This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Replacing 𝒦\mathcal{K}_{\infty} Function with Leaky ReLU in Barrier Function Design: A Union of Invariant Sets Approach for ReLU-Based Dynamical Systems

Pouya Samanipour and Hasan A. Poonawala Pouya Samanipour and Hasan A. Poonawala are with the Department of Mechanical and Aerospace Engineering, University of Kentucky, Lexington, USA {samanipour.pouya,hasan.poonawala}@uky.edu. The corresponding author is Hasan A.Poonawala. This work is supported by the Department of Mechanical Engineering at the University of Kentucky.
Abstract

In this paper, a systematic framework is presented for determining piecewise affine (PWA\mathrm{PWA}) barrier functions and their corresponding invariant sets for dynamical systems identified via Rectified Linear Unit (ReLU) neural networks or their equivalent PWA\mathrm{PWA} representations. A common approach to determining the invariant set is to use Nagumo’s condition, or to utilize the barrier function with a class-𝒦\mathcal{K}_{\infty} function. It may be challenging to find a suitable class-𝒦\mathcal{K}_{\infty} function in some cases. We propose leaky ReLU as an efficient substitute to the complex nonlinear 𝒦\mathcal{K}_{\infty} function in our formulation. Moreover, we propose the Union of Invariant Sets (UIS) method, which combines information from multiple invariant sets in order to compute the largest possible PWA\mathrm{PWA} invariant set. The proposed framework is validated through multiple examples, showcasing its potential to enhance the analysis of invariant sets in ReLU-based dynamical systems. Our code is available at: https://github.com/PouyaSamanipour/UIS.git.

I Introduction

The Rectified Linear Unit (ReLU) neural network (NN) is capable of identifying complex system dynamics, and ReLU-based neural networks have been successfully applied as NN-controllers for a variety of challenging control applications such as robot manipulation, autonomous driving [1, 2]. In spite of their effectiveness, standard NN training lacks the safety and convergence guarantees provided by classical control methods. Moreover, ReLU-based controllers are inherently sensitive to small input perturbations, which can lead to unexpected and potentially unsafe behavior [3]. These limitations highlight the need for computational tools to ensure safety and reliability for ReLU NNs, particularly for applications in safety-critical domains [4, 5, 6].

Barrier functions (BFs) are a widely used approach for automatically guaranteeing safety in dynamical systems [7]. As safety filters in control systems, control barrier functions(CBF) are commonly used, but their effectiveness depends heavily on their robustness to model uncertainties [8]. The challenge of dynamical model uncertainty has been addressed by various sampling-based methods such as supervised learning, reinforcement learning (RL), and integration of CBFs in order to establish forward invariance sets and ensure the safety of uncertain systems [9, 10]. Despite their success, in most applications it may be difficult to verify the learned safe set [5].

The piecewise affine (PWA\mathrm{PWA}) nature of ReLU neural networks enables their representation as PWA\mathrm{PWA} functions [11]. The computation of invariant sets for both continuous and discrete-time PWA\mathrm{PWA} dynamical systems has been extensively investigated in the literature, with significant contributions addressing constrained systems and their invariant properties [12, 13]. In [14], we introduced a method to estimate invariant sets and construct PWA\mathrm{PWA} BFs for PWA\mathrm{PWA} dynamical systems. The BF found depends on the choice of the 𝒦\mathcal{K}_{\infty} function, α(x)\alpha(x), which is restricted to be a linear function α(x)=αx\alpha(x)=\alpha x in [14]. Furthermore, their approach relies on trying different linear coefficients α\alpha and selecting the one that provides the largest possible invariant set. While trying various linear α(x)\alpha(x) to obtain the largest possible set of invariants might be computationally inexpensive in lower dimensions, it might prove to be computationally demanding in higher-dimensional systems.

In the present work, we address the challenge of selecting an appropriate 𝒦\mathcal{K}_{\infty} function for barrier-based safety analysis. We propose using a Leaky ReLU function instead of a complex or highly nonlinear function for α()\alpha(\cdot). This choice offers two key benefits: simplicity in form and a seamless path towards incorporating the non-smooth BF framework described in [15]. The non-smooth BF [15] utilizes multiple valid BFs to construct a new candidate BF; the validity of this combined BF depends on the existence of an appropriate α(x)\alpha(x) that satisfies essential safety conditions for these multiple BFs simultaneously. No method to find such α(x)\alpha(x) is provided. By using the Leaky ReLU function as α(x)\alpha(x), we are able to find such an α(x)\alpha(x), so that our combined barrier function is valid. Building on this insight, we introduce a new method, the Union of Invariant Sets (UIS). The UIS method combines several PWA\mathrm{PWA} BFs derived from various linear functions α(x)\alpha(x) for ReLU-based dynamical systems into a single PWA\mathrm{PWA} BF. This integration may expand the overall invariant set while preserving safety guarantees and incurring no additional computational cost compared to [14].

II Preliminaries

To begin, we briefly introduce the necessary notations and provide an overview of piecewise affine PWA\mathrm{PWA} functions.

Notation

Let SS be a set. The set of indices corresponding to the elements of SS is denoted by I(S)I(S). The convex hull, interior, and boundary SS are denoted by conv(S)\mathrm{conv}(S), Int(S)\mathrm{Int}(S), S\partial S respectively. For a matrix AA, ATA^{T} denotes its transpose. As part of this paper, we present a definition of PWA\mathrm{PWA} dynamical systems on a partition. Consequently, the partition is defined as follows:

Definition 1

Throughout this paper, the partition 𝒫\mathcal{P} is a collection of subsets {Xi}iI(𝒫)\{X_{i}\}_{i\in I(\mathcal{P})}, where each XiX_{i} represents a closed subset of n\mathbb{R}^{n} for all iI(𝒫)i\in I(\mathcal{P}). In the partition 𝒫\mathcal{P}, Dom(𝒫)=iI(𝒫)Xi\text{Dom}(\mathcal{P})=\cup_{i\in I(\mathcal{P})}X_{i} and Int(Xi)Int(Xj)=\mathrm{Int}(X_{i})\cap\mathrm{Int}(X_{j})=\emptyset for iji\neq j.

The other concept we need is the refinement of a partition. In mathematical terms, given two partitions 𝒫={Yi}iI\mathcal{P}=\{Y_{i}\}_{i\in I} and ={Zj}jJ\mathcal{R}=\{Z_{j}\}_{j\in J} of a set S=Dom(𝒫)=Dom()S=\mathrm{Dom}(\mathcal{P})=\mathrm{Dom}(\mathcal{R}), we say that \mathcal{R} is a refinement of 𝒫\mathcal{P} if ZjYiZ_{j}\cap Y_{i}\neq\emptyset implies ZjYiZ_{j}\subseteq Y_{i}.

Furthermore, we use dim(Xi)\dim(X_{i}) to denote the dimension of a cell XiX_{i}, where iI(𝒫)i\in I(\mathcal{P}).

II-A Piecewise Affine Functions

A piecewise affine function, denoted by PWA(x)\mathrm{PWA}(x), is represented via an explicit parameterization based on a partition 𝒫={Xi}iI(𝒫)\mathcal{P}=\{X_{i}\}_{i\in I(\mathcal{P})}. Each region in the partition corresponds to a set of affine dynamics, described by a collection of matrices 𝐀𝒫={Ai}iI(𝒫)\mathbf{A}_{\mathcal{P}}=\{A_{i}\}_{i\in I(\mathcal{P})} and vectors 𝐚𝒫={ai}iI(𝒫)\mathbf{a}_{\mathcal{P}}=\{a_{i}\}_{i\in I(\mathcal{P})}. The PWA\mathrm{PWA} function is defined as follows:

PWA(x)\displaystyle\mathrm{PWA}(x) =Aix+ai,if xXi,\displaystyle=A_{i}x+a_{i},\quad\text{if }x\in X_{i}, (1)

where the region (cell) XiX_{i} is described by

Xi\displaystyle X_{i} ={xn:Eix+ei0},\displaystyle=\{x\in\mathcal{R}^{n}\colon E_{i}x+e_{i}\succeq 0\}, (2)

with matrices Einhi×nE_{i}\in\mathbb{R}^{n_{hi}\times n} and vectors einhie_{i}\in\mathbb{R}^{n_{hi}}, defining the boundary hyperplanes of XiX_{i}. Here, nhin_{h_{i}} denotes the number of hyperplanes in cell XiX_{i}.

Assumption 1

In this work, we assume that all partition cells are bounded polytopes. Consequently, the vertex representation of the PWA\mathrm{PWA} dynamics is valid. Specifically, each cell XiX_{i} in the partition can be represented as the convex hull of its set of vertices, 0(Xi)\mathcal{F}_{0}(X_{i}), as follows:

Xi=conv{0(Xi)}.X_{i}=\mathrm{conv}\{\mathcal{F}_{0}(X_{i})\}. (3)

III Invariant Set Estimation

To describe the invariant set estimation algorithm, we must first define the concept of the set of invariance.

III-A Forward Invariance

To explain the concepts of forward invariant, consider the following nonlinear dynamics:

x˙=fcl(x).\dot{x}=f_{cl}(x). (4)

Consider fclf_{cl} as locally Lipschitz continuous within the domain 𝒟n\mathcal{D}\subseteq\mathbb{R}^{n}. Based on this assumption, for any initial condition x0𝒟x_{0}\in\mathcal{D}, there is a time interval I(x0)=[0,τmax)I(x_{0})=[0,\tau_{\text{max}}) within which a unique solution x(t)x(t) to (4) exists, fulfilling the differential equation (4) and the initial condition x0x_{0} [16].

Definition 2 (Forward invariant set [16])

Let us define a super-level set SS corresponding to a continuously differentiable function h:𝒟nh:\mathcal{D}\subset\mathbb{R}^{n}\rightarrow\mathbb{R} for the closed-loop system fclf_{cl} given by equation (4) as follows:

S=\displaystyle S= {x𝒟:h(x)0},\displaystyle\{x\in\mathcal{D}:h(x)\geq 0\}, (5)

where set SS is considered forward-invariant if the solution x(t)x(t) remains in SS for all tI(x0)t\in I(x_{0}) for every x0x_{0}.

Definition 3 (Barrier function [16])

Let S𝒟nS\subset\mathcal{D}\subseteq\mathbb{R}^{n} represent the superlevel set of a continuously differentiable function h(x)h(x). It is said that h(x)h(x) is a BF if there exists an extended class 𝒦\mathcal{K}_{\infty} function α(x)\alpha(x) in which:

Lfclh(x)α(h(x)),for all xD,L_{f_{cl}}h(x)\geq-\alpha(h(x)),\quad\text{for all }x\in D, (6)

where lie derivative of h(x)h(x) along the closed loop dynamics fclf_{cl} is denoted by Lfclh(x)L_{f_{cl}}h(x). Equation (6) makes set SS an asymptotically set in 𝒟\mathcal{D}.

A key challenge in finding the BF using (6) is choosing the 𝒦\mathcal{K}_{\infty} function α(x)\alpha(x). A method for selecting α(x)\alpha(x) will be discussed in the following section.

III-B Leaky ReLU: A practical choice for α(x)\alpha(x) in BF design

Definition 3 shows that if there exists an α(x)\alpha(x) satisfies constraint (6), then h(x)h(x) is a BF, and SS remains forward invariant and asymptotically stable in 𝒟\mathcal{D}. Finding a suitable nonlinear α(x)\alpha(x) is often challenging and computationally expensive because it often involves searching through a large function space. It is common practice to simplify the analysis using a linear α(x)\alpha(x)[14]. However, this methodology may impose limitations on the search for a larger invariant set.

To address these limitations, we propose a Leaky ReLU function as a practical and flexible substitute. Unlike approaches that rely on complex 𝒦\mathcal{K}_{\infty} functions or trial-and-error selection of linear α(x)\alpha(x), the Leaky ReLU function provides an efficient alternative with only a few tunable parameters, enabling more effective barrier function construction for dynamics (4).

Theorem 1

Let S𝒟nS\subset\mathcal{D}\subseteq\mathbb{R}^{n} represent the super-level set, as defined in Equation (5), of a continuously differentiable function h(x)h(x) with respect to the closed-loop dynamic (4). If h(x)h(x) is a bounded function such that hminh(x)hmaxh_{\min}\leq h(x)\leq h_{\max} for x𝒟x\in\mathcal{D}, then the followings are equivalent:

  1. (a)

    There exists an extended class 𝒦\mathcal{K}_{\infty} function α(x)\alpha(x) such that the barrier constraint (6) is satisfied, rendering SS invariant (i.e., h(x)h(x) is a valid BF).

  2. (b)

    There exists an extended class 𝒦\mathcal{K}_{\infty} function α¯(x)=αmσ(α1αm)(x)\overline{\alpha}(x)=\alpha_{m}\sigma_{\left(\frac{\alpha_{1}}{\alpha_{m}}\right)}(x) with constants 0<α1αm0<\alpha_{1}\leq\alpha_{m}, where σ(α1αm)\sigma_{\left(\frac{\alpha_{1}}{\alpha_{m}}\right)} is a Leaky ReLU function defined as

    σ(α1αm)(x)={x,if x0,(α1αm)x,if x<0,\sigma_{\left(\frac{\alpha_{1}}{\alpha_{m}}\right)}(x)=\begin{cases}x,&\text{if }x\geq 0,\\ \left(\frac{\alpha_{1}}{\alpha_{m}}\right)x,&\text{if }x<0,\end{cases} (7)

    such that condition (6) is satisfied,rendering SS invariant (i.e., h(x)h(x) is a valid BF).

Proof:

The Leaky ReLU function σ(α1αm)\sigma_{\left(\frac{\alpha_{1}}{\alpha_{m}}\right)} in (7) is continuous, strictly increasing, and satisfies σ(α1αm)(0)=0\sigma_{\left(\frac{\alpha_{1}}{\alpha_{m}}\right)}(0)=0. Thus, if (b) holds, it immediately implies (a).

Now, suppose (a) is true. Since h(x)h(x) is bounded on 𝒟\mathcal{D} with hminh(x)hmaxh_{\min}\leq h(x)\leq h_{\max}, and α(x)\alpha(x) is continuous, the composition α(h(x))\alpha\bigl{(}h(x)\bigr{)} is also bounded.

Case 1: 0<h(x)hmax0<h(x)\leq h_{\max}. Because h(x)h(x) and α(h(x))\alpha\bigl{(}h(x)\bigr{)} remain finite, the ratio α(h(x))h(x)\frac{\alpha\bigl{(}h(x)\bigr{)}}{h(x)} is bounded above. Hence, there exists αm>0\alpha_{m}>0 such that

αmα(h(x))h(x),x𝒟 with 0<h(x)hmax.\alpha_{m}\;\geq\;\frac{\alpha\bigl{(}h(x)\bigr{)}}{h(x)},\quad\forall\,x\in\mathcal{D}\text{ with }0<h(x)\leq h_{\max}. (8)

Adding h˙(x)\dot{h}(x) to both sides of (8) and using h˙(x)+α(h(x))0\dot{h}(x)+\alpha\bigl{(}h(x)\bigr{)}\geq 0, we obtain

h˙(x)+αmh(x)\displaystyle\dot{h}(x)+\alpha_{m}\,h(x) h˙(x)+α(h(x))0\displaystyle\;\geq\;\dot{h}(x)+\alpha\bigl{(}h(x)\bigr{)}\geq 0 (9)

Case 2: hminh(x)<0h_{\min}\leq h(x)<0. Similarly, α(h(x))h(x)\frac{\alpha\bigl{(}h(x)\bigr{)}}{h(x)} is bounded below. Thus there exists α1>0\alpha_{1}>0 such that

α1α(h(x))h(x),x𝒟 with hminh(x)<0.\alpha_{1}\;\leq\;\frac{\alpha\bigl{(}h(x)\bigr{)}}{h(x)},\quad\forall\,x\in\mathcal{D}\text{ with }h_{\min}\leq h(x)<0. (10)

Again, adding h˙(x)\dot{h}(x) to both sides of (10) yields

h˙(x)+α1h(x)\displaystyle\dot{h}(x)+\alpha_{1}\,h(x) h˙(x)+α(h(x))0.\displaystyle\;\geq\;\dot{h}(x)+\alpha\bigl{(}h(x)\bigr{)}\geq 0. (11)

From these two cases, we see that we can define α(x)\alpha(x) as described in (7). Therefore, if (a) holds, (b) must also hold. This completes the proof. ∎

Theorem 1 provides insight into how BFs can be constructed by tuning a Leaky ReLU with two parameters rather than looking for a complex 𝒦\mathcal{K}_{\infty} function. For less conservative behavior, αm\alpha_{m} could be set to a large value and α1\alpha_{1} to a small value. The boundedness of h(x)h(x) imposes no restrictions if 𝒟\mathcal{D} is a compact set.

III-C PWA\mathrm{PWA} barrier function

The main goal of this paper is to estimate the invariant set for the dynamical systems identified using ReLU NN or its equivalent PWA\mathrm{PWA} dynamical systems as follows:

x˙=PWA(x),\dot{x}=\mathrm{PWA}(x), (12)

where the PWA\mathrm{PWA} function is defined on a pre-selected domain 𝒟\mathcal{D}. In [14], we proposed an approach to estimate the invariant set for dynamical systems (12) with linear α(x)\alpha(x). However, using linear α(x)\alpha(x) might be challenging. Before discussing how leaky ReLU α(x)\alpha(x) can address this challenge, it is necessary to take a look at our work [14].

Our work in [14] consists of parameterizing the BF as a PWA\mathrm{PWA} function on the same partition as the dynamical systems (12). The BF for the cell XiX_{i} can be parameterized as follows:

hi(x)=siTx+tiforiI(𝒫)h_{i}(x)=s_{i}^{T}x+t_{i}\quad\text{for}\quad i\in I(\mathcal{P}) (13)

where sins_{i}\in\mathcal{R}^{n} and tit_{i}\in\mathcal{R}. hi(x)h_{i}(x) is a continuous and differentiable function within the interior of the cell.

Assumption 2

Let’s consider a cell XjX_{j} with local dynamic x˙=Ajx+aj\dot{x}=A_{j}x+a_{j} and a candidate BF hj(x)=sjTx+tjh_{j}(x)=s_{j}^{T}x+t_{j}. Then the derivative of the BF along the dynamic solution at 𝐱Int(Xj)\mathbf{x}^{\prime}\in\mathrm{Int}\left(X_{j}\right) can be obtained as follows:

hj˙(𝐱)=sjT(Ajx+aj).\dot{h_{j}}(\mathbf{x}^{\prime})=s_{j}^{T}(A_{j}x^{\prime}+a_{j}). (14)

For more details please see [11, 14].

In [14], we constructed an optimization problem to search for a PWA\mathrm{PWA} invariant set over the domain 𝒟\mathcal{D}. To describe the optimization problem, we must first establish useful index sets. Since our algorithm depends on the partition, we denote all these sets as functions of the partition. We define the index set I𝒟I_{\partial\mathcal{D}} as follows:

I𝒟(𝒫)={iI:Xi𝒟},I_{\partial\mathcal{D}}(\mathcal{P})=\{i\in I\colon X_{i}\cap\partial\mathcal{D}\neq\emptyset\}, (15)

where I𝒟(𝒫)I_{\partial\mathcal{D}}(\mathcal{P}) represents the indices of cells that have a non-empty intersection with the boundary of the 𝒟\mathcal{D}. To determine whether a vertex belongs to the 𝒟\partial\mathcal{D} or the Int(𝒟)\mathrm{Int}\left(\mathcal{D}\right), we introduce the following sets:

Ib(𝒫)\displaystyle I_{b}(\mathcal{P}) ={(i,k):vk𝒟,iI𝒟,vk0(Xi)},\displaystyle=\{(i,k)\colon v_{k}\in\partial\mathcal{D},\,i\in I_{\partial\mathcal{D}},\,v_{k}\in\mathcal{F}_{0}(X_{i})\}, (16)
Iint(𝒫)\displaystyle I_{int}(\mathcal{P}) ={(i,k):vk𝒟,iI(𝒫),vk0(Xi)}.\displaystyle=\{(i,k)\colon v_{k}\notin\partial\mathcal{D},\,i\in I(\mathcal{P}),\,v_{k}\in\mathcal{F}_{0}(X_{i})\}.

Here, Ib(𝒫)I_{b}(\mathcal{P}) and IInt(𝒫)I_{\mathrm{Int}}(\mathcal{P}) are sets of ordered pairs where the first element corresponds to the cell index ii, and the second element corresponds to the vertex index kk. Specifically, Ib(𝒫)I_{b}(\mathcal{P}) identifies the vertices on the boundary of 𝒟\mathcal{D} and their associated cells, while IInt(𝒫)I_{\mathrm{Int}}(\mathcal{P}) identifies the vertices in the interior of the domain partition 𝒫\mathcal{P} and their associated cells.

We constructed a linear optimization in [14] as follows to find a certified invariant set with α(x)=αx\alpha(x)=\alpha x where α>0\alpha>0.

minsi,ti,τInti,τbii=1Mτbi+i=1NτInti,\displaystyle\min_{s_{i},t_{i},\tau_{\mathrm{Int}_{i}},\tau_{b_{i}}}\quad\sum_{i=1}^{M}\tau_{b_{i}}+\sum_{i=1}^{N}\tau_{\mathrm{Int}_{i}}, (17a)
Subject to:
hi(vk)τbiϵ1,(i,k)Ib(𝒫),\displaystyle h_{i}(v_{k})-\tau_{b_{i}}\leq-\epsilon_{1},\quad\forall(i,k)\in I_{b}(\mathcal{P}), (17b)
hi(vk)+τIntiϵ2,(i,k)IInt(𝒫),\displaystyle h_{i}(v_{k})+\tau_{\mathrm{Int}_{i}}\geq\epsilon_{2},\quad\forall(i,k)\in I_{\mathrm{Int}}(\mathcal{P}), (17c)
hi˙(vk)+αhi(vk)ϵ3,(i,k)I𝒟(𝒫),\displaystyle\dot{h_{i}}(v_{k})+\alpha h_{i}(v_{k})\geq\epsilon_{3},\quad\forall(i,k)\in I_{\mathcal{D}}(\mathcal{P}), (17d)
hi(vk)=hj(vk),vk0(Xi)0(Xj),\displaystyle h_{i}(v_{k})=h_{j}(v_{k}),\quad\forall v_{k}\in\mathcal{F}_{0}(X_{i})\cap\mathcal{F}_{0}(X_{j}), (17e)
τbi,τInti0,\displaystyle\tau_{b_{i}},\tau_{\mathrm{Int}_{i}}\geq 0, (17f)

where ϵ1,ϵ2,ϵ3>0\epsilon_{1},\epsilon_{2},\epsilon_{3}>0. In (17a), MM and NN denote the number of elements in Ib(𝒫)I_{b}(\mathcal{P}) and IInt(𝒫)I_{\mathrm{Int}}(\mathcal{P}), respectively. Constraint (17b) ensures that vertices in Ib(𝒫)I_{b}(\mathcal{P}) are excluded from the invariant set, while constraint (17c) guides the search algorithm to include all points in IInt(𝒫)I_{\mathrm{Int}}(\mathcal{P}).

These constraints, (17b) and (17c), are relaxed, as some vertices in IInt(𝒫)I_{\mathrm{Int}}(\mathcal{P}) may not be contained within the invariant set, or the search algorithm may encounter feasibility issues for a given partition. Following the parametrization, constraint (17d) is derived from the general constraint (6). The feasibility of this optimization problem is analyzed in [14]. For further details, please refer to [14].

Remark 1

We must note that the optimization problem (17) is always feasible, however, its solution might not be a certified invariant set. In case the i=1Mτbi0\sum_{i=1}^{M}\tau_{b_{i}}\neq 0 in the optimization problem (17), the current partition does not justify a certified invariant set since certain constraints on the boundary cells, (17b), have not been met. In order to resolve this issue, all boundary cells where the slack variable τbi\tau_{b_{i}} is non-zero must be refined. Refinement should also be considered for interior cells with non-zero slack variables, τInti\tau_{\mathrm{Int}_{i}}. In this work, we utilized the vector field refinement approach presented in [17].

In [14], we employed a bisection method to obtain a set of parameters α¯={α1,α2,,αm},\underline{\alpha}\;=\;\{\alpha_{1},\alpha_{2},\dots,\alpha_{m}\}, each yielding an associated invariant set. We then retained only the invariant set corresponding to the parameter αkα¯\alpha_{k}\in\underline{\alpha} that resulted in the largest invariant set, discarding all other sets obtained from the remaining parameters. Although this strategy was effective it is not computationally efficient.

As described earlier, Leaky ReLUs α(x)\alpha(x) may address the challenge of using linear α(x)\alpha(x) in [14]. However, due to the constraint (17d), the resulting formulation requires mixed-integer programming, which results in high computational costs. Another potential solution is to take advantage of the concept of non-smooth BFs developed in [15], where multiple invariant sets can be merged. The primary challenge in [15] is determining a suitable α(x)\alpha(x) that simultaneously satisfies all the necessary barrier-function conditions, which can be difficult in practice. In the next step, we will describe a new algorithm for estimating the invariant set for dynamical systems (12).

III-D Union of Invariant Sets(UIS)

This section addresses the challenge of finding suitable α(x)\alpha(x) by integrating non-smooth BF with leaky ReLU α(x)\alpha(x). This combination aims to produce a possibly larger invariant set compared to [14] without any additional computational cost. To demonstrate how non-smooth BFs can be used with the Leaky ReLU α(x)\alpha(x), we must first modify our notation.

As mentioned earlier, the solution to the optimization problem (17) depends on both 𝒫\mathcal{P} and α(x)\alpha(x). Henceforth, we will use the notation S(m)(𝒫m,αm)S^{(m)}(\mathcal{P}_{m},\alpha_{m}) and h(m)(x,𝒫m,αm)h^{(m)}(x,\mathcal{P}_{m},\alpha_{m}) to reflect this dependency. The rest of the paper assumes α(x)=αmx\alpha(x)=\alpha_{m}x in h(m)(x,𝒫m,αm)h^{(m)}(x,\mathcal{P}_{m},\alpha_{m}) unless otherwise stated.

Lemma 1

Consider the dynamical system given by (12) with an equilibrium at the origin, defined on a compact set 𝒟\mathcal{D}. Let α¯=[αmin,,αmax]\underline{\alpha}=[\alpha_{min},\dots,\alpha_{max}] be a set of mm parameters ordered in ascending order. Suppose that the corresponding invariant sets, obtained through the optimization problem (17) are denoted by S(i)(𝒫i,αi)S^{(i)}(\mathcal{P}_{i},\alpha_{i}) for i=1,,mi=1,\dots,m with α(x)=αix\alpha(x)=\alpha_{i}x. Then, the following results hold:

  1. 1.

    There exists an invariant set S¯\overline{S} with respect to the dynamical system (12), where S¯\overline{S} is given by:

    S¯=i=1mS(i)(𝒫i,αi).\overline{S}=\bigcup_{i=1}^{m}S^{(i)}(\mathcal{P}_{i},\alpha_{i}). (18)
  2. 2.

    The set S¯\overline{S} is rendered asymptotically stable in 𝒟\mathcal{D} with the following BF and class-𝒦\mathcal{K}_{\infty} function:

    h¯(x,𝒫¯,α¯)=maxi{h(i)(x,𝒫i,αi)},\overline{h}(x,\overline{\mathcal{P}},\overline{\alpha})=\max_{i}\{h^{(i)}(x,\mathcal{P}_{i},\alpha_{i})\}, (19)

    where α¯(x)\overline{\alpha}(x) is defined as:

    α¯(x)=αmaxσ(αminαmax)(x),\displaystyle\overline{\alpha}(x)=\alpha_{max}\sigma_{\left(\frac{\alpha_{min}}{\alpha_{max}}\right)}(x), (20)

    and σ(αminαmax)(x)\sigma_{\left(\frac{\alpha_{min}}{\alpha_{max}}\right)}(x) denotes the Leaky ReLU function as defined in (7). The partition 𝒫¯\overline{\mathcal{P}} is the product partition defined as:

    𝒫¯=𝒫1×𝒫2××𝒫m,\overline{\mathcal{P}}=\mathcal{P}_{1}\times\mathcal{P}_{2}\times\dots\times\mathcal{P}_{m}, (21)

    where:

    𝒫=𝒫1×𝒫2={Xk}kI(𝒫),\mathcal{P}^{*}=\mathcal{P}_{1}\times\mathcal{P}_{2}=\{X_{k}\}_{k\in I(\mathcal{P}^{*})},
    Xk={XiXj:iI(𝒫1),jI(𝒫2),dim(Xk)=n}.X_{k}=\{X_{i}\cap X_{j}:i\in I(\mathcal{P}_{1}),j\in I(\mathcal{P}_{2}),dim(X_{k})=n\}.
Proof:

The first part of the proof can be proved using the contradiction. Assume, for contradiction, that there exists an initial condition x0S¯x_{0}\in\overline{S} such that the trajectory of the system leaves S¯\overline{S} at some future time.

By definition of S¯\overline{S}, for any x0S¯x_{0}\in\overline{S}, there exists i{1,2,,m}i\in\{1,2,\dots,m\} such that x0S(i)(𝒫i,αi)x_{0}\in S^{(i)}(\mathcal{P}_{i},\alpha_{i}). Since S(i)(𝒫i,αi)S^{(i)}(\mathcal{P}_{i},\alpha_{i}) is invariant by definition, any initial condition x0S(i)(𝒫i,αi)x_{0}\in S^{(i)}(\mathcal{P}_{i},\alpha_{i}) implies that the trajectory will remain within S(i)(𝒫i,αi)S^{(i)}(\mathcal{P}_{i},\alpha_{i}) for all future time steps.

However, this contradicts our assumption that the trajectory leaves S¯\overline{S}. Therefore, for any x0S¯x_{0}\in\overline{S}, the trajectory of the system will always remain within one of the sets S(i)(𝒫i,αi)S^{(i)}(\mathcal{P}_{i},\alpha_{i}), which are invariant by construction.

To prove the second part, note that h¯(x,𝒫¯,α¯)\overline{h}(x,\overline{\mathcal{P}},\overline{\alpha}) is a continuous PWA\mathrm{PWA} BF, since all h(i)(x,𝒫i,αi)h^{(i)}(x,\mathcal{P}_{i},\alpha_{i}) for i=1,,mi=1,\dots,m are continuous and PWA\mathrm{PWA}. To make the definition of this new PWA\mathrm{PWA} BF compatible with (1), we defined 𝒫¯\overline{\mathcal{P}} to ensure that in each cell, we have only one affine function h¯i(x,𝒫¯,α¯)=siTx+ti\overline{h}_{i}(x,\overline{\mathcal{P}},\overline{\alpha})=s_{i}^{T}x+t_{i} for xXi(𝒫¯)x\in X_{i}(\overline{\mathcal{P}}).

To prove that the candidate BF is valid, we first need to show that h¯i(x,𝒫¯,α¯)0\overline{h}_{i}(x,\overline{\mathcal{P}},\overline{\alpha})\geq 0 for xS¯x\in\overline{S} and h¯i(x,𝒫¯,α¯)<0\overline{h}_{i}(x,\overline{\mathcal{P}},\overline{\alpha})<0 for xS¯x\notin\overline{S}. By definition of the h¯(x,𝒫¯,α¯)\overline{h}(x,\overline{\mathcal{P}},\overline{\alpha}) in (19), we know

h¯(x,𝒫¯,α¯)h(i)(x,𝒫i,αi)i=1,,m,x𝒟.\overline{h}(x,\overline{\mathcal{P}},\overline{\alpha})\geq h^{(i)}(x,\mathcal{P}_{i},\alpha_{i})\quad i=1,\dots,m,\hskip 1.99997ptx\in\mathcal{D}. (22)

Moreover, by definition of S¯\overline{S}, for any xS¯x\in\overline{S}, there exists i{1,2,,m}i\in\{1,2,\dots,m\} such that xS(i)(𝒫i,αi)x\in S^{(i)}(\mathcal{P}_{i},\alpha_{i}) and as a result h(i)(x,𝒫i,αi)0h^{(i)}(x,\mathcal{P}_{i},\alpha_{i})\geq 0. Therefore, with respect to (22), and due to the existence of h(i)(x,𝒫i,αi)0h^{(i)}(x,\mathcal{P}_{i},\alpha_{i})\geq 0 for all xS¯x\in\overline{S}, we can conclude that h¯(x,𝒫¯,α¯)0\overline{h}(x,\overline{\mathcal{P}},\overline{\alpha})\geq 0 for xS¯x\in\overline{S}. Due to brevity, the proof of h¯(x,𝒫¯,α¯)<0\overline{h}(x,\overline{\mathcal{P}},\overline{\alpha})<0 for xS¯x\notin\overline{S} is eliminated.

Now, we need to prove that condition (6) holds for h¯(x,𝒫¯,α¯)\overline{h}(x,\overline{\mathcal{P}},\overline{\alpha}) with respect to the dynamical system (12) for xS¯x\in\overline{S}. According to Theorem 1, if the condition in (6) holds for h¯(x,𝒫¯,α¯)\overline{h}(x,\overline{\mathcal{P}},\overline{\alpha}) with an arbitrary α¯(x)\overline{\alpha}(x), then α¯(x)\overline{\alpha}(x) can be substituted with a Leaky ReLU function. Give that, let us assume α¯(x)=αmaxσ(αminαmax)(x)\overline{\alpha}(x)=\alpha_{max}\sigma_{(\frac{\alpha_{min}}{\alpha_{max}})}(x). Let us consider 𝐱Int(S¯)\mathbf{x}\in\mathrm{Int}\left(\overline{S}\right) such that h¯(𝐱,𝒫¯,α¯)\overline{h}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha}) is differentiable with respect to 𝐱\mathbf{x}. To prove by contradiction, suppose equation (6) does not hold for 𝐱\mathbf{x}. By the definition of h¯(x,𝒫¯,α¯)\overline{h}(x,\overline{\mathcal{P}},\overline{\alpha}) in (19), h¯(𝐱,𝒫¯,α¯)=h(k)(𝐱,𝒫k,αk)\overline{h}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha})=h^{(k)}(\mathbf{x},\mathcal{P}_{k},\alpha_{k}) for 𝐱Int(S¯)\mathbf{x}\in\mathrm{Int}\left(\overline{S}\right), where kk can be any value 1km1\leq k\leq m. Due to the fact that (6) holds for h(k)(x,𝒫k,αk)h^{(k)}(x,\mathcal{P}_{k},\alpha_{k}) for x𝒟x\in\mathcal{D}, we can conclude that:

h˙(k)(𝐱,𝒫k,αk)+αkh(k)(𝐱,𝒫k,αk)0.\dot{h}^{(k)}(\mathbf{x},\mathcal{P}_{k},\alpha_{k})+\alpha_{k}h^{(k)}(\mathbf{x},\mathcal{P}_{k},\alpha_{k})\geq 0. (23)

Also, the following holds because αmaxαk\alpha_{max}\geq\alpha_{k} and h¯(𝐱,𝒫¯,α¯))=h(k)(𝐱,𝒫k,αk)>0\overline{h}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha}))=h^{(k)}(\mathbf{x},\mathcal{P}_{k},\alpha_{k})>0 for 𝐱Int(S¯)\mathbf{x}\in\mathrm{Int}\left(\overline{S}\right):

αmaxh¯(𝐱,𝒫¯,α¯)αkh(k)(𝐱,𝒫k,αk).\alpha_{max}\overline{h}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha})\geq\alpha_{k}h^{(k)}(\mathbf{x},\mathcal{P}_{k},\alpha_{k}). (24)

With respect to the assumption that 𝐱\mathbf{x} is a differentiable point we can conclude that h¯˙(𝐱,𝒫¯,α¯)=h˙(k)(𝐱,𝒫k,αk)\dot{\overline{h}}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha})=\dot{h}^{(k)}(\mathbf{x},\mathcal{P}_{k},\alpha_{k}) and by adding it to both sides of inequality (24):

h¯˙(𝐱,𝒫¯,α¯)+\displaystyle\dot{\overline{h}}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha})+ αmaxh¯(𝐱,𝒫¯,α¯)\displaystyle\alpha_{max}\overline{h}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha}) (25)
h˙(k)(𝐱,𝒫k,αk)+αkh(k)(𝐱,𝒫k,αk)0.\displaystyle\geq\dot{h}^{(k)}(\mathbf{x},\mathcal{P}_{k},\alpha_{k})+\alpha_{k}h^{(k)}(\mathbf{x},\mathcal{P}_{k},\alpha_{k})\geq 0.

which is a contradiction to the assumption that (6) does not hold for h¯(𝐱,𝒫¯,α¯)\overline{h}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha}) for 𝐱Int(S¯)\mathbf{x}\in\mathrm{Int}\left(\overline{S}\right). As a result, we can conclude for all the differentiable points in the Int(S¯)\mathrm{Int}\left(\overline{S}\right),

h¯˙(x,𝒫¯,α¯)+α¯h¯(x,𝒫¯,α¯)0.\dot{\overline{h}}(x,\overline{\mathcal{P}},\overline{\alpha})+\overline{\alpha}\overline{h}(x,\overline{\mathcal{P}},\overline{\alpha})\geq 0.

The same reasoning can be applied to points outside the invariant set S¯\overline{S}. For differentiable points, such as 𝐱\mathbf{x}, outside the invariant set, where h¯(𝐱,𝒫¯,α¯)=h(k)(𝐱,𝒫k,αk)<0\overline{h}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha})=h^{(k)}(\mathbf{x},\mathcal{P}_{k},\alpha_{k})<0, let us assume, for contradiction, that (6) does not hold. Since h¯(𝐱,𝒫¯,α¯)<0\overline{h}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha})<0, we have α¯(𝐱)=αmin\overline{\alpha}(\mathbf{x})=\alpha_{min}, where αminαk\alpha_{min}\leq\alpha_{k} and h(𝐱,𝒫k,αk)<0h(\mathbf{x},\mathcal{P}_{k},\alpha_{k})<0. Therefore,

αminh¯(𝐱,𝒫¯,α¯)αkh(k)(𝐱,𝒫k,αk).\alpha_{min}\overline{h}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha})\geq\alpha_{k}h^{(k)}(\mathbf{x},\mathcal{P}_{k},\alpha_{k}).

Adding h¯˙(𝐱,𝒫¯,α¯)=h˙(k)(𝐱,𝒫k,αk)\dot{\overline{h}}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha})=\dot{h}^{(k)}(\mathbf{x},\mathcal{P}_{k},\alpha_{k}) to both sides of this inequality, we maintain the validity of (23). Thus,

h¯˙(𝐱,𝒫¯,α¯)+αminh¯(𝐱,𝒫¯,α¯)0,\displaystyle\dot{\overline{h}}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha})+\alpha_{min}\overline{h}(\mathbf{x},\overline{\mathcal{P}},\overline{\alpha})\geq 0, (26)

which contradicts our assumption. This allows us to conclude that equation (6) holds for points outside the invariant set.

The non-smooth BFs for differential inclusion are discussed in detail in  [15]. Proposition 2 in [15] demonstrates that (19) is valid for non-differentiable points. For the sake of brevity, we will skip this part.

Consequently, h¯(x,𝒫¯,α¯)\overline{h}(x,\overline{\mathcal{P}},\overline{\alpha}) is a certified barrier function for the system described by (12). ∎

Remark 2

Lemma 1 indicates that when multiple valid BFs exist, they can be combined to form a single BF using (19). It is shown here for PWA\mathrm{PWA}, but this approach can also be applied to more general nonlinear dynamics on compact sets, as described in (4), even though those broader applications are beyond the scope of this work.

Building on Lemma 1, we introduce the Union of Invariant Sets (UIS) method for constructing invariant sets. Instead of identifying a single Leaky ReLU function α(x)\alpha(x) that maximizes the invariant set, UIS forms a unified invariant set by taking the union of multiple invariant sets, each obtained by solving (17) with a distinct linear α(x)\alpha(x). This may result in a broader coverage of the state space while maintaining all interior points. The final invariant set is characterized by the barrier function (19) and a Leaky ReLU α(x)\alpha(x), integrating information from various valid BFs with linear 𝒦\mathcal{K}_{\infty} functions systematically. The complete procedure is detailed in Algorithm 1.

Corollary 1

Consider the set of parameters α¯={α1,α2,,αm}\underline{\alpha}=\{\alpha_{1},\alpha_{2},\dots,\alpha_{m}\}, and suppose αkα¯\alpha_{k}\in\underline{\alpha} yields the largest invariant set S=S(k)(𝒫k,αk)S^{\prime}=S^{(k)}(\mathcal{P}_{k},\alpha_{k}) through the optimization problem (17). Then, the following holds for S¯\overline{S}, (18):

SS¯.S^{\prime}\subseteq\overline{S}. (27)
Proof:

The result follows directly from the construction of the UIS algorithm. ∎

As a result of Corollary 1, it is important to note that UIS does not guarantee a larger forward invariant set in all cases; for instance, solutions such as S(𝒫4,α4)S(\mathcal{P}_{4},\alpha_{4}) in Figure 1 do not contribute any new points to the UIS algorithm. However, in comparison to the previous approach proposed in [14], this method offers the advantage of incurring no additional computational expense, while simultaneously allowing for the determination of a potentially larger invariant set.

0:  PWA(x)\mathrm{PWA}(x) dynamic (12) and α¯={α1,,αm}.\underline{\alpha}=\{\alpha_{1},\dots,\alpha_{m}\}.
  for j=1,2,,mj=1,2,\dots,m do
     1-α(x)=αj×x,αjα¯\alpha(x)=\alpha_{j}\times x,\alpha_{j}\in\underline{\alpha}
     2- Solve optimization problem (17a) for the PWA\mathrm{PWA} dynamic with α(x)\alpha(x)
     while i=1Nτbi0\sum_{i=1}^{N}\tau_{b_{i}}\neq 0 do
        for each ii such that τbi0\tau_{b_{i}}\neq 0 and τinti0\tau_{int_{i}}\neq 0 do
           Refine cells as described in [17].
        end for
        Search for a certified invariant set using optimization problem (17a) for the PWA\mathrm{PWA} dynamics (12) with α(x)\alpha(x) over the refined partition of the domain.
     end while
  end for
  return  The Union of Invariant Sets (18) and its corresponding PWA\mathrm{PWA} BF (19) with Leaky ReLU α(x)\alpha(x).
Algorithm 1 Union of Invariant sets(UIS) III-D for PWA\mathrm{PWA} dynamics (12)

IV Results and Simulations

All computations are implemented using Python 3.11 and on a computer with a 2.1 GHz processor and 8 GB RAM. A tolerance of 10610^{-6} is used to determine if a number is nonzero. Moreover, the examples employ a tolerance of ϵ1=ϵ2=ϵ3=104{\epsilon_{1}=\epsilon_{2}=\epsilon_{3}=10^{-4}}.

Example 1 (Inverted Pendulum [14])

The inverted pendulum system can be modeled as follows:

x˙1\displaystyle\dot{x}_{1} =x2\displaystyle=x_{2}
x˙2\displaystyle\dot{x}_{2} =sin(x1)+u\displaystyle=\sin(x_{1})+u

where x1x_{1} represents the pendulum’s angle, and x2x_{2} is its angular velocity. The control input uu, defined as u=3x13x2u=-3x_{1}-3x_{2}, is constrained by a saturation limit between the lower bound of 1.5-1.5 and the upper bound of 1.51.5. The system’s domain, 𝒟\mathcal{D}, is given by 𝒟=πx0\mathcal{D}=\pi-||x||_{\infty}\geq 0, where x||x||_{\infty} represents the infinity norm. We utilize a ReLU neural network with a single hidden layer with eight neurons to approximate the right-hand side of the dynamics. The UIS estimates the invariant set with α=[0.025,0.05,0.06]\alpha=[0.025,0.05,0.06]. The results are shown in Fig 2. The invariant set obtained with UIS is larger than the invariant set obtained with a linear α(x)\alpha(x) as can be seen in Fig 2.

Example 2 (Barrier Certificate Verification)

Consider the following continuous system from [18]:

x˙1\displaystyle\dot{x}_{1} =x12+x1x2+x1,\displaystyle=x_{1}^{2}+x_{1}x_{2}+x_{1},
x˙2\displaystyle\dot{x}_{2} =x1x2+x22+x2,\displaystyle=x_{1}x_{2}+x_{2}^{2}+x_{2},

defined over the state space 𝒟={x:x2}\mathcal{D}=\{x:\|x\|_{\infty}\leq 2\}. The objective is to ensure that any trajectory that originates in the set Im={x:0.5x1,x21}I_{m}=\{x:0.5\leq x_{1},x_{2}\leq 1\} never enters the unsafe region Um={x:1x1,x20}U_{m}=\{x:-1\leq x_{1},x_{2}\leq 0\}.

The dynamic is identified using a ReLU NN with 20 neurons. UIS, as described in Algorithm 1, utilized α=[0.1,0.5]\alpha=[0.1,0.5] to obtain a new invariant set, and the results compared with [18]. In Fig 3, UIS has a larger invariant set than one linear α\alpha, and it is also comparable to the SyntheBC approach as described in [18].

V Conclusion

This paper presents a systematic method for deriving PWA\mathrm{PWA} BFs and their corresponding invariant sets for dynamical systems identified using ReLU NNs or their equivalent PWA\mathrm{PWA} dynamical systems. A key innovation of this method is the introduction of the leaky ReLU function as a simplified substitute to the complex 𝒦\mathcal{K}_{\infty} function typically used in BF formulations. As an extension of our previous work, we propose a novel approach, the Union of Invariant Sets (UIS), which takes advantage of all information obtained from previous methods to compute the largest possible PWA\mathrm{PWA} invariant set. The efficacy of the UIS framework has been demonstrated through a number of nontrivial examples.

Refer to caption
Figure 1: The new invariant set S¯\overline{S} shown with a red dashed line is the union of four invariant sets obtained from optimization problem (17) with different α\alpha. As can be seen S(𝒫4,α4)S(\mathcal{P}_{4},\alpha_{4}) does not contribute to the S¯\overline{S}.
Refer to caption
Figure 2: The final invariant set will be the Union of invariant sets with 3 different α\alpha as described in UIS III-D.
Refer to caption
Figure 3: The final invariant set will be the Union of invariant sets with 2 different α\alpha as described in UIS III-D for the Example 2.

References

  • [1] J. Tan, T. Zhang, E. Coumans, A. Iscen, Y. Bai, D. Hafner, S. Bohez, and V. Vanhoucke, “Sim-to-real: Learning agile locomotion for quadruped robots,” arXiv preprint arXiv:1804.10332, 2018.
  • [2] N. Rober, S. M. Katz, C. Sidrane, E. Yel, M. Everett, M. J. Kochenderfer, and J. P. How, “Backward reachability analysis of neural feedback loops: Techniques for linear and nonlinear systems,” IEEE Open Journal of Control Systems, vol. 2, pp. 108–124, 2023.
  • [3] X. Yuan, P. He, Q. Zhu, and X. Li, “Adversarial examples: Attacks and defenses for deep learning,” IEEE transactions on neural networks and learning systems, vol. 30, no. 9, pp. 2805–2824, 2019.
  • [4] Y.-C. Chang, N. Roohi, and S. Gao, “Neural lyapunov control,” Advances in neural information processing systems, vol. 32, 2019.
  • [5] H. Dai, B. Landry, L. Yang, M. Pavone, and R. Tedrake, “Lyapunov-stable neural-network control,” arXiv preprint arXiv:2109.14152, 2021.
  • [6] C. Dawson, Z. Qin, S. Gao, and C. Fan, “Safe nonlinear control using robust neural lyapunov-barrier functions,” in Conference on Robot Learning, pp. 1724–1735, PMLR, 2022.
  • [7] A. D. Ames, J. W. Grizzle, and P. Tabuada, “Control barrier function based quadratic programs with application to adaptive cruise control,” in 53rd IEEE Conference on Decision and Control, pp. 6271–6278, IEEE, 2014.
  • [8] V. Hamdipoor, N. Meskin, and C. G. Cassandras, “Safe control synthesis using environmentally robust control barrier functions,” European Journal of Control, vol. 74, p. 100840, 2023. 2023 European Control Conference Special Issue.
  • [9] Z. Marvi and B. Kiumarsi, “Safe reinforcement learning: A control barrier function optimization approach,” International Journal of Robust and Nonlinear Control, vol. 31, no. 6, pp. 1923–1940, 2021.
  • [10] A. Taylor, A. Singletary, Y. Yue, and A. Ames, “Learning for safety-critical control with control barrier functions,” in Learning for Dynamics and Control, pp. 708–717, PMLR, 2020.
  • [11] P. Samanipour and H. A. Poonawala, “Stability analysis and controller synthesis using single-hidden-layer relu neural networks,” IEEE Transactions on Automatic Control, pp. 1–12, 2023.
  • [12] F. Blanchini and S. Miani, “Constrained stabilization of continuous-time linear systems,” Systems & control letters, vol. 28, no. 2, pp. 95–102, 1996.
  • [13] S. Raković, E. Kerrigan, K. Kouramas, and D. Mayne, Invariant approximations of robustly positively invariant sets for constrained linear discrete-time systems subject to bounded disturbances. University of Cambridge, Department of Engineering Cambridge, 2004.
  • [14] P. Samanipour and H. Poonawala, “Invariant set estimation for piecewise affine dynamical systems using piecewise affine barrier function,” European Journal of Control, p. 101115, 2024.
  • [15] P. Glotfelter, J. Cortés, and M. Egerstedt, “Nonsmooth barrier functions with applications to multi-robot systems,” IEEE control systems letters, vol. 1, no. 2, pp. 310–315, 2017.
  • [16] A. D. Ames, S. Coogan, M. Egerstedt, G. Notomista, K. Sreenath, and P. Tabuada, “Control barrier functions: Theory and applications,” in 2019 18th European control conference (ECC), pp. 3420–3431, IEEE, 2019.
  • [17] P. Samanipour and H. A. Poonawala, “Automated stability analysis of piecewise affine dynamics using vertices,” in 2023 59th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1–8, 2023.
  • [18] Q. Zhao, X. Chen, Y. Zhang, M. Sha, Z. Yang, W. Lin, E. Tang, Q. Chen, and X. Li, “Synthesizing relu neural networks with two hidden layers as barrier certificates for hybrid systems,” in Proceedings of the 24th International Conference on Hybrid Systems: Computation and Control, pp. 1–11, 2021.