Safety Verification of Networked Control Systems by Complex Zonotopes
SA Adimoolam, T Dang… - Leibniz Transactions on …, 2021 - hal.archives-ouvertes.fr
… Therefore, we extend zonotopes to the complex valued … of our complex zonotope with
a real 78 zonotope containing … zonotope is successful in verification, the real 81 zonotope …
a real 78 zonotope containing … zonotope is successful in verification, the real 81 zonotope …
Zonotope parameter identification for piecewise affine systems
W Jianhong - Journal of Systems Engineering and Electronics, 2020 - ieeexplore.ieee.org
… In this zonotope parameter identification … zonotope not growing unbounded with iterations
is formulated as an explicit linear matrix inequality. Finally, the effectiveness of this zonotope …
is formulated as an explicit linear matrix inequality. Finally, the effectiveness of this zonotope …
Set-membership State and Parameter Estimation for Discrete Time-varying Systems Based on the Constrained Zonotope
Z Pan, X Luan, F Liu - International Journal of Control, 2022 - Taylor & Francis
… zonotope that can describe any convex polytope, it inherits the advantages of zonotope and
is more accurate than zonotope… the definition of the constrained zonotope. After that, Section …
is more accurate than zonotope… the definition of the constrained zonotope. After that, Section …
Safety Verification of Neural Feedback Systems Based on Constrained Zonotopes
Artificial neural networks (ANNs) have been utilized in many feedback control systems and
introduced new challenges regarding the safety of the system. This paper considers the …
introduced new challenges regarding the safety of the system. This paper considers the …
Optimal Finite-time Watermark Signal Design for Replay Attack Detection using Zonotopes
C Trapiello, V Puig - IFAC-PapersOnLine, 2022 - Elsevier
This paper analyzes the injection of finite sequences as a physical watermarking method for
the detection of sensor replay attacks under an unknown but zonotopically bounded …
the detection of sensor replay attacks under an unknown but zonotopically bounded …
[HTML][HTML] Practical volume estimation of zonotopes by a new annealing schedule for cooling convex bodies
We study the problem of estimating the volume of convex polytopes, focusing on zonotopes.
Although a lot of effort is devoted to practical algorithms for polytopes given as an …
Although a lot of effort is devoted to practical algorithms for polytopes given as an …
Random zonotopes and valuations
R Schneider - arXiv preprint arXiv:2202.06774, 2022 - arxiv.org
… We define a random zonotope in Rd, by adding finitely many random segments, which are
… We also prove a central limit theorem for a valuation evaluated at these random zonotopes. …
… We also prove a central limit theorem for a valuation evaluated at these random zonotopes. …
Zonotope-Based Asynchronous Fault Detection for Markov Jump Systems Subject to Deception Attacks via Dynamic Event-Triggered Communication
J Yu, M Liu, JJ Rodriguez-Andina - IEEE Open Journal of the …, 2022 - ieeexplore.ieee.org
By Markov jump systems (MJSs) modeling, this article investigates event-triggered asynchronous
fault detection (FD) for quarter-car suspension system (QCSS) via zonotopic residual …
fault detection (FD) for quarter-car suspension system (QCSS) via zonotopic residual …
Inscribable Fans II: Inscribed zonotopes, simplicial arrangements, and reflection groups
S Manecke, R Sanyal - arXiv preprint arXiv:2203.11062, 2022 - arxiv.org
… Zonotopes are distinguished among belt polytopes by many favorable geometric and
combinatorial properties. We show that inscribed zonotopes also stand out among inscribed …
combinatorial properties. We show that inscribed zonotopes also stand out among inscribed …
Logical Zonotope: A Set Representation for Binary Vectors
… zonotopes play for formally verifying dynamical systems defined over real vector spaces,
logical zonotopes … To showcase the utility of logical zonotopes, we illustrate three use cases: (1) …
logical zonotopes … To showcase the utility of logical zonotopes, we illustrate three use cases: (1) …