- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources3
- Resource Type
-
0001200000000000
- More
- Availability
-
30
- Author / Contributor
- Filter by Author / Creator
-
-
Akgun, Orhan Eren (1)
-
Basar, Tamer (1)
-
Cui, Leilei (1)
-
Dayı, Arif Kerem (1)
-
Gil, Stephanie (1)
-
Jiang, Zhong-Ping (1)
-
Liu, C. (1)
-
Nedic, Angelia (1)
-
Shen, Y. (1)
-
Zavlanos, M. M. (1)
-
Zhang, Y. (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
& Ahmed, Khadija. (0)
-
& Aina, D.K. Jr. (0)
-
- Filter by Editor
-
-
Pappas, G. J. (2)
-
Jadbabaie, A. (1)
-
Lygeros, J. (1)
-
Matni, N (1)
-
Matni, N. (1)
-
Morari, M (1)
-
Morari, M. (1)
-
Pappas, G J (1)
-
Parrilo, P. A. (1)
-
Recht, B. (1)
-
Tomlin, C. J. (1)
-
Zeilinger, M. N. (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Matni, N.; Morari, M.; Pappas, G. J. (Ed.)We address the problem of learning the legitimacy of other agents in a multiagent network when an unknown subset is comprised of malicious actors. We specifically derive results for the case of directed graphs and where stochastic side information, or observations of trust, is available. We refer to this as “learning trust” since agents must identify which neighbors in the network are reliable, and we derive a learning protocol to achieve this. We also provide analytical results showing that under this protocol i) agents can learn the legitimacy of all other agents almost surely, and ii) the opinions of the agents converge in mean to the true legitimacy of all other agents in the network. Lastly, we provide numerical studies showing that our convergence results hold for various network topologies and variations in the number of malicious agents.more » « less
-
Cui, Leilei; Basar, Tamer; Jiang, Zhong-Ping (, Proceedings of Machine Learning Research)Matni, N; Morari, M; Pappas, G J (Ed.)In this paper, we propose a robust reinforcement learning method for a class of linear discrete-time systems to handle model mismatches that may be induced by sim-to-real gap. Under the formulation of risk-sensitive linear quadratic Gaussian control, a dual-loop policy optimization algorithm is proposed to iteratively approximate the robust and optimal controller. The convergence and robustness of the dual-loop policy optimization algorithm are rigorously analyzed. It is shown that the dual-loop policy optimization algorithm uniformly converges to the optimal solution. In addition, by invoking the concept of small-disturbance input-to-state stability, it is guaranteed that the dual-loop policy optimization algorithm still converges to a neighborhood of the optimal solution when the algorithm is subject to a sufficiently small disturbance at each step. When the system matrices are unknown, a learning-based off-policy policy optimization algorithm is proposed for the same class of linear systems with additive Gaussian noise. The numerical simulation is implemented to demonstrate the efficacy of the proposed algorithm.more » « less
-
Liu, C.; Zhang, Y.; Shen, Y.; Zavlanos, M. M. (, Proceedings of Machine Learning Research)Jadbabaie, A.; Lygeros, J.; Pappas, G. J.; Parrilo, P. A.; Recht, B.; Tomlin, C. J.; Zeilinger, M. N. (Ed.)
An official website of the United States government

Full Text Available