in Context. Socio-Technical Perspectives on Structural Causal Models. Frontiers in Big Data. 3:55.
The increasing use of automated decision making (ADM) and machine learning sparked an ongoing discussion about algorithmic accountability. Within computer science, a new form of producing accountability has been discussed recently: causality as an expression of algorithmic accountability, formalized using structural causal models (SCMs). However, causality itself is a concept that needs further exploration. Therefore, in this contribution we confront ideas of SCMs with insights from social theory, more explicitly pragmatism, and argue that formal expressions of causality must always be seen in the context of the social system in which they are applied. This results in the formulation of further research questions and directions.
2021-07-06
Hess, David J.  2020.  Incumbent-led transitions and civil society: Autonomous vehicle policy and consumer organizations in the United States. Technological Forecasting and Social Change. 151:119825.
The transition to connected and autonomous (or automated) vehicles (CAVs) in the United States is used to explore the role of civil society in the acceleration and deceleration of sociotechnical transitions. This is an “incumbent-led transition,” which occurs when large industrial corporations in one or more industries lead a systemic technological change. This type of transition may generate public concerns about risk and uncertainty, which can be expressed and mobilized by civil society organizations (CSOs). In turn, CSOs may also attempt to decelerate the transition process in order to develop better regulation and to change technology design. Based on an analysis of CSO statements in the public sphere and media reports on CAVs in the U.S., the political strategy of CSOs is examined to improve understanding of the role of civil society in incumbent-led transitions. The analysis indicates that the strategy includes four main aspects: articulating an alternative political goal (slower introduction of advanced autonomous vehicles and more rapid introduction of existing driver-assisted technology), engaging multiple targets or venues of action (different government units and the private sector), forming and expanding a broad coalition, and selecting effective tactics of influence (lobbying, media outreach, and research involving public opinion polls).
Lee, Dasom, Hess, David J.  2021.  Data privacy and residential smart meters: Comparative analysis and harmonization potential. Utilities Policy. 70:101188.
Building on privacy principles of the Fair Information Practice Principles and the European Union's General Data Protection Regulation, the study compares national policies and programs in Europe and North America and identifies prevailing practices for implementing privacy goals for residential energy customers: customer opt-out policies, sampling and sharing guidelines, independent data storage, and governmental enforcement authority. The analysis provides the basis for privacy standards that could apply to advanced-metering customer data across countries, even with rapidly evolving technology.
Neema, Himanshu, Phillips, Scott, Lee, Dasom, Hess, David J, Threet, Zachariah, Roth, Thomas, Nguyen, Cuong.  2021.  Transactive energy and solarization: assessing the potential for demand curve management and cost savings. Proceedings of the Workshop on Design Automation for CPS and IoT. :19–25.
Utilities and local power providers throughout the world have recognized the advantages of the "smart grid" to encourage consumers to engage in greater energy efficiency. The digitalization of electricity and the consumer interface enables utilities to develop pricing arrangements that can smooth peak load. Time-varying price signals can enable devices associated with heating, air conditioning, and ventilation (HVAC) systems to communicate with market prices in order to more efficiently configure energy demand. Moreover, the shorter time intervals and greater collection of data can facilitate the integration of distributed renewable energy into the power grid. This study contributes to the understanding of time-varying pricing using a model that examines the extent to which transactive energy can reduce economic costs of an aggregated group of households with varying levels of distributed solar energy. It also considers the potential for transactive energy to smooth the demand curve.
2020-10-12
Amjad Ibrahim, Alexander Pretschner.  2020.  From Checking to Inference: Actual Causality Computations as Optimization Problems. 18ᵗʰ International Symposium on Automated Technology for Verification and Analysis.
Amjad Ibrahim, Simon Rehwald, Antoine Scemama, Florian Andres, Alexander Pretschner.  2020.  Causal Model Extraction from Attack Trees to Attribute Malicious Insiders Attacks. The Seventh International Workshop on Graphical Models for Security.

In the context of insiders, preventive security measures have a high likelihood of failing because insiders ought to have sufficient privileges to perform their jobs. Instead, in this paper, we propose to treat the insider threat by a detective measure that holds an insider accountable in case of violations. However, to enable accountability, we need to create causal models that support reasoning about the causality of a violation. Current security models (e.g., attack trees) do not allow that. Still, they are a useful source for creating causal models. In this paper, we discuss the value added by causal models in the security context. Then, we capture the interaction between attack trees and causal models by proposing an automated approach to extract the latter from the former. Our approach considers insider-specific attack classes such as collusion attacks and causal-model-specific properties like preemption relations. We present an evaluation of the resulting causal models’ validity and effectiveness, in addition to the efficiency of the extraction process.
 

Bai Xue, Martin Fränzle, Naijun Zhan, Sergiy Bogomolov, Bican Xia.  2020.  Safety verification for random ordinary differential equations. Proceedings of EMSOFT 2020: International Conference on Embedded Software.
Martin Fränzle, Paul Kröger.  2020.  Guess what I’m doing! Rendering formal verification methods ripe for the era of interacting intelligent systems. 9th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation.
Dasom Lee, David J. Hess, Himanshu Neema.  2020.  The challenges of implementing transactive energy: A comparative analysis of experimental projects. The Electricity Journal. 33(10)

This study examines the results of field experiments of transactive energy systems (TESs) in order to identify challenges that occur with the integration of TESs with existing software, hardware, appliances, and customer practices. Three types of challenges, and potential responses and solutions, are identified for the implementation phase of TESs: systematic risk to existing building functions, lack of readiness of users and connected systems, and lack of competitiveness with existing demand-management systems and products.

Amjad Ibrahim, Tobias Klesel, Ehsan Zibaei, Severin Kacianka, Alexander Pretschner.  2020.  Actual Causality Canvas: A General Framework for Explanation-based Socio-Technical Constructs. European Conference on Artificial Intelligence 2020.

The rapid deployment of digital systems into all aspects of daily life requires embedding social constructs into the digital world. Because of the complexity of these systems, there is a need for technical support to understand their actions. Social concepts, such as explainability, accountability, and responsibility rely on a notion of actual causality. Encapsulated in the Halpern and Pearl’s (HP) definition, actual causality conveniently integrates into the socio-technical world if operationalized in concrete applications. To the best of our knowledge, theories of actual causality such as the HP definition are either applied in correspondence with domain-specific concepts (e.g., a lineage of a database query) or demonstrated using straightforward philosophical examples. On the other hand, there is a lack of explicit automated actual causality theories and operationalizations for helping understand the actions of systems. Therefore, this paper proposes a unifying framework and an interactive platform (Actual Causality Canvas) to address the problem of operationalizing actual causality for different domains and purposes. We apply this framework in such areas as aircraft accidents, unmanned aerial vehicles, and artificial intelligence (AI) systems for purposes of forensic investigation, fault diagnosis, and explainable AI. We show that with minimal effort, using our general-purpose interactive platform, actual causality reasoning can be integrated into these domains.

2020-10-08
Himanshu Neema, Peter Volgyesi, Xenofon Koutsoukos, Thomas Roth, Cuong Nguyen.  2020.  Online Testbed for Evaluating Vulnerability of Deep Learning Based Power Grid Load Forecasters. Modeling and Simulation of Cyber-Physical Energy Systems.

Modern electric grids that integrate smart grid technologies require different approaches to grid operations. There has been a shift towards increased reliance on distributed sensors to monitor bidirectional power flows and machine learning based load forecasting methods (e.g., using deep learning). These methods are fairly accurate under normal circumstances, but become highly vulnerable to stealthy adversarial attacks that could be deployed on the load forecasters. This paper provides a novel model-based Testbed for Simulation-based Evaluation of Resilience (TeSER) that enables evaluating deep learning based load forecasters against stealthy adversarial attacks. The testbed leverages three existing technologies, viz. DeepForge: for designing neural networks and machine learning pipelines, GridLAB-D: for electric grid distribution system simulation, and WebGME: for creating web-based collaborative metamodeling environments. The testbed architecture is described, and a case study to demonstrate its capabilities for evaluating load forecasters is provided.

Carlos Barreto, Himanshu Neema, Xenofon Koutsoukos.  2020.  Attacking Electricity Markets Through IoT Devices. Computer (Long Beach, Calif.). 53(5):55-62.

 

Smart appliances, or Internet of Things devices, participate autonomously in electricity markets and improve grid efficiency, but their remote access and control capabilities also introduce vulnerabilities. We show how an adverse generator can manipulate market clearing prices and propose mitigation strategies to correct the impact.

Harsh Vardhan, Neal M. Sarkar, Himanshu Neema.  2019.  Modeling and Optimization of a Longitudinally-Distributed Global Solar Grid. International Conference on Power Systems.

Our simulation-based experiments are aimed to demonstrate a use case on the feasibility of fulfillment of global energy demand by primarily relying on solar energy through the integration of a longitudinally-distributed grid. These experiments demonstrate the availability of simulation technologies, good approximation models of grid components, and data for simulation. We also experimented with integrating different tools to create realistic simulations as we are currently developing a detailed toolchain for experimentation. These experiments consist of a network of model houses at different locations in the world, each producing and consuming only solar energy. The model includes houses, various appliances, appliance usage schedules, regional weather information, floor area, HVAC systems, population, number of houses in the region, and other parameters to imitate a real-world scenario. Data gathered from the power system simulation is used to develop optimization models to find the optimal solar panel area required at the different locations to satisfy energy demands in different scenarios.

Xingyu Zhou, Yi Li, Carlos A. Barreto, Jiani Li, Peter Volgyesi, Himanshu Neema, Xenofon Koutsoukos.  2020.  Evaluating Resilience of Grid Load Predictions under Stealthy Adversarial Attacks. 2019 Resilience Week (RWS).

Recent advances in machine learning enable wider applications of prediction models in cyber-physical systems. Smart grids are increasingly using distributed sensor settings for distributed sensor fusion and information processing. Load forecasting systems use these sensors to predict future loads to incorporate into dynamic pricing of power and grid maintenance. However, these inference predictors are highly complex and thus vulnerable to adversarial attacks. Moreover, the adversarial attacks are synthetic norm-bounded modifications to a limited number of sensors that can greatly affect the accuracy of the overall predictor. It can be much cheaper and effective to incorporate elements of security and resilience at the earliest stages of design. In this paper, we demonstrate how to analyze the security and resilience of learning-based prediction models in power distribution networks by utilizing a domain-specific deep-learning and testing framework. This framework is developed using DeepForge and enables rapid design and analysis of attack scenarios against distributed smart meters in a power distribution network. It runs the attack simulations in the cloud backend. In addition to the predictor model, we have integrated an anomaly detector to detect adversarial attacks targeting the predictor. We formulate the stealthy adversarial attacks as an optimization problem to maximize prediction loss while minimizing the required perturbations. Under the worst-case setting, where the attacker has full knowledge of both the predictor and the detector, an iterative attack method has been developed to solve for the adversarial perturbation. We demonstrate the framework capabilities using a GridLAB-D based power distribution network model and show how stealthy adversarial attacks can affect smart grid prediction systems even with a partial control of network.

Christian Hinrichs, Sebastian Lehnhoff, Michael Sonneschein.  2014.  COHDA: A combinatorial optimization heuristic for distributed agents. International Conference on Agents and Artificial Intelligence 2013.
Jörg Bremer, Sebastian Lehnhoff.  2017.  Decentralized Coalition Formation with Agent-based Combinatorial Heuristics. Advances in distributed computing and artificial intelligence journal. 6(3):29-44.