Radoslav Ivanov

ORCID: 0000-0003-4987-4836
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Adversarial Robustness in Machine Learning
  • Fault Detection and Control Systems
  • Healthcare Technology and Patient Monitoring
  • Formal Methods in Verification
  • Distributed Sensor Networks and Detection Algorithms
  • Non-Invasive Vital Sign Monitoring
  • Smart Grid Security and Resilience
  • Target Tracking and Data Fusion in Sensor Networks
  • Anomaly Detection Techniques and Applications
  • ECG Monitoring and Analysis
  • Hemodynamic Monitoring and Therapy
  • Explainable Artificial Intelligence (XAI)
  • Security in Wireless Sensor Networks
  • Software Testing and Debugging Techniques
  • Advanced Combustion Engine Technologies
  • Risk and Safety Analysis
  • Safety Systems Engineering in Autonomy
  • Software Reliability and Analysis Research
  • Neural Networks and Applications
  • Advanced Neural Network Applications
  • Biodiesel Production and Applications
  • Cloud Data Security Solutions
  • Context-Aware Activity Recognition Systems
  • Real-time simulation and control systems
  • Energy Efficient Wireless Sensor Networks

Rensselaer Polytechnic Institute
2022-2024

University of Pennsylvania
2013-2021

California University of Pennsylvania
2014-2021

Institute of Electrical and Electronics Engineers
2020

Gorgias Press (United States)
2020

Vrije Universiteit Brussel
2020

Daegu Gyeongbuk Institute of Science and Technology
2016

Children's Hospital of Philadelphia
2014

Caterpillar (United Kingdom)
2012

This paper presents Verisig, a hybrid system approach to verifying safety properties of closed-loop systems using neural networks as controllers. We focus on sigmoid-based and exploit the fact that sigmoid is solution quadratic differential equation, which allows us transform network into an equivalent system. By composing network's with plant's, we problem verification can be solved state-of-the-art reachability tools. show decidable for one hidden layer general if Schanuel's conjecture...

10.1145/3302504.3311806 article EN 2019-04-08

This paper addresses the problem of detection and identification sensor attacks in presence transient faults. We consider a system with multiple sensors measuring same physical variable, where some might be under attack provide malicious values. setup, which each provides controller an interval possible values for true value. While approaches exist detecting attacks, they are conservative that treat faults way, thus neglecting fact may faulty measurements at times due to temporary...

10.1145/2735960.2735984 article EN 2015-04-14

This article focuses on the design of safe and attack-resilient Cyber-Physical Systems (CPS) equipped with multiple sensors measuring same physical variable. A malicious attacker may be able to disrupt system performance through compromising a subset these sensors. Consequently, we develop precise resilient sensor fusion algorithm that combines data received from all by taking into account their specified precisions. In particular, note in presence shared bus, which messages are broadcast...

10.1145/2847418 article EN ACM Transactions on Embedded Computing Systems 2016-02-20

This paper describes a verification case study on an autonomous racing car with neural network (NN) controller. Although several approaches have been recently proposed, they only evaluated low-dimensional systems or constrained environments. To explore the limits of existing approaches, we present challenging benchmark in which NN takes raw LiDAR measurements as input and outputs steering for car. We train dozen NNs using reinforcement learning (RL) show that state art can handle around 40...

10.1145/3365365.3382216 article EN 2020-04-22

This article addresses the problem of verifying safety autonomous systems with neural network (NN) controllers. We focus on NNs sigmoid/tanh activations and use fact that is solution to a quadratic differential equation. allows us convert NN into an equivalent hybrid system cast as verification problem, which can be solved by existing tools. Furthermore, we improve scalability proposed method approximating sigmoid Taylor series worst-case error bounds. Finally, provide evaluation over four...

10.1145/3419742 article EN ACM Transactions on Embedded Computing Systems 2020-12-07

This paper presents Verisig, a hybrid system approach to verifying safety properties of closed-loop systems using neural networks as controllers. Although techniques exist for input/output the network itself, these methods cannot be used verify (since they work with piecewise-linear constraints that do not capture non-linear plant dynamics). To overcome this challenge, we focus on sigmoid-based and exploit fact sigmoid is solution quadratic differential equation, which allows us transform...

10.48550/arxiv.1811.01828 preprint EN other-oa arXiv (Cornell University) 2018-01-01

A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log medical device patient information allows efficient forensic analysis cases adverse events or attacks on interoperable devices. secure as such must meet requirements confidentiality integrity message logs provide tamper-detection tamper-evidence. In this paper, we propose design for cloud-based using Intel Software Guard Extensions (SGX) Trusted Platform Module (TPM). The proposed receives from dongle...

10.1109/chase.2016.48 article EN 2016-06-01

Recent advances in deep learning have enabled data-driven controller design for autonomous systems. However, verifying safety of such controllers, which are often hard-to-analyze neural networks, remains a challenge. Inspired by compositional strategies program verification, we propose framework and verification network controllers. Our approach is to decompose the task (e.g., car navigation) into sequence subtasks segments track), each corresponding different mode system go straight or...

10.1145/3477023 article EN ACM Transactions on Embedded Computing Systems 2021-09-22

This paper aims to improve the design of modern Medical Cyber Physical Systems through addition supplemental noninvasive monitors. Specifically, we focus on monitoring arterial blood oxygen content (CaO2), one most closely observed vital signs in operating rooms, currently measured by a proxy -- peripheral hemoglobin saturation (SpO2). While SpO2 is good estimate O2 finger where it measured, delayed measure its arteries. In addition, does not incorporate system dynamics and poor predictor...

10.1145/2735960.2735962 article EN 2015-04-14

The tight interaction between information technology and the physical world inherent in cyber-physical systems (CPS) can challenge traditional approaches for monitoring safety security. Data collected robust CPS is often sparse may lack rich training data describing critical events/attacks. Moreover, operate diverse environments that have significant inter/intra-system variability. Furthermore, monitors are not to sparsity variability result inconsistent performance be trusted Towards...

10.1109/jproc.2017.2723847 article EN Proceedings of the IEEE 2017-09-27

This work considers the problem of performing resilient sensor fusion using past measurements. In particular, we consider a system with n sensors measuring same physical variable where some might be attacked or faulty. We setup in which each provides controller set possible values for true value. Here, more precise provide smaller sets. Since lot modern multidimensional measurements (e.g. position three dimensions), sets considered this are polyhedra.

10.1145/2566468.2566475 article EN 2014-04-15

This work considers the problem of attack-resilient sensor fusion in an autonomous system where multiple sensors measure same physical variable. A malicious attacker may corrupt a subset these and send wrong measurements to controller on their behalf, potentially compromising safety system. We formalize goals constraints such who also wants avoid detection by argue that attacker's capabilities depend amount information she has about correct sensors' measurements. In presence shared bus...

10.5555/2616606.2616673 article EN Design, Automation, and Test in Europe 2014-03-24

This report presents the results of a friendly competition for formal verification continuous and hybrid systems with artificial intelligence (AI) components. Specifically, machine learning (ML) components in cyber-physical (CPS), such as feedforward neural networks used feedback controllers closed-loop are considered, which is class classically known intelligent control systems, or more modern specific terms, network (NNCS). We broadly refer to this category AI NNCS (AINNCS). The took place...

10.29007/kfk9 article EN EPiC series in computing 2021-12-06

This paper considers the problem of incorporating context in medical cyber-physical systems (MCPS) applications for purpose improving performance MCPS detectors. In particular, many additional data could be used to conclude that actual measurements might noisy or wrong (e.g., machine settings indicate is improperly attached patient); we call such context. The first contribution this work formal definition context, namely information whose presence associated with a change measurement model...

10.1109/iccps.2018.00030 article EN 2018-04-01

As devices in the Internet of Things (IoT) increase number and integrate with everyday lives, large amounts personal information will be generated. With multiple discovered vulnerabilities current IoT networks, a malicious attacker might able to get access misuse this data. Thus, logger that stores securely would make it possible perform forensic analysis case such attacks target valuable In paper, we propose LogSafe, scalable, fault-tolerant leverages use Intel Software Guard Extensions...

10.1109/iotdi.2018.00023 article EN 2018-04-01

In this tutorial, we present a design methodology for medical parameter-invariant monitors. We begin by providing motivational review of currently employed alarm techniques, followed the introduction approach. Finally, case study example to demonstrate critical shunt detection in infants during surgical procedures.

10.1109/mdat.2015.2451083 article EN IEEE Design and Test 2015-07-21

This paper presents the context-aware filter, an estimation technique that incorporates context measurements, in addition to regular continuous measurements. Context measurements provide binary information about system's which is not directly encoded state; examples include a robot detecting nearby building using image processing or medical device alarming vital sign has exceeded predefined threshold. These can only be received from certain states and therefore modeled as function of current...

10.1109/allerton.2015.7447058 article EN 2015-09-01

Autonomous systems operating in uncertain environments under the effects of disturbances and noises can reach unsafe states even while using finetuned controllers precise sensors actuators. To provide safety guarantees on such during motion planning operations, reachability analysis (RA) has been demonstrated to be a powerful tool. RA, however, suffers from computational complexity, especially when dealing with intricate characterized by high-order dynamics, making it hard deploy for runtime...

10.1109/mra.2020.2981114 article EN publisher-specific-oa IEEE Robotics & Automation Magazine 2020-04-15

This article is concerned with the security of modern Cyber-Physical Systems in presence transient sensor faults. We consider a system multiple sensors measuring same physical variable, where each provides an interval all possible values true state. note that some might output faulty readings and others may be controlled by malicious attacker. Differing from previous works, this article, we aim to distinguish between faults attacks develop attack detection algorithm for latter only. To do...

10.1145/3064809 article EN ACM Transactions on Cyber-Physical Systems 2017-05-09

We propose a simplified high-level programming language based on blocks and links dragged workspace which generates the skeleton code for robotic applications involving different types of robots. In order to develop such that still can guarantee flexibility in term implementation, our approach takes advantage robot operating system (ROS). ROS is open source meta-operating provides message passing structure between processes (or nodes) across network (inter-process communication). framework,...

10.1109/iccps.2014.6843727 article EN 2014-04-01

This paper considers the problem of sensor attack detection for multiple operating mode systems, building upon an existing method that uses a transient fault model with fixed parameters. For system, would have to use most conservative parameters preserve soundness in detection, thus not being effective some modes. To address this problem, we propose adaptive appropriate parameter values accordance change system. The benefit our proposed system is demonstrated using real measurement data...

10.1109/cpsna.2016.21 article EN 2016-10-01

This report presents the results of a friendly competition for formal verification continuous and hybrid systems with artificial intelligence (AI) components. Specifically, machine learning (ML) components in cyber-physical (CPS), such as feedforward neural networks used feedback controllers closed-loop are considered, which is class classically known intelligent control systems, or more modern specific terms, network (NNCS). For future iterations, we broadly refer to this category AI NNCS...

10.29007/rgv8 article EN EPiC series in computing 2019-06-05

This paper describes a verification case study on an autonomous racing car with neural network (NN) controller. Although several approaches have been proposed over the last year, they only evaluated low-dimensional systems or constrained environments. To explore limits of existing approaches, we present challenging benchmark in which NN takes raw LiDAR measurements as input and outputs steering for car. We train dozen NNs using two reinforcement learning algorithms show that state art can...

10.48550/arxiv.1910.11309 preprint EN other-oa arXiv (Cornell University) 2019-01-01
Coming Soon ...