A zonotopic characterization of cyber‐physical system vulnerabilities

J Li, Z Wang, Y Shen, L Xie - International Journal of Robust …, 2022 - Wiley Online Library
… the problem of CPS vulnerability analysis using zonotopes, which motivates our work. … if
the obtained zonotope is unbounded, a CPS is safe if the obtained zonotope is enclosed by a …

Input design for active dectection of integrity attacks using set-based approach

C Trapiello Fernández… - IFAC 2020-21th World …, 2020 - upcommons.upc.edu
… where c is the center of the zonotope and H = [h1, ..., hm] the generator matrix. Hereinafter
zonotopes … and Minkowski sum operations are also zonotopes computed as LZ = 〈Lcz, LHz〉 …

Reachability-based trajectory safeguard (rts): A safe and fast reinforcement learning safety layer for continuous control

YS Shao, C Chen, S Kousik… - IEEE Robotics and …, 2021 - ieeexplore.ieee.org
… the PRS with zonotopes using an open-source toolbox called CORA [25]. A zonotope is a
set … Third, since for any k, a plan has pplan(0,k)=0, we provide an initial condition zonotope Z …

[PDF][PDF] THE ROLE OF CONSTRAINTS IN FUTURE MOTION SYSTEMS

T Raste - aci-mobility.de
… We denote sets with bold letters and need three type of convex sets: intervals, polytopes and
zonotopes. The calculation of the sets is done with the Matlab toolbox CORA [3]. An interval …

[HTML][HTML] Vertical hierarchical MPC for constrained linear systems

J Koeln, V Raghuraman, B Hencey - Automatica, 2020 - Elsevier
… are closed under these operations (ie the Minkowski sum of two zonotopes is a zonotope)
and … Unfortunately, zonotopes in general are not closed under intersection and the conversion …

Set-Based Fault Detection and Isolation for Descriptor Systems

Y Wang - Advances in State Estimation, Diagnosis and Control of …, 2021 - Springer
… of the zonotope only affected by faults and \( p_{f}(0) = 0 \) at time step \( k=0\). We recursively
provide a zonotope that bounds the uncertain state \( x(k+1) \) in the following theorem. …

Zonotopic fault detection observer design for discrete‐time systems with adaptively adjusted event‐triggered mechanism

X Wang, Z Fei, Z Wang, J Yu - IET Control Theory & …, 2020 - Wiley Online Library
This study addresses the event‐triggered fault detection for a class of discrete‐time systems
with unknown but bounded external disturbance and measurement noise. In order to save …

Verification approaches for learning-enabled autonomous cyber-physical systems

HD Tran, W Xiang, TT Johnson - IEEE Design & Test, 2020 - ieeexplore.ieee.org
… In the framework of zonotopes, a verification engine for ReLU neural networks called AI2 …
abstracted as zonotopes, and reasoning about their behaviors use operations over zonotopes. …

Design of optimal interval observers using set‐theoretic methods for robust state estimation

F Xu, J Tan, T Raissi, B Liang - International Journal of Robust …, 2020 - Wiley Online Library
… It is known that the shape and size of a zonotope are determined by its generator matrix.19
We use the F-norm of the generator matrix of a zonotope to describe its size (see Definition 4)…

Time-Varying Tube-Based Output Feedback Robust MPC for T–S Fuzzy Systems

X Ping, J Yao, B Ding, P Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… The membership functions errors are bounded within convex sets via the properties of
zonotopes and interval matrices. An offline table stores a series of structures that include nested …