var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=http%3A%2F%2Fwww.jinming.tech%2Fpapers%2Fmyref.bib&jsonp=1&theme=mila&sort=-key&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=http%3A%2F%2Fwww.jinming.tech%2Fpapers%2Fmyref.bib&jsonp=1&theme=mila&sort=-key\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=http%3A%2F%2Fwww.jinming.tech%2Fpapers%2Fmyref.bib&jsonp=1&theme=mila&sort=-key\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Balance Reward and Safety Optimization for Safe Reinforcement Learning: A Perspective of Gradient Manipulation.\n \n \n \n\n\n \n Gu, S.; Sel, B.; Ding, Y.; Wang, L.; Lin, Q.; Jin*, M.; and Knoll*, A.\n\n\n \n\n\n\n In AAAI Conference on Artificial Intelligence (AAAI) (oral presentation), 2024. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2024_4C_PCRPO,\n  title={Balance Reward and Safety Optimization for Safe Reinforcement Learning: A\nPerspective of Gradient Manipulation},\n  author={Shangding Gu and Bilgehan Sel and Yuhao Ding and Lu Wang and Qingwei Lin and Ming Jin* and Alois Knoll*},\n  booktitle={AAAI Conference on Artificial Intelligence (AAAI) (oral presentation)},\n  pages={},\n  year={2024},\n  keywords = {Machine Learning, Reinforcement Learning}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Mirrored Influence Hypothesis: Efficient Data Influence Estimation by Harnessing Forward Passes.\n \n \n \n \n\n\n \n Ko, M.; Kang, F.; Shi, W.; Jin, M.; Yu, Z.; and Jia, R.\n\n\n \n\n\n\n In Conference on Computer Vision and Pattern Recognition (CVPR), 2024. \n \n\n\n\n
\n\n\n\n \n \n \"The arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2024_3C_mirror,\n  title={The Mirrored Influence Hypothesis: Efficient Data Influence Estimation by Harnessing Forward Passes},\n  author={Myeongseob Ko and Feiyang Kang and Weiyan Shi and Ming Jin and Zhou Yu and Ruoxi Jia},\n  booktitle={Conference on Computer Vision and Pattern Recognition (CVPR)},\n  pages={},\n  year={2024},\n  url_arXiv = {https://arxiv.org/abs/2402.08922v1},\n  keywords = {Cybersecurity, Data Valuation, Machine Learning}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CausalPrompt: Enhancing LLMs with weakly supervised causal reasoning for robust performance in non-language tasks.\n \n \n \n \n\n\n \n Lin*, T.; Khattar*, V.; Huang*, Y.; Hong, J.; Jia, R.; Liu, C.; Sangiovanni-Vincentelli, A.; and Jin, M.\n\n\n \n\n\n\n In ICLR Workshop: Tackling Climate Change with Machine Learning, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"CausalPrompt: pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 16 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2024_3C_causalprompt,\ntitle={CausalPrompt: Enhancing LLMs with weakly supervised causal reasoning for robust performance in non-language tasks},\nauthor={Tung-Wei Lin* and Vanshaj Khattar* and Yuxuan Huang* and Junho Hong and Ruoxi Jia and Chen-Ching Liu and Alberto Sangiovanni-Vincentelli and Ming Jin},\nbooktitle={ICLR Workshop: Tackling Climate Change with Machine Learning},\npages={},\nyear={2024},\n  keywords = {Power and energy systems, Machine Learning},\n    url_pdf = {CausalPrompt2024.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Optimization Solution Functions as Deterministic Policies for Offline Reinforcement Learning.\n \n \n \n\n\n \n Khattar, V.; and Jin, M.\n\n\n \n\n\n\n In American Control Conference (ACC), 2024. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2024_3C_OfflineIAC,\n  title={Optimization Solution Functions as Deterministic Policies for Offline Reinforcement Learning},\n  author={Vanshaj Khattar and Ming Jin},\n  booktitle={American Control Conference (ACC)},\n  pages={},\n  year={2024},\n  keywords = {Machine Learning, Reinforcement Learning, Optimization}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Latent Space Correlation-Aware Autoencoders for Anomaly Detection in Skewed Data.\n \n \n \n\n\n \n Roy, P.; Singhal, H.; O'Shea, T.; and Jin, M.\n\n\n \n\n\n\n In Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2024. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2024_2C_oodcyber,\n  title={Latent Space Correlation-Aware Autoencoders for Anomaly Detection in Skewed Data},\n  author={Padmaksha Roy and Himanshu Singhal and Tim O'Shea and Ming Jin},\n  booktitle={Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD)},\n  pages={},\n  year={2024},\n  keywords = {Cybersecurity, Machine Learning}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Does online gradient descent (and variants) still work with biased gradient and variance?.\n \n \n \n\n\n \n Al-Tawaha, A.; and Jin, M.\n\n\n \n\n\n\n In American Control Conference (ACC), 2024. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2024_2C_Online,\n  title={Does online gradient descent (and variants) still work with biased gradient and variance?},\n  author={Ahmad Al-Tawaha and Ming Jin},\n  booktitle={American Control Conference (ACC)},\n  pages={},\n  year={2024},\n  keywords = {Machine Learning, Online Learning, Optimization}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Simulation and Analysis of Cyber Attacks on Power and Energy Systems.\n \n \n \n\n\n \n Ruttle, Z. A.; Somda, B.; Liu, C.; and Jin, M.\n\n\n \n\n\n\n In The 2024 Conference on Innovative Smart Grid Technologies, North America (ISGT NA 2024), 2024. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2024_1C_cybersim,\n  title={Simulation and Analysis of Cyber Attacks on Power and Energy Systems},\n  author={Zachary A. Ruttle and Baza Somda and Chen-Ching Liu and Ming Jin},\n  booktitle={The 2024 Conference on Innovative Smart Grid Technologies, North America (ISGT NA 2024)},\n  pages={},\n  year={2024},\n  keywords = {Cybersecurity, Power systems}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (17)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A CMDP-within-online framework for Meta-Safe Reinforcement Learning.\n \n \n \n \n\n\n \n Khattar, V.; Ding, Y.; Sel, B.; Lavaei, J.; and Jin, M.\n\n\n \n\n\n\n In International Conference on Learning Representations (ICLR) (spotlight presentation), 2023. \n \n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n \n \"A openreview\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 55 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_5C_MetaSRL,\n  title={A CMDP-within-online framework for Meta-Safe Reinforcement Learning},\n  author={Vanshaj Khattar and Yuhao Ding and Bilgehan Sel and Javad Lavaei and  Ming Jin},\n  booktitle={International Conference on Learning Representations (ICLR) (spotlight presentation)},\n  pages={},\n  year={2023},\n  url_pdf={MetaSRL.pdf},\n  url_openreview = {https://openreview.net/forum?id=mbxz9Cjehr},\n  keywords = {Reinforcement learning, Machine Learning},\n  abstract={Meta-reinforcement learning has widely been used as a learning-to-learn framework to solve unseen tasks with limited experience. However, the aspect of constraint violations has not been adequately addressed in the existing works, making their application restricted in real-world settings. In this paper, we study the problem of meta-safe reinforcement learning (meta-SRL) through the CMDP-within-online framework. We obtain task-averaged regret guarantees for the reward maximization (optimality gap) and constraint violations using gradient-based meta-learning and show that the task-averaged optimality gap and constraint satisfaction improve with task-similarity in the static environment, or task-relatedness in the changing environment. Several technical challenges arise when making this framework practical while still having strong theoretical guarantees. To address these challenges, we propose a meta-algorithm that performs inexact online learning on the upper bounds of intra-task optimality gap and constraint violations estimated by off-policy stationary distribution corrections. Furthermore, we enable the learning rates to be adapted for every task and extend our approach to settings with the dynamically changing task environments. Finally, experiments are conducted to demonstrate the effectiveness of our approach. The proposed theoretical framework is the first to handle the nonconvexity and stochastic nature of within-task CMDPs, while exploiting inter-task dependency for multi-task safe learning.  },\n}\n\n
\n
\n\n\n
\n Meta-reinforcement learning has widely been used as a learning-to-learn framework to solve unseen tasks with limited experience. However, the aspect of constraint violations has not been adequately addressed in the existing works, making their application restricted in real-world settings. In this paper, we study the problem of meta-safe reinforcement learning (meta-SRL) through the CMDP-within-online framework. We obtain task-averaged regret guarantees for the reward maximization (optimality gap) and constraint violations using gradient-based meta-learning and show that the task-averaged optimality gap and constraint satisfaction improve with task-similarity in the static environment, or task-relatedness in the changing environment. Several technical challenges arise when making this framework practical while still having strong theoretical guarantees. To address these challenges, we propose a meta-algorithm that performs inexact online learning on the upper bounds of intra-task optimality gap and constraint violations estimated by off-policy stationary distribution corrections. Furthermore, we enable the learning rates to be adapted for every task and extend our approach to settings with the dynamically changing task environments. Finally, experiments are conducted to demonstrate the effectiveness of our approach. The proposed theoretical framework is the first to handle the nonconvexity and stochastic nature of within-task CMDPs, while exploiting inter-task dependency for multi-task safe learning. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Human-on-the-Loop Optimization Autoformalism Approach for Sustainability.\n \n \n \n \n\n\n \n Jin, M.; Sel, B.; Hardeep, F.; and Yin, W.\n\n\n \n\n\n\n In Preprint, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"A arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 9 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_5C_Chatenergy,\n  title={A Human-on-the-Loop Optimization Autoformalism Approach\nfor Sustainability},\n  author={Ming Jin and Bilgehan Sel and Fnu Hardeep and Wotao Yin},\n  booktitle={Preprint},\n  pages={},\n  year={2023},\n  url_arXiv = {https://arxiv.org/abs/2210.06516},\n  keywords = {Machine Learning, Energy}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Tempo Adaption in Non-stationary Reinforcement Learning.\n \n \n \n \n\n\n \n Lee, H.; Ding, Y.; Lee, J.; Jin, M.; Lavaei, J.; and Sojoudi, S.\n\n\n \n\n\n\n In Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS), 2023. \n \n\n\n\n
\n\n\n\n \n \n \"Tempo pdf\n  \n \n \n \"Tempo arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 14 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_4C_TempoRL,\n  title={Tempo Adaption in Non-stationary Reinforcement Learning},\n  author={Hyunin Lee and Yuhao Ding and Jongmin Lee and Ming Jin and Javad Lavaei and Somayeh Sojoudi},\n  booktitle={Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS)},\n  pages={},\n  year={2023},\n  url_pdf = {TempoRL23.pdf},\n  url_arXiv = {https://arxiv.org/abs/2309.14989},\n  keywords = {Machine Learning, Reinforcement Learning}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On Solution Functions of Optimization: Universal Approximation and Covering Number Bounds.\n \n \n \n \n\n\n \n Jin, M.; Khattar, V.; Kaushik, H.; Sel, B.; and Jia, R.\n\n\n \n\n\n\n In AAAI Conference on Artificial Intelligence (AAAI) (oral presentation), 2023. \n \n\n\n\n
\n\n\n\n \n \n \"On arxiv\n  \n \n \n \"On pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 14 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_4C_Sol,\n  title={On Solution Functions of Optimization: Universal Approximation and Covering Number Bounds},\n  author={Ming Jin and Vanshaj Khattar and Harshal Kaushik and Bilgehan Sel and Ruoxi Jia},\n  booktitle={AAAI Conference on Artificial Intelligence (AAAI) (oral presentation)},\n  pages={},\n  year={2023},\n  url_arXiv={https://arxiv.org/abs/2212.01314},\n  url_pdf={Sol_function_complexity.pdf},\n  keywords = {Optimization,  Machine Learning},\n  abstract={We study the expressibility and learnability of solution functions of convex optimization and their multi-layer architectural extension. The main results are: (1) the class of solution functions of linear programming (LP) and quadratic programming (QP) is a universal approximant for the $C^k$ smooth model class or some restricted Sobolev space, and we characterize the rate-distortion, (2) the approximation power is investigated through a viewpoint of regression error, where information about the target function is provided in terms of data observations, (3) compositionality in the form of deep architecture with optimization as a layer is shown to reconstruct some basic functions used in numerical analysis without error, which implies that (4) a substantial reduction in rate-distortion can be achieved with a universal network architecture, and (5) we discuss the statistical bounds of empirical covering numbers for LP/QP, as well as a generic optimization problem (possibly nonconvex) by exploiting tame geometry. Our results provide the **first rigorous analysis of the approximation and learning-theoretic properties of solution functions** with implications for algorithmic design and performance guarantees.  },\n}\n\n
\n
\n\n\n
\n We study the expressibility and learnability of solution functions of convex optimization and their multi-layer architectural extension. The main results are: (1) the class of solution functions of linear programming (LP) and quadratic programming (QP) is a universal approximant for the $C^k$ smooth model class or some restricted Sobolev space, and we characterize the rate-distortion, (2) the approximation power is investigated through a viewpoint of regression error, where information about the target function is provided in terms of data observations, (3) compositionality in the form of deep architecture with optimization as a layer is shown to reconstruct some basic functions used in numerical analysis without error, which implies that (4) a substantial reduction in rate-distortion can be achieved with a universal network architecture, and (5) we discuss the statistical bounds of empirical covering numbers for LP/QP, as well as a generic optimization problem (possibly nonconvex) by exploiting tame geometry. Our results provide the **first rigorous analysis of the approximation and learning-theoretic properties of solution functions** with implications for algorithmic design and performance guarantees. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n How to Sift Out a Clean Data Subset in the Presence of Data Poisoning?.\n \n \n \n \n\n\n \n Zeng*, Y.; Pan*, M.; Jahagirdar, H.; Jin, M.; Lyu, L.; and Jia, R.\n\n\n \n\n\n\n In USENIX Security, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"How arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_4C_MetaSift,\n  title={How to Sift Out a Clean Data Subset in the Presence of Data Poisoning?},\n  author={Yi Zeng* and Minzhou Pan* and Himanshu Jahagirdar and Ming Jin and Lingjuan Lyu and Ruoxi Jia},\n  booktitle={USENIX Security},\n  pages={},\n  year={2023},\n  url_arXiv = {https://arxiv.org/abs/2210.06516},\n  keywords = {Machine Learning},\n  abstract={Given the volume of data needed to train modern machine learning models, external suppliers are increasingly used. However, incorporating external data poses data poisoning risks, wherein attackers manipulate their data to degrade model utility or integrity. Most poisoning defenses presume access to a set of clean data (or base set). While this assumption has been taken for granted, given the fast-growing research on stealthy poisoning attacks, a question arises: can defenders really identify a clean subset within a contaminated dataset to support defenses? This paper starts by examining the impact of poisoned samples on defenses when they are mistakenly mixed into the base set. We analyze five defenses and find that their performance deteriorates dramatically with less than 1% poisoned points in the base set. These findings suggest that sifting out a base set with high precision is key to these defenses' performance. Motivated by these observations, we study how precise existing automated tools and human inspection are at identifying clean data in the presence of data poisoning. Unfortunately, neither effort achieves the precision needed. Worse yet, many of the outcomes are worse than random selection. In addition to uncovering the challenge, we propose a practical countermeasure, Meta-Sift. Our method is based on the insight that existing attacks' poisoned samples shifts from clean data distributions. Hence, training on the clean portion of a dataset and testing on the corrupted portion will result in high prediction loss. Leveraging the insight, we formulate a bilevel optimization to identify clean data and further introduce a suite of techniques to improve efficiency and precision. Our evaluation shows that Meta-Sift can sift a clean base set with 100% precision under a wide range of poisoning attacks. The selected base set is large enough to give rise to successful defenses.  },\n}\n\n\n
\n
\n\n\n
\n Given the volume of data needed to train modern machine learning models, external suppliers are increasingly used. However, incorporating external data poses data poisoning risks, wherein attackers manipulate their data to degrade model utility or integrity. Most poisoning defenses presume access to a set of clean data (or base set). While this assumption has been taken for granted, given the fast-growing research on stealthy poisoning attacks, a question arises: can defenders really identify a clean subset within a contaminated dataset to support defenses? This paper starts by examining the impact of poisoned samples on defenses when they are mistakenly mixed into the base set. We analyze five defenses and find that their performance deteriorates dramatically with less than 1% poisoned points in the base set. These findings suggest that sifting out a base set with high precision is key to these defenses' performance. Motivated by these observations, we study how precise existing automated tools and human inspection are at identifying clean data in the presence of data poisoning. Unfortunately, neither effort achieves the precision needed. Worse yet, many of the outcomes are worse than random selection. In addition to uncovering the challenge, we propose a practical countermeasure, Meta-Sift. Our method is based on the insight that existing attacks' poisoned samples shifts from clean data distributions. Hence, training on the clean portion of a dataset and testing on the corrupted portion will result in high prediction loss. Leveraging the insight, we formulate a bilevel optimization to identify clean data and further introduce a suite of techniques to improve efficiency and precision. Our evaluation shows that Meta-Sift can sift a clean base set with 100% precision under a wide range of poisoning attacks. The selected base set is large enough to give rise to successful defenses. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n LAVA: Data Valuation without Pre-Specified Learning Algorithms.\n \n \n \n \n\n\n \n Just*, H. A.; Kang*, F.; Wang, T.; Zeng, Y.; Myeongseob Ko, M. J.; and Jia, R.\n\n\n \n\n\n\n In International Conference on Learning Representations (ICLR) (spotlight presentation), 2023. \n \n\n\n\n
\n\n\n\n \n \n \"LAVA: openreview\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_4C_LAVA,\n  title={LAVA: Data Valuation without Pre-Specified Learning Algorithms},\n  author={Hoang Anh Just* and Feiyang Kang* and Tianhao Wang and Yi Zeng and Myeongseob Ko, Ming Jin and Ruoxi Jia},\n  booktitle={International Conference on Learning Representations (ICLR) (spotlight presentation)},\n  pages={},\n  year={2023},\n  url_openreview={https://openreview.net/forum?id=JJuP86nBl4q},\n  keywords = {Machine Learning},\n  abstract={Traditionally, data valuation is posed as a problem of equitably splitting the validation performance of a learning algorithm among the training data. As a result, the calculated data values depend on many design choices of the underlying learning algorithm. However, this dependence is undesirable for many use cases of data valuation, such as setting priorities over different data sources in a data acquisition process and informing pricing mechanisms in a data marketplace. In these scenarios, data needs to be valued before the actual analysis and the choice of the learning algorithm is still undetermined then. Another side-effect of the dependence is that to assess the value of individual points, one needs to re-run the learning algorithm with and without a point, which incurs a large computation burden. This work leapfrogs over the current limits of data valuation methods by introducing a new framework that can value training data in a way that is oblivious to the downstream learning algorithm. Our main results are as follows. We develop a proxy for the validation performance associated with a training set based on a non-conventional between the training and the validation set. We show that the distance characterizes the upper bound of the validation performance for any given model under certain Lipschitz conditions. We develop a novel method to value individual data based on the sensitivity analysis of the Wasserstein distance. Importantly, these values can be directly obtained from the output of off-the-shelf optimization solvers once the Wasserstein distance is computed. We evaluate our new data valuation framework over various use cases related to detecting low-quality data and show that, surprisingly, the learning-agnostic feature of our framework enables a over the state-of-the-art performance while being Anonymous Url: I certify that there is no URL (e.g., github page) that could be used to find authors’ identity. },\n}\n\n
\n
\n\n\n
\n Traditionally, data valuation is posed as a problem of equitably splitting the validation performance of a learning algorithm among the training data. As a result, the calculated data values depend on many design choices of the underlying learning algorithm. However, this dependence is undesirable for many use cases of data valuation, such as setting priorities over different data sources in a data acquisition process and informing pricing mechanisms in a data marketplace. In these scenarios, data needs to be valued before the actual analysis and the choice of the learning algorithm is still undetermined then. Another side-effect of the dependence is that to assess the value of individual points, one needs to re-run the learning algorithm with and without a point, which incurs a large computation burden. This work leapfrogs over the current limits of data valuation methods by introducing a new framework that can value training data in a way that is oblivious to the downstream learning algorithm. Our main results are as follows. We develop a proxy for the validation performance associated with a training set based on a non-conventional between the training and the validation set. We show that the distance characterizes the upper bound of the validation performance for any given model under certain Lipschitz conditions. We develop a novel method to value individual data based on the sensitivity analysis of the Wasserstein distance. Importantly, these values can be directly obtained from the output of off-the-shelf optimization solvers once the Wasserstein distance is computed. We evaluate our new data valuation framework over various use cases related to detecting low-quality data and show that, surprisingly, the learning-agnostic feature of our framework enables a over the state-of-the-art performance while being Anonymous Url: I certify that there is no URL (e.g., github page) that could be used to find authors’ identity. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Winning the CityLearn Challenge: Adaptive Optimization with Evolutionary Search under Trajectory-based Guidance.\n \n \n \n \n\n\n \n Khattar, V.; and Jin, M.\n\n\n \n\n\n\n In AAAI Conference on Artificial Intelligence (AAAI) AI for Social Impact Track, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"Winning arxiv\n  \n \n \n \"Winning pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 25 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_4C_CL,\n  title={Winning the CityLearn Challenge: Adaptive Optimization with Evolutionary Search under Trajectory-based Guidance},\n  author={Vanshaj Khattar and  Ming Jin},\n  booktitle={AAAI Conference on Artificial Intelligence (AAAI) AI for Social Impact Track},\n  pages={},\n  year={2023},\n  url_arXiv={https://arxiv.org/abs/2212.01939},\n  url_pdf={ESGuidance_ZOiRL.pdf},\n  keywords = {Optimization, Power system, Reinforcement learning, Machine Learning},\n  abstract={Modern power systems will have to face difficult challenges in the years to come: frequent blackouts in urban areas caused by high peaks of electricity demand, grid instability exacerbated by the intermittency of renewable generation, and climate change on a global scale amplified by increasing carbon emissions. While current practices are growingly inadequate, the pathway of artificial intelligence (AI)-based methods to widespread adoption is hindered by missing aspects of trustworthiness. The CityLearn Challenge is an exemplary opportunity for researchers from multi-disciplinary fields to investigate the potential of AI to tackle these pressing issues within the energy domain, collectively modeled as a reinforcement learning (RL) task. Multiple real-world challenges faced by contemporary RL techniques are embodied in the problem formulation. In this paper, we present a novel method using the solution function of optimization as policies to compute the actions for sequential decision-making, while notably adapting the parameters of the optimization model from online observations. Algorithmically, this is achieved by an evolutionary algorithm under a novel trajectory-based guidance scheme. Formally, the global convergence property is established. Our agent ranked first in the latest 2021 CityLearn Challenge, being able to achieve superior performance in almost all metrics while maintaining some key aspects of interpretability.  },\n}\n\n\n
\n
\n\n\n
\n Modern power systems will have to face difficult challenges in the years to come: frequent blackouts in urban areas caused by high peaks of electricity demand, grid instability exacerbated by the intermittency of renewable generation, and climate change on a global scale amplified by increasing carbon emissions. While current practices are growingly inadequate, the pathway of artificial intelligence (AI)-based methods to widespread adoption is hindered by missing aspects of trustworthiness. The CityLearn Challenge is an exemplary opportunity for researchers from multi-disciplinary fields to investigate the potential of AI to tackle these pressing issues within the energy domain, collectively modeled as a reinforcement learning (RL) task. Multiple real-world challenges faced by contemporary RL techniques are embodied in the problem formulation. In this paper, we present a novel method using the solution function of optimization as policies to compute the actions for sequential decision-making, while notably adapting the parameters of the optimization model from online observations. Algorithmically, this is achieved by an evolutionary algorithm under a novel trajectory-based guidance scheme. Formally, the global convergence property is established. Our agent ranked first in the latest 2021 CityLearn Challenge, being able to achieve superior performance in almost all metrics while maintaining some key aspects of interpretability. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Algorithm of Thoughts: Enhancing Exploration of Ideas in Large Language Models.\n \n \n \n \n\n\n \n Sel, B.; Al-Tawaha, A.; Khattar, V.; Wang, L.; Jia, R.; and Jin, M.\n\n\n \n\n\n\n In Preprint, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"Algorithm arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 10 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_4C_AoT,\n  title={Algorithm of Thoughts: Enhancing Exploration of Ideas\nin Large Language Models},\n  author={Bilgehan Sel and Ahmad Al-Tawaha and Vanshaj Khattar and Lu Wang and Ruoxi Jia  and Ming Jin},\n  booktitle={Preprint},\n  pages={},\n  year={2023},\n  url_arXiv = {https://arxiv.org/pdf/2308.10379.pdf},\n  keywords = {Machine Learning, Large Language Model}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards Robustness Certification Against Universal Perturbations.\n \n \n \n \n\n\n \n Zeng*, Y.; Shi*, Z.; Jin, M.; Kang, F.; Lyu, L.; Hsieh, C.; and Jia, R.\n\n\n \n\n\n\n In International Conference on Learning Representations (ICLR), 2023. \n \n\n\n\n
\n\n\n\n \n \n \"Towards openreview\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_4C_AUP,\n  title={Towards Robustness Certification Against Universal Perturbations},\n  author={Yi Zeng* and Zhouxing Shi* and Ming Jin and Feiyang Kang and Lingjuan Lyu and Cho-Jui Hsieh and Ruoxi Jia},\n  booktitle={International Conference on Learning Representations (ICLR)},\n  pages={},\n  year={2023},\n  url_openreview={https://openreview.net/forum?id=7GEvPKxjtt},\n  keywords = {Machine Learning},\n  abstract={In this paper, we investigate the problem of certifying neural network robustness against universal perturbations (UPs), which have been widely used in universal adversarial attacks and backdoor attacks. Existing robustness certification methods aim to provide robustness guarantees for each sample with respect to the worst-case perturbations given a neural network. However, those sample-wise bounds will be loose when considering the UP threat model as they overlook the important constraint that the perturbation should be shared across all samples. We propose a method based on a combination of linear relaxation-based perturbation analysis and Mixed Integer Linear Programming to establish the first robust certification method for UP. In addition, we develop a theoretical framework for computing error bounds on the entire population using the certification results from a randomly sampled batch. Aside from an extensive evaluation of the proposed certification, we further show how the certification facilitates efficient comparison of robustness among different models or efficacy among different universal adversarial attack defenses and enables accurate detection of backdoor target classes.  },\n}\n\n
\n
\n\n\n
\n In this paper, we investigate the problem of certifying neural network robustness against universal perturbations (UPs), which have been widely used in universal adversarial attacks and backdoor attacks. Existing robustness certification methods aim to provide robustness guarantees for each sample with respect to the worst-case perturbations given a neural network. However, those sample-wise bounds will be loose when considering the UP threat model as they overlook the important constraint that the perturbation should be shared across all samples. We propose a method based on a combination of linear relaxation-based perturbation analysis and Mixed Integer Linear Programming to establish the first robust certification method for UP. In addition, we develop a theoretical framework for computing error bounds on the entire population using the certification results from a randomly sampled batch. Aside from an extensive evaluation of the proposed certification, we further show how the certification facilitates efficient comparison of robustness among different models or efficacy among different universal adversarial attack defenses and enables accurate detection of backdoor target classes. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Model Residuals as Shields: A Bilevel Formulation to Defend Smart Grids from Poisoning Attacks.\n \n \n \n \n\n\n \n Lin, T.; Roy, P.; Zeng, Y.; Jin, M.; Jia, R.; Liu, C.; and Sangiovanni-Vinecentelli, A.\n\n\n \n\n\n\n In Preprint, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"Model pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 11 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_3J_MSAS,\n  title={Model Residuals as Shields: A Bilevel Formulation\nto Defend Smart Grids from Poisoning Attacks},\n  author={Tung-Wei Lin and Padmaksha Roy and Yi Zeng and Ming Jin and Ruoxi Jia and Chen-Ching Liu and Alberto Sangiovanni-Vinecentelli},\n  booktitle={Preprint},\n  pages={},\n  year={2023},\n  url_pdf = {Power_Cybersecurity_MSAS2023.pdf},\n  keywords = {Machine Learning, Power Systems, Cybersecurity}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Non-stationary Risk-sensitive Reinforcement Learning: Near-optimal Dynamic Regret, Adaptive Detection, and Separation Design.\n \n \n \n \n\n\n \n Ding, Y.; Jin, M.; and Lavaei, J.\n\n\n \n\n\n\n In AAAI Conference on Artificial Intelligence (AAAI) (oral presentation), 2023. \n \n\n\n\n
\n\n\n\n \n \n \"Non-stationary pdf\n  \n \n \n \"Non-stationary arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 20 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_3C_NRRL,\n  title={Non-stationary Risk-sensitive Reinforcement Learning: Near-optimal Dynamic Regret, Adaptive Detection, and Separation Design},\n  author={Yuhao Ding and Ming Jin and Javad Lavaei},\n  booktitle={AAAI Conference on Artificial Intelligence (AAAI) (oral presentation)},\n  pages={},\n  year={2023},\n  url_pdf={Nonstationary_RL2022.pdf},\n  url_arXiv={https://arxiv.org/pdf/2211.10815.pdf},\n  keywords = {Optimization, Reinforcement Learning, Machine Learning},\n  abstract={We study risk-sensitive reinforcement learning (RL) based on an entropic risk measure in episodic non-stationary Markov decision processes (MDPs). Both the reward functions and the state transition kernels are unknown and allowed to vary arbitrarily over time with a budget on their cumulative variations. When this variation budget is known a prior, we propose two restart-based algorithms, namely Restart-RSMB and Restart-RSQ, and establish their dynamic regrets. Based on these results, we further present a meta-algorithm that does not require any prior knowledge of the variation budget and can adaptively detect the non-stationarity on the exponential value functions. A dynamic regret lower bound is then established for non-stationary risk-sensitive RL to certify the near-optimality of the proposed algorithms. Our results also show that the risk control and the handling of the non-stationarity can be separately designed in the algorithm if the variation budget is known a prior, while the non-stationary detection mechanism in the adaptive algorithm depends on the risk parameter. This work offers the first non-asymptotic theoretical analyses for the non-stationary risk-sensitive RL in the literature. },\n}\n\n\n\n
\n
\n\n\n
\n We study risk-sensitive reinforcement learning (RL) based on an entropic risk measure in episodic non-stationary Markov decision processes (MDPs). Both the reward functions and the state transition kernels are unknown and allowed to vary arbitrarily over time with a budget on their cumulative variations. When this variation budget is known a prior, we propose two restart-based algorithms, namely Restart-RSMB and Restart-RSQ, and establish their dynamic regrets. Based on these results, we further present a meta-algorithm that does not require any prior knowledge of the variation budget and can adaptively detect the non-stationarity on the exponential value functions. A dynamic regret lower bound is then established for non-stationary risk-sensitive RL to certify the near-optimality of the proposed algorithms. Our results also show that the risk control and the handling of the non-stationarity can be separately designed in the algorithm if the variation budget is known a prior, while the non-stationary detection mechanism in the adaptive algorithm depends on the risk parameter. This work offers the first non-asymptotic theoretical analyses for the non-stationary risk-sensitive RL in the literature. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Learning-to-Learn to Guide Random Search: Derivative-Free Meta Blackbox Optimization on Manifold.\n \n \n \n \n\n\n \n Sel, B.; Al-Tawaha, A.; Ding, Y.; Jia, R.; Ji, B.; Lavaei, J.; and Jin, M.\n\n\n \n\n\n\n In Learning for Dynamics & Control Conference (L4DC) (oral presentation), 2023. \n \n\n\n\n
\n\n\n\n \n \n \"Learning-to-Learn pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 54 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_3C_MetaLMRS,\n  title={Learning-to-Learn to Guide Random Search: Derivative-Free Meta Blackbox Optimization on Manifold},\n  author={Bilgehan Sel and Ahmad Al-Tawaha and Yuhao Ding and Ruoxi Jia and Bo Ji and Javad Lavaei and  Ming Jin},\n  booktitle={Learning for Dynamics & Control Conference (L4DC) (oral presentation)},\n  pages={},\n  year={2023},\n  url_pdf={Meta_LMRS.pdf},\n  keywords = {Optimization, Reinforcement learning, Machine Learning},\n  abstract={Solving a sequence of high-dimensional, nonconvex, but potentially similar optimization problems poses a computational challenge in engineering applications. We propose the \\emph{first} meta-learning framework that leverages the shared structure among sequential tasks to improve the computational efficiency and sample complexity of derivative-free optimization. Based on the observation that most practical high-dimensional functions lie on a latent low-dimensional manifold, which can be further shared among instances, our method jointly learns the meta-initialization of a search point and a meta-manifold.  Theoretically, we establish the benefit of meta-learning in this challenging setting. Empirically, we demonstrate the effectiveness of the proposed algorithm in two high-dimensional reinforcement learning tasks.  },\n}\n\n
\n
\n\n\n
\n Solving a sequence of high-dimensional, nonconvex, but potentially similar optimization problems poses a computational challenge in engineering applications. We propose the \\emphfirst meta-learning framework that leverages the shared structure among sequential tasks to improve the computational efficiency and sample complexity of derivative-free optimization. Based on the observation that most practical high-dimensional functions lie on a latent low-dimensional manifold, which can be further shared among instances, our method jointly learns the meta-initialization of a search point and a meta-manifold. Theoretically, we establish the benefit of meta-learning in this challenging setting. Empirically, we demonstrate the effectiveness of the proposed algorithm in two high-dimensional reinforcement learning tasks. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Practical Membership Inference Attacks Against Large-Scale Multi-Modal Models: A Pilot Study.\n \n \n \n\n\n \n Ko, M.; Jin, M.; Wang, C.; and Jia, R.\n\n\n \n\n\n\n In ICCV, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_3C_MIA,\n  title={Practical Membership Inference Attacks Against Large-Scale Multi-Modal Models: A Pilot Study},\n  author={Myeongseob Ko and Ming Jin and Chenguang Wang and Ruoxi Jia},\n  booktitle={ICCV},\n  pages={},\n  year={2023},\n  keywords = {Machine Learning}\n}\n\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Certifiably Robust Neural ODE with Learning-based Barrier Function.\n \n \n \n \n\n\n \n Yang, R.; Jia, R.; Zhang, X.; and Jin, M.\n\n\n \n\n\n\n IEEE Control Systems Letters (Special Issue on Data-Driven Analysis and Control). 2023.\n \n\n\n\n
\n\n\n\n \n \n \"Certifiably pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 17 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{2023_3C_BNODE,\n  title={Certifiably Robust Neural ODE with Learning-based Barrier Function},\n  author={Runing Yang and Ruoxi Jia and Xiangyu Zhang and  Ming Jin},\n  journal={IEEE Control Systems Letters (Special Issue on Data-Driven Analysis and Control)},\n  pages={},\n  year={2023},\n  url_pdf={B-NODE22.pdf},\n  keywords = {Optimization, Control theory, Machine Learning},\n  abstract={Neural Ordinary Differential Equations (ODEs) have gained traction in many applications. While recent studies have focused on empirically increasing the robustness of neural ODEs against natural or adversarial attacks, certified robustness is still lacking. In this work, we propose a framework for training a neural ODE using barrier functions and demonstrate improved robustness for classification problems. We further provide the first generalization guarantee of robustness against adversarial attacks using a wait-and-judge scenario approach.  },\n}\n\n
\n
\n\n\n
\n Neural Ordinary Differential Equations (ODEs) have gained traction in many applications. While recent studies have focused on empirically increasing the robustness of neural ODEs against natural or adversarial attacks, certified robustness is still lacking. In this work, we propose a framework for training a neural ODE using barrier functions and demonstrate improved robustness for classification problems. We further provide the first generalization guarantee of robustness against adversarial attacks using a wait-and-judge scenario approach. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n TUNEOPT: An Evolutionary Reinforcement Learning HVAC Controller For Energy-Comfort Optimization Tuning.\n \n \n \n \n\n\n \n Meimand, M.; Khattar, V.; Yazdani, Z.; Jazizadeh, F.; and Jin, M.\n\n\n \n\n\n\n In ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation (BuildSys), 2023. \n \n\n\n\n
\n\n\n\n \n \n \"TUNEOPT: pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2023_2C_TUNEOPT,\n  title={TUNEOPT: An Evolutionary Reinforcement Learning HVAC Controller For Energy-Comfort Optimization Tuning},\n  author={Mostafa Meimand and Vanshaj Khattar and Zahra Yazdani and Farrokh Jazizadeh and Ming Jin},\n  booktitle={ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation (BuildSys)},\n  pages={},\n  year={2023},\n  url_pdf = {TUNEOPT23.pdf},\n  keywords = {Machine Learning, Control, Energy}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Theoretical Analysis of Using Gradient Data for Sobolev Training in RKHS.\n \n \n \n \n\n\n \n ul Abdeen, Z.; Jia, R.; Kekatos, V.; and Jin, M.\n\n\n \n\n\n\n IFAC World Congress. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{2023_2C_SobolevTrain,\n  title={A Theoretical Analysis of Using Gradient Data for Sobolev Training in RKHS},\n  author={Zain ul Abdeen and Ruoxi Jia and Vassilis Kekatos and Ming Jin},\n  year={2023},\n   journal = {IFAC World Congress}, \n  url_pdf={Sobolev_training2022.pdf},\n  keywords = {Machine Learning, Optimization},\n  abstract={Recent works empirically demonstrated that incorporating target derivatives, in addition to the conventional usage of target values, during the training process improves the accuracy of the predictor and data efficiency. Despite the successful application of gradient data in the learning process, very little is understood theoretically about their performance guarantee. In this paper, our goal is to highlight (i) the limitations of gradient data on their performance guarantees, especially in low-data regimes, and (ii) the extent to which the gradients affect the learning rate. Our result implies that in a low-data regime, if the Lipschitz of the target function is below a threshold, gradient data for Sobolev training outperforms the classical training in terms of sample efficiency. For a target function with a large Lipschitz constant, there is a threshold for training data size beyond which the gradient data perform better than conventional training. The convergence behavior of gradient data for Sobolev training is studied, and the learning rate of order $\\mathcal{O}(n^{-\\frac{1}{2}+\\epsilon})$ is derived. Experiments are conducted to determine the effect of gradient data in the learning process.   }\n}\n\n\n
\n
\n\n\n
\n Recent works empirically demonstrated that incorporating target derivatives, in addition to the conventional usage of target values, during the training process improves the accuracy of the predictor and data efficiency. Despite the successful application of gradient data in the learning process, very little is understood theoretically about their performance guarantee. In this paper, our goal is to highlight (i) the limitations of gradient data on their performance guarantees, especially in low-data regimes, and (ii) the extent to which the gradients affect the learning rate. Our result implies that in a low-data regime, if the Lipschitz of the target function is below a threshold, gradient data for Sobolev training outperforms the classical training in terms of sample efficiency. For a target function with a large Lipschitz constant, there is a threshold for training data size beyond which the gradient data perform better than conventional training. The convergence behavior of gradient data for Sobolev training is studied, and the learning rate of order $\\mathcal{O}(n^{-\\frac{1}{2}+ε})$ is derived. Experiments are conducted to determine the effect of gradient data in the learning process. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Decision-Focused Learning for Inverse Noncooperative Games: Generalization Bounds and Convergence Analysis.\n \n \n \n \n\n\n \n Al-Tawaha, A.; Kaushik, H.; Sel, B.; Jia, R.; and Jin, M.\n\n\n \n\n\n\n IFAC World Congress. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"Decision-Focused pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 22 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{2023_2C_CyberPower,\n  title={Decision-Focused Learning for Inverse Noncooperative Games: Generalization Bounds and Convergence Analysis},\n  author={Ahmad Al-Tawaha and Harshal Kaushik and Bilgehan Sel and Ruoxi Jia and Ming Jin},\n  year={2023},\n   journal = {IFAC World Congress}, \n  url_pdf={DFL-conf2022.pdf},\n  keywords = {Machine Learning, Optimization},\n  abstract={Finding the equilibrium strategy of agents is one of the central problems in game theory. Perhaps equally intriguing is the inverse of the above problem: from the available finite set of actions at equilibrium, how can we learn the utilities of players competing against each other and eventually use the learned models to predict their future actions?  Instead of following an estimate-then-predict approach, this work proposes a decision-focused learning (DFL) method that directly learns the utility function to improve prediction accuracy. The game's equilibrium is represented as a layer and integrated into an end-to-end optimization framework. We discuss the statistical bounds of covering numbers for the set of solution functions corresponding to the solution of a generic parametric variational inequality. Also, we establish the generalization bound for the set of solution functions with respect to smooth loss function with an improved rate. Moreover, we proposed an algorithm based on the iterative differentiation strategy to forward and back propagate through the equilibrium layer. The convergence analysis of the proposed algorithm is established. Finally, We numerically validate the proposed framework in the utility learning problem among the agents whose utility functions are approximated by partially input convex neural networks (PICNN).  }\n}\n\n
\n
\n\n\n
\n Finding the equilibrium strategy of agents is one of the central problems in game theory. Perhaps equally intriguing is the inverse of the above problem: from the available finite set of actions at equilibrium, how can we learn the utilities of players competing against each other and eventually use the learned models to predict their future actions? Instead of following an estimate-then-predict approach, this work proposes a decision-focused learning (DFL) method that directly learns the utility function to improve prediction accuracy. The game's equilibrium is represented as a layer and integrated into an end-to-end optimization framework. We discuss the statistical bounds of covering numbers for the set of solution functions corresponding to the solution of a generic parametric variational inequality. Also, we establish the generalization bound for the set of solution functions with respect to smooth loss function with an improved rate. Moreover, we proposed an algorithm based on the iterative differentiation strategy to forward and back propagate through the equilibrium layer. The convergence analysis of the proposed algorithm is established. Finally, We numerically validate the proposed framework in the utility learning problem among the agents whose utility functions are approximated by partially input convex neural networks (PICNN). \n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Recurrent Neural Network Controllers Synthesis with Stability Guarantees for Partially Observed Systems.\n \n \n \n \n\n\n \n Gu, F.; Yin, H.; El Ghaoui, L.; Arcak, M.; Seiler, P.; and Jin, M.\n\n\n \n\n\n\n AAAI Conference on Artificial Intelligence (AAAI). 2022.\n \n\n\n\n
\n\n\n\n \n \n \"Recurrent pdf\n  \n \n \n \"Recurrent arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{2022_3C_ppg,\n  title={Recurrent Neural Network Controllers Synthesis with Stability Guarantees for Partially Observed Systems},\n  author={Gu, Fangda and Yin, He and El Ghaoui, Laurent and Arcak, Murat and Seiler, Peter and Jin, Ming},\n  year={2022},\n   journal = "AAAI Conference on Artificial Intelligence (AAAI)",\n  url_pdf={PPG_2021.pdf},\n  url_arXiv={https://arxiv.org/abs/2109.03861},\n  keywords = {Machine learning, Reinforcement learning},\n  abstract={Neural network controllers have become popular in control tasks thanks to their flexibility and expressivity. Stability is a crucial property for safety-critical dynamical systems, while stabilization of partially observed systems, in many cases, requires controllers to retain and process long-term memories of the past. We consider the important class of recurrent neural networks (RNN) as dynamic controllers for nonlinear uncertain partially-observed systems, and derive convex stability conditions based on integral quadratic constraints, S-lemma and sequential convexification. To ensure stability during the learning and control process, we propose a projected policy gradient method that iteratively enforces the stability conditions in the reparametrized space taking advantage of mild additional information on system dynamics. Numerical experiments show that our method learns stabilizing controllers while using fewer samples and achieving higher final performance compared with policy gradient.}\n}\n\n
\n
\n\n\n
\n Neural network controllers have become popular in control tasks thanks to their flexibility and expressivity. Stability is a crucial property for safety-critical dynamical systems, while stabilization of partially observed systems, in many cases, requires controllers to retain and process long-term memories of the past. We consider the important class of recurrent neural networks (RNN) as dynamic controllers for nonlinear uncertain partially-observed systems, and derive convex stability conditions based on integral quadratic constraints, S-lemma and sequential convexification. To ensure stability during the learning and control process, we propose a projected policy gradient method that iteratively enforces the stability conditions in the reparametrized space taking advantage of mild additional information on system dynamics. Numerical experiments show that our method learns stabilizing controllers while using fewer samples and achieving higher final performance compared with policy gradient.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adversarial Unlearning of Backdoors via Implicit Hypergradient.\n \n \n \n \n\n\n \n Zeng, Y.; Chen, S.; Park, W.; Mao, Z. M.; Jin, M.; and Jia, R.\n\n\n \n\n\n\n International Conference on Learning Representations (ICLR). 2022.\n \n\n\n\n
\n\n\n\n \n \n \"Adversarial pdf\n  \n \n \n \"Adversarial arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{2022_3C_AdUn,\n  title={Adversarial Unlearning of Backdoors via Implicit Hypergradient},\n  author={Yi Zeng and Si Chen and Won Park and Z. Morley Mao and Ming Jin and Ruoxi Jia},\n  year={2022},\n   journal = {International Conference on Learning Representations (ICLR)}, \n  url_pdf={AdversarialUnlearning.pdf},\n  url_arXiv={https://arxiv.org/abs/2110.03735},\n  keywords = {Machine Learning},\n  abstract={We propose a minimax formulation for removing backdoors from a given poisoned model based on a small set of clean data. This formulation encompasses much of prior work on backdoor removal. We propose the Implicit Bacdoor Adversarial Unlearning (I-BAU) algorithm to solve the minimax. Unlike previous work, which breaks down the minimax into separate inner and outer problems, our algorithm utilizes the implicit hypergradient to account for the interdependence between inner and outer optimization. We theoretically analyze its convergence and the generalizability of the robustness gained by solving minimax on clean data to unseen test data. In our evaluation, we compare I-BAU with six state-of-art backdoor defenses on seven backdoor attacks over two datasets and various attack settings, including the common setting where the attacker targets one class as well as important but underexplored settings where multiple classes are targeted. I-BAU's performance is comparable to and most often significantly better than the best baseline. Particularly, its performance is more robust to the variation on triggers, attack settings, poison ratio, and clean data size. Moreover, I-BAU requires less computation to take effect; particularly, it is more than 13× faster than the most efficient baseline in the single-target attack setting. Furthermore, it can remain effective in the extreme case where the defender can only access 100 clean samples -- a setting where all the baselines fail to produce acceptable results.  }\n}\n\n\n\n
\n
\n\n\n
\n We propose a minimax formulation for removing backdoors from a given poisoned model based on a small set of clean data. This formulation encompasses much of prior work on backdoor removal. We propose the Implicit Bacdoor Adversarial Unlearning (I-BAU) algorithm to solve the minimax. Unlike previous work, which breaks down the minimax into separate inner and outer problems, our algorithm utilizes the implicit hypergradient to account for the interdependence between inner and outer optimization. We theoretically analyze its convergence and the generalizability of the robustness gained by solving minimax on clean data to unseen test data. In our evaluation, we compare I-BAU with six state-of-art backdoor defenses on seven backdoor attacks over two datasets and various attack settings, including the common setting where the attacker targets one class as well as important but underexplored settings where multiple classes are targeted. I-BAU's performance is comparable to and most often significantly better than the best baseline. Particularly, its performance is more robust to the variation on triggers, attack settings, poison ratio, and clean data size. Moreover, I-BAU requires less computation to take effect; particularly, it is more than 13× faster than the most efficient baseline in the single-target attack setting. Furthermore, it can remain effective in the extreme case where the defender can only access 100 clean samples – a setting where all the baselines fail to produce acceptable results. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Controlling Smart Inverters using Proxies: A Chance-Constrained DNN-based Approach.\n \n \n \n \n\n\n \n Gupta, S.; Kekatos, V.; and Jin, M.\n\n\n \n\n\n\n IEEE Transactions on Smart Grid. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"Controlling pdf\n  \n \n \n \"Controlling arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{2022_2J_proxy,\n  title={Controlling Smart Inverters using Proxies: A Chance-Constrained DNN-based Approach},\n  author={Gupta, Sarthak and Kekatos, Vassilis and Jin, Ming},\n  year={2022},\n  journal = "IEEE Transactions on Smart Grid",\n  url_pdf={Control_Proxy_2021.pdf},\n  url_arXiv={https://arxiv.org/abs/2105.00429},\n  keywords = {Optimization, Machine learning, Power system},\n  abstract={Coordinating inverters at scale under uncertainty is the desideratum for integrating renewables in distribution grids. Unless load demands and solar generation are telemetered frequently, controlling inverters given approximate grid conditions or proxies thereof becomes a key specification. Although deep neural networks (DNNs) can learn optimal inverter schedules, guaranteeing feasibility is largely elusive. Rather than training DNNs to imitate already computed optimal power flow (OPF) solutions, this work integrates DNN-based inverter policies into the OPF. The proposed DNNs are trained through two OPF alternatives that confine voltage deviations on the average and as a convex restriction of chance constraints. The trained DNNs can be driven by partial, noisy, or proxy descriptors of the current grid conditions. This is important when OPF has to be solved for an unobservable feeder. DNN weights are trained via back-propagation and upon differentiating the AC power flow equations assuming the network model is known. Otherwise, a gradient-free variant is put forth. The latter is relevant when inverters are controlled by an aggregator having access only to a power flow solver or a digital twin of the feeder. Numerical tests compare the DNN-based inverter control schemes with the optimal inverter setpoints in terms of optimality and feasibility.}}\n  \n
\n
\n\n\n
\n Coordinating inverters at scale under uncertainty is the desideratum for integrating renewables in distribution grids. Unless load demands and solar generation are telemetered frequently, controlling inverters given approximate grid conditions or proxies thereof becomes a key specification. Although deep neural networks (DNNs) can learn optimal inverter schedules, guaranteeing feasibility is largely elusive. Rather than training DNNs to imitate already computed optimal power flow (OPF) solutions, this work integrates DNN-based inverter policies into the OPF. The proposed DNNs are trained through two OPF alternatives that confine voltage deviations on the average and as a convex restriction of chance constraints. The trained DNNs can be driven by partial, noisy, or proxy descriptors of the current grid conditions. This is important when OPF has to be solved for an unobservable feeder. DNN weights are trained via back-propagation and upon differentiating the AC power flow equations assuming the network model is known. Otherwise, a gradient-free variant is put forth. The latter is relevant when inverters are controlled by an aggregator having access only to a power flow solver or a digital twin of the feeder. Numerical tests compare the DNN-based inverter control schemes with the optimal inverter setpoints in terms of optimality and feasibility.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Learning Neural Networks under Input-Output Specifications.\n \n \n \n \n\n\n \n ul Abdeen, Z.; Yin, H.; Kekatos, V.; and Jin, M.\n\n\n \n\n\n\n In American Control Conference, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"Learning pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2022_2C_learning,\n  title={Learning Neural Networks under Input-Output Specifications},\n  author={Zain ul Abdeen and He Yin and Vassilis Kekatos and Ming Jin},\n  booktitle={American Control Conference},\n  pages={},\n  year={2022},\n  url_pdf={LearnNNSpecs.pdf},\n  keywords = {Optimization, Machine Learning},\n  abstract={In this paper, we examine an important problem of learning neural networks that certifiably meet certain specifications on input-output behaviors.  Our strategy is to find an inner approximation of the set of admissible policy parameters, which is convex in a transformed space. To this end, we address the key technical challenge of convexifying the verification condition for neural networks, which is derived by abstracting the nonlinear specifications and activation functions with quadratic constraints. In particular, we propose a reparametrization scheme of the original neural network based on loop transformation, which leads to a convex condition that can be computationally enforced during learning. The theoretical construction is validated in an experiment that specifies reachable sets for different regions of inputs.  },\n  keywords={Machine learning, Optimization}\n}\n\n\n
\n
\n\n\n
\n In this paper, we examine an important problem of learning neural networks that certifiably meet certain specifications on input-output behaviors. Our strategy is to find an inner approximation of the set of admissible policy parameters, which is convex in a transformed space. To this end, we address the key technical challenge of convexifying the verification condition for neural networks, which is derived by abstracting the nonlinear specifications and activation functions with quadratic constraints. In particular, we propose a reparametrization scheme of the original neural network based on loop transformation, which leads to a convex condition that can be computationally enforced during learning. The theoretical construction is validated in an experiment that specifies reachable sets for different regions of inputs. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Defense against Joint Poisoning and Evasion Attacks: A Case Study of DERMS.\n \n \n \n \n\n\n \n ul Abdeen, Z.; Roy, P.; Al-Tawaha, A.; Jia, R.; Freeman, L.; Beling, P.; Liu, C.; Sangiovanni-Vincentelli, A.; and Jin, M.\n\n\n \n\n\n\n Preprint. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"Defense pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 25 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{2022_2C_CyberPower,\n  title={Defense against Joint Poisoning and Evasion Attacks: A Case Study of DERMS},\n  author={Zain ul Abdeen and Padmaksha Roy and Ahmad Al-Tawaha and Rouxi Jia and Laura Freeman and Peter Beling and Chen-Ching Liu and Alberto Sangiovanni-Vincentelli and Ming Jin},\n  year={2022},\n   journal = {Preprint}, \n  url_pdf={Cybersecurity_PS2022.pdf},\n  keywords = {Machine Learning, Cybersecurity, Power system},\n  abstract={There is an upward trend of deploying distributed energy resource management systems (DERMS) to control modern power grids. However, DERMS controller communication lines are vulnerable to cyberattacks that could potentially impact operational reliability. While a data-driven intrusion detection system (IDS) can potentially thwart attacks during deployment, also known as  the evasion attack, the training of the detection algorithm may be corrupted by adversarial data injected into the database, also known as the poisoning attack.  In this paper, we propose the \\emph{first} framework of IDS that is robust against joint poisoning and evasion attacks. We formulate the defense mechanism as a bilevel optimization, where the inner and outer levels deal with attacks that occur during training time and testing time, respectively. We verify the robustness of our method on the IEEE-13 bus feeder model against a diverse set of poisoning and evasion attack scenarios. The results indicate that our proposed method outperforms the baseline technique in terms of accuracy, precision, and recall for intrusion detection.  }\n}\n\n
\n
\n\n\n
\n There is an upward trend of deploying distributed energy resource management systems (DERMS) to control modern power grids. However, DERMS controller communication lines are vulnerable to cyberattacks that could potentially impact operational reliability. While a data-driven intrusion detection system (IDS) can potentially thwart attacks during deployment, also known as the evasion attack, the training of the detection algorithm may be corrupted by adversarial data injected into the database, also known as the poisoning attack. In this paper, we propose the \\emphfirst framework of IDS that is robust against joint poisoning and evasion attacks. We formulate the defense mechanism as a bilevel optimization, where the inner and outer levels deal with attacks that occur during training time and testing time, respectively. We verify the robustness of our method on the IEEE-13 bus feeder model against a diverse set of poisoning and evasion attack scenarios. The results indicate that our proposed method outperforms the baseline technique in terms of accuracy, precision, and recall for intrusion detection. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dynamic Regret Bounds for Constrained Online Nonconvex Optimization Based on Polyak-Lojasiewicz Regions.\n \n \n \n \n\n\n \n Mulvaney-Kemp, J.; Park, S.; Jin, M.; and Lavaei, J.\n\n\n \n\n\n\n . 2022.\n IEEE Transactions on Control of Network Systems\n\n\n\n
\n\n\n\n \n \n \"Dynamic pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{2021_2J_ONO,\n  title={Dynamic Regret Bounds for Constrained Online Nonconvex Optimization\nBased on Polyak-Lojasiewicz Regions},\n  author={Julie Mulvaney-Kemp and SangWoo Park and Ming Jin and Javad Lavaei},\n  year={2022},\n   note={IEEE Transactions on Control of Network Systems}, \n  url_pdf={ONO_dynamic_2022.pdf},\n  keywords = {Optimization},\n  abstract={Online optimization problems are well-understood in the convex case, where algorithmic performance is typically measured relative to the best fixed decision. In this paper, we shed light on online nonconvex optimization problems in which algorithms are evaluated against the optimal decision at each time using the more useful notion of dynamic regret. The focus is on loss functions which are arbitrarily nonconvex, but have global solutions that are slowly time-varying. We address this problem by first analyzing the region around the global solution at each time to define time-varying target sets, which contain the global solution and exhibit desirable properties under the projected gradient descent algorithm. All points in a target set satisfy the proximal Polyak-Łojasiewicz inequality, among other conditions. Then, we introduce two algorithms and prove that the dynamic regret for each algorithm is bounded by a function of the temporal variation in the optimal decision. The first algorithm assumes that the decision maker has some prior knowledge about the initial objective function and may query the gradient repeatedly at each time. This algorithm ensures that decisions are within the target set at every time. The second algorithm makes no assumption about prior knowledge. It instead relies on random sampling and memory to find and then track the target sets over time. In this case, the landscape of the loss functions determines the likelihood that the dynamic regret will be small. Numerical experiments validate these theoretical results and highlight the impact of a single low-complexity problem early in the sequence.}\n}\n\n
\n
\n\n\n
\n Online optimization problems are well-understood in the convex case, where algorithmic performance is typically measured relative to the best fixed decision. In this paper, we shed light on online nonconvex optimization problems in which algorithms are evaluated against the optimal decision at each time using the more useful notion of dynamic regret. The focus is on loss functions which are arbitrarily nonconvex, but have global solutions that are slowly time-varying. We address this problem by first analyzing the region around the global solution at each time to define time-varying target sets, which contain the global solution and exhibit desirable properties under the projected gradient descent algorithm. All points in a target set satisfy the proximal Polyak-Łojasiewicz inequality, among other conditions. Then, we introduce two algorithms and prove that the dynamic regret for each algorithm is bounded by a function of the temporal variation in the optimal decision. The first algorithm assumes that the decision maker has some prior knowledge about the initial objective function and may query the gradient repeatedly at each time. This algorithm ensures that decisions are within the target set at every time. The second algorithm makes no assumption about prior knowledge. It instead relies on random sampling and memory to find and then track the target sets over time. In this case, the landscape of the loss functions determines the likelihood that the dynamic regret will be small. Numerical experiments validate these theoretical results and highlight the impact of a single low-complexity problem early in the sequence.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Power up! Robust graph convolutional network via graph powering.\n \n \n \n \n\n\n \n Jin, M.; Chang, H.; Zhu, W.; and Sojoudi, S.\n\n\n \n\n\n\n In AAAI Conference on Artificial Intelligence (AAAI), 2021. \n \n\n\n\n
\n\n\n\n \n \n \"Power pdf\n  \n \n \n \"Power arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2021_3C_power,\n  title={Power up! Robust graph convolutional network via graph powering},\n  author={Jin, Ming and Chang, Heng and Zhu, Wenwu and Sojoudi, Somayeh},\n  booktitle={AAAI Conference on Artificial Intelligence (AAAI)},\n  url_pdf={Robust_GCN.pdf},\n  url_arXiv={https://arxiv.org/abs/1905.10029},\n  keywords={Graph theory, Machine learning},\n  abstract={Graph convolutional networks (GCNs) are powerful tools for graph-structured data. However, they have been recently shown to be vulnerable to topological attacks. To enhance adversarial robustness, we go beyond spectral graph theory to robust graph theory. By challenging the classical graph Laplacian, we propose a new convolution operator that is provably robust in the spectral domain and is incorporated in the GCN architecture to improve expressivity and interpretability. By extending the original graph to a sequence of graphs, we also propose a robust training paradigm that encourages transferability across graphs that span a range of spatial and spectral characteristics. The proposed approaches are demonstrated in extensive experiments to simultaneously improve performance in both benign and adversarial situations.},\n  year={2021}\n}\n
\n
\n\n\n
\n Graph convolutional networks (GCNs) are powerful tools for graph-structured data. However, they have been recently shown to be vulnerable to topological attacks. To enhance adversarial robustness, we go beyond spectral graph theory to robust graph theory. By challenging the classical graph Laplacian, we propose a new convolution operator that is provably robust in the spectral domain and is incorporated in the GCN architecture to improve expressivity and interpretability. By extending the original graph to a sequence of graphs, we also propose a robust training paradigm that encourages transferability across graphs that span a range of spatial and spectral characteristics. The proposed approaches are demonstrated in extensive experiments to simultaneously improve performance in both benign and adversarial situations.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Imitation Learning with Stability and Safety Guarantees.\n \n \n \n \n\n\n \n Yin, H.; Seiler, P.; Jin, M.; and Arcak, M.\n\n\n \n\n\n\n . 2021.\n IEEE Control Systems Letters\n\n\n\n
\n\n\n\n \n \n \"Imitation pdf\n  \n \n \n \"Imitation arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{2021_3C_imitation,\n  title={Imitation Learning with Stability and Safety Guarantees},\n  author={Yin, He and Seiler, Peter and Jin, Ming and Arcak, Murat},\n  year={2021},\n  note={IEEE Control Systems Letters}, \n  url_pdf={SafeIL2020.pdf},\n  url_arXiv={https://arxiv.org/abs/2012.09293},\n  keywords = {Control theory, Machine learning},\n  abstract={A method is presented to synthesize neural network (NN) controllers with stability and safety guarantees through imitation learning. Convex stability and safety conditions are derived for linear time-invariant plant dynamics with NN controllers. The proposed approach merges Lyapunov theory with local quadratic constraints to bound the nonlinear activation functions in the NN. The safe imitation learning problem is formulated as an optimization problem with the goal of minimizing the imitation learning loss, and maximizing volume of the region of attraction associated with the NN controller, while enforcing the stability and safety conditions. An alternating direction method of multipliers based algorithm is proposed to solve the optimization. The method is illustrated on an inverted pendulum system and aircraft longitudinal dynamics.}}\n\n
\n
\n\n\n
\n A method is presented to synthesize neural network (NN) controllers with stability and safety guarantees through imitation learning. Convex stability and safety conditions are derived for linear time-invariant plant dynamics with NN controllers. The proposed approach merges Lyapunov theory with local quadratic constraints to bound the nonlinear activation functions in the NN. The safe imitation learning problem is formulated as an optimization problem with the goal of minimizing the imitation learning loss, and maximizing volume of the region of attraction associated with the NN controller, while enforcing the stability and safety conditions. An alternating direction method of multipliers based algorithm is proposed to solve the optimization. The method is illustrated on an inverted pendulum system and aircraft longitudinal dynamics.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Unified Framework for Task-Driven Data Quality Management.\n \n \n \n \n\n\n \n Wang, T.; Zeng, Y.; Jin, M.; and Jia, R.\n\n\n \n\n\n\n . 2021.\n Preprint.\n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n \n \"A arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{2021_3C_dqm,\n  title={A Unified Framework for Task-Driven Data Quality Management},\n  author={Wang, Tianhao and Zeng, Yi and Jin, Ming and Jia, Ruoxi},\n  year={2021},\n   note={Preprint.}, \n  url_pdf={DQM_2021.pdf},\n  url_arXiv={https://arxiv.org/abs/2106.05484?context=cs},\n  keywords = {Machine learning},\n  abstract={High-quality data is critical to train performant Machine Learning (ML) models, highlighting the importance of Data Quality Management (DQM). Existing DQM schemes often cannot satisfactorily improve ML performance because, by design, they are oblivious to downstream ML tasks. Besides, they cannot handle various data quality issues (especially those caused by adversarial attacks) and have limited applications to only certain types of ML models. Recently, data valuation approaches (e.g., based on the Shapley value) have been leveraged to perform DQM; yet, empirical studies have observed that their performance varies considerably based on the underlying data and training process. In this paper, we propose a task-driven, multi-purpose, model-agnostic DQM framework, DataSifter, which is optimized towards a given downstream ML task, capable of effectively removing data points with various defects, and applicable to diverse models. Specifically, we formulate DQM as an optimization problem and devise a scalable algorithm to solve it. Furthermore, we propose a theoretical framework for comparing the worst-case performance of different DQM strategies. Remarkably, our results show that the popular strategy based on the Shapley value may end up choosing the worst data subset in certain practical scenarios. Our evaluation shows that DataSifter achieves and most often significantly improves the state-of-the-art performance over a wide range of DQM tasks, including backdoor, poison, noisy/mislabel data detection, data summarization, and data debiasing.}\n}\n\n\n
\n
\n\n\n
\n High-quality data is critical to train performant Machine Learning (ML) models, highlighting the importance of Data Quality Management (DQM). Existing DQM schemes often cannot satisfactorily improve ML performance because, by design, they are oblivious to downstream ML tasks. Besides, they cannot handle various data quality issues (especially those caused by adversarial attacks) and have limited applications to only certain types of ML models. Recently, data valuation approaches (e.g., based on the Shapley value) have been leveraged to perform DQM; yet, empirical studies have observed that their performance varies considerably based on the underlying data and training process. In this paper, we propose a task-driven, multi-purpose, model-agnostic DQM framework, DataSifter, which is optimized towards a given downstream ML task, capable of effectively removing data points with various defects, and applicable to diverse models. Specifically, we formulate DQM as an optimization problem and devise a scalable algorithm to solve it. Furthermore, we propose a theoretical framework for comparing the worst-case performance of different DQM strategies. Remarkably, our results show that the popular strategy based on the Shapley value may end up choosing the worst data subset in certain practical scenarios. Our evaluation shows that DataSifter achieves and most often significantly improves the state-of-the-art performance over a wide range of DQM tasks, including backdoor, poison, noisy/mislabel data detection, data summarization, and data debiasing.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Diminishing Regret for Online Nonconvex Optimization.\n \n \n \n \n\n\n \n Park, S.; Mulvaney-Kemp, J.; Jin, M.; and Lavaei, J.\n\n\n \n\n\n\n In American Control Conference, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"Diminishing pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{2021_1C_dim,\n  title={Diminishing Regret for Online Nonconvex Optimization},\n  author={SangWoo Park and Julie Mulvaney-Kemp and Ming Jin and Javad Lavaei},\n  booktitle={American Control Conference},\n  pages={},\n  year={2021},\n  url_pdf={regret_ONO_2020_1.pdf},\n  abstract={A single nonconvex optimization is NP-hard in the worst case, and so is a sequence of nonconvex problems viewed separately. For online nonconvex optimization (ONO) problems, widely used local search algorithms are guaranteed to track a sequence of local optima, but offer no promises about global optimality. In this paper, we introduce the concept of nonconvexity regret to measure the performance of a local search method against a global optimization solver for ONO. We define the notion of depth of a global minimum, and show that memory and random explorations drive the nonconvexity regret to zero if the variability of the objective function is low compared to the depth of the global minima. We prove probabilistic guarantees on the regret bound that depend on the evolution of the landscapes of the time-varying objective functions. Then, based on the notions of missing mass and 1-occupancy set, we develop a practical algorithm that works even when there is no such information on the landscapes. The theoretical results imply that the existence of a low-complexity optimization at any arbitrary time instance of ONO can nullify the NP-hardness of the entire ONO problem. The results are verified through numerical simulations.},\n  keywords={Optimization}\n}\n\n
\n
\n\n\n
\n A single nonconvex optimization is NP-hard in the worst case, and so is a sequence of nonconvex problems viewed separately. For online nonconvex optimization (ONO) problems, widely used local search algorithms are guaranteed to track a sequence of local optima, but offer no promises about global optimality. In this paper, we introduce the concept of nonconvexity regret to measure the performance of a local search method against a global optimization solver for ONO. We define the notion of depth of a global minimum, and show that memory and random explorations drive the nonconvexity regret to zero if the variability of the objective function is low compared to the depth of the global minima. We prove probabilistic guarantees on the regret bound that depend on the evolution of the landscapes of the time-varying objective functions. Then, based on the notions of missing mass and 1-occupancy set, we develop a practical algorithm that works even when there is no such information on the landscapes. The theoretical results imply that the existence of a low-complexity optimization at any arbitrary time instance of ONO can nullify the NP-hardness of the entire ONO problem. The results are verified through numerical simulations.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Boundary Defense Against Cyber Threat for Power System State Estimation.\n \n \n \n \n\n\n \n Jin, M.; Lavaei, J.; Sojoudi, S.; and Baldick, R.\n\n\n \n\n\n\n IEEE Transactions on Information Forensics and Security,1-16. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Boundary pdf\n  \n \n \n \"Boundary link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 10 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@ARTICLE{2020_3J_boundary,\n  author={M. {Jin} and J. {Lavaei} and S. {Sojoudi} and R. {Baldick}},\n  journal={IEEE Transactions on Information Forensics and Security}, \n  title={Boundary Defense Against Cyber Threat for Power System State Estimation}, \n  year={2020},\n  volume={},\n  number={},\n  pages={1-16},\n  doi={10.1109/TIFS.2020.3043065},\n  abstract={The operation of power grids is becoming increasingly data-centric. While the abundance of data could improve system efficiency, it poses major reliability challenges. In particular, state estimation aims to find the operating state of a network from the telemetered data, but an undetected attack on the data could lead to making wrong operational decisions for the system and trigger a large-scale blackout. Nevertheless, understanding the vulnerability of state estimation with regards to cyberattacks, which is a special instance of graph-structured quadratic sensing problem, has been hindered by the lack of tools for studying the topological and data-analytic aspects of networks. Algorithmic robustness is critical in extracting reliable information from abundant but untrusted grid data. For a large-scale power grid, we quantify, analyze, and visualize the regions of the network that are not robust to cyberattacks in the sense that there exists a data manipulation strategy for each of those local regions that misleads the operator at the global scale and yields a wrong estimation of the state of the network at almost all buses. We also propose an optimization-based graphical boundary defense mechanism to identify the border of the geographical area in which data have been manipulated. The proposed method does not allow a local attack to have a global effect on the data analysis of the entire network, which enhances the situational awareness of the grid, especially in the face of adversity. The developed mathematical framework reveals key geometric and algebraic factors that can affect algorithmic robustness and is used to study the vulnerability of the U.S. power grid in this paper.},\n  url_pdf =    {TIFS_Boundary_Defense.pdf},\n  url_link =     {https://ieeexplore.ieee.org/document/9290080},\n  keywords = {Cybersecurity, Power system, Optimization, Graph theory}}\n  \n
\n
\n\n\n
\n The operation of power grids is becoming increasingly data-centric. While the abundance of data could improve system efficiency, it poses major reliability challenges. In particular, state estimation aims to find the operating state of a network from the telemetered data, but an undetected attack on the data could lead to making wrong operational decisions for the system and trigger a large-scale blackout. Nevertheless, understanding the vulnerability of state estimation with regards to cyberattacks, which is a special instance of graph-structured quadratic sensing problem, has been hindered by the lack of tools for studying the topological and data-analytic aspects of networks. Algorithmic robustness is critical in extracting reliable information from abundant but untrusted grid data. For a large-scale power grid, we quantify, analyze, and visualize the regions of the network that are not robust to cyberattacks in the sense that there exists a data manipulation strategy for each of those local regions that misleads the operator at the global scale and yields a wrong estimation of the state of the network at almost all buses. We also propose an optimization-based graphical boundary defense mechanism to identify the border of the geographical area in which data have been manipulated. The proposed method does not allow a local attack to have a global effect on the data analysis of the entire network, which enhances the situational awareness of the grid, especially in the face of adversity. The developed mathematical framework reveals key geometric and algebraic factors that can affect algorithmic robustness and is used to study the vulnerability of the U.S. power grid in this paper.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Deep Learning for Reactive Power Control of Smart Inverters under Communication Constraints.\n \n \n \n \n\n\n \n Gupta, S.; Kekatos, V.; and Jin, M.\n\n\n \n\n\n\n In IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2020. \n \n\n\n\n
\n\n\n\n \n \n \"Deep link\n  \n \n \n \"Deep pdf\n  \n \n \n \"Deep arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2020_3C_dl,\n  title={Deep Learning for Reactive Power Control of Smart Inverters under Communication Constraints},\n  author={Gupta, Sarthak and Kekatos, Vassilis and Jin, Ming},\n  booktitle={IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)},\n  year={2020},\n  url_link={https://smartgridcomm.info/day/1},\n  url_pdf={DL_SmartInverter_2020.pdf},\n  url_arXiv={https://arxiv.org/abs/2007.05868},\n  abstract={Aiming for the median solution between cyber-intensive optimal power flow (OPF) solutions and subpar local control, this work advocates deciding inverter injection setpoints using deep neural networks (DNNs). Instead of fitting OPF solutions in a black-box manner, inverter DNNs are naturally integrated with the feeder model and trained to minimize a grid-wide objective subject to inverter and network constraints enforced on the average over uncertain grid conditions. Learning occurs in a quasi-stationary fashion and is posed as a stochastic OPF, handled via stochastic primal-dual updates acting on grid data scenarios. Although trained as a whole, the proposed DNN is operated in a master-slave architecture. Its master part is run at the utility to output a condensed control signal broadcast to all inverters. Its slave parts are implemented by inverters and are driven by the utility signal along with local inverter readings. This novel DNN structure uniquely addresses the small-big data conundrum where utilities collect detailed smart meter readings yet on an hourly basis, while in real time inverters should be driven by local inputs and minimal utility coordination to save on communication. Numerical tests corroborate the efficacy of this physics-aware DNN-based inverter solution over an optimal control policy.},\n  keywords={Machine learning, Power system}\n}\n\n
\n
\n\n\n
\n Aiming for the median solution between cyber-intensive optimal power flow (OPF) solutions and subpar local control, this work advocates deciding inverter injection setpoints using deep neural networks (DNNs). Instead of fitting OPF solutions in a black-box manner, inverter DNNs are naturally integrated with the feeder model and trained to minimize a grid-wide objective subject to inverter and network constraints enforced on the average over uncertain grid conditions. Learning occurs in a quasi-stationary fashion and is posed as a stochastic OPF, handled via stochastic primal-dual updates acting on grid data scenarios. Although trained as a whole, the proposed DNN is operated in a master-slave architecture. Its master part is run at the utility to output a condensed control signal broadcast to all inverters. Its slave parts are implemented by inverters and are driven by the utility signal along with local inverter readings. This novel DNN structure uniquely addresses the small-big data conundrum where utilities collect detailed smart meter readings yet on an hourly basis, while in real time inverters should be driven by local inputs and minimal utility coordination to save on communication. Numerical tests corroborate the efficacy of this physics-aware DNN-based inverter solution over an optimal control policy.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Stability-Certified Reinforcement Learning: A Control-Theoretic Perspective.\n \n \n \n \n\n\n \n Jin, M.; and Lavaei, J.\n\n\n \n\n\n\n IEEE Access,1-1. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Stability-Certified pdf\n  \n \n \n \"Stability-Certified link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@ARTICLE{2020_2J_stabilityrl,\n  author={M. {Jin} and J. {Lavaei}},\n  journal={IEEE Access}, \n  title={Stability-Certified Reinforcement Learning: A Control-Theoretic Perspective}, \n  year={2020},\n  volume={},\n  number={},\n  pages={1-1},\n  doi={10.1109/ACCESS.2020.3045114},\n  abstract={We investigate the important problem of certifying stability of reinforcement learning policies when interconnected with nonlinear dynamical systems. We show that by regulating the partial gradients of policies, strong guarantees of robust stability can be obtained based on a proposed semidefinite programming feasibility problem. The method is able to certify a large set of stabilizing controllers by exploiting problem-specific structures; furthermore, we analyze and establish its (non)conservatism. Empirical evaluations on two decentralized control tasks, namely multi-flight formation and power system frequency regulation, demonstrate that the reinforcement learning agents can have high performance within the stability-certified parameter space and also exhibit stable learning behaviors in the long run.},\n  url_pdf =    {SafeRL_2020.pdf},\n  url_link =     {https://ieeexplore.ieee.org/document/9296215},\n  keywords = {Control theory, Machine learning, Power system}}\n\n
\n
\n\n\n
\n We investigate the important problem of certifying stability of reinforcement learning policies when interconnected with nonlinear dynamical systems. We show that by regulating the partial gradients of policies, strong guarantees of robust stability can be obtained based on a proposed semidefinite programming feasibility problem. The method is able to certify a large set of stabilizing controllers by exploiting problem-specific structures; furthermore, we analyze and establish its (non)conservatism. Empirical evaluations on two decentralized control tasks, namely multi-flight formation and power system frequency regulation, demonstrate that the reinforcement learning agents can have high performance within the stability-certified parameter space and also exhibit stable learning behaviors in the long run.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Scalable and Robust State Estimation From Abundant but Untrusted Data.\n \n \n \n \n\n\n \n Jin, M.; Molybog, I.; Mohammadi-Ghazi, R.; and Lavaei, J.\n\n\n \n\n\n\n IEEE Transactions on Smart Grid, 11(3): 1880-1894. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Scalable pdf\n  \n \n \n \"Scalable link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@ARTICLE{2020_2J_scalable,\n  author={M. {Jin} and I. {Molybog} and R. {Mohammadi-Ghazi} and J. {Lavaei}},\n  journal={IEEE Transactions on Smart Grid}, \n  title={Scalable and Robust State Estimation From Abundant but Untrusted Data}, \n  year={2020},\n  volume={11},\n  number={3},\n  pages={1880-1894},\n  doi={10.1109/TSG.2019.2944986},\n  abstract={Power system state estimation is an important problem in grid operation that has a long tradition of research since 1960s. Due to the nonconvexity of the problem, existing approaches based on local search methods are susceptible to spurious local minima, which could endanger the reliability of the system. In general, even in the absence of noise, it is challenging to provide a practical condition under which one can uniquely identify the global solution due to its NP-hardness. In this study, we propose a linear basis of representation that succinctly captures the topology of the network and enables an efficient two-stage estimation method in case the amount of measured data is not too low. Based on this framework, we propose an identifiability condition that numerically depicts the boundary where one can warrant efficient recovery of the unique global minimum. Furthermore, we develop a robustness metric called “mutual incoherence,” which underpins theoretical analysis of global recovery condition and statistical error bounds in the presence of both dense noise and bad data. The method demonstrates superior performance over existing methods in terms of both estimation accuracy and bad data robustness in an array of benchmark systems. Above all, it is scalable to large systems with more than 13,000 buses and can achieve accurate estimation within a minute.},\n  url_pdf =    {PSSE_Linear_Estimator.pdf},\n  url_link =     {https://ieeexplore.ieee.org/document/8855013},\n  keywords = {Power system, Optimization, Cybersecurity}}\n  \n
\n
\n\n\n
\n Power system state estimation is an important problem in grid operation that has a long tradition of research since 1960s. Due to the nonconvexity of the problem, existing approaches based on local search methods are susceptible to spurious local minima, which could endanger the reliability of the system. In general, even in the absence of noise, it is challenging to provide a practical condition under which one can uniquely identify the global solution due to its NP-hardness. In this study, we propose a linear basis of representation that succinctly captures the topology of the network and enables an efficient two-stage estimation method in case the amount of measured data is not too low. Based on this framework, we propose an identifiability condition that numerically depicts the boundary where one can warrant efficient recovery of the unique global minimum. Furthermore, we develop a robustness metric called “mutual incoherence,” which underpins theoretical analysis of global recovery condition and statistical error bounds in the presence of both dense noise and bad data. The method demonstrates superior performance over existing methods in terms of both estimation accuracy and bad data robustness in an array of benchmark systems. Above all, it is scalable to large systems with more than 13,000 buses and can achieve accurate estimation within a minute.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards Off-policy Evaluation as a Prerequisite for Real-world Reinforcement Learning in Building Control.\n \n \n \n \n\n\n \n Chen, B.; Jin, M.; Wang, Z.; Hong, T.; and Bergés, M.\n\n\n \n\n\n\n In International Workshop on Reinforcement Learning for Energy Management in Buildings & Cities (RLEM), pages 52–56, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"Towards link\n  \n \n \n \"Towards pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2020_2C_ope,\n  title={Towards Off-policy Evaluation as a Prerequisite for Real-world Reinforcement Learning in Building Control},\n  author={Chen, Bingqing and Jin, Ming and Wang, Zhe and Hong, Tianzhen and Berg{\\'e}s, Mario},\n  booktitle={International Workshop on Reinforcement Learning for Energy Management in Buildings \\& Cities (RLEM)},\n  pages={52--56},\n  year={2020},\n  url_link={https://dl.acm.org/doi/abs/10.1145/3427773.3427871},\n  url_pdf={OPE_RLEM20.pdf},\n  abstract={We present an initial study of off-policy evaluation (OPE), a problem prerequisite to real-world reinforcement learning (RL), in the context of building control. OPE is the problem of estimating a policy's performance without running it on the actual system, using historical data from the existing controller. It enables the control engineers to ensure a new, pretrained policy satisfies the performance requirements and safety constraints of a real-world system, prior to interacting with it. While many methods have been developed for OPE, no study has evaluated which ones are suitable for building operational data, which are generated by deterministic policies and have limited coverage of the state-action space. After reviewing existing works and their assumptions, we adopted the approximate model (AM) method. Furthermore, we used bootstrapping to quantify uncertainty and correct for bias. In a simulation study, we evaluated the proposed approach on 10 policies pretrained with imitation learning. On average, the AM method estimated the energy and comfort costs with 1.84% and 14.1% error, respectively.},\n  keywords={Machine learning, Energy system, Smart city}\n}\n\n
\n
\n\n\n
\n We present an initial study of off-policy evaluation (OPE), a problem prerequisite to real-world reinforcement learning (RL), in the context of building control. OPE is the problem of estimating a policy's performance without running it on the actual system, using historical data from the existing controller. It enables the control engineers to ensure a new, pretrained policy satisfies the performance requirements and safety constraints of a real-world system, prior to interacting with it. While many methods have been developed for OPE, no study has evaluated which ones are suitable for building operational data, which are generated by deterministic policies and have limited coverage of the state-action space. After reviewing existing works and their assumptions, we adopted the approximate model (AM) method. Furthermore, we used bootstrapping to quantify uncertainty and correct for bias. In a simulation study, we evaluated the proposed approach on 10 policies pretrained with imitation learning. On average, the AM method estimated the energy and comfort costs with 1.84% and 14.1% error, respectively.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Survey on Conic Relaxations of Optimal Power Flow Problem.\n \n \n \n \n\n\n \n Zohrizadeh, F.; Josz, C.; Jin, M.; Madani, R.; Lavaei, J.; and Sojoudi, S.\n\n\n \n\n\n\n European Journal of Operational Research, 287(2): 391 - 409. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"A link\n  \n \n \n \"A pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{2020_1J_survey,\ntitle = "A Survey on Conic Relaxations of Optimal Power Flow Problem",\njournal = "European Journal of Operational Research",\nvolume = "287",\nnumber = "2",\npages = "391 - 409",\nyear = "2020",\nissn = "0377-2217",\ndoi = "https://doi.org/10.1016/j.ejor.2020.01.034",\nabstract = "Conic optimization has recently emerged as a powerful tool for designing tractable and guaranteed algorithms for power system operation. On the one hand, tractability is crucial due to the large size of modern electricity transmission grids. This is a result of the numerous interconnections that have been built over time. On the other hand, guarantees are needed to ensure reliability and safety for consumers at a time when power systems are growing in complexity. This is in large part due to the high penetration of renewable energy sources and the advent of electric vehicles. The aim of this paper is to review the latest literature in order to demonstrate the success of conic optimization when applied to power systems. The main focus is on how linear programming, second-order cone programming, and semidefinite programming can be used to address a central problem named the optimal power flow problem. We describe how they are used to design convex relaxations of this highly challenging non-convex optimization problem. We also show how sum-of-squares can be used to strengthen these relaxations. Finally, we present advances in first-order methods, interior-point methods, and nonconvex methods for solving conic optimization. Challenges for future research are also discussed.",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S0377221720300552",\nurl_pdf = "Review_OPF_2019.pdf",\nauthor = "Fariba Zohrizadeh and Cedric Josz and Ming Jin and Ramtin Madani and Javad Lavaei and Somayeh Sojoudi",\nkeywords = "Power system, Optimization, Graph theory"\n}\n\n
\n
\n\n\n
\n Conic optimization has recently emerged as a powerful tool for designing tractable and guaranteed algorithms for power system operation. On the one hand, tractability is crucial due to the large size of modern electricity transmission grids. This is a result of the numerous interconnections that have been built over time. On the other hand, guarantees are needed to ensure reliability and safety for consumers at a time when power systems are growing in complexity. This is in large part due to the high penetration of renewable energy sources and the advent of electric vehicles. The aim of this paper is to review the latest literature in order to demonstrate the success of conic optimization when applied to power systems. The main focus is on how linear programming, second-order cone programming, and semidefinite programming can be used to address a central problem named the optimal power flow problem. We describe how they are used to design convex relaxations of this highly challenging non-convex optimization problem. We also show how sum-of-squares can be used to strengthen these relaxations. Finally, we present advances in first-order methods, interior-point methods, and nonconvex methods for solving conic optimization. Challenges for future research are also discussed.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Control of Superheat of Organic Rankine Cycle under Transient Heat Source based on Deep Reinforcement Learning.\n \n \n \n \n\n\n \n Wang, X.; Wang, R.; Jin, M.; Shu, G.; Tian, H.; and Pan, J.\n\n\n \n\n\n\n Applied Energy, 278: 115637. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Control link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{2020_0J_control,\ntitle = "Control of Superheat of Organic Rankine Cycle under Transient Heat Source based on Deep Reinforcement Learning",\njournal = "Applied Energy",\nvolume = "278",\npages = "115637",\nyear = "2020",\nissn = "0306-2619",\ndoi = "https://doi.org/10.1016/j.apenergy.2020.115637",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S0306261920311399",\nauthor = "Xuan Wang and Rui Wang and Ming Jin and Gequn Shu and Hua Tian and Jiaying Pan",\nkeywords = "Energy system, Machine learning",\nabstract = "The organic Rankine cycle (ORC) is a promising technology for engine waste heat recovery. During real-world operation, the engine working condition varies frequently to satisfy the power demand; thus, the transient nature of engine waste heat presents significant control challenges for the ORC. To control the superheat of the ORC precisely under a transient heat source, several optimal control methods have been used such as model predictive control and dynamic programing. However, most of them depend strongly on the accurate prediction of future disturbances. Deep reinforcement learning (DRL) is an artificial-intelligence algorithm that can overcome the aforementioned disadvantage, but the potential of DRL in control of thermodynamic systems has not yet been investigated. Thus, this paper proposes two DRL-based control methods for controlling the superheat of ORC under a transient heat source. One directly uses the DRL agent to learn the control strategy (DRL control), and the other uses the DRL agent to optimize the parameters of the proportional–integral–derivative (PID) controller (DRL-based PID control). Additionally, a switching mechanism between different DRL controllers is proposed for improving the training efficiency and enlarging the operation range of the controller. The results of this study indicate that the DRL agent can satisfactorily perform the control task and optimize the traditional controller under the trained and untrained transient heat source. Specifically, the DRL control can track the reference superheat with an average error of only 0.19 K, whereas that of the traditional PID control is 2.16 K. Furthermore, the proposed switching DRL control exhibits excellent tracking performance with an average error of only 0.21 K and robustness over a wide range of operation conditions. The successful application of DRL demonstrates its considerable potential for the control of thermodynamic systems, providing a useful reference and motivation for the application to other thermodynamic systems."\n}\n\n
\n
\n\n\n
\n The organic Rankine cycle (ORC) is a promising technology for engine waste heat recovery. During real-world operation, the engine working condition varies frequently to satisfy the power demand; thus, the transient nature of engine waste heat presents significant control challenges for the ORC. To control the superheat of the ORC precisely under a transient heat source, several optimal control methods have been used such as model predictive control and dynamic programing. However, most of them depend strongly on the accurate prediction of future disturbances. Deep reinforcement learning (DRL) is an artificial-intelligence algorithm that can overcome the aforementioned disadvantage, but the potential of DRL in control of thermodynamic systems has not yet been investigated. Thus, this paper proposes two DRL-based control methods for controlling the superheat of ORC under a transient heat source. One directly uses the DRL agent to learn the control strategy (DRL control), and the other uses the DRL agent to optimize the parameters of the proportional–integral–derivative (PID) controller (DRL-based PID control). Additionally, a switching mechanism between different DRL controllers is proposed for improving the training efficiency and enlarging the operation range of the controller. The results of this study indicate that the DRL agent can satisfactorily perform the control task and optimize the traditional controller under the trained and untrained transient heat source. Specifically, the DRL control can track the reference superheat with an average error of only 0.19 K, whereas that of the traditional PID control is 2.16 K. Furthermore, the proposed switching DRL control exhibits excellent tracking performance with an average error of only 0.21 K and robustness over a wide range of operation conditions. The successful application of DRL demonstrates its considerable potential for the control of thermodynamic systems, providing a useful reference and motivation for the application to other thermodynamic systems.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Power Grid AC-Based State Estimation: Vulnerability Analysis Against Cyber Attacks.\n \n \n \n \n\n\n \n Jin, M.; Lavaei, J.; and Johansson, K. H.\n\n\n \n\n\n\n IEEE Transactions on Automatic Control, 64(5): 1784-1799. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"Power pdf\n  \n \n \n \"Power link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@ARTICLE{2019_3J_powercyber,\n  author={M. {Jin} and J. {Lavaei} and K. H. {Johansson}},\n  journal={IEEE Transactions on Automatic Control}, \n  title={Power Grid AC-Based State Estimation: Vulnerability Analysis Against Cyber Attacks}, \n  year={2019},\n  volume={64},\n  number={5},\n  pages={1784-1799},\n  doi={10.1109/TAC.2018.2852774},\n  abstract={To ensure grid efficiency and reliability, power system operators continuously monitor the operational characteristics of the grid through a critical process called state estimation (SE), which performs the task by filtering and fusing various measurements collected from grid sensors. This study analyzes the vulnerability of the key operation module, namely ac-based SE, against potential cyber attacks on data integrity, also known as false data injection attack (FDIA). A general form of FDIA can be formulated as an optimization problem, whose objective is to find a stealthy and sparse data injection vector on the sensor measurements with the aim of making the state estimate spurious and misleading. Due to the nonlinear ac measurement model and the cardinality constraint, the problem includes both continuous and discrete nonlinearities. To solve the FDIA problem efficiently, we propose a novel convexification framework based on semidefinite programming (SDP). By analyzing a globally optimal SDP solution, we delineate the “attackable region” for any given set of measurement types and grid topology, where the spurious state can be falsified by FDIA. Furthermore, we prove that the attack is stealthy and sparse, and derive performance bounds. Simulation results on various IEEE test cases indicate the efficacy of the proposed convexification approach. From the grid protection point of view, the results of this study can be used to design a security metric for the current practice against cyber attacks, redesign the bad data detection scheme, and inform proposals of grid hardening. From a theoretical point of view, the proposed framework can be used for other nonconvex problems in power systems and beyond.},\n  url_pdf =    {FDIA_AC_2018.pdf},\n  url_link =     {https://ieeexplore.ieee.org/document/8403288},\n  keywords = {Power system, Optimization, Graph theory, Cybersecurity}\n  }\n\n\n\n
\n
\n\n\n
\n To ensure grid efficiency and reliability, power system operators continuously monitor the operational characteristics of the grid through a critical process called state estimation (SE), which performs the task by filtering and fusing various measurements collected from grid sensors. This study analyzes the vulnerability of the key operation module, namely ac-based SE, against potential cyber attacks on data integrity, also known as false data injection attack (FDIA). A general form of FDIA can be formulated as an optimization problem, whose objective is to find a stealthy and sparse data injection vector on the sensor measurements with the aim of making the state estimate spurious and misleading. Due to the nonlinear ac measurement model and the cardinality constraint, the problem includes both continuous and discrete nonlinearities. To solve the FDIA problem efficiently, we propose a novel convexification framework based on semidefinite programming (SDP). By analyzing a globally optimal SDP solution, we delineate the “attackable region” for any given set of measurement types and grid topology, where the spurious state can be falsified by FDIA. Furthermore, we prove that the attack is stealthy and sparse, and derive performance bounds. Simulation results on various IEEE test cases indicate the efficacy of the proposed convexification approach. From the grid protection point of view, the results of this study can be used to design a security metric for the current practice against cyber attacks, redesign the bad data detection scheme, and inform proposals of grid hardening. From a theoretical point of view, the proposed framework can be used for other nonconvex problems in power systems and beyond.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards Robust and Scalable Power System State Estimation.\n \n \n \n \n\n\n \n Jin, M.; Molybog, I.; Mohammadi-Ghazi, R.; and Lavaei, J.\n\n\n \n\n\n\n In IEEE Conference on Decision and Control (CDC), pages 3245–3252, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"Towards link\n  \n \n \n \"Towards pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2019_2C_towards,\n  title={Towards Robust and Scalable Power System State Estimation},\n  author={Jin, Ming and Molybog, Igor and Mohammadi-Ghazi, Reza and Lavaei, Javad},\n  booktitle={IEEE Conference on Decision and Control (CDC)},\n  pages={3245--3252},\n  year={2019},\n  abstract={Power system state estimation is an important instance of data-driven decision making in power systems. Yet due to the nonconvexity of the problem, existing approaches based on local search methods are susceptible to spurious local minima. In this study, we propose a linear basis of representation that succinctly captures the topology of the network and enables an efficient two-stage estimation method when the amount of measured data is not too low. Furthermore, we develop a robustness metric called "mutual incoherence," which provides robustness guarantees in the presence of bad data. The proposed method demonstrates superior performance over existing methods in terms of both estimation accuracy and bad data detection for an array of benchmark systems. This technique is shown to be scalable to large systems with more than 13,000 nodes and can achieve an accurate estimation within a minute.},\n  url_link={https://ieeexplore.ieee.org/document/9030243},\n  keywords={Power system, Optimization},\n  url_pdf={linear-SE_2019_2.pdf}\n}\n\n \n
\n
\n\n\n
\n Power system state estimation is an important instance of data-driven decision making in power systems. Yet due to the nonconvexity of the problem, existing approaches based on local search methods are susceptible to spurious local minima. In this study, we propose a linear basis of representation that succinctly captures the topology of the network and enables an efficient two-stage estimation method when the amount of measured data is not too low. Furthermore, we develop a robustness metric called \"mutual incoherence,\" which provides robustness guarantees in the presence of bad data. The proposed method demonstrates superior performance over existing methods in terms of both estimation accuracy and bad data detection for an array of benchmark systems. This technique is shown to be scalable to large systems with more than 13,000 nodes and can achieve an accurate estimation within a minute.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Advanced Building Control via Deep Reinforcement Learning.\n \n \n \n \n\n\n \n Jia, R.; Jin, M.; Sun, K.; Hong, T.; and Spanos, C.\n\n\n \n\n\n\n In International Conference on Applied Energy (ICAE), volume 158, pages 6158 - 6163, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"Advanced link\n  \n \n \n \"Advanced pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2019_2C_advanced,\ntitle = "Advanced Building Control via Deep Reinforcement Learning",\nbooktitle = "International Conference on Applied Energy (ICAE)",\nvolume = "158",\npages = "6158 - 6163",\nyear = "2019",\nissn = "1876-6102",\ndoi = "https://doi.org/10.1016/j.egypro.2019.01.494",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S187661021930517X",\nurl_pdf={BuildingRL_ICAE_CR.pdf},\nauthor = "Ruoxi Jia and Ming Jin and Kaiyu Sun and Tianzhen Hong and Costas Spanos",\nkeywords = "Smart city, Machine learning, Energy system",\nabstract = "Building control is a challenging task, not least because of complex building dynamics ad multiple control objectives that are often conflicting. To tackle this challenge, we explore an end-to-end deep reinforcement learning paradigm, which learns an optimal control strategy to reduce energy consumption and to enhance occupant comfort from the data of building-controller interactions. Because real-world control policies need to be interpretable and efficient in learning, this work makes the following key contributions: (1) we investigated a systematic approach to encode expert knowledge in reinforcement learning through “experience replay” and/or “expert policy guidance”; (2) we proposed to regulate the smoothness property of the neural network to penalize the erratic behavior, which is found to dramatically stabilize the learning process and lead to interpretable control laws; (3) we established a virtual testbed for building control by combining the state-of-the-art building energy simulator EnergyPlus with a python environment to provide a systematic evaluation and comparison platform, which will not only further our understanding of the strengths and weaknesses of existing building control algorithms, but also suggest directions for future research. We experimentally verified our proposed deep reinforcement learning paradigm on the virtual testbed in case studies, which demonstrated promising results."\n}\n\n
\n
\n\n\n
\n Building control is a challenging task, not least because of complex building dynamics ad multiple control objectives that are often conflicting. To tackle this challenge, we explore an end-to-end deep reinforcement learning paradigm, which learns an optimal control strategy to reduce energy consumption and to enhance occupant comfort from the data of building-controller interactions. Because real-world control policies need to be interpretable and efficient in learning, this work makes the following key contributions: (1) we investigated a systematic approach to encode expert knowledge in reinforcement learning through “experience replay” and/or “expert policy guidance”; (2) we proposed to regulate the smoothness property of the neural network to penalize the erratic behavior, which is found to dramatically stabilize the learning process and lead to interpretable control laws; (3) we established a virtual testbed for building control by combining the state-of-the-art building energy simulator EnergyPlus with a python environment to provide a systematic evaluation and comparison platform, which will not only further our understanding of the strengths and weaknesses of existing building control algorithms, but also suggest directions for future research. We experimentally verified our proposed deep reinforcement learning paradigm on the virtual testbed in case studies, which demonstrated promising results.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n BISCUIT: Building Intelligent System Customer Investment Tools.\n \n \n \n \n\n\n \n Jin, M.; Jia, R.; Das, H. P.; Feng, W.; and Spanos, C.\n\n\n \n\n\n\n In International Conference on Applied Energy (ICAE), volume 158, pages 6152 - 6157, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"BISCUIT: link\n  \n \n \n \"BISCUIT: pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2019_1C_biscuit,\ntitle = "BISCUIT: Building Intelligent System Customer Investment Tools",\nbooktitle = "International Conference on Applied Energy (ICAE)",\nvolume = "158",\npages = "6152 - 6157",\nyear = "2019",\nissn = "1876-6102",\ndoi = "https://doi.org/10.1016/j.egypro.2019.01.495",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S1876610219305181",\nurl_pdf = "BISCUIT_ICAE_CR.pdf",\nauthor = "Ming Jin and Ruoxi Jia and Hari Prasanna Das and Wei Feng and Costas Spanos",\nkeywords = "Smart city, Optimization, Energy system",\nabstract = "Smart buildings as human-cyber-physical systems (h-CPSs) are capable of providing intelligent services, such as indoor positioning, personalized lighting, demand-based heating ventilation and air-conditioning, and automatic fault detection and recovery, just to name a few. However, most buildings nowadays lack the basic components and infrastructure to support such services. The investment decision of intelligent system design and retrofit can be a daunting task, because it involves both hardware (sensors, actuators, servers) and software (operating systems, service algorithms), which have issues of compatibility, functionality constraints, and opportunities of co-design of synergy. This work proposes a user-oriented investment decision toolset aimed at handling the complexity of exploration in the large design space and to enhance cost-effectiveness, energy efficiency, and human-centric values. The toolset is demonstrated in a case study to retrofit a medium-sized building, where it is shown to propose a design that significantly lowers the overall investment cost while achieving user specifications."\n}\n\n
\n
\n\n\n
\n Smart buildings as human-cyber-physical systems (h-CPSs) are capable of providing intelligent services, such as indoor positioning, personalized lighting, demand-based heating ventilation and air-conditioning, and automatic fault detection and recovery, just to name a few. However, most buildings nowadays lack the basic components and infrastructure to support such services. The investment decision of intelligent system design and retrofit can be a daunting task, because it involves both hardware (sensors, actuators, servers) and software (operating systems, service algorithms), which have issues of compatibility, functionality constraints, and opportunities of co-design of synergy. This work proposes a user-oriented investment decision toolset aimed at handling the complexity of exploration in the large design space and to enhance cost-effectiveness, energy efficiency, and human-centric values. The toolset is demonstrated in a case study to retrofit a medium-sized building, where it is shown to propose a design that significantly lowers the overall investment cost while achieving user specifications.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Provision of secondary frequency regulation by coordinated dispatch of industrial loads and thermal power plants.\n \n \n \n \n\n\n \n Bao, Y.; Xu, J.; Feng, W.; Sun, Y.; Liao, S.; Yin, R.; Jiang, Y.; Jin, M.; and Marnay, C.\n\n\n \n\n\n\n Applied Energy, 241: 302 - 312. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"Provision link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{2019_0J_provision,\ntitle = "Provision of secondary frequency regulation by coordinated dispatch of industrial loads and thermal power plants",\njournal = "Applied Energy",\nvolume = "241",\npages = "302 - 312",\nyear = "2019",\nissn = "0306-2619",\ndoi = "https://doi.org/10.1016/j.apenergy.2019.03.025",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S0306261919304234",\nauthor = "Yi Bao and Jian Xu and Wei Feng and Yuanzhang Sun and Siyang Liao and Rongxin Yin and Yazhou Jiang and Ming Jin and Chris Marnay",\nkeywords = "Control theory, Power system",\nabstract = "Demand responsive industrial loads with high thermal inertia have potential to provide ancillary service for frequency regulation in the power market. To capture the benefit, this study proposes a new hierarchical framework to coordinate the demand responsive industrial loads with thermal power plants in an industrial park for secondary frequency control. In the proposed framework, demand responsive loads and generating resources are coordinated for optimal dispatch in two-time scales: (1) the regulation reserve of the industrial park is optimally scheduled in a day-ahead manner. The stochastic regulation signal is replaced by the specific extremely trajectories. Furthermore, the extremely trajectories are achieved by the day-ahead predicted regulation mileage. The resulting benefit is to transform the stochastic reserve scheduling problem into a deterministic optimization; (2) a model predictive control strategy is proposed to dispatch the industry park in real time with an objective to maximize the revenue. The proposed technology is tested using a real-world industrial electrolysis power system based upon Pennsylvania, Jersey, and Maryland (PJM) power market. Various scenarios are simulated to study the performance of the proposed approach to enable industry parks to provide ancillary service into the power market. The simulation results indicate that an industrial park with a capacity of 500 MW can provide up to 40 MW ancillary service for participation in the secondary frequency regulation. The proposed strategy is demonstrated to be capable of maintaining the economic and secure operation of the industrial park while satisfying performance requirements from the real world regulation market."\n}\n\n
\n
\n\n\n
\n Demand responsive industrial loads with high thermal inertia have potential to provide ancillary service for frequency regulation in the power market. To capture the benefit, this study proposes a new hierarchical framework to coordinate the demand responsive industrial loads with thermal power plants in an industrial park for secondary frequency control. In the proposed framework, demand responsive loads and generating resources are coordinated for optimal dispatch in two-time scales: (1) the regulation reserve of the industrial park is optimally scheduled in a day-ahead manner. The stochastic regulation signal is replaced by the specific extremely trajectories. Furthermore, the extremely trajectories are achieved by the day-ahead predicted regulation mileage. The resulting benefit is to transform the stochastic reserve scheduling problem into a deterministic optimization; (2) a model predictive control strategy is proposed to dispatch the industry park in real time with an objective to maximize the revenue. The proposed technology is tested using a real-world industrial electrolysis power system based upon Pennsylvania, Jersey, and Maryland (PJM) power market. Various scenarios are simulated to study the performance of the proposed approach to enable industry parks to provide ancillary service into the power market. The simulation results indicate that an industrial park with a capacity of 500 MW can provide up to 40 MW ancillary service for participation in the secondary frequency regulation. The proposed strategy is demonstrated to be capable of maintaining the economic and secure operation of the industrial park while satisfying performance requirements from the real world regulation market.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Personal thermal comfort models with wearable sensors.\n \n \n \n \n\n\n \n Liu, S.; Schiavon, S.; Das, H. P.; Jin, M.; and Spanos, C. J.\n\n\n \n\n\n\n Building and Environment, 162: 106281. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"Personal link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{2019_0J_personal,\ntitle = "Personal thermal comfort models with wearable sensors",\njournal = "Building and Environment",\nvolume = "162",\npages = "106281",\nyear = "2019",\nissn = "0360-1323",\ndoi = "https://doi.org/10.1016/j.buildenv.2019.106281",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S0360132319304913",\nauthor = "Shichao Liu and Stefano Schiavon and Hari Prasanna Das and Ming Jin and Costas J. Spanos",\nkeywords = "Smart city, Machine learning, Energy system",\nabstract = "A personal comfort model is an approach to thermal comfort modeling, for thermal environmental design and control, that predicts an individual's thermal comfort response, instead of the average response of a large population. We developed personal thermal comfort models using lab grade wearable in normal daily activities. We collected physiological signals (e.g., skin temperature, heart rate) of 14 subjects (6 female and 8 male adults) and environmental parameters (e.g., air temperature, relative humidity) for 2–4 weeks (at least 20 h per day). Then we trained 14 models for each subject with different machine-learning algorithms to predict their thermal preference. The results show that the median prediction power could be up to 24%/78%/0.79 (Cohen's kappa/accuracy/AUC) with all features considered. The median prediction power reaches 21%/71%/0.7 after 200 subjective votes. We explored the importance of different features on the prediction performance by considering all subjects in one dataset. When all features included for the entire dataset, personal comfort models can generate the highest performance of 35%/76%/0.80 by the most predictive algorithm. Personal comfort models display the highest prediction power when occupants' thermal sensations is outside thermal neutrality. Skin temperature measured at the ankle is more predictive than measured at the wrist. We suggest that Cohen's kappa or AUC should be employed to assess the performance of personal thermal comfort models for imbalanced datasets due to the capacity to exclude random success."\n}\n\n
\n
\n\n\n
\n A personal comfort model is an approach to thermal comfort modeling, for thermal environmental design and control, that predicts an individual's thermal comfort response, instead of the average response of a large population. We developed personal thermal comfort models using lab grade wearable in normal daily activities. We collected physiological signals (e.g., skin temperature, heart rate) of 14 subjects (6 female and 8 male adults) and environmental parameters (e.g., air temperature, relative humidity) for 2–4 weeks (at least 20 h per day). Then we trained 14 models for each subject with different machine-learning algorithms to predict their thermal preference. The results show that the median prediction power could be up to 24%/78%/0.79 (Cohen's kappa/accuracy/AUC) with all features considered. The median prediction power reaches 21%/71%/0.7 after 200 subjective votes. We explored the importance of different features on the prediction performance by considering all subjects in one dataset. When all features included for the entire dataset, personal comfort models can generate the highest performance of 35%/76%/0.80 by the most predictive algorithm. Personal comfort models display the highest prediction power when occupants' thermal sensations is outside thermal neutrality. Skin temperature measured at the ankle is more predictive than measured at the wrist. We suggest that Cohen's kappa or AUC should be employed to assess the performance of personal thermal comfort models for imbalanced datasets due to the capacity to exclude random success.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Occupancy Detection via Environmental Sensing.\n \n \n \n \n\n\n \n Jin, M.; Bekiaris-Liberis, N.; Weekly, K.; Spanos, C. J.; and Bayen, A. M.\n\n\n \n\n\n\n IEEE Transactions on Automation Science and Engineering, 15(2): 443-455. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Occupancy link\n  \n \n \n \"Occupancy pdf\n  \n \n \n \"Occupancy synopsis\n  \n \n \n \"Occupancy code\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@ARTICLE{2018_3J_occ,\n  author={M. {Jin} and N. {Bekiaris-Liberis} and K. {Weekly} and C. J. {Spanos} and A. M. {Bayen}},\n  journal={IEEE Transactions on Automation Science and Engineering}, \n  title={Occupancy Detection via Environmental Sensing}, \n  year={2018},\n  volume={15},\n  number={2},\n  pages={443-455},\n  doi={10.1109/TASE.2016.2619720},\n  abstract={Sensing by proxy (SbP) is proposed in this paper as a sensing paradigm for occupancy detection, where the inference is based on “proxy” measurements such as temperature and CO2 concentrations. The effects of occupants on indoor environments are captured by constitutive models comprising a coupled partial differential equation-ordinary differential equation system that exploits the spatial and physical features. Sensor fusion of multiple environmental parameters is enabled in the proposed framework. We report on experiments conducted under simulated conditions and real-life circumstances, when the variation of occupancy follows a schedule as the ground truth. The inference of the number of occupants in the room based on CO2 concentration at the air return and air supply vents by our approach achieves an overall mean squared error of 0.6044 (fractional person), while the best alternative by Bayes net is 1.2061 (fractional person). Results from the projected ventilation analysis show that SbP can potentially save 55% of total ventilation compared with the traditional fixed schedule ventilation strategy, while at the same time maintain a reasonably comfort profile for the occupants.},\n  url_link = "https://ieeexplore.ieee.org/document/7742900",\n  url_pdf =    {occ_tase.pdf},\n  url_synopsis={SbP_synopsis.pdf},\n  url_code = {https://github.com/jinming99/Sensing-by-proxy},\n  keywords={Control theory, Smart city, Data mining}}\n  \n
\n
\n\n\n
\n Sensing by proxy (SbP) is proposed in this paper as a sensing paradigm for occupancy detection, where the inference is based on “proxy” measurements such as temperature and CO2 concentrations. The effects of occupants on indoor environments are captured by constitutive models comprising a coupled partial differential equation-ordinary differential equation system that exploits the spatial and physical features. Sensor fusion of multiple environmental parameters is enabled in the proposed framework. We report on experiments conducted under simulated conditions and real-life circumstances, when the variation of occupancy follows a schedule as the ground truth. The inference of the number of occupants in the room based on CO2 concentration at the air return and air supply vents by our approach achieves an overall mean squared error of 0.6044 (fractional person), while the best alternative by Bayes net is 1.2061 (fractional person). Results from the projected ventilation analysis show that SbP can potentially save 55% of total ventilation compared with the traditional fixed schedule ventilation strategy, while at the same time maintain a reasonably comfort profile for the occupants.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Microgrid to enable optimal distributed energy retail and end-user demand response.\n \n \n \n \n\n\n \n Jin, M.; Feng, W.; Marnay, C.; and Spanos, C.\n\n\n \n\n\n\n Applied Energy, 210: 1321 - 1335. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Microgrid link\n  \n \n \n \"Microgrid pdf\n  \n \n \n \"Microgrid conference\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{2018_2J_microgrid,\ntitle = "Microgrid to enable optimal distributed energy retail and end-user demand response",\njournal = "Applied Energy",\nvolume = "210",\npages = "1321 - 1335",\nyear = "2018",\nissn = "0306-2619",\ndoi = "https://doi.org/10.1016/j.apenergy.2017.05.103",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S0306261917306062",\nurl_pdf =    {mr-pod.pdf},\nurl_conference ={der_isgt.pdf},\nauthor = "Ming Jin and Wei Feng and Chris Marnay and Costas Spanos",\nkeywords = "Power system, Energy system",\nabstract = "In the face of unprecedented challenges in environmental sustainability and grid resilience, there is an increasingly held consensus regarding the adoption of distributed and renewable energy resources such as microgrids (MGs), and the utilization of flexible electric loads by demand response (DR) to potentially drive a necessary paradigm shift in energy production and consumption patterns. However, the potential value of distributed generation and demand flexibility has not yet been fully realized in the operation of MGs. This study investigates the pricing and operation strategy with DR for a MG retailer in an integrated energy system (IES). Based on co-optimizing retail rates and MG dispatch formulated as a mixed integer quadratic programming (MIQP) problem, our model devises a dynamic pricing scheme that reflects the cost of generation and promotes DR, in tandem with an optimal dispatch plan that exploits spark spread and facilitates the integration of renewables, resulting in improved retailer profits and system stability. Main issues like integrated energy coupling and customer bill reduction are addressed during pricing to ensure rates competitiveness and customer protection. By evaluating on real datasets, the system is demonstrated to optimally coordinate storage, renewables, and combined heat and power (CHP), reduce carbon dioxide emission while maintaining profits, and effectively alleviate the PV curtailment problem. The model can be used by retailers and MG operators to optimize their operations, as well as regulators to design new utility rates in support of the ongoing transformation of energy systems."\n}\n\n
\n
\n\n\n
\n In the face of unprecedented challenges in environmental sustainability and grid resilience, there is an increasingly held consensus regarding the adoption of distributed and renewable energy resources such as microgrids (MGs), and the utilization of flexible electric loads by demand response (DR) to potentially drive a necessary paradigm shift in energy production and consumption patterns. However, the potential value of distributed generation and demand flexibility has not yet been fully realized in the operation of MGs. This study investigates the pricing and operation strategy with DR for a MG retailer in an integrated energy system (IES). Based on co-optimizing retail rates and MG dispatch formulated as a mixed integer quadratic programming (MIQP) problem, our model devises a dynamic pricing scheme that reflects the cost of generation and promotes DR, in tandem with an optimal dispatch plan that exploits spark spread and facilitates the integration of renewables, resulting in improved retailer profits and system stability. Main issues like integrated energy coupling and customer bill reduction are addressed during pricing to ensure rates competitiveness and customer protection. By evaluating on real datasets, the system is demonstrated to optimally coordinate storage, renewables, and combined heat and power (CHP), reduce carbon dioxide emission while maintaining profits, and effectively alleviate the PV curtailment problem. The model can be used by retailers and MG operators to optimize their operations, as well as regulators to design new utility rates in support of the ongoing transformation of energy systems.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Automated mobile sensing: Towards high-granularity agile indoor environmental quality monitoring.\n \n \n \n \n\n\n \n Jin, M.; Liu, S.; Schiavon, S.; and Spanos, C.\n\n\n \n\n\n\n Building and Environment, 127: 268 - 276. 2018.\n Best paper award (3 out of >3000)\n\n\n\n
\n\n\n\n \n \n \"Automated link\n  \n \n \n \"Automated code\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{2018_2J_automated,\ntitle = "Automated mobile sensing: Towards high-granularity agile indoor environmental quality monitoring",\njournal = "Building and Environment",\nvolume = "127",\npages = "268 - 276",\nyear = "2018",\nissn = "0360-1323",\ndoi = "https://doi.org/10.1016/j.buildenv.2017.11.003",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S0360132317305012",\nurl_code="https://github.com/jinming99/IEQbot",\nauthor = "Ming Jin and Shichao Liu and Stefano Schiavon and Costas Spanos",\nnote={<a style="color:#FF0000" href="https://www.journals.elsevier.com/building-and-environment/news/building-and-environment-best-paper-awards-previous-years">Best paper award (3 out of >3000)</a>},\nkeywords = "Smart city, Energy system, Data mining",\nabstract = "Indoor environmental quality (IEQ) is a critical aspect of the built environment to ensure occupant health, comfort, well-being and productivity. Existing IEQ monitoring approaches rely on sensor networks deployed at selected locations to collect environmental measurements, and are limited in scale and adaptability due to infrastructure cost and maintenance requirement. To enable high-granularity IEQ monitoring with agile adaption to the dynamic indoor environment, we propose an “automated mobile sensing” system that dispatches a sensor-rich navigation-capable robot to actively survey the indoor space. Data collected in this fashion is sparse in the joint temporal and spatial domain, and cannot be used directly for IEQ evaluation. To deal with this special characteristics, we developed a spatio-temporal interpolation algorithm to capture the global trend and local variation in order to use the data efficiently to reconstruct the IEQ dynamics. We compared the performance of the automated mobile sensing with a dense sensor network in a laboratory where we measured the air-change effectiveness (ASHRAE standard 129) for four different conditions. Results indicate that automated mobile sensing is able to accurately estimate the parameters with a minimal sensor cost and calibration effort. Potential applications of this system include indoor thermal comfort, lighting, indoor air quality and acoustic monitoring, pollutant source identification, and building commissioning. We shared publicly the source codes for robot control, sensor setup, and interpolation algorithm to encourage comparison study and further development."\n}\n\n
\n
\n\n\n
\n Indoor environmental quality (IEQ) is a critical aspect of the built environment to ensure occupant health, comfort, well-being and productivity. Existing IEQ monitoring approaches rely on sensor networks deployed at selected locations to collect environmental measurements, and are limited in scale and adaptability due to infrastructure cost and maintenance requirement. To enable high-granularity IEQ monitoring with agile adaption to the dynamic indoor environment, we propose an “automated mobile sensing” system that dispatches a sensor-rich navigation-capable robot to actively survey the indoor space. Data collected in this fashion is sparse in the joint temporal and spatial domain, and cannot be used directly for IEQ evaluation. To deal with this special characteristics, we developed a spatio-temporal interpolation algorithm to capture the global trend and local variation in order to use the data efficiently to reconstruct the IEQ dynamics. We compared the performance of the automated mobile sensing with a dense sensor network in a laboratory where we measured the air-change effectiveness (ASHRAE standard 129) for four different conditions. Results indicate that automated mobile sensing is able to accurately estimate the parameters with a minimal sensor cost and calibration effort. Potential applications of this system include indoor thermal comfort, lighting, indoor air quality and acoustic monitoring, pollutant source identification, and building commissioning. We shared publicly the source codes for robot control, sensor setup, and interpolation algorithm to encourage comparison study and further development.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Control-Theoretic Analysis of Smoothness for Stability-Certified Reinforcement Learning.\n \n \n \n \n\n\n \n Jin, M.; and Lavaei, J.\n\n\n \n\n\n\n In IEEE Conference on Decision and Control (CDC), pages 6840-6847, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"Control-Theoretic pdf\n  \n \n \n \"Control-Theoretic link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2018_2C_control,\n  author={M. {Jin} and J. {Lavaei}},\n  booktitle={IEEE Conference on Decision and Control (CDC)}, \n  title={Control-Theoretic Analysis of Smoothness for Stability-Certified Reinforcement Learning}, \n  year={2018},\n  volume={},\n  number={},\n  pages={6840-6847},\n  doi={10.1109/CDC.2018.8618996},\n  abstract={It is critical to obtain stability certificate before deploying reinforcement learning in real-world mission-critical systems. This study justifies the intuition that smoothness (i.e., small changes in inputs lead to small changes in outputs) is an important property for stability-certified reinforcement learning from a control-theoretic perspective. The smoothness margin can be obtained by solving a feasibility problem based on semi-definite programming for both linear and nonlinear dynamical systems, and it does not need to access the exact parameters of the learned controllers. Numerical evaluation on nonlinear and decentralized frequency control for large-scale power grids demonstrates that the smoothness margin can certify stability during both exploration and deployment for (deep) neural-network policies, which substantially surpass nominal controllers in performance. The study opens up new opportunities for robust Lipschitz continuous policy learning.},\n  url_pdf={smoothRL_cdc_tech.pdf},\n  url_link={https://ieeexplore.ieee.org/document/8618996},\n  keywords={Control theory, Machine learning}}\n  \n
\n
\n\n\n
\n It is critical to obtain stability certificate before deploying reinforcement learning in real-world mission-critical systems. This study justifies the intuition that smoothness (i.e., small changes in inputs lead to small changes in outputs) is an important property for stability-certified reinforcement learning from a control-theoretic perspective. The smoothness margin can be obtained by solving a feasibility problem based on semi-definite programming for both linear and nonlinear dynamical systems, and it does not need to access the exact parameters of the learned controllers. Numerical evaluation on nonlinear and decentralized frequency control for large-scale power grids demonstrates that the smoothness margin can certify stability during both exploration and deployment for (deep) neural-network policies, which substantially surpass nominal controllers in performance. The study opens up new opportunities for robust Lipschitz continuous policy learning.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Robust Utility Learning Framework via Inverse Optimization.\n \n \n \n \n\n\n \n Konstantakopoulos, I. C.; Ratliff, L. J.; Jin, M.; Sastry, S. S.; and Spanos, C. J.\n\n\n \n\n\n\n IEEE Transactions on Control Systems Technology, 26(3): 954-970. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n \n \"A link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@ARTICLE{2018_1J_robust,\n  author={I. C. {Konstantakopoulos} and L. J. {Ratliff} and M. {Jin} and S. S. {Sastry} and C. J. {Spanos}},\n  journal={IEEE Transactions on Control Systems Technology}, \n  title={A Robust Utility Learning Framework via Inverse Optimization}, \n  year={2018},\n  volume={26},\n  number={3},\n  pages={954-970},\n  doi={10.1109/TCST.2017.2699163},\n  abstract={In many smart infrastructure applications, flexibility in achieving sustainability goals can be gained by engaging end users. However, these users often have heterogeneous preferences that are unknown to the decision maker tasked with improving operational efficiency. Modeling user interaction as a continuous game between noncooperative players, we propose a robust parametric utility learning framework that employs constrained feasible generalized least squares estimation with heteroskedastic inference. To improve forecasting performance, we extend the robust utility learning scheme by employing bootstrapping with bagging, bumping, and gradient boosting ensemble methods. Moreover, we estimate the noise covariance, which provides approximated correlations between players, which we leverage to develop a novel correlated utility learning framework. We apply the proposed methods both to a toy example arising from Bertrand-Nash competition between two firms and to data from a social game experiment designed to encourage energy efficient behavior among smart building occupants. Using occupant voting data for shared resources such as lighting, we simulate the game defined by the estimated utility functions to demonstrate the performance of the proposed methods.},\n  url_pdf = {robust_inverse_learning.pdf},\n  keywords={Smart city, Optimization, Machine learning, Game theory},\n  url_link = {https://ieeexplore.ieee.org/document/7932982}}\n  \n\n
\n
\n\n\n
\n In many smart infrastructure applications, flexibility in achieving sustainability goals can be gained by engaging end users. However, these users often have heterogeneous preferences that are unknown to the decision maker tasked with improving operational efficiency. Modeling user interaction as a continuous game between noncooperative players, we propose a robust parametric utility learning framework that employs constrained feasible generalized least squares estimation with heteroskedastic inference. To improve forecasting performance, we extend the robust utility learning scheme by employing bootstrapping with bagging, bumping, and gradient boosting ensemble methods. Moreover, we estimate the noise covariance, which provides approximated correlations between players, which we leverage to develop a novel correlated utility learning framework. We apply the proposed methods both to a toy example arising from Bertrand-Nash competition between two firms and to data from a social game experiment designed to encourage energy efficient behavior among smart building occupants. Using occupant voting data for shared resources such as lighting, we simulate the game defined by the estimated utility functions to demonstrate the performance of the proposed methods.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Review of Microgrid Development in the United States–A Decade of Progress on Policies, Demonstrations, Controls, and Software Tools.\n \n \n \n \n\n\n \n Feng, W.; Jin, M.; Liu, X.; Bao, Y.; Marnay, C.; Yao, C.; and Yu, J.\n\n\n \n\n\n\n Applied energy, 228: 1656–1668. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n \n \"A link\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{2018_1J_review,\n  title={A Review of Microgrid Development in the United States--A Decade of Progress on Policies, Demonstrations, Controls, and Software Tools},\n  author={Feng, Wei and Jin, Ming and Liu, Xu and Bao, Yi and Marnay, Chris and Yao, Cheng and Yu, Jiancheng},\n  journal={Applied energy},\n  volume={228},\n  pages={1656--1668},\n  year={2018},\n  publisher={Elsevier},\n  abstract={Microgrids have become increasingly popular in the United States. Supported by favorable federal and local policies, microgrid projects can provide greater energy stability and resilience within a project site or community. This paper reviews major federal, state, and utility-level policies driving microgrid development in the United States. Representative U.S. demonstration projects are selected and their technical characteristics and non-technical features are introduced. The paper discusses trends in the technology development of microgrid systems as well as microgrid control methods and interactions within the electricity market. Software tools for microgrid design, planning, and performance analysis are illustrated with each tool’s core capability. Finally, the paper summarizes the successes and lessons learned during the recent expansion of the U.S. microgrid industry that may serve as a reference for other countries developing their own microgrid industries.},\n  url_pdf =    {MG_Review.pdf},\n  url_link =     {https://www.sciencedirect.com/science/article/abs/pii/S0306261918309644},\n  keywords = "Power system"\n}\n\n
\n
\n\n\n
\n Microgrids have become increasingly popular in the United States. Supported by favorable federal and local policies, microgrid projects can provide greater energy stability and resilience within a project site or community. This paper reviews major federal, state, and utility-level policies driving microgrid development in the United States. Representative U.S. demonstration projects are selected and their technical characteristics and non-technical features are introduced. The paper discusses trends in the technology development of microgrid systems as well as microgrid control methods and interactions within the electricity market. Software tools for microgrid design, planning, and performance analysis are illustrated with each tool’s core capability. Finally, the paper summarizes the successes and lessons learned during the recent expansion of the U.S. microgrid industry that may serve as a reference for other countries developing their own microgrid industries.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Design Automation for Smart Building Systems.\n \n \n \n \n\n\n \n Jia, R.; Jin, B.; Jin, M.; Zhou, Y.; Konstantakopoulos, I. C.; Zou, H.; Kim, J.; Li, D.; Gu, W.; Arghandeh, R.; Nuzzo, P.; Schiavon, S.; Sangiovanni-Vincentelli, A. L.; and Spanos, C. J.\n\n\n \n\n\n\n Proceedings of the IEEE, 106(9): 1680-1699. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Design link\n  \n \n \n \"Design pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@ARTICLE{2018_1J_design,\n  author={R. {Jia} and B. {Jin} and M. {Jin} and Y. {Zhou} and I. C. {Konstantakopoulos} and H. {Zou} and J. {Kim} and D. {Li} and W. {Gu} and R. {Arghandeh} and P. {Nuzzo} and S. {Schiavon} and A. L. {Sangiovanni-Vincentelli} and C. J. {Spanos}},\n  journal={Proceedings of the IEEE}, \n  title={Design Automation for Smart Building Systems}, \n  year={2018},\n  volume={106},\n  number={9},\n  pages={1680-1699},\n  doi={10.1109/JPROC.2018.2856932},\n  url_link={https://ieeexplore.ieee.org/document/8466990},\n  url_pdf={Design_IEEEProc.pdf},\n  abstract={Smart buildings today are aimed at providing safe, healthy, comfortable, affordable, and beautiful spaces in a carbon and energy-efficient way. They are emerging as complex cyber-physical systems with humans in the loop. Cost, the need to cope with increasing functional complexity, flexibility, fragmentation of the supply chain, and time-to-market pressure are rendering the traditional heuristic and ad hoc design paradigms inefficient and insufficient for the future. In this paper, we present a platform-based methodology for smart building design. Platform-based design (PBD) promotes the reuse of hardware and software on shared infrastructures, enables rapid prototyping of applications, and involves extensive exploration of the design space to optimize design performance. In this paper, we identify, abstract, and formalize components of smart buildings, and present a design flow that maps high-level specifications of desired building applications to their physical implementations under the PBD framework. A case study on the design of on-demand heating, ventilation, and air conditioning (HVAC) systems is presented to demonstrate the use of PBD.},\n  keywords={Cyber-physical system, Optimization, Energy system}}\n\n
\n
\n\n\n
\n Smart buildings today are aimed at providing safe, healthy, comfortable, affordable, and beautiful spaces in a carbon and energy-efficient way. They are emerging as complex cyber-physical systems with humans in the loop. Cost, the need to cope with increasing functional complexity, flexibility, fragmentation of the supply chain, and time-to-market pressure are rendering the traditional heuristic and ad hoc design paradigms inefficient and insufficient for the future. In this paper, we present a platform-based methodology for smart building design. Platform-based design (PBD) promotes the reuse of hardware and software on shared infrastructures, enables rapid prototyping of applications, and involves extensive exploration of the design space to optimize design performance. In this paper, we identify, abstract, and formalize components of smart buildings, and present a design flow that maps high-level specifications of desired building applications to their physical implementations under the PBD framework. A case study on the design of on-demand heating, ventilation, and air conditioning (HVAC) systems is presented to demonstrate the use of PBD.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cascade energy optimization for waste heat recovery in distributed energy systems.\n \n \n \n \n\n\n \n Wang, X.; Jin, M.; Feng, W.; Shu, G.; Tian, H.; and Liang, Y.\n\n\n \n\n\n\n Applied Energy, 230: 679 - 695. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Cascade link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{2018_1J_cascade,\ntitle = "Cascade energy optimization for waste heat recovery in distributed energy systems",\njournal = "Applied Energy",\nvolume = "230",\npages = "679 - 695",\nyear = "2018",\nissn = "0306-2619",\ndoi = "https://doi.org/10.1016/j.apenergy.2018.08.124",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S0306261918312984",\nauthor = "Xuan Wang and Ming Jin and Wei Feng and Gequn Shu and Hua Tian and Youcai Liang",\nkeywords = "Optimization, Energy system",\nabstract = "The efficiency of distributed energy systems can be significantly increased through waste heat recovery from industry or power generation. The technologies used for this process are typically dependent on the quality and temperature grades of waste heat. To maximize the efficiency of cascade heat utilization, it is important to optimize the choice of waste heat recovery technologies and their operation. In this paper, a detailed mixed integer linear programming optimization model is proposed for waste heat recovery in a district-scale microgrid. The model can distinguish waste heat quality for planning and operation optimization of distributed energy systems. Heat utilization technologies are formulated in this developed model and categorized in different temperature grades. The developed model is validated using four typical cases under different settings of system operation and business models. It is found that the optimization model, by distinguishing waste heat temperature, can increase energy cost savings by around 5%, compared to models that do not consider waste heat temperature grades. Additionally, the results indicate that the developed model can provide more realistic configuration and technologies dispatch."\n}\n\n
\n
\n\n\n
\n The efficiency of distributed energy systems can be significantly increased through waste heat recovery from industry or power generation. The technologies used for this process are typically dependent on the quality and temperature grades of waste heat. To maximize the efficiency of cascade heat utilization, it is important to optimize the choice of waste heat recovery technologies and their operation. In this paper, a detailed mixed integer linear programming optimization model is proposed for waste heat recovery in a district-scale microgrid. The model can distinguish waste heat quality for planning and operation optimization of distributed energy systems. Heat utilization technologies are formulated in this developed model and categorized in different temperature grades. The developed model is validated using four typical cases under different settings of system operation and business models. It is found that the optimization model, by distinguishing waste heat temperature, can increase energy cost savings by around 5%, compared to models that do not consider waste heat temperature grades. Additionally, the results indicate that the developed model can provide more realistic configuration and technologies dispatch.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Review of Microgrid Development in the United States and China and Lessons Learned for China.\n \n \n \n \n\n\n \n Yu, J.; Marnay, C.; Jin, M.; Yao, C.; Liu, X.; and Feng, W.\n\n\n \n\n\n\n In Applied Energy Symposium and Forum, Renewable Energy Integration with Mini/Microgrids (REM), volume 145, pages 217 - 222, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"Review link\n  \n \n \n \"Review pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2018_0C_review,\ntitle = "Review of Microgrid Development in the United States and China and Lessons Learned for China",\nbooktitle = "Applied Energy Symposium and Forum, Renewable Energy Integration with Mini/Microgrids (REM)",\nvolume = "145",\npages = "217 - 222",\nyear = "2018",\nissn = "1876-6102",\ndoi = "https://doi.org/10.1016/j.egypro.2018.04.038",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S1876610218300444",\nurl_pdf ="REM2017.pdf",\nauthor = "Jiancheng Yu and Chris Marnay and Ming Jin and Cheng Yao and Xu Liu and Wei Feng",\nkeywords = "Energy system, Power system",\nabstract = "The U.S. has emerged as the microgrid development leader with around 40% of worldwide capacity. Over the last decade, demonstrations have been executed by a mix of civilian federal, military, private, and local government entities. While their motivations are mixed, resilience became the focus following Superstorm Sandy in 2012, especially in the highly active northeast states. This paper describes U.S. microgrid demonstrations. Then it shows China’s effort to develop microgrids and compares the difference between U.S. and Chinese projects. Finally, based on U.S. experience, recommendations are provided for Chinese microgrids."\n}\n\n
\n
\n\n\n
\n The U.S. has emerged as the microgrid development leader with around 40% of worldwide capacity. Over the last decade, demonstrations have been executed by a mix of civilian federal, military, private, and local government entities. While their motivations are mixed, resilience became the focus following Superstorm Sandy in 2012, especially in the highly active northeast states. This paper describes U.S. microgrid demonstrations. Then it shows China’s effort to develop microgrids and compares the difference between U.S. and Chinese projects. Finally, based on U.S. experience, recommendations are provided for Chinese microgrids.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Inverse reinforcement learning via deep gaussian process.\n \n \n \n \n\n\n \n Jin, M.; Damianou, A.; Abbeel, P.; and Spanos, C.\n\n\n \n\n\n\n In Conference on Uncertainty in Artificial Intelligence (UAI), 2017. \n (Oral presentation)\n\n\n\n
\n\n\n\n \n \n \"Inverse pdf\n  \n \n \n \"Inverse supplementary\n  \n \n \n \"Inverse code\n  \n \n \n \"Inverse link\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2017_4C_inverse,\n  title={Inverse reinforcement learning via deep gaussian process},\n  author={Jin, Ming and Damianou, Andreas and Abbeel, Pieter and Spanos, Costas},\n  booktitle={Conference on Uncertainty in Artificial Intelligence (UAI)},\n  url_pdf={dgpirl_uai.pdf},\n  url_supplementary={dgpirl_supp.pdf},\n  url_code={https://github.com/jinming99/DGP-IRL},\n  url_link={http://auai.org/uai2017/proceedings/papers/48.pdf},\n  abstract={We propose a new approach to inverse reinforcement learning (IRL) based on the deep Gaussian process (deep GP) model, which is capable of learning complicated reward structures with few demonstrations. Our model stacks multiple latent GP layers to learn abstract representations of the state feature space, which is linked to the demonstrations through the Maximum Entropy learning framework. Incorporating the IRL engine into the nonlinear latent structure renders existing deep GP inference approaches intractable. To tackle this, we develop a non-standard variational approximation framework which extends previous inference schemes. This allows for approximate Bayesian treatment of the feature space and guards against overfitting. Carrying out representation and inverse reinforcement learning simultaneously within our model outperforms state-of-the-art approaches, as we demonstrate with experiments on standard benchmarks ("object world","highway driving") and a new benchmark ("binary world").},\n  keywords={Machine learning, Optimization},\n  note={<font style="color:#FF0000">(Oral presentation)</font>},\n  year={2017}\n}\n\n
\n
\n\n\n
\n We propose a new approach to inverse reinforcement learning (IRL) based on the deep Gaussian process (deep GP) model, which is capable of learning complicated reward structures with few demonstrations. Our model stacks multiple latent GP layers to learn abstract representations of the state feature space, which is linked to the demonstrations through the Maximum Entropy learning framework. Incorporating the IRL engine into the nonlinear latent structure renders existing deep GP inference approaches intractable. To tackle this, we develop a non-standard variational approximation framework which extends previous inference schemes. This allows for approximate Bayesian treatment of the feature space and guards against overfitting. Carrying out representation and inverse reinforcement learning simultaneously within our model outperforms state-of-the-art approaches, as we demonstrate with experiments on standard benchmarks (\"object world\",\"highway driving\") and a new benchmark (\"binary world\").\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Virtual Occupancy Sensing: Using Smart Meters to Indicate Your Presence.\n \n \n \n \n\n\n \n Jin, M.; Jia, R.; and Spanos, C. J.\n\n\n \n\n\n\n IEEE Transactions on Mobile Computing, 16(11): 3264-3277. 2017.\n (Featured in 'IEEE Spectrum')\n\n\n\n
\n\n\n\n \n \n \"Virtual pdf\n  \n \n \n \"Virtual supplementary\n  \n \n \n \"Virtual link\n  \n \n \n \"Virtual media\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@ARTICLE{2017_3J_virtual,\n  author={M. {Jin} and R. {Jia} and C. J. {Spanos}},\n  journal={IEEE Transactions on Mobile Computing}, \n  title={Virtual Occupancy Sensing: Using Smart Meters to Indicate Your Presence}, \n  year={2017},\n  volume={16},\n  number={11},\n  pages={3264-3277},\n  doi={10.1109/TMC.2017.2684806},\n  abstract={Occupancy detection for buildings is crucial to improving energy efficiency, user comfort, and space utility. However, existing methods require dedicated system setup, continuous calibration, and frequent maintenance. With the instrumentation of electricity meters in millions of homes and offices, however, power measurement presents a unique opportunity for a non-intrusive and cost-effective way to detect occupant presence. This study develops solutions to the problems when no data or limited data is available for training, as motivated by difficulties in ground truth collection. Experimental evaluations on data from both residential and commercial buildings indicate that the proposed methods for binary occupancy detection are nearly as accurate as models learned with sufficient data, with accuracies of approximately 78 to 93 percent for residences and 90 percent for offices. This study shows that power usage contains valuable and sensitive user information, demonstrating a virtual occupancy sensing approach with minimal system calibration and setup.},\n  url_pdf = {smart_meter_presence.pdf},\n  url_supplementary = {smart_meter_presence_supp.pdf},\n  url_link = {https://ieeexplore.ieee.org/document/7882676},\n  url_media={https://spectrum.ieee.org/view-from-the-valley/energy/the-smarter-grid/what-does-your-smart-meter-know-about-you},\n  keywords = "Smart city, Data mining, Machine learning",\n  note={<a style="color:#FF0000" href="https://spectrum.ieee.org/view-from-the-valley/energy/the-smarter-grid/what-does-your-smart-meter-know-about-you">(Featured in 'IEEE Spectrum')</a>}\n  }\n  \n  
\n
\n\n\n
\n Occupancy detection for buildings is crucial to improving energy efficiency, user comfort, and space utility. However, existing methods require dedicated system setup, continuous calibration, and frequent maintenance. With the instrumentation of electricity meters in millions of homes and offices, however, power measurement presents a unique opportunity for a non-intrusive and cost-effective way to detect occupant presence. This study develops solutions to the problems when no data or limited data is available for training, as motivated by difficulties in ground truth collection. Experimental evaluations on data from both residential and commercial buildings indicate that the proposed methods for binary occupancy detection are nearly as accurate as models learned with sufficient data, with accuracies of approximately 78 to 93 percent for residences and 90 percent for offices. This study shows that power usage contains valuable and sensitive user information, demonstrating a virtual occupancy sensing approach with minimal system calibration and setup.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A semidefinite programming relaxation under false data injection attacks against power grid AC state estimation.\n \n \n \n \n\n\n \n Jin, M.; Lavaei, J.; and Johansson, K.\n\n\n \n\n\n\n In Annual Allerton Conference on Communication, Control, and Computing (Allerton), pages 236-243, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"A link\n  \n \n \n \"A pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2017_3C_semidefinite,\n  author={M. {Jin} and J. {Lavaei} and K. {Johansson}},\n  booktitle={Annual Allerton Conference on Communication, Control, and Computing (Allerton)}, \n  title={A semidefinite programming relaxation under false data injection attacks against power grid AC state estimation}, \n  year={2017},\n  volume={},\n  number={},\n  pages={236-243},\n  doi={10.1109/ALLERTON.2017.8262743},\n  url_link={https://ieeexplore.ieee.org/document/8262743},\n  url_pdf={cyberattack_allerton.pdf},\n  abstract={The integration of sensing and information technology renders the power grid susceptible to cyber-attacks. To understand how vulnerable the state estimator is, we study its behavior under the worst attacks possible. A general false data injection attack (FDIA) based on the AC model is formulated, where the attacker manipulates sensor measurements to mislead the system operator to make decisions based on a falsified state. To stage such an attack, the optimization problem incorporates constraints of limited resources (allowing only a limited number of measurements to be altered), and stealth operation (ensuring the cyber hack cannot be identified by the bad data detection algorithm). Due to the nonlinear AC power flow model and combinatorial selection of compromised sensors, the problem is nonconvex and cannot be solved in polynomial time; however, it is shown that convexification of the original problem based on a semidefinite programming (SDP) relaxation and a sparsity penalty is able to recover a near-optimal solution. This represents the first study to solve the AC-based FDIA. Simulations on a 30-bus system illustrate that the proposed attack requires only sparse sensor manipulation and remains stealthy from the residual-based bad data detection mechanism. In light of the analysis, this study raises new challenges on grid defense mechanism and attack detection strategy.},\n  keywords={Optimization, Cybersecurity, Power system}}\n\n
\n
\n\n\n
\n The integration of sensing and information technology renders the power grid susceptible to cyber-attacks. To understand how vulnerable the state estimator is, we study its behavior under the worst attacks possible. A general false data injection attack (FDIA) based on the AC model is formulated, where the attacker manipulates sensor measurements to mislead the system operator to make decisions based on a falsified state. To stage such an attack, the optimization problem incorporates constraints of limited resources (allowing only a limited number of measurements to be altered), and stealth operation (ensuring the cyber hack cannot be identified by the bad data detection algorithm). Due to the nonlinear AC power flow model and combinatorial selection of compromised sensors, the problem is nonconvex and cannot be solved in polynomial time; however, it is shown that convexification of the original problem based on a semidefinite programming (SDP) relaxation and a sparsity penalty is able to recover a near-optimal solution. This represents the first study to solve the AC-based FDIA. Simulations on a 30-bus system illustrate that the proposed attack requires only sparse sensor manipulation and remains stealthy from the residual-based bad data detection mechanism. In light of the analysis, this study raises new challenges on grid defense mechanism and attack detection strategy.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n MOD-DR: Microgrid optimal dispatch with demand response.\n \n \n \n \n\n\n \n Jin, M.; Feng, W.; Liu, P.; Marnay, C.; and Spanos, C.\n\n\n \n\n\n\n Applied Energy, 187: 758 - 776. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"MOD-DR: link\n  \n \n \n \"MOD-DR: pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{2017_2J_moddr,\ntitle = "MOD-DR: Microgrid optimal dispatch with demand response",\njournal = "Applied Energy",\nvolume = "187",\npages = "758 - 776",\nyear = "2017",\nissn = "0306-2619",\ndoi = "https://doi.org/10.1016/j.apenergy.2016.11.093",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S030626191631724X",\nauthor = "Ming Jin and Wei Feng and Ping Liu and Chris Marnay and Costas Spanos",\nkeywords = "Power system",\nabstract = "In the face of unprecedented challenges of upcoming fossil fuel shortage and reliability and security of the grid, there is an increasing interest in adopting distributed, renewable, energy resources, such as microgrids (MGs), and engaging flexible electric loads in power system operations to potentially drive a paradigm shift in energy production and consumption patterns. Prior work on MG dispatch has leveraged decentralized technologies like combined heat and power (CHP) and heat pumps to promote efficiency and economic gains; however, the flexibility of demand has yet to be fully exploited in cooperation with the grid to offer added benefits and ancillary services. The object of the study is to develop microgrid optimal dispatch with demand response (MOD-DR), which fills in the gap by coordinating both the demand and supply sides in a renewable-integrated, storage-augmented, DR-enabled MG to achieve economically viable and system-wide resilient solutions. The key contribution of this paper is the formulation of a multi-objective optimization with prevailing constraints and utility trade-off based on the model of a large-scale MG with flexible loads, which leads to the derivation of strategies that incorporate uncertainty in scheduling. Evaluation using real datasets is conducted to analyze the uncertainty effects and demand response potentials, demonstrating in a campus prototype a 17.5% peak load reduction and 8.8% cost savings for MOD-DR compared to the non-trivial baseline, which is on par with the Oracle for perfect predictions.",\nurl_pdf = {MOD-DR.pdf}}\n\n
\n
\n\n\n
\n In the face of unprecedented challenges of upcoming fossil fuel shortage and reliability and security of the grid, there is an increasing interest in adopting distributed, renewable, energy resources, such as microgrids (MGs), and engaging flexible electric loads in power system operations to potentially drive a paradigm shift in energy production and consumption patterns. Prior work on MG dispatch has leveraged decentralized technologies like combined heat and power (CHP) and heat pumps to promote efficiency and economic gains; however, the flexibility of demand has yet to be fully exploited in cooperation with the grid to offer added benefits and ancillary services. The object of the study is to develop microgrid optimal dispatch with demand response (MOD-DR), which fills in the gap by coordinating both the demand and supply sides in a renewable-integrated, storage-augmented, DR-enabled MG to achieve economically viable and system-wide resilient solutions. The key contribution of this paper is the formulation of a multi-objective optimization with prevailing constraints and utility trade-off based on the model of a large-scale MG with flexible loads, which leads to the derivation of strategies that incorporate uncertainty in scheduling. Evaluation using real datasets is conducted to analyze the uncertainty effects and demand response potentials, demonstrating in a campus prototype a 17.5% peak load reduction and 8.8% cost savings for MOD-DR compared to the non-trivial baseline, which is on par with the Oracle for perfect predictions.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Indoor environmental quality monitoring by autonomous mobile sensing.\n \n \n \n \n\n\n \n Jin, M.; Liu, S.; Tian, Y.; Lu, M.; Schiavon, S.; and Spanos, C.\n\n\n \n\n\n\n In ACM International Conference on Systems for Energy-Efficient Built Environments (BuildSys), pages 1–4, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"Indoor pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2017_2C_indoor,\n  title={Indoor environmental quality monitoring by autonomous mobile sensing},\n  author={Jin, Ming and Liu, Shichao and Tian, Yulun and Lu, Mingjian and Schiavon, Stefano and Spanos, Costas},\n  booktitle={ACM International Conference on Systems for Energy-Efficient Built Environments (BuildSys)},\n  pages={1--4},\n  year={2017},\n  url_pdf={ieq_buildsys.pdf},\n  abstract={Indoor environmental quality (IEQ) monitoring is a critical task in building operation, maintenance, and diagnosis. Current approach based on static sensor network is not scalable for IEQ assessment that relies on costly sensing instruments. The study proposes to leverage autonomous mobility to reduce sensing infrastructure cost and enable real-time high-granularity monitoring that can be otherwise inhibitively laborious. Unique to the autonomous mobile sensing methodology, the collected IEQ samples are highly sparse in both spatial and temporal domains. The study develops spatiotemporal (ST) interpolation methods based on ST binning, global trend extraction, and local variation estimation, which efficiently use the data to construct accurate depiction of the indoor environment evolution. The method is evaluated by a standard protocol for ventilation assessment, where the estimation is shown to be highly correlated with the ground truth, and reveals the true ventilation conditions.},\n  keywords={Data mining, Smart city, Energy system}\n}\n\n
\n
\n\n\n
\n Indoor environmental quality (IEQ) monitoring is a critical task in building operation, maintenance, and diagnosis. Current approach based on static sensor network is not scalable for IEQ assessment that relies on costly sensing instruments. The study proposes to leverage autonomous mobility to reduce sensing infrastructure cost and enable real-time high-granularity monitoring that can be otherwise inhibitively laborious. Unique to the autonomous mobile sensing methodology, the collected IEQ samples are highly sparse in both spatial and temporal domains. The study develops spatiotemporal (ST) interpolation methods based on ST binning, global trend extraction, and local variation estimation, which efficiently use the data to construct accurate depiction of the indoor environment evolution. The method is evaluated by a standard protocol for ventilation assessment, where the estimation is shown to be highly correlated with the ground truth, and reveals the true ventilation conditions.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n WinIPS: WiFi-Based Non-Intrusive Indoor Positioning System With Online Radio Map Construction and Adaptation.\n \n \n \n \n\n\n \n Zou, H.; Jin, M.; Jiang, H.; Xie, L.; and Spanos, C. J.\n\n\n \n\n\n\n IEEE Transactions on Wireless Communications, 16(12): 8118-8130. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"WinIPS: pdf\n  \n \n \n \"WinIPS: link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@ARTICLE{2017_1J_winips,\n  author={H. {Zou} and M. {Jin} and H. {Jiang} and L. {Xie} and C. J. {Spanos}},\n  journal={IEEE Transactions on Wireless Communications}, \n  title={WinIPS: WiFi-Based Non-Intrusive Indoor Positioning System With Online Radio Map Construction and Adaptation}, \n  year={2017},\n  volume={16},\n  number={12},\n  pages={8118-8130},\n  doi={10.1109/TWC.2017.2757472},\n  abstract={WiFi fingerprinting-based indoor positioning system (IPS) has become the most promising solution for indoor localization. However, there are two major drawbacks that hamper its large-scale implementation. First, an offline site survey process is required which is extremely time-consuming and labor-intensive. Second, the RSS fingerprint database built offline is vulnerable to environmental dynamics. To address these issues comprehensively, in this paper, we propose WinIPS, a WiFi-based non-intrusive IPS that enables automatic online radio map construction and adaptation, aiming for calibration-free indoor localization. WinIPS can capture data packets transmitted in existing WiFi traffic and extract the RSS and MAC addresses of both WiFi access points (APs) and mobile devices in a non-intrusive manner. APs can be used as online reference points for radio map construction. A novel Gaussian process regression model is proposed to approximate the non-uniform RSS distribution of an indoor environment. Extensive experiments were conducted, which demonstrated that WinIPS outperforms existing solutions in terms of both RSS estimation accuracy and localization accuracy.},\n  url_pdf = {WinIPS.pdf},\n  url_link = {https://ieeexplore.ieee.org/document/8057286/versions},\n  keywords = "Smart city, Data mining, Machine learning"}\n\n\n\n
\n
\n\n\n
\n WiFi fingerprinting-based indoor positioning system (IPS) has become the most promising solution for indoor localization. However, there are two major drawbacks that hamper its large-scale implementation. First, an offline site survey process is required which is extremely time-consuming and labor-intensive. Second, the RSS fingerprint database built offline is vulnerable to environmental dynamics. To address these issues comprehensively, in this paper, we propose WinIPS, a WiFi-based non-intrusive IPS that enables automatic online radio map construction and adaptation, aiming for calibration-free indoor localization. WinIPS can capture data packets transmitted in existing WiFi traffic and extract the RSS and MAC addresses of both WiFi access points (APs) and mobile devices in a non-intrusive manner. APs can be used as online reference points for radio map construction. A novel Gaussian process regression model is proposed to approximate the non-uniform RSS distribution of an indoor environment. Extensive experiments were conducted, which demonstrated that WinIPS outperforms existing solutions in terms of both RSS estimation accuracy and localization accuracy.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Leveraging correlations in utility learning.\n \n \n \n \n\n\n \n Konstantakopoulos, I. C.; Ratliff, L. J.; Jin, M.; and Spanos, C. J.\n\n\n \n\n\n\n In American Control Conference (ACC), pages 5249-5256, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"Leveraging link\n  \n \n \n \"Leveraging pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2017_1C_leveraging,\n  author={I. C. {Konstantakopoulos} and L. J. {Ratliff} and M. {Jin} and C. J. {Spanos}},\n  booktitle={American Control Conference (ACC)}, \n  title={Leveraging correlations in utility learning}, \n  year={2017},\n  volume={},\n  number={},\n  pages={5249-5256},\n  doi={10.23919/ACC.2017.7963770},\n  url_link={https://ieeexplore.ieee.org/abstract/document/7963770},\n  url_pdf={leverage_correlation.pdf},\n  abstract={We present two approaches for leveraging correlations in learning the utilities of non-cooperative agents' competing in a game: correlation and coalition utility learning. In the former, we estimate the correlations between agents using constrained Feasible Generalized Least Squares with noise estimation and then use the estimated correlations to generate a correlation utility function for each agent which is a weighted sum of its own estimated utility function and all the agents' estimated utilities that are highly correlated with them. We then optimize the weights to boost the performance of the estimators. In the latter, we use a small amount of training data to estimate the correlations between players and form coalitions between agents that are positively correlated. We then estimate the parameters of the utility functions for each coalition where agents in a coalition jointly optimize their utilities. The correlation utility learning method outperforms existing schemes while the coalition utility learning method is simple enough to be adapted to an online framework after an initial training phase, yet it matches the performance of much more complex schemes. To demonstrate the efficacy of the estimation schemes, we apply them to data collected from a social game framework for incentivizing more efficient shared resource consumption in smart buildings.},\n  keywords={Game theory, Smart city, Optimization, Data mining}}\n  \n
\n
\n\n\n
\n We present two approaches for leveraging correlations in learning the utilities of non-cooperative agents' competing in a game: correlation and coalition utility learning. In the former, we estimate the correlations between agents using constrained Feasible Generalized Least Squares with noise estimation and then use the estimated correlations to generate a correlation utility function for each agent which is a weighted sum of its own estimated utility function and all the agents' estimated utilities that are highly correlated with them. We then optimize the weights to boost the performance of the estimators. In the latter, we use a small amount of training data to estimate the correlations between players and form coalitions between agents that are positively correlated. We then estimate the parameters of the utility functions for each coalition where agents in a coalition jointly optimize their utilities. The correlation utility learning method outperforms existing schemes while the coalition utility learning method is simple enough to be adapted to an online framework after an initial training phase, yet it matches the performance of much more complex schemes. To demonstrate the efficacy of the estimation schemes, we apply them to data collected from a social game framework for incentivizing more efficient shared resource consumption in smart buildings.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Measuring fine-grained metro interchange time via smartphones.\n \n \n \n \n\n\n \n Gu, W.; Zhang, K.; Zhou, Z.; Jin, M.; Zhou, Y.; Liu, X.; Spanos, C. J.; Shen, Z. (.; Lin, W.; and Zhang, L.\n\n\n \n\n\n\n Transportation Research Part C: Emerging Technologies, 81: 153 - 171. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"Measuring link\n  \n \n \n \"Measuring pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{2017_0J_transportation,\ntitle = "Measuring fine-grained metro interchange time via smartphones",\njournal = "Transportation Research Part C: Emerging Technologies",\nvolume = "81",\npages = "153 - 171",\nyear = "2017",\nissn = "0968-090X",\ndoi = "https://doi.org/10.1016/j.trc.2017.05.014",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S0968090X17301523",\nurl_pdf = {/metro_smartphone.pdf},\nauthor = "Weixi Gu and Kai Zhang and Zimu Zhou and Ming Jin and Yuxun Zhou and Xi Liu and Costas J. Spanos and Zuo-Jun (Max) Shen and Wei-Hua Lin and Lin Zhang",\nkeywords = "Data mining, Smart city",\nabstract = "High variability interchange times often significantly affect the reliability of metro travels. Fine-grained measurements of interchange times during metro transfers can provide valuable insights on the crowdedness of stations, usage of station facilities and efficiency of metro lines. Measuring interchange times in metro systems is challenging since agent-operated systems like automatic fare collection systems only provide coarse-grained trip information and popular localization services like GPS are often inaccessible underground. In this paper, we propose a smartphone-based interchange time measuring method from the passengers’ perspective. It leverages low-power sensors embedded in modern smartphones to record ambient contextual features, and utilizes a two-tier classifier to infer interchange states during a metro trip, and further distinguishes 10 fine-grained cases during interchanges. Experimental results within 6months across over 14 subway lines in 3 major cities demonstrate that our approach yields an overall interchange state inference F1-measurement of 91.0% and an average time error of less than 2min at an inference interval of 20s, and an average accuracy of 89.3% to distinguish the 10 fine-grained interchange cases. We also conducted a series of case studies using measurements collected from crowdsourced users during 3months, which reveals findings previously unattainable without fine-grained interchange time measurements, such as portions of waiting time during interchange, interchange directions, usage of facilities (stairs/escalators/lifts), and the root causes of long interchange times."\n}\n\n
\n
\n\n\n
\n High variability interchange times often significantly affect the reliability of metro travels. Fine-grained measurements of interchange times during metro transfers can provide valuable insights on the crowdedness of stations, usage of station facilities and efficiency of metro lines. Measuring interchange times in metro systems is challenging since agent-operated systems like automatic fare collection systems only provide coarse-grained trip information and popular localization services like GPS are often inaccessible underground. In this paper, we propose a smartphone-based interchange time measuring method from the passengers’ perspective. It leverages low-power sensors embedded in modern smartphones to record ambient contextual features, and utilizes a two-tier classifier to infer interchange states during a metro trip, and further distinguishes 10 fine-grained cases during interchanges. Experimental results within 6months across over 14 subway lines in 3 major cities demonstrate that our approach yields an overall interchange state inference F1-measurement of 91.0% and an average time error of less than 2min at an inference interval of 20s, and an average accuracy of 89.3% to distinguish the 10 fine-grained interchange cases. We also conducted a series of case studies using measurements collected from crowdsourced users during 3months, which reveals findings previously unattainable without fine-grained interchange time measurements, such as portions of waiting time during interchange, interchange directions, usage of facilities (stairs/escalators/lifts), and the root causes of long interchange times.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Longitudinal assessment of thermal and perceived air quality acceptability in relation to temperature, humidity, and CO2 exposure in Singapore.\n \n \n \n \n\n\n \n Cheung, T. C.; Schiavon, S.; Gall, E. T.; Jin, M.; and Nazaroff, W. W\n\n\n \n\n\n\n Building and Environment, 115: 80 - 90. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"Longitudinal link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{2017_0J_longitudinal,\ntitle = "Longitudinal assessment of thermal and perceived air quality acceptability in relation to temperature, humidity, and CO2 exposure in Singapore",\njournal = "Building and Environment",\nvolume = "115",\npages = "80 - 90",\nyear = "2017",\nissn = "0360-1323",\ndoi = "https://doi.org/10.1016/j.buildenv.2017.01.014",\nurl_link = "http://www.sciencedirect.com/science/article/pii/S036013231730015X",\nauthor = "Toby C.T. Cheung and Stefano Schiavon and Elliott T. Gall and Ming Jin and William W Nazaroff",\nkeywords = "Smart city, Data mining",\nabstract = "Thermal acceptability (TA) and perceived air quality acceptability (PAQA) are typically analyzed in climate chambers or cross-sectional field studies. Individual factors, such as expectations and perceived environment history, may influence the acceptability response. Longitudinal studies with multi-day design are absent in the literature. Fifteen Singaporean subjects participated in a 7-day longitudinal experiment in which they carried a portable sensor that continuously recorded personal air temperature, relative humidity and carbon dioxide concentration at 1-min intervals. Instantaneous TA and PAQA were regularly sampled by survey for each subject. High acceptability was found at home, restaurants and workplaces, whereas low acceptability was found for outdoor and transport environments. The participants, from Singapore's modern tropical environment spent an average of 96% of their time indoors. Weak associations were reported between acceptabilities and measured physical parameters taken independently. Clustering data by location, subject's sleeping ventilation habit, air-conditioning operation status and the changes in physical parameters over a designated time period enhanced the understanding of the acceptability results. In general, acceptability was lower for those who slept in air-conditioned environments than for those who slept without air-conditioning. The carbon dioxide mixing ratio was critical for PAQA predictions but not for TA. The Gaussian process (GP) had a better predictive power than a multiple linear regression approach. Using GP, we found that a general predictive model had comparable simulation performance as for individual predictive models. The longitudinal experiment has demonstrated effectiveness for TA and PAQA analysis, which could be beneficial to future studies in personal comfort prediction."\n}\n\n
\n
\n\n\n
\n Thermal acceptability (TA) and perceived air quality acceptability (PAQA) are typically analyzed in climate chambers or cross-sectional field studies. Individual factors, such as expectations and perceived environment history, may influence the acceptability response. Longitudinal studies with multi-day design are absent in the literature. Fifteen Singaporean subjects participated in a 7-day longitudinal experiment in which they carried a portable sensor that continuously recorded personal air temperature, relative humidity and carbon dioxide concentration at 1-min intervals. Instantaneous TA and PAQA were regularly sampled by survey for each subject. High acceptability was found at home, restaurants and workplaces, whereas low acceptability was found for outdoor and transport environments. The participants, from Singapore's modern tropical environment spent an average of 96% of their time indoors. Weak associations were reported between acceptabilities and measured physical parameters taken independently. Clustering data by location, subject's sleeping ventilation habit, air-conditioning operation status and the changes in physical parameters over a designated time period enhanced the understanding of the acceptability results. In general, acceptability was lower for those who slept in air-conditioned environments than for those who slept without air-conditioning. The carbon dioxide mixing ratio was critical for PAQA predictions but not for TA. The Gaussian process (GP) had a better predictive power than a multiple linear regression approach. Using GP, we found that a general predictive model had comparable simulation performance as for individual predictive models. The longitudinal experiment has demonstrated effectiveness for TA and PAQA analysis, which could be beneficial to future studies in personal comfort prediction.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Metroeye: smart tracking your metro trips underground.\n \n \n \n \n\n\n \n Gu, W.; Jin, M.; Zhou, Z.; Spanos, C. J; and Zhang, L.\n\n\n \n\n\n\n In International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), pages 84–93, 2016. \n (Best Paper Runner-up)\n\n\n\n
\n\n\n\n \n \n \"Metroeye: pdf\n  \n \n \n \"Metroeye: link\n  \n \n \n \"Metroeye: poster\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2016_2C_metroeye,\n  title={Metroeye: smart tracking your metro trips underground},\n  author={Gu, Weixi and Jin, Ming and Zhou, Zimu and Spanos, Costas J and Zhang, Lin},\n  booktitle={International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous)},\n  url_pdf={metroeye_paper.pdf},\n  url_link={https://dl.acm.org/doi/10.1145/2968219.2971437},\n  url_poster={metroeye.pdf},\n  keywords={Smart city, Data mining},\n  abstract={Subway has become the first choice of traveling for people in metropolis due to its efficiency and convenience. Yet passengers have to rely on subway broadcasts to know their locations because popular localization services (e.g. GPS and wireless localization technologies) are often unavailable underground. To this end, we propose MetroEye, a fine-grained passenger tracking service underground. MetroEye leverages smartphone sensors to record ambient contextual features, and infers the state of passengers (including stop, running, and interchange) during a metro trip using a Conditional Random Field (CRF) model. MetroEye further provides arrival alarm services based on individual passenger state, and aggregates crowdsourced interchange durations to guide passengers for intelligent metro trip planning. Experimental results within 6 months across over 14 subway trains in 3 major cities demonstrate that MetroEye outperforms the state-of-the-art.},\n  pages={84--93},\n  year={2016},\n  note={<font style="color:#FF0000">(Best Paper Runner-up)</font>}\n}\n\n
\n
\n\n\n
\n Subway has become the first choice of traveling for people in metropolis due to its efficiency and convenience. Yet passengers have to rely on subway broadcasts to know their locations because popular localization services (e.g. GPS and wireless localization technologies) are often unavailable underground. To this end, we propose MetroEye, a fine-grained passenger tracking service underground. MetroEye leverages smartphone sensors to record ambient contextual features, and infers the state of passengers (including stop, running, and interchange) during a metro trip using a Conditional Random Field (CRF) model. MetroEye further provides arrival alarm services based on individual passenger state, and aggregates crowdsourced interchange durations to guide passengers for intelligent metro trip planning. Experimental results within 6 months across over 14 subway trains in 3 major cities demonstrate that MetroEye outperforms the state-of-the-art.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Mapsentinel: Can the knowledge of space use improve indoor tracking further?.\n \n \n \n \n\n\n \n Jia, R.; Jin, M.; Zou, H.; Yesilata, Y.; Xie, L.; and Spanos, C.\n\n\n \n\n\n\n Sensors, 16(4): 472. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"Mapsentinel: link\n  \n \n \n \"Mapsentinel: pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{2016_1J_mapsentinel,\n  title={Mapsentinel: Can the knowledge of space use improve indoor tracking further?},\n  author={Jia, Ruoxi and Jin, Ming and Zou, Han and Yesilata, Yigitcan and Xie, Lihua and Spanos, Costas},\n  journal={Sensors},\n  volume={16},\n  number={4},\n  pages={472},\n  year={2016},\n  publisher={Multidisciplinary Digital Publishing Institute},\n  abstract={Estimating an occupant’s location is arguably the most fundamental sensing task in smart buildings. The applications for fine-grained, responsive building operations require the location sensing systems to provide location estimates in real time, also known as indoor tracking. Existing indoor tracking systems require occupants to carry specialized devices or install programs on their smartphone to collect inertial sensing data. In this paper, we propose MapSentinel, which performs non-intrusive location sensing based on WiFi access points and ultrasonic sensors. MapSentinel combines the noisy sensor readings with the floormap information to estimate locations. One key observation supporting our work is that occupants exhibit distinctive motion characteristics at different locations on the floormap, e.g., constrained motion along the corridor or in the cubicle zones, and free movement in the open space. While extensive research has been performed on using a floormap as a tool to obtain correct walking trajectories without wall-crossings, there have been few attempts to incorporate the knowledge of space use available from the floormap into the location estimation. This paper argues that the knowledge of space use as an additional information source presents new opportunities for indoor tracking. The fusion of heterogeneous information is theoretically formulated within the Factor Graph framework, and the Context-Augmented Particle Filtering algorithm is developed to efficiently solve real-time walking trajectories. Our evaluation in a large office space shows that the MapSentinel can achieve accuracy improvement of 31.3% compared with the purely WiFi-based tracking system. },\n  url_link = {https://www.mdpi.com/1424-8220/16/4/472},\n  url_pdf = {mapsentinel.pdf},\n  keywords = {Smart city, Data mining}\n}\n\n
\n
\n\n\n
\n Estimating an occupant’s location is arguably the most fundamental sensing task in smart buildings. The applications for fine-grained, responsive building operations require the location sensing systems to provide location estimates in real time, also known as indoor tracking. Existing indoor tracking systems require occupants to carry specialized devices or install programs on their smartphone to collect inertial sensing data. In this paper, we propose MapSentinel, which performs non-intrusive location sensing based on WiFi access points and ultrasonic sensors. MapSentinel combines the noisy sensor readings with the floormap information to estimate locations. One key observation supporting our work is that occupants exhibit distinctive motion characteristics at different locations on the floormap, e.g., constrained motion along the corridor or in the cubicle zones, and free movement in the open space. While extensive research has been performed on using a floormap as a tool to obtain correct walking trajectories without wall-crossings, there have been few attempts to incorporate the knowledge of space use available from the floormap into the location estimation. This paper argues that the knowledge of space use as an additional information source presents new opportunities for indoor tracking. The fusion of heterogeneous information is theoretically formulated within the Factor Graph framework, and the Context-Augmented Particle Filtering algorithm is developed to efficiently solve real-time walking trajectories. Our evaluation in a large office space shows that the MapSentinel can achieve accuracy improvement of 31.3% compared with the purely WiFi-based tracking system. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n WinIPS: WiFi-based non-intrusive IPS for online radio map construction.\n \n \n \n \n\n\n \n Zou, H.; Ming Jin; Jiang, H.; Xie, L.; and Spanos, C.\n\n\n \n\n\n\n In IEEE Conference on Computer Communications (INFOCOM) Workshops , pages 1081-1082, 2016. \n \n\n\n\n
\n\n\n\n \n \n \"WinIPS: link\n  \n \n \n \"WinIPS: pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2016_1C_winips,\n  author={H. {Zou} and  {Ming Jin} and H. {Jiang} and L. {Xie} and C. {Spanos}},\n  booktitle={IEEE Conference on Computer Communications (INFOCOM) Workshops }, \n  title={WinIPS: WiFi-based non-intrusive IPS for online radio map construction}, \n  year={2016},\n  volume={},\n  number={},\n  pages={1081-1082},\n  doi={10.1109/INFCOMW.2016.7562263},\n  url_link={https://ieeexplore.ieee.org/abstract/document/7562263},\n  url_pdf={infocom_winips.pdf},\n  abstract={Existing WiFi fingerprinting-based Indoor Positioning System (IPS) suffers from two major bottlenecks. One is that the offline site survey process is extremely time-consuming and labor-intensive. The other is that the offline calibrated received signal strength (RSS) fingerprint database is vulnerable to environmental dynamics. To address these issues comprehensively, in this paper, we propose WinIPS, a WiFi-based non-intrusive IPS that enables automatic online radio map construction and adaptation for calibration-free indoor localization. WinIPS is able to capture data packets transmitted in the existing WiFi traffic and extract the RSS values and MAC addresses of both access points (AP) and mobile devices (MD) in a non-intrusive manner. By leveraging APs as online reference points for radio map construction, we can completely remove the needs of laborious offline site survey process. The constructed radio map is more robust to environmental dynamics since it is updated automatically in real-time. Extensive experimental results verify the superiority of WinIPS in terms of RSS estimation accuracy and localization accuracy, and these merits make it more suitable for practical large-scale implementation.},\n  keywords={Data mining, Smart city}}\n  \n
\n
\n\n\n
\n Existing WiFi fingerprinting-based Indoor Positioning System (IPS) suffers from two major bottlenecks. One is that the offline site survey process is extremely time-consuming and labor-intensive. The other is that the offline calibrated received signal strength (RSS) fingerprint database is vulnerable to environmental dynamics. To address these issues comprehensively, in this paper, we propose WinIPS, a WiFi-based non-intrusive IPS that enables automatic online radio map construction and adaptation for calibration-free indoor localization. WinIPS is able to capture data packets transmitted in the existing WiFi traffic and extract the RSS values and MAC addresses of both access points (AP) and mobile devices (MD) in a non-intrusive manner. By leveraging APs as online reference points for radio map construction, we can completely remove the needs of laborious offline site survey process. The constructed radio map is more robust to environmental dynamics since it is updated automatically in real-time. Extensive experimental results verify the superiority of WinIPS in terms of RSS estimation accuracy and localization accuracy, and these merits make it more suitable for practical large-scale implementation.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Smart building energy efficiency via social game: a robust utility learning framework for closing–the–loop.\n \n \n \n \n\n\n \n Konstantakopoulos, I. C.; Ratliff, L. J.; Jin, M.; Spanos, C.; and Sastry, S. S.\n\n\n \n\n\n\n In International Workshop on Science of Smart City Operations and Platforms Engineering (SCOPE), pages 1-6, 2016. \n \n\n\n\n
\n\n\n\n \n \n \"Smart link\n  \n \n \n \"Smart pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2016_1C_smart,\n  author={I. C. {Konstantakopoulos} and L. J. {Ratliff} and M. {Jin} and C. {Spanos} and S. S. {Sastry}},\n  booktitle={International Workshop on Science of Smart City Operations and Platforms Engineering (SCOPE)}, \n  title={Smart building energy efficiency via social game: a robust utility learning framework for closing–the–loop}, \n  year={2016},\n  volume={},\n  number={},\n  pages={1-6},\n  doi={10.1109/SCOPE.2016.7515054},\n  url_link={https://ieeexplore.ieee.org/abstract/document/7515054},\n  url_pdf={Scope2016CameraReady.pdf},\n  abstract={Given a non-cooperative, continuous game, we describe a framework for parametric utility learning. Using heteroskedasticity inference, we adapt a Constrained Feasible Generalized Least Squares (cFGLS) utility learning method in which estimator variance is reduced, unbiased, and consistent. We extend our utility learning method using bootstrapping and bagging. We show the performance of the proposed method using data from a social game experiment designed to encourage energy efficient behavior amongst building occupants. Using occupant voting data we simulate the game defined by the estimated utility functions and show that the performance of our robust utility learning method and quantify its improvement over classical methods such as Ordinary Least Squares (OLS).},\n  keywords={Data mining, Optimization, Game theory, Smart city, Energy system}}\n\n
\n
\n\n\n
\n Given a non-cooperative, continuous game, we describe a framework for parametric utility learning. Using heteroskedasticity inference, we adapt a Constrained Feasible Generalized Least Squares (cFGLS) utility learning method in which estimator variance is reduced, unbiased, and consistent. We extend our utility learning method using bootstrapping and bagging. We show the performance of the proposed method using data from a social game experiment designed to encourage energy efficient behavior amongst building occupants. Using occupant voting data we simulate the game defined by the estimated utility functions and show that the performance of our robust utility learning method and quantify its improvement over classical methods such as Ordinary Least Squares (OLS).\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Inverse modeling of non-cooperative agents via mixture of utilities.\n \n \n \n \n\n\n \n Konstantakopoulos, I. C.; Ratliff, L. J.; Jin, M.; Spanos, C. J.; and Sastry, S. S.\n\n\n \n\n\n\n In IEEE Conference on Decision and Control, pages 6327-6334, 2016. \n \n\n\n\n
\n\n\n\n \n \n \"Inverse link\n  \n \n \n \"Inverse pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2016_1C_inverse,\n  author={I. C. {Konstantakopoulos} and L. J. {Ratliff} and M. {Jin} and C. J. {Spanos} and S. S. {Sastry}},\n  booktitle={IEEE Conference on Decision and Control}, \n  title={Inverse modeling of non-cooperative agents via mixture of utilities}, \n  year={2016},\n  volume={},\n  number={},\n  pages={6327-6334},\n  doi={10.1109/CDC.2016.7799243},\n  url_link={https://ieeexplore.ieee.org/document/7799243},\n  url_pdf={InverseModel_2016.pdf},\n  abstract={We describe a new method of parametric utility learning for non-cooperative, continuous games using a probabilistic interpretation for combining multiple utility functions - thereby creating a mixture of utilities - under non-spherical noise terms. We present an adaptation of mixture of regression models that takes in to account heteroskedasticity. We show the performance of the proposed method by estimating the utility functions of players using data from a social game experiment designed to encourage energy efficient behavior amongst building occupants. Using occupant voting data we simulate the new game defined by the estimated mixture of utilities and show that the resulting forecast is more accurate than robust utility learning methods such as constrained Feasible Generalized Least Squares (cFGLS), ensemble methods such as bagging, and classical methods such as Ordinary Least Squares (OLS).},\n  keywords={Smart city, Optimization, Data mining}}\n  \n
\n
\n\n\n
\n We describe a new method of parametric utility learning for non-cooperative, continuous games using a probabilistic interpretation for combining multiple utility functions - thereby creating a mixture of utilities - under non-spherical noise terms. We present an adaptation of mixture of regression models that takes in to account heteroskedasticity. We show the performance of the proposed method by estimating the utility functions of players using data from a social game experiment designed to encourage energy efficient behavior amongst building occupants. Using occupant voting data we simulate the new game defined by the estimated mixture of utilities and show that the resulting forecast is more accurate than robust utility learning methods such as constrained Feasible Generalized Least Squares (cFGLS), ensemble methods such as bagging, and classical methods such as Ordinary Least Squares (OLS).\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Sensing by proxy: Occupancy detection based on indoor CO2 concentration.\n \n \n \n \n\n\n \n Jin, M.; Bekiaris-Liberis, N.; Weekly, K.; Spanos, C.; and Bayen, A.\n\n\n \n\n\n\n In UBICOMM 2015, volume 14, 2015. \n (Best Paper Award)\n\n\n\n
\n\n\n\n \n \n \"Sensing pdf\n  \n \n \n \"Sensing link\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2015_3C_sbp,\n  title={Sensing by proxy: Occupancy detection based on indoor CO2 concentration},\n  author={Jin, Ming and Bekiaris-Liberis, Nikolaos and Weekly, Kevin and Spanos, Costas and Bayen, Alexandre},\n  booktitle={UBICOMM 2015},\n  url_pdf={sbp.pdf},\n  url_link={https://www.iaria.org/conferences2015/UBICOMM15.html},\n  abstract={Sensing by proxy, as described in this study, is a sensing paradigm which infers latent factors by “proxy” measurements based on constitutive models that exploit the spatial and physical features in the system. In this study, we demonstrate the efficiency of sensing by proxy for occupancy detection based on indoor CO2 concentration. We propose a link model that relates the proxy measurements with unknown human emission rates based on a data-driven model which consists of a coupled Partial Differential Equation (PDE) – Ordinary Differential Equation (ODE) system. We report on several experimental results using both a CO2 pump that emulates human breathing, as well as measurements of actual occupancy by performing controlled field experiments, in order to validate our model. Parameters of the model are datadriven, which exhibit long-term stability and robustness across all the occupants experiments. The inference of the number of occupants in the room based on CO2 measurements at the air return and air supply vents by sensing by proxy outperforms a range of machine learning algorithms, and achieves an overall mean squared error of 0.6569 (fractional person), while the best alternative by Bayes net is 1.2061 (fractional person). Building indoor occupancy is essential to facilitate heating, ventilation, and air conditioning (HVAC) control, lighting adjustment, and occupancy-aware services to achieve occupancy comfort and energy efficiency. The significance of this study is the proposal of a paradigm of sensing that results in a parsimonious and accurate occupancy inference model, which holds considerable potential for energy saving and improvement of HVAC operations. The proposed framework can be also applied to other tasks, such as indoor pollutants source identification, while requiring minimal infrastructure expenses.},\n  keywords={Smart city, Energy system, Data mining},\n  volume={14},\n  year={2015},\n  note={<font style="color:#FF0000">(Best Paper Award)</font>}\n}\n\n
\n
\n\n\n
\n Sensing by proxy, as described in this study, is a sensing paradigm which infers latent factors by “proxy” measurements based on constitutive models that exploit the spatial and physical features in the system. In this study, we demonstrate the efficiency of sensing by proxy for occupancy detection based on indoor CO2 concentration. We propose a link model that relates the proxy measurements with unknown human emission rates based on a data-driven model which consists of a coupled Partial Differential Equation (PDE) – Ordinary Differential Equation (ODE) system. We report on several experimental results using both a CO2 pump that emulates human breathing, as well as measurements of actual occupancy by performing controlled field experiments, in order to validate our model. Parameters of the model are datadriven, which exhibit long-term stability and robustness across all the occupants experiments. The inference of the number of occupants in the room based on CO2 measurements at the air return and air supply vents by sensing by proxy outperforms a range of machine learning algorithms, and achieves an overall mean squared error of 0.6569 (fractional person), while the best alternative by Bayes net is 1.2061 (fractional person). Building indoor occupancy is essential to facilitate heating, ventilation, and air conditioning (HVAC) control, lighting adjustment, and occupancy-aware services to achieve occupancy comfort and energy efficiency. The significance of this study is the proposal of a paradigm of sensing that results in a parsimonious and accurate occupancy inference model, which holds considerable potential for energy saving and improvement of HVAC operations. The proposed framework can be also applied to other tasks, such as indoor pollutants source identification, while requiring minimal infrastructure expenses.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n BRIEF: Bayesian Regression of Infinite Expert Forecasters for single and multiple time series prediction.\n \n \n \n \n\n\n \n Jin, M.; and Spanos, C. J.\n\n\n \n\n\n\n In IEEE Conference on Decision and Control (CDC), pages 78-83, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"BRIEF: link\n  \n \n \n \"BRIEF: pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2015_3C_brief,\n  author={M. {Jin} and C. J. {Spanos}},\n  booktitle={IEEE Conference on Decision and Control (CDC)}, \n  title={BRIEF: Bayesian Regression of Infinite Expert Forecasters for single and multiple time series prediction}, \n  year={2015},\n  volume={},\n  number={},\n  pages={78-83},\n  doi={10.1109/CDC.2015.7402089},\n  url_link={https://ieeexplore.ieee.org/document/7402089},\n  url_pdf={brief_cdc.pdf},\n  abstract={Bayesian Regression of Infinite Expert Forecasters (BRIEF) as proposed in the study is a prediction algorithm for time-varying systems. The method is based on regret minimization by tracking the performance of an inifinite pool of experts for single and multiple time series. The inverse correlation weighted error (ICWE) employed in BRIEF takes into account the dependency structure among multiple time series, which can also be adapted to multi-step ahead predictions. Theoretical bounds show that the cumulative regret grows at rate O(log T) with respect to the oracle that can select the best strategy in retrospect. As the per round regret vanishes, BRIEF is indistinguishable to the oracle when the horizon increases. Also since the bound applies to any choice of input subject to the euclidean norm constraint, the method can be applied to adversarial settings. Experimental results verify that BRIEF excels in single and multiple steps ahead prediction of ARMAX simulated data and building energy consumptions.},\n  keywords={Machine learning, Optimization}}\n  \n
\n
\n\n\n
\n Bayesian Regression of Infinite Expert Forecasters (BRIEF) as proposed in the study is a prediction algorithm for time-varying systems. The method is based on regret minimization by tracking the performance of an inifinite pool of experts for single and multiple time series. The inverse correlation weighted error (ICWE) employed in BRIEF takes into account the dependency structure among multiple time series, which can also be adapted to multi-step ahead predictions. Theoretical bounds show that the cumulative regret grows at rate O(log T) with respect to the oracle that can select the best strategy in retrospect. As the per round regret vanishes, BRIEF is indistinguishable to the oracle when the horizon increases. Also since the bound applies to any choice of input subject to the euclidean norm constraint, the method can be applied to adversarial settings. Experimental results verify that BRIEF excels in single and multiple steps ahead prediction of ARMAX simulated data and building energy consumptions.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SoundLoc: Accurate room-level indoor localization using acoustic signatures.\n \n \n \n \n\n\n \n Jia, R.; Jin, M.; Chen, Z.; and Spanos, C. J.\n\n\n \n\n\n\n In IEEE International Conference on Automation Science and Engineering (CASE), pages 186-193, 2015. \n (Featured in 'MIT Technology Review')\n\n\n\n
\n\n\n\n \n \n \"SoundLoc: link\n  \n \n \n \"SoundLoc: pdf\n  \n \n \n \"SoundLoc: media\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2015_2C_soundloc,\n  author={R. {Jia} and M. {Jin} and Z. {Chen} and C. J. {Spanos}},\n  booktitle={IEEE International Conference on Automation Science and Engineering (CASE)}, \n  title={SoundLoc: Accurate room-level indoor localization using acoustic signatures}, \n  year={2015},\n  volume={},\n  number={},\n  pages={186-193},\n  doi={10.1109/CoASE.2015.7294060},\n  url_link={https://ieeexplore.ieee.org/document/7294060},\n  url_pdf={soundloc.pdf},\n  url_media={https://www.technologyreview.com/view/529176/an-indoor-positioning-system-based-on-echolocation/},\n  abstract={Room-level indoor localization is of particular interest in the energy-efficient smart building, as services, such as lighting and ventilation, can be targeted towards individual rooms based on occupancy instead of an entire floor. Hence, this paper focuses on identifying the room where a person or a mobile device is physically present. Existing room-level localization methods, however, require special infrastructure to annotate rooms with special signatures. SoundLoc is a room-level localization scheme that exploits the intrinsic acoustic properties of individual rooms and obviates the needs for infrastructures. As we will show in the study, rooms' acoustic properties can be characterized by Room Impulse Response (RIR). Nevertheless, obtaining precise RIRs is a time-consuming and expensive process. The main contributions of our work are the following: First, a cost-effective RIR measurement system is designed and the Noise Adaptive Extraction of Reverberation (NAER) algorithm is developed to estimate room acoustic parameters in noisy conditions. Second, a comprehensive physical and statistical analysis of features extracted from RIRs is performed. Also, SoundLoc is evaluated using the dataset consisting of ten (10) different rooms and the overall accuracy of 97.8% has been achieved.},\n  keywords={Data mining, Smart city, Energy system},\n  note={<a style="color:#FF0000" href="http://www.technologyreview.com/view/529176/an-indoor-positioning-system-based-on-echolocation/">(Featured in 'MIT Technology Review')</a>}}\n  \n
\n
\n\n\n
\n Room-level indoor localization is of particular interest in the energy-efficient smart building, as services, such as lighting and ventilation, can be targeted towards individual rooms based on occupancy instead of an entire floor. Hence, this paper focuses on identifying the room where a person or a mobile device is physically present. Existing room-level localization methods, however, require special infrastructure to annotate rooms with special signatures. SoundLoc is a room-level localization scheme that exploits the intrinsic acoustic properties of individual rooms and obviates the needs for infrastructures. As we will show in the study, rooms' acoustic properties can be characterized by Room Impulse Response (RIR). Nevertheless, obtaining precise RIRs is a time-consuming and expensive process. The main contributions of our work are the following: First, a cost-effective RIR measurement system is designed and the Noise Adaptive Extraction of Reverberation (NAER) algorithm is developed to estimate room acoustic parameters in noisy conditions. Second, a comprehensive physical and statistical analysis of features extracted from RIRs is performed. Also, SoundLoc is evaluated using the dataset consisting of ten (10) different rooms and the overall accuracy of 97.8% has been achieved.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n REST: a reliable estimation of stopping time algorithm for social game experiments.\n \n \n \n \n\n\n \n Jin, M.; Ratliff, L. J; Konstantakopoulos, I.; Spanos, C.; and Sastry, S.\n\n\n \n\n\n\n In ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pages 90–99, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"REST: pdf\n  \n \n \n \"REST: link\n  \n \n \n \"REST: code\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2015_2C_rest,\n  title={REST: a reliable estimation of stopping time algorithm for social game experiments},\n  author={Jin, Ming and Ratliff, Lillian J and Konstantakopoulos, Ioannis and Spanos, Costas and Sastry, Shankar},\n  booktitle={ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS)},\n  pages={90--99},\n  year={2015},\n  url_pdf={rest.pdf},\n  url_link={https://dl.acm.org/doi/abs/10.1145/2735960.2735974},\n  url_code={https://github.com/jinming99/REST},\n  abstract={Through a social game, we integrate building occupants into the control and management of an office building that is instrumented with networked embedded systems for sensing and actuation. The goal of the social game is to both incentivize building occupants to be more energy efficient and learn behavioral models for occupants so that the building can be made sustainable through automation. Given a generative model for the occupants behavior in the competitive environment created by the social game, we develop a method for learning the parameters of the behavioral model as we conduct the experiment by adopting a learning to learn framework. Using tools from statistical learning, we provide bounds on the parameter inference error. In addition, we provide an algorithm for computing the stopping time required for a specified level of confidence in estimation. We show the performance of our algorithm in several examples.},\n  keywords={Smart city, Optimization, Energy system}\n}\n\n
\n
\n\n\n
\n Through a social game, we integrate building occupants into the control and management of an office building that is instrumented with networked embedded systems for sensing and actuation. The goal of the social game is to both incentivize building occupants to be more energy efficient and learn behavioral models for occupants so that the building can be made sustainable through automation. Given a generative model for the occupants behavior in the competitive environment created by the social game, we develop a method for learning the parameters of the behavioral model as we conduct the experiment by adopting a learning to learn framework. Using tools from statistical learning, we provide bounds on the parameter inference error. In addition, we provide an algorithm for computing the stopping time required for a specified level of confidence in estimation. We show the performance of our algorithm in several examples.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Power prediction through energy consumption pattern recognition for smart buildings.\n \n \n \n \n\n\n \n Jin, M.; Zhang, L.; and Spanos, C. J.\n\n\n \n\n\n\n In IEEE International Conference on Automation Science and Engineering (CASE), pages 419-424, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"Power link\n  \n \n \n \"Power pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2015_1C_powerpred,\n  author={M. {Jin} and L. {Zhang} and C. J. {Spanos}},\n  booktitle={IEEE International Conference on Automation Science and Engineering (CASE)}, \n  title={Power prediction through energy consumption pattern recognition for smart buildings}, \n  year={2015},\n  volume={},\n  number={},\n  pages={419-424},\n  doi={10.1109/CoASE.2015.7294115},\n  url_link={https://ieeexplore.ieee.org/document/7294115},\n  url_pdf={power_pred.pdf},\n  abstract={In this paper, we propose a Non-negative Mixture of Experts (NME) model for smart buildings that is capable of making accurate power forecasting by recognizing characteristic consumption patterns. The model uses prediction error as a metric to guide the feature learning process subject to non-negativity constraints. The objective is to understand and model energy consumption behaviors in commercial buildings at the appliance level so as to facilitate dynamic pricing and demand response. Application of the NME model to a large dataset of device power measurements results in the discovery of meaningful energy usage patterns that are characteristic of the working and idle states of the building space, with the additional advantage that the learned features also optimize the energy prediction model. The model can be learned by stochastic gradient descent, which is suitable for large-scale problems, and an online version is also suggested.},\n  keywords={Machine learning, Smart city, Energy system}}\n\n
\n
\n\n\n
\n In this paper, we propose a Non-negative Mixture of Experts (NME) model for smart buildings that is capable of making accurate power forecasting by recognizing characteristic consumption patterns. The model uses prediction error as a metric to guide the feature learning process subject to non-negativity constraints. The objective is to understand and model energy consumption behaviors in commercial buildings at the appliance level so as to facilitate dynamic pricing and demand response. Application of the NME model to a large dataset of device power measurements results in the discovery of meaningful energy usage patterns that are characteristic of the working and idle states of the building space, with the additional advantage that the learned features also optimize the energy prediction model. The model can be learned by stochastic gradient descent, which is suitable for large-scale problems, and an online version is also suggested.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n APEC: Auto planner for efficient configuration of indoor positioning system.\n \n \n \n \n\n\n \n Jin, M.; Jia, R.; and Spanos, C.\n\n\n \n\n\n\n In Int. Conf. Mobile Ubiquitous Comput. Syst. Services Technol.(UBICOMM), pages 100–107, 2015. \n (Invitation for IARIA Journals)\n\n\n\n
\n\n\n\n \n \n \"APEC: pdf\n  \n \n \n \"APEC: link\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2015_1C_apec,\n  title={APEC: Auto planner for efficient configuration of indoor positioning system},\n  author={Jin, Ming and Jia, Ruoxi and Spanos, Costas},\n  booktitle={Int. Conf. Mobile Ubiquitous Comput. Syst. Services Technol.(UBICOMM)},\n  pages={100--107},\n  year={2015},\n  url_pdf={apec.pdf},\n  url_link={https://www.iaria.org/conferences2015/AwardsUBICOMM15.html},\n  note={<font style="color:#FF0000">(Invitation for IARIA Journals)</font>},\n  abstract={Fingerprints-based methods have been prevailing in indoor positioning systems, whereas they have certain drawbacks that fingerprints collection in the offline phase requires considerable manpower and time. Auto Planner for Efficient Configuration (APEC) systematically exploits router setups and fingerprints allocations over space by taking into account user preferences and budget constraints. The task of configuration is formulated as an optimization problem, whose objective is the expected loss based on the Hierarchical Bayesian Signal Model (HBSM) and theoretical results on the misclassification rates. To reduce the computational complexity of large-scale problems, two heuristics are employed, i.e., the coordinate descent and the router-fingerprints decoupling, which are validated by simulation analysis. Experiments with three mobile devices (Android, iPad, iPhone) in two setups (7 or 9 access points) verify that the expected loss is a reliable predictor of the actual loss of the system (objective consistency), and that APEC outperforms the random and uniform approaches (solution superiority). Since APEC focuses on the system configuration in the planning stage, it can be combined with other fingerprinting processes in the online phase to improve the utility of the system},\n  keywords={Optimization, Data mining, Smart city, Energy system}\n}\n\n
\n
\n\n\n
\n Fingerprints-based methods have been prevailing in indoor positioning systems, whereas they have certain drawbacks that fingerprints collection in the offline phase requires considerable manpower and time. Auto Planner for Efficient Configuration (APEC) systematically exploits router setups and fingerprints allocations over space by taking into account user preferences and budget constraints. The task of configuration is formulated as an optimization problem, whose objective is the expected loss based on the Hierarchical Bayesian Signal Model (HBSM) and theoretical results on the misclassification rates. To reduce the computational complexity of large-scale problems, two heuristics are employed, i.e., the coordinate descent and the router-fingerprints decoupling, which are validated by simulation analysis. Experiments with three mobile devices (Android, iPad, iPhone) in two setups (7 or 9 access points) verify that the expected loss is a reliable predictor of the actual loss of the system (objective consistency), and that APEC outperforms the random and uniform approaches (solution superiority). Since APEC focuses on the system configuration in the planning stage, it can be combined with other fingerprinting processes in the online phase to improve the utility of the system\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Modeling and Estimation of the Humans' Effect on the CO2 Dynamics Inside a Conference Room.\n \n \n \n \n\n\n \n Weekly, K.; Bekiaris-Liberis, N.; Jin, M.; and Bayen, A. M.\n\n\n \n\n\n\n IEEE Transactions on Control Systems Technology, 23(5): 1770-1781. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"Modeling link\n  \n \n \n \"Modeling pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@ARTICLE{2015_0J_modeling,\n  author={K. {Weekly} and N. {Bekiaris-Liberis} and M. {Jin} and A. M. {Bayen}},\n  journal={IEEE Transactions on Control Systems Technology}, \n  title={Modeling and Estimation of the Humans' Effect on the CO2 Dynamics Inside a Conference Room}, \n  year={2015},\n  volume={23},\n  number={5},\n  pages={1770-1781},\n  doi={10.1109/TCST.2014.2384002},\n  abstract={We develop a data driven, partial differential equation-ordinary differential equation model that describes the response of the carbon dioxide (CO 2 ) dynamics inside a conference room, due to the presence of humans, or of a user-controlled exogenous source of CO 2 . We conduct three controlled experiments to develop and tune a model whose output matches the measured output concentration of CO 2 inside the room, when known inputs are applied to the model. In the first experiment, a controlled amount of CO 2 gas is released inside the room from a regulated supply, and in the second and third experiments, a known number of humans produce a certain amount of CO 2 inside the room. For the estimation of the exogenous inputs, we design an observer, based on our model, using measurements of CO 2 concentrations at two locations inside the room. We perform several simulation studies for the illustration of our results.},\n  url_link={https://ieeexplore.ieee.org/abstract/document/7004837},\n  url_pdf={modelco2.pdf},\n  keywords = {Control theory, Data mining, Smart city}}\n  \n
\n
\n\n\n
\n We develop a data driven, partial differential equation-ordinary differential equation model that describes the response of the carbon dioxide (CO 2 ) dynamics inside a conference room, due to the presence of humans, or of a user-controlled exogenous source of CO 2 . We conduct three controlled experiments to develop and tune a model whose output matches the measured output concentration of CO 2 inside the room, when known inputs are applied to the model. In the first experiment, a controlled amount of CO 2 gas is released inside the room from a regulated supply, and in the second and third experiments, a known number of humans produce a certain amount of CO 2 inside the room. For the estimation of the exogenous inputs, we design an observer, based on our model, using measurements of CO 2 concentrations at two locations inside the room. We perform several simulation studies for the illustration of our results.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Presencesense: Zero-training algorithm for individual presence detection based on power monitoring.\n \n \n \n \n\n\n \n Jin, M.; Jia, R.; Kang, Z.; Konstantakopoulos, I. C; and Spanos, C. J\n\n\n \n\n\n\n In ACM Conference on Embedded Systems for Energy-Efficient Buildings, pages 1–10, 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Presencesense: link\n  \n \n \n \"Presencesense: pdf\n  \n \n \n \"Presencesense: arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{2014_3C_presence,\n  title={Presencesense: Zero-training algorithm for individual presence detection based on power monitoring},\n  author={Jin, Ming and Jia, Ruoxi and Kang, Zhaoyi and Konstantakopoulos, Ioannis C and Spanos, Costas J},\n  booktitle={ACM Conference on Embedded Systems for Energy-Efficient Buildings},\n  pages={1--10},\n  year={2014},\n  url_link={https://dl.acm.org/doi/abs/10.1145/2674061.2674073},\n  url_pdf={/presencesense.pdf},\n  url_arXiv={https://arxiv.org/abs/1407.4395},\n  abstract={Non-intrusive presence detection of individuals in commercial buildings is much easier to implement than intrusive methods such as passive infrared, acoustic sensors, and camera. Individual power consumption, while providing useful feedback and motivation for energy saving, can be used as a valuable source for presence detection. We conduct pilot experiments in an office setting to collect individual presence data by ultrasonic sensors, acceleration sensors, and WiFi access points, in addition to the individual power monitoring data. PresenceSense (PS), a semi-supervised learning algorithm based on power measurement that trains itself with only unlabeled data, is proposed, analyzed and evaluated in the study. Without any labeling efforts, which are usually tedious and time consuming, PresenceSense outperforms popular models whose parameters are optimized over a large training set. The results are interpreted and potential applications of PresenceSense on other data sources are discussed. The significance of this study attaches to space security, occupancy behavior modeling, and energy saving of plug loads.},\n  keywords={Machine learning, Data mining, Energy system, Smart city}\n}\n\n
\n
\n\n\n
\n Non-intrusive presence detection of individuals in commercial buildings is much easier to implement than intrusive methods such as passive infrared, acoustic sensors, and camera. Individual power consumption, while providing useful feedback and motivation for energy saving, can be used as a valuable source for presence detection. We conduct pilot experiments in an office setting to collect individual presence data by ultrasonic sensors, acceleration sensors, and WiFi access points, in addition to the individual power monitoring data. PresenceSense (PS), a semi-supervised learning algorithm based on power measurement that trains itself with only unlabeled data, is proposed, analyzed and evaluated in the study. Without any labeling efforts, which are usually tedious and time consuming, PresenceSense outperforms popular models whose parameters are optimized over a large training set. The results are interpreted and potential applications of PresenceSense on other data sources are discussed. The significance of this study attaches to space security, occupancy behavior modeling, and energy saving of plug loads.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Social game for building energy efficiency: Incentive design.\n \n \n \n \n\n\n \n Ratliff, L. J.; Jin, M.; Konstantakopoulos, I. C.; Spanos, C.; and Sastry, S. S.\n\n\n \n\n\n\n In Annual Allerton Conference on Communication, Control, and Computing (Allerton), pages 1011-1018, 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Social link\n  \n \n \n \"Social pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2014_2C_social,\n  author={L. J. {Ratliff} and M. {Jin} and I. C. {Konstantakopoulos} and C. {Spanos} and S. S. {Sastry}},\n  booktitle={Annual Allerton Conference on Communication, Control, and Computing (Allerton)}, \n  title={Social game for building energy efficiency: Incentive design}, \n  year={2014},\n  volume={},\n  number={},\n  pages={1011-1018},\n  doi={10.1109/ALLERTON.2014.7028565},\n  url_link={https://ieeexplore.ieee.org/document/7028565},\n  url_pdf={social_game.pdf},\n  abstract={We present analysis and results of a social game encouraging energy efficient behavior in occupants by distributing points which determine the likelihood of winning in a lottery. We estimate occupants utilities and formulate the interaction between the building manager and the occupants as a reversed Stackelberg game in which there are multiple followers that play in a non-cooperative game. The estimated utilities are used for determining the occupant behavior in the non-cooperative game. Due to nonconvexities and complexity of the problem, in particular the size of the joint distribution across the states of the occupants, we solve the resulting the bilevel optimization problem using a particle swarm optimization method. Drawing from the distribution across player states, we compute the Nash equilibrium of the game using the resulting leader choice. We show that the behavior of the agents under the leader choice results in greater utility for the leader.},\n  keywords={Game theory, Optimization, Smart city, Energy system}}
\n
\n\n\n
\n We present analysis and results of a social game encouraging energy efficient behavior in occupants by distributing points which determine the likelihood of winning in a lottery. We estimate occupants utilities and formulate the interaction between the building manager and the occupants as a reversed Stackelberg game in which there are multiple followers that play in a non-cooperative game. The estimated utilities are used for determining the occupant behavior in the non-cooperative game. Due to nonconvexities and complexity of the problem, in particular the size of the joint distribution across the states of the occupants, we solve the resulting the bilevel optimization problem using a particle swarm optimization method. Drawing from the distribution across player states, we compute the Nash equilibrium of the game using the resulting leader choice. We show that the behavior of the agents under the leader choice results in greater utility for the leader.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Environmental sensing by wearable device for indoor activity and location estimation.\n \n \n \n \n\n\n \n Jin, M.; Zou, H.; Weekly, K.; Jia, R.; Bayen, A. M.; and Spanos, C. J.\n\n\n \n\n\n\n In Annual Conference of the IEEE Industrial Electronics Society (IECON), pages 5369-5375, 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Environmental pdf\n  \n \n \n \"Environmental poster\n  \n \n \n \"Environmental link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2014_2C_environment,\n  author={M. {Jin} and H. {Zou} and K. {Weekly} and R. {Jia} and A. M. {Bayen} and C. J. {Spanos}},\n  booktitle={Annual Conference of the IEEE Industrial Electronics Society (IECON)}, \n  title={Environmental sensing by wearable device for indoor activity and location estimation}, \n  year={2014},\n  volume={},\n  number={},\n  pages={5369-5375},\n  doi={10.1109/IECON.2014.7049320},\n  url_pdf={environmental_sensing.pdf},\n  url_poster={environmental_sensing_poster.pdf},\n  url_link={https://ieeexplore.ieee.org/document/7049320},\n  abstract={We present results from a set of experiments in this pilot study to investigate the causal influence of user activity on various environmental parameters monitored by occupant-carried multi-purpose sensors. Hypotheses with respect to each type of measurements are verified, including temperature, humidity, and light level collected during eight typical activities: sitting in lab / cubicle, indoor walking / running, resting after physical activity, climbing stairs, taking elevators, and outdoor walking. Our main contribution is the development of features for activity and location recognition based on environmental measurements, which exploit location- and activity-specific characteristics and capture the trends resulted from the underlying physiological process. The features are statistically shown to have good separability and are also information-rich. Fusing environmental sensing together with acceleration is shown to achieve classification accuracy as high as 99.13%. For building applications, this study motivates a sensor fusion paradigm for learning individualized activity, location, and environmental preferences for energy management and user comfort.},\n  keywords={Data mining, Smart city, Energy system}}\n  \n
\n
\n\n\n
\n We present results from a set of experiments in this pilot study to investigate the causal influence of user activity on various environmental parameters monitored by occupant-carried multi-purpose sensors. Hypotheses with respect to each type of measurements are verified, including temperature, humidity, and light level collected during eight typical activities: sitting in lab / cubicle, indoor walking / running, resting after physical activity, climbing stairs, taking elevators, and outdoor walking. Our main contribution is the development of features for activity and location recognition based on environmental measurements, which exploit location- and activity-specific characteristics and capture the trends resulted from the underlying physiological process. The features are statistically shown to have good separability and are also information-rich. Fusing environmental sensing together with acceleration is shown to achieve classification accuracy as high as 99.13%. For building applications, this study motivates a sensor fusion paradigm for learning individualized activity, location, and environmental preferences for energy management and user comfort.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Modeling of end-use energy profile: An appliance-data-driven stochastic approach.\n \n \n \n \n\n\n \n Kang, Z.; Jin, M.; and Spanos, C. J.\n\n\n \n\n\n\n In Annual Conference of the IEEE Industrial Electronics Society (IECON), pages 5382-5388, 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Modeling link\n  \n \n \n \"Modeling pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@INPROCEEDINGS{2014_1C_model,\n  author={Z. {Kang} and M. {Jin} and C. J. {Spanos}},\n  booktitle={Annual Conference of the IEEE Industrial Electronics Society (IECON)}, \n  title={Modeling of end-use energy profile: An appliance-data-driven stochastic approach}, \n  year={2014},\n  volume={},\n  number={},\n  pages={5382-5388},\n  doi={10.1109/IECON.2014.7049322},\n  url_link={https://ieeexplore.ieee.org/abstract/document/7049322},\n  url_pdf={model_use.pdf},\n  abstract={In this paper, the modeling of building end-use energy profile is comprehensively investigated. Top-down and Bottom-up approaches are discussed with a focus on the latter for better integration with occupant information. Compared to the Time-Of-Use (TOU) data used in previous Bottom-up models, this work utilizes high frequency sampled appliance power consumption data from wireless sensor network, and hence builds an appliance-data-driven probability based end-use energy profile model. ON/OFF probabilities of appliances are used in this model, to build a non-homogeneous Markov Chain, compared to the duration statistics based model that is widely used in other works. The simulation results show the capability of the model to capture the diversity and variability of different categories of end-use appliance energy profile, which can further help on the design of a modern robust building power system.},\n  keywords={Energy system, Data mining}}\n  \n
\n
\n\n\n
\n In this paper, the modeling of building end-use energy profile is comprehensively investigated. Top-down and Bottom-up approaches are discussed with a focus on the latter for better integration with occupant information. Compared to the Time-Of-Use (TOU) data used in previous Bottom-up models, this work utilizes high frequency sampled appliance power consumption data from wireless sensor network, and hence builds an appliance-data-driven probability based end-use energy profile model. ON/OFF probabilities of appliances are used in this model, to build a non-homogeneous Markov Chain, compared to the duration statistics based model that is widely used in other works. The simulation results show the capability of the model to capture the diversity and variability of different categories of end-use appliance energy profile, which can further help on the design of a modern robust building power system.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);