# convex programming

- telecommunication security
- Resiliency
- pubcrawl
- composability
- Metrics
- privacy
- quality of service
- physical-layer security
- antenna arrays
- array signal processing
- signal processing security
- wireless channels
- channel state information
- concave programming
- radio transmitters
- artificial noise
- artificial-noise-aided robust beamforming
- convex programming
- estimation errors
- formulated design problem
- linear matrix inequalities
- minimum allowable signal-to-interference
- MISOME wiretap channels
- multiantenna transmitter
- multiple multiantenna eavesdroppers
- power saving
- radio receivers
- RJOBF
- robust beamforming
- robust joint optimal
- secret signal
- security communication
- security QoS
- security quality
- single-antenna receiver
- SINR
- transmit power

- actual demand
- automated ridesharing services
- autonomous vehicles
- constant rebalancing vehicle supply
- convex programming
- DCA
- difference-of-convex algorithm
- direct control
- efficiency gain
- equivalent convex program
- human drivers
- Laplace equations
- local search method
- Measurement
- models on-demand dispatchable vehicles
- numerical tools
- passenger demand
- Pricing
- road traffic
- road vehicles
- search problems
- tools
- Transportation network
- vehicle flows
- 1536086

- AC power flow model
- Adversary Models
- Convex functions
- convex optimization problem
- convex programming
- Cyber-physical attack
- failure analysis
- Human behavior
- IEEE 118-bus systems
- IEEE 300-bus systems
- line failures detection problem
- load flow control
- Mathematical model
- Metrics
- Numerical models
- optimization
- phase angle measurements
- Phase measurement
- power grid state estimation
- power grids
- power system state estimation
- power transmission control
- pubcrawl
- resilience
- Resiliency
- Scalability
- state estimation

- adversarial component
- adversarial data
- adversarial environment
- adversarial learning research
- adversarial learning setting
- Adversarial Machine Learning
- Adversary Models
- convex programming
- data analysis
- Data mining
- data mining algorithms
- data set testing
- data testing
- domain adaptation
- domain adaption
- feature extraction
- Feature Selection
- fine tuning lasso
- fixed probability distribution
- gradient attacks
- Human behavior
- Input variables
- known weaknesses
- labeled training data
- learning (artificial intelligence)
- Metrics
- optimization
- pattern classification
- probability
- pubcrawl
- resilience
- Resiliency
- robust classifier
- Scalability
- security of data
- single convex optimization
- source domain
- supervised learning
- Synthetic Data
- Task Analysis
- testing
- Toxicology
- Training

- Ad Hoc Network Security
- Ad hoc networks
- auxiliary variable
- composability
- connection outage probability
- convex optimization problem
- convex programming
- COP
- D2D network
- eavesdroppers
- friendly jamming
- Human behavior
- Human Factors
- Interference
- Jamming
- machine-to-machine communication
- Measurement
- physical layer security technique
- pubcrawl
- Receivers
- Resiliency
- route security
- Routing
- secrecy outage probability
- security
- Security Metrics
- security performance
- service quality metrics
- Signal to noise ratio
- SOP
- telecommunication network reliability
- telecommunication network routing
- telecommunication security
- wireless area network

## Digital Control of Hybrid Systems via Simulation and Bisimulation

### Abstract:

The research objective of this project is to bridge two disparate paths to the control of hybrid dynamical systems--namely, symbolic model-based and Lyapunov analysis-based approaches--via convex programming in order to address major challenges in hybrid control. The primary goal is to establish nonconservative, robust, and scalable control theories and algorithms for verifying/achieving desired stability and performance bounds for hybrid affine systems.

- Algorithm design and analysis
- connected undirected graph
- Control of networks
- convergence
- convex function
- Convex functions
- convex programming
- Cost function
- cost functions
- directed graphs
- distributed continuous-time algorithm
- distributed continuous-time convex optimization
- event-triggered communication
- global cost function
- network optimization problem
- network theory (graphs)
- Optimization algorithms
- periodic communication
- privacy
- privacy preservation properties
- strongly connected weight-balanced directed graph
- synchronous periodic communication scheme
- Topology
- Zeno behavior

- Algorithm design and analysis
- connected undirected graph
- Control of networks
- convergence
- convex function
- Convex functions
- convex programming
- Cost function
- cost functions
- directed graphs
- distributed continuous-time algorithm
- distributed continuous-time convex optimization
- event-triggered communication
- global cost function
- network optimization problem
- network theory (graphs)
- Optimization algorithms
- periodic communication
- privacy
- privacy preservation properties
- strongly connected weight-balanced directed graph
- synchronous periodic communication scheme
- Topology
- Zeno behavior

## Digital Control of Hybrid Systems via Simulation and Bisimulation

## Abstract:

The research objective of this project is to bridge two disparate paths to the control of hybrid dynamical systems--namely, symbolic model-based and Lyapunov analysis-based approaches--via convex programming in order to address major challenges in hybrid control. Hybrid systems are characterized by the presence of both continuous dynamics and discrete logic that interact with each other.

- CPS Domains
- Hybrid Models
- Control
- Energy
- Modeling
- Simulation
- Validation and Verification
- Foundations
- convex programming
- Lyapunov analysis
- Pennsylvania State University
- performance optimization
- power electronics
- Robustness
- stabilization
- Symbolic models
- University of Michigan
- National CPS PI Meeting 2014
- 2014
- Abstract
- Poster
- Academia
- 1329422
- CPSPI MTG 2014 Posters, Videos and Abstracts