Past Research


[Jump to:
Introduction |
Section 1. Resource Aware Learning and Control via Submodular Optimization |
Section 2. Denial-of-Service Robust Learning and Control via Combinatorial Optimization |
Section 3. Deception Robust Perception]


Fig. 1: Research pillars for an Internet of Resilient Robot Teams (IoR2T).

In the future, mobile robots will be supporting our efforts in safety-critical tasks of search and rescue (e.g., localizing people in burning buildings), autonomous navigation (e.g., self-driving flying cars), and surveillance (e.g., tracking adversarial behavior). To complete the tasks, robots with heterogeneous capabilities, such as speed, sensing, and payload, will dynamically form teams, agree on navigation and other action plans, and act. The robots will rely on a collaborative distributed intelligence, communicating only with their neighbors via wireless networks. And following the current technological paradigm, the robots’ learning and control capabilities will be software-driven. Overall, the robots will form a cyber-physical network, which I henceforth call an Internet of Robotic Teams (IoRT).

However, as any cyber-physical system, the IoRT will be vulnerable to deceptive and denial-of-service (DoS) attacks and failures that will compromise the robot teams, their plans, and their actions (cf. Fig. 2). The attacks may be physical or transduction attacks (not necessarily “cyberattacks”); and the failures may even originate from the very algorithms that aim to support autonomy (cf. Section 3 below, Deception Robust Perception). All such attacks and failures can eventually result to misinformation and robot withdrawals from the tasks, to suboptimal and untrustworthy decisions. And all lie beyond the reach of cybersecurity and classical estimation and control. Unsurprisingly, the need for a trustworthy autonomy has been listed by the National Academy of Engineering one of the grand 14 engineering challenges of the future.

My research on trustworthy autonomy has been on enabling what I call an Internet of Resilient Robotic Teams (IoR2T), where robots will not only withstand attacks and failures, by being robust, but also will adapt and recover, by being resilient. To this end, I have worked on robotics and control towards a provably robust autonomy against deception and DoS attacks and failures (cf. Fig 2), identifying fundamental limits, and contributing provably optimal algorithms. I have demonstrated the research outcomes in applications, in tasks of autonomous navigation and multi-robot planning for exploration, search and rescue, and surveillance.

Fig. 2: The future Internet of Robotic Teams (IoRT) will be vulnerable to attacks and failures that will compromise the multi-robot teams, their plans, and their actions: attack A1 removes robots from the formed multi-robot teams; A2 removes robots once the robots have agreed on future actions plans, such as navigation trajectories (depicted with blue dotted arrows); A3 deceives robots to act differently than the agreed plans.

[Introduction | Section 1 | Section 2 | Section 3]

1. ReSource-aware learning and control

In a world of connected machines, from the Internet of Things (IoT) to the IoR2T, competitions for resources arise: from how to allocate the available power (when to activate what) to how to allocate the available communication and computation bandwidth (when to communicate and compute what). Hence, towards the IoR2T, a first step is to address the necessity for robotic and, more broadly, cyber-physical systems (CPS) that can successfully operate despite power, communication, and computation constraints.

The first key contribution of my PhD was to identify first fundamental limits towards resource-constrained operation of CPS in terms of their learning and control capabilities, and to develop provably near-optimal algorithms to reach the limits.  To identify the limits, I employed tools of control and computational complexity theory. mTo develop the algorithms, I employed tools of combinatorial optimization, proving properties of discrete convexity, namely, of submodularity.


[Introduction | Section 1 | Section 2 | Section 3]

2. Denial-of-service robust learning and control via combinatorial optimization

But the robots and CPS composing the IoT and IoR2T are vulnerable to denial-of-service (DoS) attacks and failures that can shut down subsets of the robots’ learning and control capabilities: sensors, actuators, communication channels, or even entire robots; e.g., see A1-A2 in Fig. 1. Although much research has focused against deceptive attacks and failures, little work has focused against DoS attacks and failures, and none has developed a generalized framework against any number of DoS attacks and failures.

My PhD research contributed such a general framework providing the first provably near-optimal algorithms for robust combinatorial optimization against any number of DoS attacks. The algorithms not only enabled the DoS-robustification of the resource-aware designs in Section 1. They also enabled the first DoS-robust multi-robot planning methods for navigation tasks of information gathering, such as search and rescue (e.g., localizing people in burning buildings), and surveillance (e.g., tracking adversarial behavior) —see selected publications below. The validation approach used small-scale hardware experiments (cf. figure to the right), and large-scale simulator experiments in Gazebo. The algorithms also apply to discrete optimization problems in machine learning (e.g., data summarization, feature selection).


All theorems in this paper, as noted therein, are corollaries of the theorems proved in Resilient Non-Submodular Maximization Over Matroid Constraints, by V. Tzoumas, A. Jadbabaie, G. J. Pappas, 2018.

[Introduction | Section 1 | Section 2 | Section 3]

3. Deception robust perception

Besides DoS-robust designs and navigation plans, for an IoR2T future where robots will reliably navigate the world we also need reliable robotic navigational perception capabilities such as object recognition, scene reconstruction, and simultaneous localization and mapping (SLAM). The current algorithms supporting such capabilities are brittle to deceptive failures, namely, outliers, caused by sensor malfunctions or incorrect data associations; i.e., the outliers can be interpreted as deceptive attacks by nature (A3 in Fig. 1).

During my post-doc, my collaborators and I developed real-time outlier-robust algorithms with broad applicability to all perception problems above, employing combinatorial and non-convex optimization. The algorithms outperform the state of the art in all experimental validations, in terms of both outlier-robustness and running time. The validation approach used real-world datasets.

As such, our proposed algorithms promise to be valid replacements of the current algorithms for outlier-robust perception, including RANSAC, which is significantly slower and brittler to outliers, yet has been the standard algorithm for outlier-robust perception (and more broadly, for outlier-robust estimation in statistics, e.g., for learning and prediction) for the last 30 years.

Selected publications

[Introduction | Section 1 | Section 2 | Section 3]