Shripad Gade

ORCID: 0000-0003-3400-749X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Stochastic Gradient Optimization Techniques
  • Distributed Control Multi-Agent Systems
  • Cryptography and Data Security
  • Game Theory and Applications
  • Robotics and Sensor-Based Localization
  • Auction Theory and Applications
  • Robotic Path Planning Algorithms
  • Guidance and Control Systems
  • UAV Applications and Optimization
  • Evacuation and Crowd Dynamics
  • Adversarial Robustness in Machine Learning
  • Wireless Communication Security Techniques
  • Inertial Sensor and Navigation
  • Age of Information Optimization
  • Advanced Vision and Imaging
  • Optimization and Search Problems
  • Mobile Crowdsensing and Crowdsourcing
  • Machine Learning and Algorithms
  • Cloud Data Security Solutions
  • Optical measurement and interference techniques
  • Sparse and Compressive Sensing Techniques
  • Reinforcement Learning in Robotics

University of Illinois Urbana-Champaign
2015-2020

Indian Institute of Technology Indore
2013

The problem of herding a flock birds is posed in graph theoretic framework. A novel algorithm, called the n-wavefront Is developed for enabling single unmanned aerial vehicle to herd desired point. technique applied diverting approaching an airport away from protected zone around airport. algorithm demonstrated simulation and compared with existing strategies using graph-based metrics.

10.2514/6.2015-1540 article EN AIAA Guidance, Navigation and Control Conference 2015-01-02

Distributed (federated) learning has become a popular paradigm in recent years. In this scenario private data is stored among several machines (possibly cellular or mobile devices). These collaboratively solve distributed optimization problem, using data, to learn predictive models. The aggressive use of problems involving sensitive resulted privacy concerns. paper we present synchronous stochastic gradient descent based algorithm that introduces via obfuscation client-server model. We prove...

10.1109/cdc.2018.8619133 article EN 2018-12-01

This paper considers a distributed multi-agent optimization problem, with the global objective consisting of sum local functions agents. The agents solve problem using computation and communication between adjacent in network. We present two randomized iterative algorithms for optimization. To improve privacy, our add "structured" randomization to information exchanged prove deterministic correctness (in every execution) proposed despite being perturbed by noise non-zero mean. that special...

10.23919/acc.2018.8430960 article EN 2018-06-01

This paper is concerned with robotic herding of a swarm birds by another adversarial agent, referred to as the pursuer. The objective to prevent from entering specified volume space, such air space around an airport. n-Wavefront algorithm was introduced authors in a prior enable using unmanned aerial vehicle. In this paper, the performance and stability characteristics are analyzed tools linear nonlinear stability theory, aim proving its identifying permissible optimum values...

10.2514/6.2016-1378 article EN AIAA Guidance, Navigation and Control Conference 2016-01-01

This paper considers a distributed multi-agent optimization problem, with the global objective consisting of sum local functions agents. The agents solve problem using computation and communication between adjacent in network. We present two randomized iterative algorithms for optimization. To improve privacy, our add "structured" randomization to information exchanged prove deterministic correctness (in every execution) proposed despite being perturbed by noise non-zero mean. that special...

10.48550/arxiv.1703.09185 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Unmanned Aerial Systems (UAS) have great potential to aid in search and situation assessment. Here, we present a UAV swarm system performing target adversarial environment. It utilizes Ant-Colony (ACO) Artificial Potential Function (APF) based decentralised strategy. ACO meta-heuristic forms the higher level guidance algorithm APF provide global local path planning. Uncertainty maps are used represent probable locations. The is scalable shown be robust agent loss. Its distributed nature...

10.1109/iccc.2013.6731679 article EN 2013-12-01

We present a distributed solution to optimizing convex function composed of several non-convex functions. Each is privately stored with an agent while the agents communicate neighbors form network. show that coupled consensus and projected gradient descent algorithm proposed in [1] can optimize sum functions under additional assumption on Lipschitzness. further discuss applications this analysis improving privacy optimization.

10.48550/arxiv.1608.05401 preprint EN other-oa arXiv (Cornell University) 2016-01-01

This paper considers a distributed reinforcement learning problem in the presence of Byzantine agents. The system consists central coordinating authority called "master agent" and multiple computational entities "worker agents". master agent is assumed to be reliable, while, small fraction workers can (malicious) adversaries. are interested cooperatively maximize convex combination honest (non-malicious) worker agents' long-term returns through communication between A actor-critic algorithm...

10.23919/acc45564.2020.9147381 article EN 2022 American Control Conference (ACC) 2020-07-01

We propose a distributed algorithm to compute an equilibrium in aggregate games where players communicate over fixed undirected network. Our exploits correlated perturbation obfuscate information shared the prove that our does not reveal private of honest-but-curious adversary who monitors several nodes In contrast with differential privacy based algorithms, method sacrifice accuracy computation provide guarantees.

10.1016/j.ifacol.2020.12.1134 article EN IFAC-PapersOnLine 2020-01-01

Continual data collection and widespread deployment of machine learning algorithms, particularly the distributed variants, have raised new privacy challenges. In a scenario, dataset is stored among several machines they solve optimization problem to collectively learn underlying model. We present secure multi-party computation inspired preserving algorithm for optimizing convex function consisting possibly non-convex functions. Each individual objective privately with an agent while agents...

10.48550/arxiv.1612.05236 preprint EN other-oa arXiv (Cornell University) 2016-01-01

We present a distributed optimization protocol that preserves statistical privacy of agents' local cost functions against passive adversary corrupts some agents in the network. The is composition "zero-sum" obfuscation obfuscates functions, and standard non-private method. show our protects up to t arbitrary as long communication network has (t+1 )-vertex connectivity. sum therefore ensures accuracy computed solution.

10.1109/lcsys.2020.3005766 article EN publisher-specific-oa IEEE Control Systems Letters 2020-06-30

Availability of both massive datasets and computing resources have made machine learning predictive analytics extremely pervasive. In this work we present a synchronous algorithm architecture for distributed optimization motivated by privacy requirements posed applications in learning. We an the recently proposed multi-parameter-server architecture. consider group parameter servers that learn model based on randomized gradients received from clients. Clients are computational entities with...

10.48550/arxiv.1608.03866 preprint EN other-oa arXiv (Cornell University) 2016-01-01

This paper studies a system of linear equations, denoted as $Ax = b$, which is horizontally partitioned (rows in $A$ and $b$) stored over network $m$ devices connected fixed directed graph. We design fast distributed algorithm for solving such that additionally, protects the privacy local data against an honest-but-curious adversary corrupts at most $τ$ nodes network. First, we present TITAN, privaTe fInite Time Average coNsensus algorithm, general average consensus problem graphs, while...

10.48550/arxiv.2004.04680 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Unmanned Aerial Systems (UAS) possess tremendous capabilities to perform search, tracking and situation assessment in hazardous environments. However, it sometimes becomes critical include a human component offset the limited reasoning of agents. This paper presents Human-in-Loop (HiL) control architecture for distributed cooperative target search. Hierarchical autonomy provides tight over system, enhancing operational reliability, search efficiency effectiveness. Human feedback also...

10.21535/proicius.2013.v9.409 article EN Proceedings of International Conference on Intelligent Unmanned Systems 2013-01-01

We propose a distributed algorithm to compute an equilibrium in aggregate games where players communicate over fixed undirected network. Our exploits correlated perturbation obfuscate information shared the prove that our does not reveal private of honest-but-curious adversary who monitors several nodes In contrast with differential privacy based algorithms, method sacrifice accuracy computation provide guarantees.

10.48550/arxiv.1912.06296 preprint EN other-oa arXiv (Cornell University) 2019-01-01

We present a distributed optimization protocol that preserves statistical privacy of agents' local cost functions against passive adversary corrupts some agents in the network. The is composition ``{\em zero-sum}" obfuscation obfuscates functions, and standard non-private method. show our protects up to $t$ arbitrary as long communication network has $(t+1)$-vertex connectivity. sum therefore ensures accuracy computed solution.

10.48550/arxiv.2004.01312 preprint EN other-oa arXiv (Cornell University) 2020-01-01
Coming Soon ...