Skip to main content

Showing 1–40 of 40 results for author: Miao, F

  1. arXiv:2410.03997  [pdf, other

    cs.MA

    YOLO-MARL: You Only LLM Once for Multi-agent Reinforcement Learning

    Authors: Yuan Zhuang, Yi Shen, Zhili Zhang, Yuxiao Chen, Fei Miao

    Abstract: Advancements in deep multi-agent reinforcement learning (MARL) have positioned it as a promising approach for decision-making in cooperative games. However, it still remains challenging for MARL agents to learn cooperative strategies for some game environments. Recently, large language models (LLMs) have demonstrated emergent reasoning capabilities, making them promising candidates for enhancing c… ▽ More

    Submitted 4 October, 2024; originally announced October 2024.

  2. arXiv:2406.18069  [pdf, other

    eess.SP cs.AI cs.CL

    Large Language Models for Cuffless Blood Pressure Measurement From Wearable Biosignals

    Authors: Zengding Liu, Chen Chen, Jiannong Cao, Minglei Pan, Jikui Liu, Nan Li, Fen Miao, Ye Li

    Abstract: Large language models (LLMs) have captured significant interest from both academia and industry due to their impressive performance across various textual tasks. However, the potential of LLMs to analyze physiological time-series data remains an emerging research field. Particularly, there is a notable gap in the utilization of LLMs for analyzing wearable biosignals to achieve cuffless blood press… ▽ More

    Submitted 4 July, 2024; v1 submitted 26 June, 2024; originally announced June 2024.

  3. arXiv:2406.12100  [pdf, other

    cs.LG cs.RO

    CUQDS: Conformal Uncertainty Quantification under Distribution Shift for Trajectory Prediction

    Authors: Huiqun Huang, Sihong He, Fei Miao

    Abstract: Trajectory prediction models that can infer both finite future trajectories and their associated uncertainties of the target vehicles in an online setting (e.g., real-world application scenarios) is crucial for ensuring the safe and robust navigation and path planning of autonomous vehicle motion. However, the majority of existing trajectory prediction models have neither considered reducing the u… ▽ More

    Submitted 20 September, 2024; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: 9 pages, 2 figures

  4. arXiv:2406.11021  [pdf, other

    cs.CV

    $α$-OCC: Uncertainty-Aware Camera-based 3D Semantic Occupancy Prediction

    Authors: Sanbao Su, Nuo Chen, Felix Juefei-Xu, Chen Feng, Fei Miao

    Abstract: In the realm of autonomous vehicle (AV) perception, comprehending 3D scenes is paramount for tasks such as planning and mapping. Camera-based 3D Semantic Occupancy Prediction (OCC) aims to infer scene geometry and semantics from limited observations. While it has gained popularity due to affordability and rich visual cues, existing methods often neglect the inherent uncertainty in models. To addre… ▽ More

    Submitted 4 October, 2024; v1 submitted 16 June, 2024; originally announced June 2024.

  5. arXiv:2406.03711  [pdf, other

    physics.flu-dyn cs.AI

    Pi-fusion: Physics-informed diffusion model for learning fluid dynamics

    Authors: Jing Qiu, Jiancheng Huang, Xiangdong Zhang, Zeng Lin, Minglei Pan, Zengding Liu, Fen Miao

    Abstract: Physics-informed deep learning has been developed as a novel paradigm for learning physical dynamics recently. While general physics-informed deep learning methods have shown early promise in learning fluid dynamics, they are difficult to generalize in arbitrary time instants in real-world scenario, where the fluid motion can be considered as a time-variant trajectory involved large-scale particle… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  6. arXiv:2405.19499  [pdf, other

    cs.LG cs.MA math.OC

    Momentum for the Win: Collaborative Federated Reinforcement Learning across Heterogeneous Environments

    Authors: Han Wang, Sihong He, Zhili Zhang, Fei Miao, James Anderson

    Abstract: We explore a Federated Reinforcement Learning (FRL) problem where $N$ agents collaboratively learn a common policy without sharing their trajectory data. To date, existing FRL work has primarily focused on agents operating in the same or ``similar" environments. In contrast, our problem setup allows for arbitrarily large levels of environment heterogeneity. To obtain the optimal policy which maxim… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Journal ref: Proceedings of the 41st International Conference on Machine Learning, 2024 Learning

  7. arXiv:2405.01327  [pdf, other

    cs.LG

    Constrained Reinforcement Learning Under Model Mismatch

    Authors: Zhongchang Sun, Sihong He, Fei Miao, Shaofeng Zou

    Abstract: Existing studies on constrained reinforcement learning (RL) may obtain a well-performing policy in the training environment. However, when deployed in a real environment, it may easily violate constraints that were originally satisfied during training because there might be model mismatch between the training and real environments. To address the above challenge, we formulate the problem as constr… ▽ More

    Submitted 3 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

    Comments: ICML 2024

  8. arXiv:2310.00288  [pdf

    cs.AR cs.ET eess.SY physics.app-ph

    Parallel in-memory wireless computing

    Authors: Cong Wang, Gong-Jie Ruan, Zai-Zheng Yang, Xing-Jian Yangdong, Yixiang Li, Liang Wu, Yingmeng Ge, Yichen Zhao, Chen Pan, Wei Wei, Li-Bo Wang, Bin Cheng, Zaichen Zhang, Chuan Zhang, Shi-Jun Liang, Feng Miao

    Abstract: Parallel wireless digital communication with ultralow power consumption is critical for emerging edge technologies such as 5G and Internet of Things. However, the physical separation between digital computing units and analogue transmission units in traditional wireless technology leads to high power consumption. Here we report a parallel in-memory wireless computing scheme. The approach combines… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

    Journal ref: Nat Electron 6, 381-389 (2023)

  9. arXiv:2309.16716  [pdf, other

    cs.RO cs.AI

    Towards Safe Autonomy in Hybrid Traffic: Detecting Unpredictable Abnormal Behaviors of Human Drivers via Information Sharing

    Authors: Jiangwei Wang, Lili Su, Songyang Han, Dongjin Song, Fei Miao

    Abstract: Hybrid traffic which involves both autonomous and human-driven vehicles would be the norm of the autonomous vehicles practice for a while. On the one hand, unlike autonomous vehicles, human-driven vehicles could exhibit sudden abnormal behaviors such as unpredictably switching to dangerous driving modes, putting its neighboring vehicles under risks; such undesired mode switching could arise from n… ▽ More

    Submitted 23 August, 2023; originally announced September 2023.

    Comments: accepted to ACM Transactions on Cyber-Physical Systems

  10. arXiv:2309.11057  [pdf, other

    cs.RO cs.MA

    Safety Guaranteed Robust Multi-Agent Reinforcement Learning with Hierarchical Control for Connected and Automated Vehicles

    Authors: Zhili Zhang, H M Sabbir Ahmad, Ehsan Sabouni, Yanchao Sun, Furong Huang, Wenchao Li, Fei Miao

    Abstract: We address the problem of coordination and control of Connected and Automated Vehicles (CAVs) in the presence of imperfect observations in mixed traffic environment. A commonly used approach is learning-based decision-making, such as reinforcement learning (RL). However, most existing safe RL methods suffer from two limitations: (i) they assume accurate state information, and (ii) safety is genera… ▽ More

    Submitted 23 September, 2024; v1 submitted 20 September, 2023; originally announced September 2023.

    Comments: 6 pages, 6 figures

  11. arXiv:2307.16228  [pdf, other

    cs.MA cs.AI cs.LG eess.SY

    Robust Electric Vehicle Balancing of Autonomous Mobility-On-Demand System: A Multi-Agent Reinforcement Learning Approach

    Authors: Sihong He, Shuo Han, Fei Miao

    Abstract: Electric autonomous vehicles (EAVs) are getting attention in future autonomous mobility-on-demand (AMoD) systems due to their economic and societal benefits. However, EAVs' unique charging patterns (long charging time, high charging frequency, unpredictable charging behaviors, etc.) make it challenging to accurately predict the EAVs supply in E-AMoD systems. Furthermore, the mobility demand's pred… ▽ More

    Submitted 30 July, 2023; originally announced July 2023.

    Comments: accepted to International Conference on Intelligent Robots and Systems (IROS2023)

  12. arXiv:2307.16212  [pdf, other

    cs.LG cs.AI cs.GT cs.MA eess.SY

    Robust Multi-Agent Reinforcement Learning with State Uncertainty

    Authors: Sihong He, Songyang Han, Sanbao Su, Shuo Han, Shaofeng Zou, Fei Miao

    Abstract: In real-world multi-agent reinforcement learning (MARL) applications, agents may not have perfect state information (e.g., due to inaccurate measurement or malicious attacks), which challenges the robustness of agents' policies. Though robustness is getting important in MARL deployment, little prior work has studied state uncertainties in MARL, neither in problem formulation nor algorithm design.… ▽ More

    Submitted 30 July, 2023; originally announced July 2023.

    Comments: 50 pages, Published in TMLR, Transactions on Machine Learning Research (06/2023)

  13. arXiv:2306.06808  [pdf, other

    cs.AI

    Multi-Agent Reinforcement Learning Guided by Signal Temporal Logic Specifications

    Authors: Jiangwei Wang, Shuo Yang, Ziyan An, Songyang Han, Zhili Zhang, Rahul Mangharam, Meiyi Ma, Fei Miao

    Abstract: Reward design is a key component of deep reinforcement learning, yet some tasks and designer's objectives may be unnatural to define as a scalar cost function. Among the various techniques, formal methods integrated with DRL have garnered considerable attention due to their expressiveness and flexibility to define the reward and requirements for different states and actions of the agent. However,… ▽ More

    Submitted 22 October, 2023; v1 submitted 11 June, 2023; originally announced June 2023.

  14. arXiv:2304.04120  [pdf, other

    cs.NE cs.AI

    Surrogate Lagrangian Relaxation: A Path To Retrain-free Deep Neural Network Pruning

    Authors: Shanglin Zhou, Mikhail A. Bragin, Lynn Pepin, Deniz Gurevin, Fei Miao, Caiwen Ding

    Abstract: Network pruning is a widely used technique to reduce computation cost and model size for deep neural networks. However, the typical three-stage pipeline significantly increases the overall training time. In this paper, we develop a systematic weight-pruning optimization approach based on Surrogate Lagrangian relaxation, which is tailored to overcome difficulties caused by the discrete nature of th… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: text overlap with arXiv:2012.10079

    ACM Class: I.2

  15. arXiv:2303.14346  [pdf, other

    cs.CV

    Collaborative Multi-Object Tracking with Conformal Uncertainty Propagation

    Authors: Sanbao Su, Songyang Han, Yiming Li, Zhili Zhang, Chen Feng, Caiwen Ding, Fei Miao

    Abstract: Object detection and multiple object tracking (MOT) are essential components of self-driving systems. Accurate detection and uncertainty quantification are both critical for onboard modules, such as perception, prediction, and planning, to improve the safety and robustness of autonomous vehicles. Collaborative object detection (COD) has been proposed to improve detection accuracy and reduce uncert… ▽ More

    Submitted 31 January, 2024; v1 submitted 24 March, 2023; originally announced March 2023.

    Comments: This paper has been accepted by IEEE Robotics and Automation Letters

  16. arXiv:2303.04340  [pdf, other

    cs.LG cs.CV cs.DC cs.RO

    Privacy-preserving and Uncertainty-aware Federated Trajectory Prediction for Connected Autonomous Vehicles

    Authors: Muzi Peng, Jiangwei Wang, Dongjin Song, Fei Miao, Lili Su

    Abstract: Deep learning is the method of choice for trajectory prediction for autonomous vehicles. Unfortunately, its data-hungry nature implicitly requires the availability of sufficiently rich and high-quality centralized datasets, which easily leads to privacy leakage. Besides, uncertainty-awareness becomes increasingly important for safety-crucial cyber physical systems whose prediction module heavily r… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

  17. arXiv:2302.04321  [pdf, other

    cs.RO cs.AI

    Shared Information-Based Safe And Efficient Behavior Planning For Connected Autonomous Vehicles

    Authors: Songyang Han, Shanglin Zhou, Lynn Pepin, Jiangwei Wang, Caiwen Ding, Fei Miao

    Abstract: The recent advancements in wireless technology enable connected autonomous vehicles (CAVs) to gather data via vehicle-to-vehicle (V2V) communication, such as processed LIDAR and camera data from other vehicles. In this work, we design an integrated information sharing and safe multi-agent reinforcement learning (MARL) framework for CAVs, to take advantage of the extra information when making decis… ▽ More

    Submitted 15 February, 2023; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: This paper gets the Best Paper Award in the DCAA workshop of AAAI 2023

  18. arXiv:2212.02705  [pdf, other

    cs.AI cs.GT cs.MA

    What is the Solution for State-Adversarial Multi-Agent Reinforcement Learning?

    Authors: Songyang Han, Sanbao Su, Sihong He, Shuo Han, Haizhao Yang, Shaofeng Zou, Fei Miao

    Abstract: Various methods for Multi-Agent Reinforcement Learning (MARL) have been developed with the assumption that agents' policies are based on accurate state information. However, policies learned through Deep Reinforcement Learning (DRL) are susceptible to adversarial state perturbation attacks. In this work, we propose a State-Adversarial Markov Game (SAMG) and make the first attempt to investigate di… ▽ More

    Submitted 12 April, 2024; v1 submitted 5 December, 2022; originally announced December 2022.

    Comments: Accepted by Transactions on Machine Learning Research (TMLR)

  19. arXiv:2211.13797  [pdf, other

    math.OC cs.RO eess.SY

    Data-Driven Distributionally Robust Electric Vehicle Balancing for Autonomous Mobility-on-Demand Systems under Demand and Supply Uncertainties

    Authors: Sihong He, Zhili Zhang, Shuo Han, Lynn Pepin, Guang Wang, Desheng Zhang, John Stankovic, Fei Miao

    Abstract: Electric vehicles (EVs) are being rapidly adopted due to their economic and societal benefits. Autonomous mobility-on-demand (AMoD) systems also embrace this trend. However, the long charging time and high recharging frequency of EVs pose challenges to efficiently managing EV AMoD systems. The complicated dynamic charging and mobility process of EV AMoD systems makes the demand and supply uncertai… ▽ More

    Submitted 24 November, 2022; originally announced November 2022.

    Comments: 16 pages

  20. arXiv:2210.10887  [pdf, other

    math.OC cs.RO stat.AP

    Data-Driven Distributionally Robust Electric Vehicle Balancing for Mobility-on-Demand Systems under Demand and Supply Uncertainties

    Authors: Sihong He, Lynn Pepin, Guang Wang, Desheng Zhang, Fei Miao

    Abstract: As electric vehicle (EV) technologies become mature, EV has been rapidly adopted in modern transportation systems, and is expected to provide future autonomous mobility-on-demand (AMoD) service with economic and societal benefits. However, EVs require frequent recharges due to their limited and unpredictable cruising ranges, and they have to be managed efficiently given the dynamic charging proces… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: This paper has been published in IROS2020

  21. arXiv:2210.02300  [pdf, other

    cs.RO cs.AI cs.MA

    Spatial-Temporal-Aware Safe Multi-Agent Reinforcement Learning of Connected Autonomous Vehicles in Challenging Scenarios

    Authors: Zhili Zhang, Songyang Han, Jiangwei Wang, Fei Miao

    Abstract: Communication technologies enable coordination among connected and autonomous vehicles (CAVs). However, it remains unclear how to utilize shared information to improve the safety and efficiency of the CAV system in dynamic and complicated driving scenarios. In this work, we propose a framework of constrained multi-agent reinforcement learning (MARL) with a parallel Safety Shield for CAVs in challe… ▽ More

    Submitted 13 March, 2023; v1 submitted 5 October, 2022; originally announced October 2022.

    Comments: This paper has been accepted by the 2023 IEEE International Conference on Robotics and Automation (ICRA 2023). 6 pages, 5 figures

  22. arXiv:2209.08230  [pdf, other

    cs.MA cs.LG cs.RO eess.SY

    A Robust and Constrained Multi-Agent Reinforcement Learning Electric Vehicle Rebalancing Method in AMoD Systems

    Authors: Sihong He, Yue Wang, Shuo Han, Shaofeng Zou, Fei Miao

    Abstract: Electric vehicles (EVs) play critical roles in autonomous mobility-on-demand (AMoD) systems, but their unique charging patterns increase the model uncertainties in AMoD systems (e.g. state transition probability). Since there usually exists a mismatch between the training and test/true environments, incorporating model uncertainty into system design is of critical importance in real-world applicat… ▽ More

    Submitted 27 September, 2023; v1 submitted 16 September, 2022; originally announced September 2022.

    Comments: 8 pages, accepted to IROS2023

  23. arXiv:2209.08162  [pdf, other

    cs.CV

    Uncertainty Quantification of Collaborative Detection for Self-Driving

    Authors: Sanbao Su, Yiming Li, Sihong He, Songyang Han, Chen Feng, Caiwen Ding, Fei Miao

    Abstract: Sharing information between connected and autonomous vehicles (CAVs) fundamentally improves the performance of collaborative object detection for self-driving. However, CAVs still have uncertainties on object detection due to practical challenges, which will affect the later modules in self-driving such as planning and control. Hence, uncertainty quantification is crucial for safety-critical syste… ▽ More

    Submitted 16 March, 2023; v1 submitted 16 September, 2022; originally announced September 2022.

    Comments: This paper has been accepted by the 2023 IEEE International Conference on Robotics and Automation (ICRA 2023)

  24. arXiv:2209.06866  [pdf, other

    cs.LG

    Robust Constrained Reinforcement Learning

    Authors: Yue Wang, Fei Miao, Shaofeng Zou

    Abstract: Constrained reinforcement learning is to maximize the expected reward subject to constraints on utilities/costs. However, the training environment may not be the same as the test one, due to, e.g., modeling error, adversarial attack, non-stationarity, resulting in severe performance degradation and more importantly constraint violation. We propose a framework of robust constrained reinforcement le… ▽ More

    Submitted 14 September, 2022; originally announced September 2022.

  25. arXiv:2208.12960  [pdf, other

    cs.CR

    An Automated Analyzer for Financial Security of Ethereum Smart Contracts

    Authors: Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji

    Abstract: At present, millions of Ethereum smart contracts are created per year and attract financially motivated attackers. However, existing analyzers do not meet the need to precisely analyze the financial security of large numbers of contracts. In this paper, we propose and implement FASVERIF, an automated analyzer for fine-grained analysis of smart contracts' financial security. On the one hand, FASVER… ▽ More

    Submitted 23 March, 2023; v1 submitted 27 August, 2022; originally announced August 2022.

    Journal ref: In 32nd USENIX Security Symposium (USENIX Security 2023) (pp. 3367-3383)

  26. arXiv:2203.10158  [pdf, other

    cs.CR

    Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid

    Authors: Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao

    Abstract: Traditional botnet attacks leverage large and distributed numbers of compromised internet-connected devices to target and overwhelm other devices with internet packets. With increasing consumer adoption of high-wattage internet-facing "smart devices", a new "power botnet" attack emerges, where such devices are used to target and overwhelm power grid devices with unusual load demand. We introduce a… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

    Comments: 18 pages, 10 figures

  27. arXiv:2203.06333  [pdf, other

    cs.GT

    Stable and Efficient Shapley Value-Based Reward Reallocation for Multi-Agent Reinforcement Learning of Autonomous Vehicles

    Authors: Songyang Han, He Wang, Sanbao Su, Yuanyuan Shi, Fei Miao

    Abstract: With the development of sensing and communication technologies in networked cyber-physical systems (CPSs), multi-agent reinforcement learning (MARL)-based methodologies are integrated into the control process of physical systems and demonstrate prominent performance in a wide array of CPS domains, such as connected autonomous vehicles (CAVs). However, it remains challenging to mathematically chara… ▽ More

    Submitted 14 June, 2022; v1 submitted 11 March, 2022; originally announced March 2022.

    Comments: This paper has been accepted by the 2022 IEEE International Conference on Robotics and Automation (ICRA 2022)

  28. arXiv:2201.11934  [pdf, other

    cs.CR cs.CL cs.LG

    A Secure and Efficient Federated Learning Framework for NLP

    Authors: Jieren Deng, Chenghong Wang, Xianrui Meng, Yijue Wang, Ji Li, Sheng Lin, Shuo Han, Fei Miao, Sanguthevar Rajasekaran, Caiwen Ding

    Abstract: In this work, we consider the problem of designing secure and efficient federated learning (FL) frameworks. Existing solutions either involve a trusted aggregator or require heavyweight cryptographic primitives, which degrades performance significantly. Moreover, many existing secure FL designs work only under the restrictive assumption that none of the clients can be dropped out from the training… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

    Comments: Accepted by EMNLP 2021

  29. arXiv:2108.04674  [pdf, other

    cs.CL

    Natural Language Processing with Commonsense Knowledge: A Survey

    Authors: Yubo Xie, Zonghui Liu, Zongyang Ma, Fanyuan Meng, Yan Xiao, Fahui Miao, Pearl Pu

    Abstract: Commonsense knowledge is essential for advancing natural language processing (NLP) by enabling models to engage in human-like reasoning, which requires a deeper understanding of context and often involves making inferences based on implicit external knowledge. This paper explores the integration of commonsense knowledge into various NLP tasks. We begin by reviewing prominent commonsense knowledge… ▽ More

    Submitted 13 September, 2024; v1 submitted 10 August, 2021; originally announced August 2021.

    Comments: 20 pages, 3 figures, 1 table

  30. arXiv:2105.05956  [pdf

    cs.ET cond-mat.dis-nn cond-mat.mtrl-sci

    2022 Roadmap on Neuromorphic Computing and Engineering

    Authors: Dennis V. Christensen, Regina Dittmann, Bernabé Linares-Barranco, Abu Sebastian, Manuel Le Gallo, Andrea Redaelli, Stefan Slesazeck, Thomas Mikolajick, Sabina Spiga, Stephan Menzel, Ilia Valov, Gianluca Milano, Carlo Ricciardi, Shi-Jun Liang, Feng Miao, Mario Lanza, Tyler J. Quill, Scott T. Keene, Alberto Salleo, Julie Grollier, Danijela Marković, Alice Mizrahi, Peng Yao, J. Joshua Yang, Giacomo Indiveri , et al. (34 additional authors not shown)

    Abstract: Modern computation based on the von Neumann architecture is today a mature cutting-edge science. In the Von Neumann architecture, processing and memory units are implemented as separate blocks interchanging data intensively and continuously. This data transfer is responsible for a large part of the power consumption. The next generation computer technology is expected to solve problems at the exas… ▽ More

    Submitted 13 January, 2022; v1 submitted 12 May, 2021; originally announced May 2021.

    Journal ref: Neuromorph. Comput. Eng. 2 022501 (2022)

  31. arXiv:2012.10079  [pdf, other

    cs.LG cs.CV

    Enabling Retrain-free Deep Neural Network Pruning using Surrogate Lagrangian Relaxation

    Authors: Deniz Gurevin, Shanglin Zhou, Lynn Pepin, Bingbing Li, Mikhail Bragin, Caiwen Ding, Fei Miao

    Abstract: Network pruning is a widely used technique to reduce computation cost and model size for deep neural networks. However, the typical three-stage pipeline, i.e., training, pruning and retraining (fine-tuning) significantly increases the overall training trails. In this paper, we develop a systematic weight-pruning optimization approach based on Surrogate Lagrangian relaxation (SLR), which is tailore… ▽ More

    Submitted 25 March, 2021; v1 submitted 18 December, 2020; originally announced December 2020.

  32. arXiv:2003.04371  [pdf, other

    cs.AI cs.LG eess.SY

    A Multi-Agent Reinforcement Learning Approach For Safe and Efficient Behavior Planning Of Connected Autonomous Vehicles

    Authors: Songyang Han, Shanglin Zhou, Jiangwei Wang, Lynn Pepin, Caiwen Ding, Jie Fu, Fei Miao

    Abstract: The recent advancements in wireless technology enable connected autonomous vehicles (CAVs) to gather information about their environment by vehicle-to-vehicle (V2V) communication. In this work, we design an information-sharing-based multi-agent reinforcement learning (MARL) framework for CAVs, to take advantage of the extra information when making decisions to improve traffic efficiency and safety… ▽ More

    Submitted 3 September, 2022; v1 submitted 9 March, 2020; originally announced March 2020.

    Comments: This paper is submitted to IEEE Transactions on Intelligent Transportation Systems

  33. arXiv:1908.02110  [pdf, other

    cs.CR

    Threshold Changeable Secret Sharing Scheme and Its Application to Group Authentication

    Authors: Fuyou Miao, Yue Yu, Keju Meng, Wenchao Huang, Yan Xiong

    Abstract: Group oriented applications are getting more and more popular in mobile Internet and call for secure and efficient secret sharing (SS) scheme to meet their requirements. A $(t,n)$ threshold SS scheme divides a secret into $n$ shares such that any $t$ or more than $t$ shares can recover the secret while less than $t$ shares cannot. However, an adversary, even without a valid share, may obtain the s… ▽ More

    Submitted 10 April, 2021; v1 submitted 6 August, 2019; originally announced August 2019.

  34. Realize General Access Structure Based On Single Share

    Authors: Yang Xie, Sijjad Ali Khuhro, Fuyou Miao, Keju Meng

    Abstract: Traditional threshold secret sharing cannot realizing all access structures of secret sharing. So, Ito introduced the concept of Secret sharing scheme realizing general access structure. But Its scheme has to send multiple shares to each trustee. In this paper, we proposed two new secret sharing schemes realizing general access structures by only assigning one share to each trustee. Our proposed s… ▽ More

    Submitted 7 September, 2022; v1 submitted 6 May, 2019; originally announced May 2019.

    Comments: updated version

  35. arXiv:1809.07036  [pdf, other

    cs.SE

    AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs

    Authors: Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Jianmeng Huang

    Abstract: Android users are now suffering severe threats from unwanted behaviors of various apps. The analysis of apps' audit logs is one of the essential methods for some device manufacturers to unveil the underlying malice within apps. We propose and implement AppAngio, a novel system that reveals contextual information in Android app behaviors by API-level audit logs. Our goal is to help analysts of devi… ▽ More

    Submitted 28 November, 2020; v1 submitted 19 September, 2018; originally announced September 2018.

    Comments: Accepted by TIFS

  36. arXiv:1807.00669  [pdf, other

    cs.CR cs.LO cs.SE

    Verifying Security Protocols using Dynamic Strategies

    Authors: Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang

    Abstract: Current formal approaches have been successfully used to find design flaws in many security protocols. However, it is still challenging to automatically analyze protocols due to their large or infinite state spaces. In this paper, we propose a novel framework that can automatically verifying security protocols without any human intervention. Experimental results show that SmartVerif automatically… ▽ More

    Submitted 25 August, 2019; v1 submitted 26 June, 2018; originally announced July 2018.

    Comments: arXiv admin note: text overlap with arXiv:1403.1142, arXiv:1703.00426 by other authors

  37. arXiv:1710.00288  [pdf, other

    cs.GT

    A Moving-Horizon Hybrid Stochastic Game for Secure Control of Cyber-Physical Systems

    Authors: Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas

    Abstract: In this paper, we establish a zero-sum, hybrid state stochastic game model for designing defense policies for cyber-physical systems against different types of attacks. With the increasingly integrated properties of cyber-physical systems (CPS) today, security is a challenge for critical infrastructures. Though resilient control and detecting techniques for a specific model of attack have been pro… ▽ More

    Submitted 30 September, 2017; originally announced October 2017.

    Comments: Provionally accepted as a regular paper, Automatica, 11 pages

  38. arXiv:1705.04524  [pdf, other

    cs.LG cs.AI math.DS stat.ML

    Long-term Blood Pressure Prediction with Deep Recurrent Neural Networks

    Authors: Peng Su, Xiao-Rong Ding, Yuan-Ting Zhang, Jing Liu, Fen Miao, Ni Zhao

    Abstract: Existing methods for arterial blood pressure (BP) estimation directly map the input physiological signals to output BP values without explicitly modeling the underlying temporal dependencies in BP dynamics. As a result, these models suffer from accuracy decay over a long time and thus require frequent calibration. In this work, we address this issue by formulating BP estimation as a sequence predi… ▽ More

    Submitted 14 January, 2018; v1 submitted 12 May, 2017; originally announced May 2017.

    Comments: To appear in IEEE BHI 2018

  39. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks

    Authors: Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas

    Abstract: This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors and actuators that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while… ▽ More

    Submitted 29 May, 2016; originally announced May 2016.

    Comments: 12 pages, accepted, IEEE Transactions on Control of Network Systems

  40. arXiv:1307.2977  [pdf, ps, other

    cs.CR

    A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET

    Authors: Qiwei Lu, Wenchao Huang, Xudong Gong, Xingfu Wang, Yan Xiong, Fuyou Miao

    Abstract: With the rapid development of MANET, secure and practical authentication is becoming increasingly important. The existing works perform the research from two aspects, i.e., (a)secure key division and distributed storage, (b)secure distributed authentication. But there still exist several unsolved problems. Specifically, it may suffer from cheating problems and fault authentication attack, which ca… ▽ More

    Submitted 11 July, 2013; originally announced July 2013.

    Comments: under submission