Abstraction-Free Control Synthesis to Satisfy Temporal Logic Constraints under Sensor Faults and Attacks
Abstract
We study the problem of synthesizing a controller to satisfy a complex task in the presence of sensor faults and attacks. We model the task using Gaussian distribution temporal logic (GDTL), and propose a solution approach that does not rely on computing any finite abstraction to model the system. We decompose the GDTL specification into a sequence of reach-avoid sub-tasks. We develop a class of fault-tolerant finite time convergence control barrier functions (CBFs) to guarantee that a dynamical system reaches a set within finite time almost surely in the presence of malicious attacks. We use the fault-tolerant finite time convergence CBFs to guarantee the satisfaction of ‘reach’ property. We ensure ‘avoid’ part in each sub-task using fault-tolerant zeroing CBFs. These fault-tolerant CBFs formulate a set of linear constraints on the control input for each sub-task. We prove that if the error incurred by system state estimation is bounded by a certain threshold, then our synthesized controller fulfills each reach-avoid sub-task almost surely for any possible sensor fault and attack, and thus the GDTL specification is satisfied with probability one. We demonstrate our proposed approach using a numerical study on the coordination of two wheeled mobile robots.
I Introduction
Cyber-physical systems (CPS) in applications including autonomous vehicles, industrial control systems, and robotics must complete increasingly complex tasks. Temporal logics [1] such as linear temporal logic (LTL) are used to specify tasks because of their concreteness, rigor, and rich expressiveness. To model the process and observation noises that are commonly incurred by CPS, Gaussian distribution temporal logic (GDTL) has been proposed to specify CPS properties involving the uncertainties in the system state [2, 3]. Controller design for CPS under different temporal logic constraints has attracted extensive research attention [4, 5, 2, 3]. There have been two types of methodologies for temporal logic based control synthesis, namely abstraction-based and abstraction-free approaches.
The abstraction-based approaches [6, 7, 8, 2, 3, 4, 5] lift the CPS model from continuous domain to discrete domain by computing a finite abstraction, e.g., finite transition systems [6] and Markov decision processes (MDPs) [7, 8]. A controller is synthesized by applying model checking algorithms on the finite abstraction. In general, the abstraction-based approaches are computationally demanding and suffer from the curse of dimensionality. To mitigate the computation required by the abstraction-based approaches, abstraction-free approaches have been proposed [9, 10, 11, 12, 13, 14, 15]. These approaches eliminate the step of constructing the finite abstractions, and directly compute the controller in the continuous state space.
The previously introduced abstraction-based [6, 7, 8, 2, 3, 4, 5] and abstraction-free approaches [9, 10, 11, 12, 13, 14, 15] assume that there exist no faults or malicious attacks targeting the system sensors. However, CPS have been shown to be vulnerable to sensor faults and malicious attacks [16, 17, 18, 19], making temporal logic based control synthesis more challenging. Sensor faults and malicious attacks can arbitrarily manipulate the sensor measurements. Inaccurate measurements prevent the CPS from correctly evaluating and tracking the satisfaction of temporal logic specifications. Moreover, the faulty or compromised measurements can bias the state estimate and lead to erroneous controller actions, which deviate the system trajectory and violate the temporal logic specification. Although there has been research attention on fault and attack detection [17, 20, 19] and low-level control design under sensor attacks [21], abstraction-free temporal logic based control synthesis under sensor faults and attacks has not been studied.
In this paper, we study the problem of synthesizing a controller for a nonlinear control-affine system to satisfy a GDTL specification in the presence of process and observation noises as well as malicious attacks on sensor measurements. We assume that the adversary has finitely many choices of the sensors to attack. The system estimates the state by employing a set of Extended Kalman Filters (EKFs) associated with each possible set of sensors attacked by the adversary. If there exists a control input that satisfies the GDTL specification for all of the state estimates, then the GDTL formula can be satisfied regardless of the attack. When such control input does not exist, it indicates that the state estimates given by some EKFs conflict with the others. We view two EKFs as conflicting if the divergence between their state estimates exceeds a certain threshold. We then compute a baseline state estimate without using any sensor corresponding to the conflicting EKFs. We compare this baseline with those from the conflicting EKFs, and treat the one that diverges from the baseline as being compromised. We make the following specific contributions:
-
•
We decompose the GDTL specification into a sequence of reach-avoid sub-tasks with the system state uncertainties being explicitly encoded.
-
•
We synthesize the controller for each decomposed problem by deriving a set of sufficient conditions. We guarantee the ‘reach’ and ‘avoid’ properties in each sub-task by developing a class of fault-tolerant finite time convergence control barrier functions and applying the fault-tolerant zeroing control barrier functions.
-
•
We prove that if the errors incurred by the EKFs are bounded by some thresholds, then each decomposed reach-avoid sub-task is satisfied with probability one using our proposed approach, and thus the GDTL specification is satisfied almost surely.
-
•
We evaluate our proposed approach using a numerical case study on two wheeled mobile robots. We show that our proposed approach satisfies the given GDTL specification, while a baseline fails.
The rest of this paper is organized as follows. Section II reviews related work. Section III presents the system model and reviews necessary background on finite time stability in probability, EKF, and GDTL. Section IV presents our proposed solution approach. A numerical case study is presented in Section V. Section VI concludes the paper.
II Related Work
Abstraction-based approaches have been proposed for control synthesis of CPS in the absence of observation noise and sensor attacks under LTL constraints [4, 6, 7, 8]. When CPS are subject to observation noises, GDTL has been proposed to model the uncertainties [2, 3].
When CPS operate under malicious attacks targeting the system actuators, abstraction-based approaches for control synthesis under LTL constraints have been studied in [22, 23], where the CPS are abstracted as finite stochastic games. For CPS under partially observable environments, partially observable stochastic game is used as the finite abstraction for control synthesis [24]. These works [22, 23, 24] and the present paper focus on different scopes of attacks. In [22, 23, 24], sensor faults or attacks are not considered, and thus the system state is known by the CPS. This paper focuses on sensor faults and attacks. In addition, our proposed approach does not compute a finite abstraction for the CPS, and thus belongs to the class of abstraction-free approaches.
Abstraction-free approaches eliminate the step for computing the finite abstractions to improve the scalability. In [25], the LTL specification is encoded as a set of mixed integer linear constraints. In [10], the authors solve a sequence of stochastic reachability problems via nonlinear PDEs to satisfy a co-safe LTL specification. Alternatively, a mixed continuous-discrete HJB-based formulation is proposed in [11]. In general, solving PDEs and HJB equations are computationally expensive.
In [13, 12, 15], the authors adopt control barrier functions (CBFs), which are originally proposed for safety-critical control synthesis [26, 27], to compute control policies that satisfy LTL specifications for deterministic CPS. In parallel, (control) barrier certificate based verification and synthesis for temporal logic properties have been investigated in [28, 29]. An abstraction-free safe learning scheme is proposed in [30] for systems under adversarial actuator attacks. Our paper differs from these barrier function based works in two aspects. First, we consider the presence of sensor faults and attacks. Second, we develop a class of fault-tolerant finite time convergence CBF, in combined with the recent advancement in fault-tolerant zeroing CBF, to address the presence of noises, faults, and attacks.
III Preliminaries and Problem Formulation
In this section, we first present the system model. We then give some background on GDTL and EKF. We finally present the problem formulation.
III-A System Model
In this subsection, we first give the notations that we will use throughout this paper. We next present the system model.
Notations. We use to denote the -dimensional Euclidean space. Given a vector , we use and to denote its support and -th entry, respectively. For any matrix , we denote its trace as . The set of positive semi-definite matrices of dimension is represented as . We denote the set of non-negative real numbers as . A function belongs to class if it is continuous, strictly increasing, and . A class function belongs to class if when . We use to represent the probability of an event.
Consider a nonlinear dynamical system defined as
(1) |
where is the system state, is the control input at time , , and is an -dimensional Brownian motion. Functions and are locally Lipschitz continuous.
We denote the system output at time as . The output follows an observation process [31] given as:
(2) |
where , , and is a -dimensional Brownian motion. We assume that the system operates in the presence of a malicious adversary. The adversary can inject a signal to manipulate the output with . We assume that once the adversary determines the set of sensors to attack, it cannot adjust the support of the attack signal, i.e., the adversary cannot change its target after the attack starts. We assume that there are finitely many choices for the support of , denoted as , which is also known to the system. In the remainder of this paper, we refer to as a fault pattern. However, the choice made by the adversary is not known to the system.
III-B Finite Time Stability in Probability of Stochastic Nonlinear Systems
In this subsection, we introduce background on finite time stability of stochastic nonlinear systems. Consider a stochastic nonlinear system with complete state information given by Eqn. (1). We then give the definition of finite time stability in probability.
Definition 1 (Finite Time Stability in Probability [32]).
The solution of system (1), denoted as , is said to be finite time stable in probability if system (1) admits a unique solution for any initial state and the following conditions hold:
-
1.
Finite time attractiveness in probability: For every initial state , the stochastic settling time is finite almost surely, i.e., .
-
2.
Stability in probability: For every pair of and , there exists some constant such that
(3) for any .
Let be a twice continuously differentiable function. Finite time stability in probability is then certified by the following stochastic Lyapunov theorem.
III-C Extended Kalman Filter
The system given in Eqn. (1) and (2) employs a set of EKFs [33] to estimate the system state. Each EKF corresponds to a potential fault pattern . We briefly review the background on EKF in the following.
We denote the state estimate at time as when fault pattern is chosen by the adversary. Then the dynamics of can be represented as
(5) |
where , , and as well as are obtained from matrix and vector by removing the corresponding rows indexed by . Matrix is obtained from by removing the rows and columns indexed by . The covariance of , denoted as , is the solution to
(6) |
where and with . A belief state corresponding to fault pattern is defined as . The evolution of the belief state is described by Eqn. (5) and (6). We make the following assumptions on Eqn. (1) and (2).
Assumption 1.
Given Assumption 1, we have the following result.
III-D Gaussian Distribution Temporal Logic and Problem Formulation
In this subsection, we introduce GDTL [2, 3], which will be used to model the task that needs to be satisfied by system (1)-(2). We then formulate the problem studied in this paper.
The syntax of GDTL is defined as follows:
(8) |
where , and is a predicate.
Let be an infinite sequence of belief states with each . We denote the suffix of as . Then a GDTL formula is interpreted as follows:
-
•
-
•
iff
-
•
iff
-
•
iff
-
•
iff s.t. for all
Let be the set of belief states such that predicate is true and be the set of predicates that appear in a GDTL formula . We present the following proposition [3] so as to construct an equivalent deterministic Rabin automaton (DRA) representing GDTL formula .
Proposition 1 ([3]).
Let be a GDTL formula. Let be an additional finite set of atomic propositions such that . Let be a bijective map. Then GDTL formula is equivalent to an LTL formula defined over atomic proposition set , with each predicate in being replaced by .
Leveraging Proposition 1, we can represent a GDTL formula using an equivalent DRA defined as follows:
Definition 2 (Deterministic Rabin Automaton (DRA) [1]).
A Deterministic Rabin Automaton (DRA) is a tuple , where is a finite set of states, is the finite set of alphabet, is a finite set of transitions, is the initial state, and is a finite set of Rabin pairs such that for all with being a positive integer.
We consider that the system given by Eqn. (1) and (2) needs to satisfy a GDTL specification . We define a labeling function , where is the set of atomic propositions generated by Proposition 1. For any , we define as . Consider . We define as
(9) |
We let be a trajectory of belief state of infinite length. We now define the trace of to establish the connection between the satisfaction of to trajectory .
Definition 3 (Trace of Trajectory [34]).
An infinite sequence , where for all is a trace of a trajectory if there exists a sequence of time instants such that
-
1.
-
2.
as
-
3.
-
4.
-
5.
if , then there exists some such that for all , for all , and either or .
Using the trace of system trajectory, we have that GDTL specification is satisfied if . The problem investigated in this paper is then formulated as follows:
Problem 1.
Given a parameter , compute a control policy for the system at each time mapping from the sequence of outputs to a control input , so that the probability of satisfying , denoted as , satisfies for any fault when fault occurs.
IV Solution Approach
In this section, we present the proposed solution approach. We first derive a fault-tolerant stochastic finite time convergence CBF. We then decompose the GDTL formula into a sequence of sub-formulae using the DRA representing . We show that the satisfaction probability of GDTL formula can be expressed using that of each sub-formula. We then synthesize a control policy that enables the system to satisfy each sub-formula with certain probability guarantee using fault-tolerant stochastic finite time convergence CBF and fault-tolerant stochastic zeroing CBF. We finally derive the satisfaction probability guarantee for each sub-formula.
IV-A Fault-Tolerant Stochastic Finite Time Convergence CBF
This subsection derives fault-tolerant stochastic finite time convergence CBF. We first define stochastic finite time convergence CBF under complete information in the absence of an adversary. Then we extend it to the incomplete information setting. We finally propose the fault-tolerant stochastic finite time convergence CBF to address the presence of the adversary.
Definition 4 (Stochastic Finite Time Convergence CBF under Complete Information).
Consider the dynamical system given in Eqn. (1) whose solution is denoted as . Consider a set where is a twice continuously differentiable function. We say is a stochastic finite time convergence CBF if the following conditions hold:
-
1.
There exist class functions and such that
(10) for all .
-
2.
There exist control input such that
(11)
Stochastic finite time convergence CBF provides the finite time stability in probability guarantee as given by Definition 1. We formally state this result as follows:
Lemma 2.
Let . Suppose the system admits a stochastic finite time convergence CBF . Let . Then , i.e., the system reaches within finite time almost surely. Moreover, the system remains in for all almost surely.
Proof.
In the following, we extend Definition 4 and Lemma 2 to the incomplete information setting where the system state is estimated via an EKF. Define
as the supremum of for all belonging to the -neighborhood of the boundary of . We then present the following preliminary result [35].
Lemma 3 ([35]).
If for all and for all , then for all .
We define . Provided Lemma 3, we are now ready to develop stochastic finite time convergence CBF under incomplete information setting for the system described by (1) and (2) employing EKF for state estimation, assuming that for all .
Theorem 2.
Let . Suppose there exists a twice continuously differentiable function , control input , and class functions , such that
(12a) | |||
(12b) |
then , i.e., the system reaches within finite time almost surely.
Proof.
Since we use EKF for state estimation, we have that the state estimate and covariance follow Eqn. (5) and (6). Given the output dynamics of , we have that
Let . We have that
(13) |
When holds, then
When Eqn. (12b) holds, we thus have that
Finally, according to Lemma 2, we have that time is finite with probability . ∎
We are now ready to present fault-tolerant stochastic finite time convergence CBF for the system given by (1)-(2) as follows. The system utilizes EKFs, with each associated with one attack pattern , where .
Lemma 4.
Let and . Let . Suppose and are chosen such that there exists , making any satisfying for all there exists satisfying
(14) |
where , , then
IV-B Decomposition of GDTL Formula and Satisfaction of the Decomposed Sub-formulae
Given the GDTL formula, we construct the DRA representing it, as defined in Definition 2. We then pick an accepting run of the automaton , denoted as . We rewrite into the prefix suffix form . We next decompose the accepting run into a sequence of sub-formulae, denoted as . Here
(15) |
where is the input word for self-loop transition , and is the input word corresponding to the transition from state to . That is, sub-formula models a one-step transition from state to along accepting run .
We next synthesize the control policy to satisfy each sub-formula leveraging fault-tolerant finite time convergence control barrier functions in Section IV-A and fault-tolerant zeroing control barrier functions proposed in [36]. We then derive the satisfaction probability of each sub-formula, which is used to bound the probability of satisfying .
We let functions and be given as
Then sub-formula indicates that the system trajectory needs to guarantee for all and for some , where and are some time instants satisfying . We now define
(16) | |||
(17) | |||
(18) |
We next present an algorithm for synthesizing the control policy so that the probability of satisfying sub-formula is lower bounded in Algorithm 1. In line 3, we compute , where and are constants. In line 4, we first compute the set of control inputs and , where ensures that for all , and ensures that there exists such that , provided that the fault pattern is . If , then any control input guarantees the satisfaction of sub-formula regardless of the fault pattern. If such does not exist, then line 5-11 aims to identify the fault pattern by comparing the state estimate when fault pattern is removed. Line 17 computes the control input by solving a quadratic program. If no feasible control input can be found, we will repeat the procedure for another accepting run .
Theorem 3.
Let . We define
Suppose and are chosen such that there exists making holds for all and for any . If there exists some satisfying
(19) |
then
(20) | |||
(21) |
Proof.
We show that if and for all , then holds when and .
Suppose that the fault pattern . At time , suppose that and hold. In addition, suppose that . We divide our discussion into three cases.
Case I. We first consider for all . Note that and can be represented as
where are some constants. When for all holds, by condition 1), we then have that there exists satisfying
indicating that .
Case II. We next consider that for all , but there exists some such that . In this case, by the iteration between line 5-11 in Algorithm 1, is removed. By the hypothesis that for all , we have that the updated now reduces to Case I, and thus our previous analysis can be applied.
We finally suppose that for some . We then have that
where the second inequality holds by triangle inequality, and the last inequality holds by the hypothesis that . In this case, , indicating that is removed by line 8 of Algorithm 1. Then our previous analysis becomes applicable once all such are removed. Lastly, using Theorem 2 and [36], we have that the control input satisfies sub-formula almost surely. ∎
We conclude this section by quantifying the probability of satisfying GDTL formula as follows.
Theorem 4.
If the conditions in Theorem 3 are satisfied, then the probability of satisfying GDTL specification satisfies
(23) |
Proof.
We denote the probability that occur in order as , where . We also denote the event that holds for all and holds for all under fault as . By Bayes’ theorem, we have that
By our hypothesis, we have that . Using Theorem 3, we have that holds for all . Therefore, we have that Eqn. (23) holds, completing the proof. ∎
V Case Study
In this section, we present a case study on the coordination of two wheeled mobile robots (WMRs) in a 2-D domain. Each WMR follows dynamics:
(24) |
where and model the position of the robot at time , is the orientation of the robot at time , is the control input consisting of the linear and angular velocities, and is a zero-mean Gaussian process noise. Following [37], we apply feedback linearization to Eqn. (24) and use sensors to measure the location and velocities for each WMR. In particular, we let and measure horizontal position , and use and to measure vertical position . Outputs and measure the velocities of the WMR. The orientation of the WMR is measured by .
The WMRs need to coordinate to satisfy a GDTL specification given as , where , , and . Specification requires the WMRs to reach a set of destinations, denoted as , and , in order, and to avoid the unsafe region . In addition, the WMRs must maintain an uncertainty that is less than . There exists a malicious adversary that manipulates the outputs of and to bias the WMRs’ location estimates.

We compare our proposed approach with a baseline approach [15]. The baseline approach adopts the state-of-the-art abstraction-free CBF-based control synthesis using the state estimate obtained by all sensor measurements.
In the following, we demonstrate our proposed approach. We generate the DRA representing GDTL specification . We then pick an accepting run and decompose into a sequence of sub-formulae using . In this case study, accepting run requires the WMRs to reach destinations , , and in this order, while guaranteeing and to be always satisfied.
We present the trajectories for both robots using our proposed approach and the baseline in Fig. 1 using lines in black and blue colors, respectively. The trajectories of WMR and are presented using solid and dashed lines, respectively. We observe that the trajectories of the robots using our proposed approach never enter the unsafe region and reach their assigned destinations. In addition, our proposed approach yields and thus satisfies specification . However, the trajectories generated by the baseline approach enter the the unsafe region and thus violate specification . Moreover, WMR is biased by the sensor attack and fails to reach its destination using the baseline approach. To summarize, our proposed approach guarantees that WMR and can coordinate to satisfy GDTL formula in the presence of sensor attacks.
VI Conclusion
In this paper, we studied the problem of abstraction-free synthesis for a control-affine nonlinear system to satisfy a Gaussian distribution temporal logic specification in the presence of process and observation noises as well as sensor faults and attacks. We proposed a solution approach that decomposes the given specification into a sequence of reach-avoid tasks that needs to be satisfied by the system. We developed the sufficient conditions for the controller so that each decomposed sub-formula can be satisfied by the system in the presence of sensor faults and attacks using our proposed fault-tolerant finite time convergence control barrier functions, along with the fault-tolerant zeroing control barrier functions. We proved that our synthesized controller guarantees almost sure satisfaction for each decomposed sub-formula, and thus ensures that the system satisfies the Gaussian distribution temporal logic specification with probability one, provided that the extended Kalman filters used by the system ensures certain accuracy bounds. We presented a numerical case study on the coordination of two wheeled mobile robots to demonstrate our proposed approach.
References
- [1] C. Baier, J.-P. Katoen, and K. G. Larsen, Principles of Model Checking. MIT Press, 2008.
- [2] C.-I. Vasile, K. Leahy, E. Cristofalo, A. Jones, M. Schwager, and C. Belta, “Control in belief space with temporal logic specifications,” in 55th IEEE Conference on Decision and Control (CDC). IEEE, 2016, pp. 7419–7424.
- [3] K. Leahy, E. Cristofalo, C.-I. Vasile, A. Jones, E. Montijano, M. Schwager, and C. Belta, “Control in belief space with temporal logic specifications using vision-based localization,” The International Journal of Robotics Research, vol. 38, no. 6, pp. 702–722, 2019.
- [4] H. Kress-Gazit, G. E. Fainekos, and G. J. Pappas, “Temporal-logic-based reactive mission and motion planning,” IEEE Transactions on Robotics, vol. 25, no. 6, pp. 1370–1381, 2009.
- [5] S. Coogan, E. A. Gol, M. Arcak, and C. Belta, “Traffic network control from temporal logic specifications,” IEEE Transactions on Control of Network Systems, vol. 3, no. 2, pp. 162–172, 2015.
- [6] G. E. Fainekos, A. Girard, H. Kress-Gazit, and G. J. Pappas, “Temporal logic motion planning for dynamic robots,” Automatica, vol. 45, no. 2, pp. 343–352, 2009.
- [7] X. Ding, S. L. Smith, C. Belta, and D. Rus, “Optimal control of Markov decision processes with linear temporal logic constraints,” IEEE Transactions on Automatic Control, vol. 59, no. 5, pp. 1244–1257, 2014.
- [8] T. Wongpiromsarn, U. Topcu, and R. M. Murray, “Receding horizon temporal logic planning for dynamical systems,” in 48th IEEE Conference on Decision and Control (CDC). IEEE, 2009, pp. 5997–6004.
- [9] E. M. Wolff, U. Topcu, and R. M. Murray, “Robust control of uncertain Markov decision processes with temporal logic specifications,” in 51st Conference on Decision and Control. IEEE, 2012, pp. 3372–3379.
- [10] M. B. Horowitz, E. M. Wolff, and R. M. Murray, “A compositional approach to stochastic optimal control with co-safe temporal logic specifications,” in IEEE/RSJ International Conference on Intelligent Robots and Systems. IEEE, 2014, pp. 1466–1473.
- [11] I. Papusha, J. Fu, U. Topcu, and R. M. Murray, “Automata theory meets approximate dynamic programming: Optimal control with temporal logic constraints,” in 55th IEEE Conference on Decision and Control (CDC). IEEE, 2016, pp. 434–440.
- [12] M. Srinivasan, S. Coogan, and M. Egerstedt, “Control of multi-agent systems with finite time control barrier certificates and temporal logic,” in IEEE 57th Conference on Decision and Control (CDC). IEEE, 2018, pp. 1991–1996.
- [13] L. Lindemann and D. V. Dimarogonas, “Control barrier functions for signal temporal logic tasks,” IEEE control systems letters, vol. 3, no. 1, pp. 96–101, 2018.
- [14] G. Yang, C. Belta, and R. Tron, “Continuous-time signal temporal logic planning with control barrier functions,” in 2020 American Control Conference (ACC), 2020, pp. 4612–4618.
- [15] L. Niu and A. Clark, “Control barrier functions for abstraction-free control synthesis under temporal logic constraints,” in 59th IEEE Conference on Decision and Control. IEEE, 2020, pp. 816–823.
- [16] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information and System Security, vol. 14, no. 1, p. 13, 2011.
- [17] Y. Mo and B. Sinopoli, “False data injection attacks in control systems,” in 1st workshop on Secure Control Systems, 2010, pp. 1–6.
- [18] A. A. Cárdenas, S. Amin, and S. Sastry, “Research challenges for the security of control systems.” in Proceedings of the 3rd Conference on Hot Topics in Security, vol. 5. USENIX Association, 2008, p. 15.
- [19] H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for cyber-physical systems under adversarial attacks,” IEEE Transactions on Automatic Control, vol. 59, no. 6, pp. 1454–1467, 2014.
- [20] Y. Shoukry, P. Nuzzo, A. Puggelli, A. L. Sangiovanni-Vincentelli, S. A. Seshia, and P. Tabuada, “Secure state estimation for cyber-physical systems under sensor attacks: A satisfiability modulo theory approach,” IEEE Transactions on Automatic Control, vol. 62, no. 10, pp. 4917–4932, 2017.
- [21] A. Clark and L. Niu, “Linear quadratic Gaussian control under false data injection attacks,” in Annual American Control Conference (ACC). IEEE, 2018, pp. 5737–5743.
- [22] L. Niu and A. Clark, “Optimal secure control with linear temporal logic constraints,” IEEE Transactions on Automatic Control, vol. 65, no. 6, pp. 2434–2449, 2019.
- [23] L. Niu, J. Fu, and A. Clark, “Optimal minimum violation control synthesis of cyber-physical systems under attacks,” IEEE Transactions on Automatic Control, vol. 66, no. 3, pp. 995–1008, 2020.
- [24] B. Ramasubramanian, L. Niu, A. Clark, L. Bushnell, and R. Poovendran, “Secure control in partially observable environments to satisfy LTL specifications,” IEEE Transactions on Automatic Control, vol. 66, no. 12, pp. 5665–5679, 2020.
- [25] E. M. Wolff, U. Topcu, and R. M. Murray, “Optimization-based trajectory generation with linear temporal logic specifications,” in International Conference on Robotics and Automation (ICRA). IEEE, 2014, pp. 5319–5325.
- [26] L. Wang, A. D. Ames, and M. Egerstedt, “Safety barrier certificates for collisions-free multirobot systems,” IEEE Transactions on Robotics, vol. 33, no. 3, pp. 661–674, 2017.
- [27] A. D. Ames, X. Xu, J. W. Grizzle, and P. Tabuada, “Control barrier function based quadratic programs for safety critical systems,” IEEE Transactions on Automatic Control, vol. 62, no. 8, pp. 3861–3876, 2016.
- [28] P. Jagtap, S. Soudjani, and M. Zamani, “Formal synthesis of stochastic systems via control barrier certificates,” IEEE Transactions on Automatic Control, vol. 66, no. 7, pp. 3097–3110, 2020.
- [29] M. Anand, P. Jagtapt, and M. Zamani, “Verification of switched stochastic systems via barrier certificates,” in IEEE 58th Conference on Decision and Control (CDC). IEEE, 2019, pp. 4373–4378.
- [30] C. Sun and K. G. Vamvoudakis, “Continuous-time safe learning with temporal logic constraints in adversarial environments,” in American Control Conference (ACC). IEEE, 2020, pp. 4786–4791.
- [31] M. Fujisaki, G. Kallianpur, and H. Kunita, “Stochastic differential equations for the non linear filtering problem,” Osaka Journal of Mathematics, vol. 9, no. 1, pp. 19–40, 1972.
- [32] J. Yin, S. Khoo, Z. Man, and X. Yu, “Finite-time stability and instability of stochastic nonlinear systems,” Automatica, vol. 47, no. 12, pp. 2671–2677, 2011.
- [33] K. Reif, S. Gunther, E. Yaz, and R. Unbehauen, “Stochastic stability of the continuous-time extended Kalman filter,” IEE Proceedings-Control Theory and Applications, vol. 147, no. 1, pp. 45–52, 2000.
- [34] T. Wongpiromsarn, U. Topcu, and A. Lamperski, “Automata theory meets barrier certificates: Temporal logic verification of nonlinear systems,” IEEE Transactions on Automatic Control, vol. 61, no. 11, pp. 3344–3355, 2015.
- [35] A. Clark, “Control barrier functions for stochastic systems,” Automatica, vol. 130, p. 109688, 2021.
- [36] A. Clark, Z. Li, and H. Zhang, “Control barrier functions for safe CPS under sensor faults and attacks,” in 59th IEEE Conference on Decision and Control (CDC). IEEE, 2020, pp. 796–803.
- [37] Z. Chen, L. Li, and X. Huang, “Building an autonomous lane keeping simulator using real-world data and end-to-end learning,” IEEE Intelligent Transportation Systems Magazine, 2018.