A zonotopic characterization of cyber‐physical system vulnerabilities
… the problem of CPS vulnerability analysis using zonotopes, which motivates our work. … if
the obtained zonotope is unbounded, a CPS is safe if the obtained zonotope is enclosed by a …
the obtained zonotope is unbounded, a CPS is safe if the obtained zonotope is enclosed by a …
Input design for active dectection of integrity attacks using set-based approach
C Trapiello Fernández… - IFAC 2020-21th World …, 2020 - upcommons.upc.edu
… where c is the center of the zonotope and H = [h1, ..., hm] the generator matrix. Hereinafter
zonotopes … and Minkowski sum operations are also zonotopes computed as LZ = 〈Lcz, LHz〉 …
zonotopes … and Minkowski sum operations are also zonotopes computed as LZ = 〈Lcz, LHz〉 …
Reachability-based trajectory safeguard (rts): A safe and fast reinforcement learning safety layer for continuous control
… the PRS with zonotopes using an open-source toolbox called CORA [25]. A zonotope is a
set … Third, since for any k, a plan has pplan(0,k)=0, we provide an initial condition zonotope Z …
set … Third, since for any k, a plan has pplan(0,k)=0, we provide an initial condition zonotope Z …
[PDF][PDF] THE ROLE OF CONSTRAINTS IN FUTURE MOTION SYSTEMS
T Raste - aci-mobility.de
… We denote sets with bold letters and need three type of convex sets: intervals, polytopes and
zonotopes. The calculation of the sets is done with the Matlab toolbox CORA [3]. An interval …
zonotopes. The calculation of the sets is done with the Matlab toolbox CORA [3]. An interval …
[HTML][HTML] Vertical hierarchical MPC for constrained linear systems
… are closed under these operations (ie the Minkowski sum of two zonotopes is a zonotope)
and … Unfortunately, zonotopes in general are not closed under intersection and the conversion …
and … Unfortunately, zonotopes in general are not closed under intersection and the conversion …
Set-Based Fault Detection and Isolation for Descriptor Systems
Y Wang - Advances in State Estimation, Diagnosis and Control of …, 2021 - Springer
… of the zonotope only affected by faults and \( p_{f}(0) = 0 \) at time step \( k=0\). We recursively
provide a zonotope that bounds the uncertain state \( x(k+1) \) in the following theorem. …
provide a zonotope that bounds the uncertain state \( x(k+1) \) in the following theorem. …
Zonotopic fault detection observer design for discrete‐time systems with adaptively adjusted event‐triggered mechanism
This study addresses the event‐triggered fault detection for a class of discrete‐time systems
with unknown but bounded external disturbance and measurement noise. In order to save …
with unknown but bounded external disturbance and measurement noise. In order to save …
Verification approaches for learning-enabled autonomous cyber-physical systems
… In the framework of zonotopes, a verification engine for ReLU neural networks called AI2 …
abstracted as zonotopes, and reasoning about their behaviors use operations over zonotopes. …
abstracted as zonotopes, and reasoning about their behaviors use operations over zonotopes. …
Design of optimal interval observers using set‐theoretic methods for robust state estimation
… It is known that the shape and size of a zonotope are determined by its generator matrix.19
We use the F-norm of the generator matrix of a zonotope to describe its size (see Definition 4)…
We use the F-norm of the generator matrix of a zonotope to describe its size (see Definition 4)…
Time-Varying Tube-Based Output Feedback Robust MPC for T–S Fuzzy Systems
X Ping, J Yao, B Ding, P Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… The membership functions errors are bounded within convex sets via the properties of
zonotopes and interval matrices. An offline table stores a series of structures that include nested …
zonotopes and interval matrices. An offline table stores a series of structures that include nested …