Reachset-Conformant System Identification

Read original: arXiv:2407.11692 - Published 7/17/2024 by Laura Lutzow, Matthias Althoff
Total Score

0

🔄

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper explores techniques for ensuring the safety of complex cyber-physical systems using formal verification methods.
  • The key focus is on the concept of "reachset conformance," which requires that the measurements of the target system lie within the set of reachable outputs of the corresponding model.
  • The paper generalizes existing reachset-conformant identification methods to handle nonlinear state-space models and linear/nonlinear input-output models, while also adapting to different levels of prior knowledge about the system dynamics.
  • A new genetic programming variant called "conformant genetic programming" is proposed for identifying reachset-conformant black-box models from data.
  • The framework is evaluated through extensive numerical experiments using simulated and real-world data.

Plain English Explanation

Complex cyber-physical systems, such as self-driving cars or industrial robots, require rigorous safety checks to ensure they operate as intended. One way to do this is through formal verification techniques, which use mathematical models to analyze the system's behavior and identify potential issues.

However, to be truly useful, these models need to accurately reflect the real-world system. This is where the concept of "reachset conformance" comes in. Reachset conformance means that the measurements taken from the actual system should fall within the set of outputs that the model can potentially reach.

The researchers in this paper developed methods to automatically identify reachset-conformant models, which can then be used for formal verification. They focused on both linear and nonlinear models, and different levels of prior knowledge about the system - from fully known "white-box" models to completely unknown "black-box" models.

For the black-box case, the researchers created a new type of genetic programming algorithm that can find reachset-conformant models directly from the data. This is like a smart search process that explores many different model options to find the one that best matches the real-world measurements.

By validating their methods through extensive testing on simulated and real-world data, the researchers have provided a valuable toolset for ensuring the safety of complex cyber-physical systems through rigorous, model-based verification.

Technical Explanation

The paper begins by highlighting the importance of formal verification techniques, such as those described in related work, for ensuring the safety of complex cyber-physical systems. To bridge the gap between model-based verification and real-world application, the authors focus on the concept of "reachset conformance" - the requirement that the measurements of the target system lie within the set of reachable outputs of the corresponding model.

The core of the paper is the development of a generalized framework for identifying reachset-conformant models. While prior work focused on linear state-space models, the authors extend these methods to handle nonlinear state-space models and linear/nonlinear input-output models. Furthermore, the framework adapts to different levels of prior knowledge about the system dynamics, ranging from fully known "white-box" models to completely unknown "black-box" models.

For the white-box case, the authors identify the set of model uncertainties. For gray-box models, they estimate both the parameters and the set of model uncertainties. For the black-box scenario, the researchers propose a new genetic programming variant called "conformant genetic programming" to directly identify the entire reachset-conformant model from data.

The efficacy of the proposed framework is demonstrated through extensive numerical experiments using both simulated and real-world data. The authors show that their methods can effectively identify reachset-conformant models across a variety of system types and levels of prior knowledge.

Critical Analysis

The paper presents a comprehensive and well-designed framework for identifying reachset-conformant models, which is a crucial step in ensuring the safety of complex cyber-physical systems through formal verification. The authors have done a commendable job in generalizing the existing methods to handle a wider range of model types and levels of prior knowledge.

One potential limitation, as acknowledged by the authors, is the computational complexity of the proposed methods, especially the black-box identification using conformant genetic programming. This could be a concern for real-time applications or systems with very high-dimensional state spaces. Additional research may be needed to improve the scalability and efficiency of the identification algorithms.

Furthermore, the paper focuses primarily on the technical aspects of the identification framework and does not delve deeply into the practical challenges of implementing these methods in real-world cyber-physical systems. Aspects such as sensor noise, model uncertainties, and the integration of the identified models into the overall verification and control pipeline could be interesting areas for future research, as highlighted in [related work](https://aimodels.fyi/papers/arxiv/verification-neural-reachable-tubes-via-scenario-optimization, https://aimodels.fyi/papers/arxiv/parameter-conditioned-reachable-sets-updating-safety-assurances, https://aimodels.fyi/papers/arxiv/safe-reach-set-computation-via-neural-barrier).

Overall, this paper makes a valuable contribution to the field of formal verification for cyber-physical systems by providing a versatile and robust framework for identifying reachset-conformant models. The insights and methods presented here can serve as a foundation for further advancements in ensuring the safety and reliability of complex systems.

Conclusion

This paper introduces a generalized framework for automatically identifying reachset-conformant models, which is a crucial step in ensuring the safety of complex cyber-physical systems through formal verification. The proposed methods can handle a wide range of model types, from linear to nonlinear, and adapt to different levels of prior knowledge about the system dynamics.

The key innovations include the extension of existing reachset-conformant identification techniques to nonlinear models and the development of a new genetic programming variant for identifying black-box models directly from data. The researchers have demonstrated the robustness and efficacy of their framework through extensive numerical experiments using both simulated and real-world data.

While the computational complexity of the proposed methods may be a concern for some real-time applications, this work represents a significant advancement in the field of formal verification for cyber-physical systems. The insights and techniques presented here can serve as a foundation for further research and development, ultimately contributing to the safe and reliable operation of complex, safety-critical systems.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

🔄

Total Score

0

Reachset-Conformant System Identification

Laura Lutzow, Matthias Althoff

Formal verification techniques play a pivotal role in ensuring the safety of complex cyber-physical systems. To transfer model-based verification results to the real world, we require that the measurements of the target system lie in the set of reachable outputs of the corresponding model, a property we refer to as reachset conformance. This paper is on automatically identifying those reachset-conformant models. While state-of-the-art reachset-conformant identification methods focus on linear state-space models, we generalize these methods to nonlinear state-space models and linear and nonlinear input-output models. Furthermore, our identification framework adapts to different levels of prior knowledge on the system dynamics. In particular, we identify the set of model uncertainties for white-box models, the parameters and the set of model uncertainties for gray-box models, and entire reachset-conformant black-box models from data. For the black-box identification, we propose a new genetic programming variant, which we call conformant genetic programming. The robustness and efficacy of our framework are demonstrated in extensive numerical experiments using simulated and real-world data.

Read more

7/17/2024

Statistical Reachability Analysis of Stochastic Cyber-Physical Systems under Distribution Shift
Total Score

0

Statistical Reachability Analysis of Stochastic Cyber-Physical Systems under Distribution Shift

Navid Hashemi, Lars Lindemann, Jyotirmoy V. Deshmukh

Reachability analysis is a popular method to give safety guarantees for stochastic cyber-physical systems (SCPSs) that takes in a symbolic description of the system dynamics and uses set-propagation methods to compute an overapproximation of the set of reachable states over a bounded time horizon. In this paper, we investigate the problem of performing reachability analysis for an SCPS that does not have a symbolic description of the dynamics, but instead is described using a digital twin model that can be simulated to generate system trajectories. An important challenge is that the simulator implicitly models a probability distribution over the set of trajectories of the SCPS; however, it is typical to have a sim2real gap, i.e., the actual distribution of the trajectories in a deployment setting may be shifted from the distribution assumed by the simulator. We thus propose a statistical reachability analysis technique that, given a user-provided threshold $1-epsilon$, provides a set that guarantees that any reachable state during deployment lies in this set with probability not smaller than this threshold. Our method is based on three main steps: (1) learning a deterministic surrogate model from sampled trajectories, (2) conducting reachability analysis over the surrogate model, and (3) employing {em robust conformal inference} using an additional set of sampled trajectories to quantify the surrogate model's distribution shift with respect to the deployed SCPS. To counter conservatism in reachable sets, we propose a novel method to train surrogate models that minimizes a quantile loss term (instead of the usual mean squared loss), and a new method that provides tighter guarantees using conformal inference using a normalized surrogate error. We demonstrate the effectiveness of our technique on various case studies.

Read more

7/17/2024

Verification of Neural Reachable Tubes via Scenario Optimization and Conformal Prediction
Total Score

0

Verification of Neural Reachable Tubes via Scenario Optimization and Conformal Prediction

Albert Lin, Somil Bansal

Learning-based approaches for controlling safety-critical systems are rapidly growing in popularity; thus, it is important to assure their performance and safety. Hamilton-Jacobi (HJ) reachability analysis is a popular formal verification tool for providing such guarantees, since it can handle general nonlinear system dynamics, bounded adversarial system disturbances, and state and input constraints. However, its computational and memory complexity scales exponentially with the state dimension, making it intractable for large-scale systems. To overcome this challenge, neural approaches, such as DeepReach, have been used to synthesize reachable tubes and safety controllers for high-dimensional systems. However, verifying these neural reachable tubes remains challenging. In this work, we propose two verification methods, based on robust scenario optimization and conformal prediction, to provide probabilistic safety guarantees for neural reachable tubes. Our methods allow a direct trade-off between resilience to outlier errors in the neural tube, which are inevitable in a learning-based approach, and the strength of the probabilistic safety guarantee. Furthermore, we show that split conformal prediction, a widely used method in the machine learning community for uncertainty quantification, reduces to a scenario-based approach, making the two methods equivalent not only for verification of neural reachable tubes but also more generally. To our knowledge, our proof is the first in the literature to show a strong relationship between conformal prediction and scenario optimization. Finally, we propose an outlier-adjusted verification approach that uses the error distribution in neural reachable tubes to recover greater safe volumes. We demonstrate the efficacy of the proposed approaches for the high-dimensional problems of multi-vehicle collision avoidance and rocket landing with no-go zones.

Read more

4/11/2024

📉

Total Score

0

Parameter-Conditioned Reachable Sets for Updating Safety Assurances Online

Javier Borquez, Kensuke Nakamura, Somil Bansal

Hamilton-Jacobi (HJ) reachability analysis is a powerful tool for analyzing the safety of autonomous systems. However, the provided safety assurances are often predicated on the assumption that once deployed, the system or its environment does not evolve. Online, however, an autonomous system might experience changes in system dynamics, control authority, external disturbances, and/or the surrounding environment, requiring updated safety assurances. Rather than restarting the safety analysis from scratch, which can be time-consuming and often intractable to perform online, we propose to compute textit{parameter-conditioned} reachable sets. Assuming expected system and environment changes can be parameterized, we treat these parameters as virtual states in the system and leverage recent advances in high-dimensional reachability analysis to solve the corresponding reachability problem offline. This results in a family of reachable sets that is parameterized by the environment and system factors. Online, as these factors change, the system can simply query the corresponding safety function from this family to ensure system safety, enabling a real-time update of the safety assurances. Through various simulation studies, we demonstrate the capability of our approach in maintaining system safety despite the system and environment evolution.

Read more

4/24/2024