liu.seSearch for publications in DiVA
1 - 2 of 2
rss atomLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
  • Presentation: 2025-12-12 10:15 C3, C-building, LinköpingOrder onlineBuy this publication >>
    Tozzi de Cantuaria Gama, Artur
    Linköping University, Department of Management and Engineering, Fluid and Mechatronic Systems. Linköping University, Faculty of Science & Engineering.
    Multi-Pump Systems for Electrified Mobile Machinery: Addressing Combinatorial Control Complexity through Simulation-Based Optimisation2025Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Electrification is increasingly being adopted in mobile machinery as a means to reduce carbon emissions and improve energy efficiency. While electric solutions for actuation are growing, hydraulic systems still offer a favourable balance between cost, power density, reliability, and overall performance. Their primary drawback is efficiency, as they often rely on throttling control, which incurs high losses. However, electrified vehicles bring new opportunities for redesigning hydraulic systems.

    An electric vehicle does not require a centralised hydraulic system. Integrated electric machine and hydraulic pump/motor units have long been available, enabling systems composed of multiple smaller decentralised components. Such arrangements allow the system to match flow and pressure demand directly, reducing or eliminating throttling losses.

    This enables new hydraulic architectures that require alternative control methods and have not been previously analysed. This thesis focuses on the Multi-Pump System (MPS), which uses multiple smaller fixed-displacement hydraulic machines to supply flow to the actuators through on/off valves. The design minimises throttling by using the valves for flow routing and the pump/motors for control. Any pump/motor port can connect to any actuator chamber, and the architecture enables energy regeneration and recuperation.

    This system offers considerable flexibility in performing a task. For instance, it can control actuators independently using varying numbers of active pump/motors, short-circuit actuator chambers to reduce the total required pump flow, or utilise the return flow for electric energy recuperation. This licentiate thesis investigates the decision-making process involved in selecting among these operating modes.

    It proposes an optimisation-based method to infer viable and preferred control decisions from the actuators’ operating points, thereby reducing the control decision space. A structurally simple system is analysed, and a visualisation method is introduced to summarise the transition regions between operating modes for the hydraulic machines. Finally, a dynamic model is tested using the decisions from this analysis to develop the control system. The results indicate that this approach can be extended to more complex systems, although new strategies may be required to identify mode transition patterns.

    List of papers
    1. An Analysis of a Multi-Pump System for Actuator Operation in Electric Mobile Machinery
    Open this publication in new window or tab >>An Analysis of a Multi-Pump System for Actuator Operation in Electric Mobile Machinery
    2023 (English)In: ASME/BATH 2023 Symposium on Fluid Power and Motion Control - FPMC2023, The American Society of Mechanical Engineers , 2023Conference paper, Published paper (Refereed)
    Abstract [en]

    This paper presents an analysis of a multi-pump solution for a hydraulic cylinder for application in mobile machinery with electric prime movers. The flexibility provided by using electric motors instead of an internal combustion engine allows for the design of alternative hydraulic architectures that remove the need for a centralized pumping system and support more direct control of individual components. This allows them to operate at a higher efficiency region to improve overall vehicle efficiency, leading to smaller batteries and shorter or less frequent recharge periods. To evaluate the capabilities of this proposal, this paper focuses on a backward calculation analysis of a single actuator operating with multiple pump/motors connected to each chamber. A series of hydraulic machines with fixed displacement and identical sizes are connected to the actuator chambers through on/off directional valves. The system controls the flow by using the required pumps and selecting their optimal speeds to minimize energy consumption or maximize energy recovery. The results show how the number of pumps affects the system’s performance and provide insights regarding the selection of operating machines according to the actuator speed and force.

    Place, publisher, year, edition, pages
    The American Society of Mechanical Engineers, 2023
    Series
    Symposium on Fluid Power and Motion Control
    Keywords
    multi-pump hydraulic actuator, multi-pump system, hydraulic actuation, electric mobile machinery, electrification
    National Category
    Other Mechanical Engineering
    Identifiers
    urn:nbn:se:liu:diva-199230 (URN)10.1115/FPMC2023-111452 (DOI)001219322300023 ()9780791887431 (ISBN)
    Conference
    ASME/BATH 2023 Symposium on Fluid Power and Motion Control, Sarasota, FL, USA, October 16-18, 2023.
    Projects
    Energieffektiva kompakta elektrohydrauliska komponent- och systemlösningar för arbetsmaskiner, E-hydraulik
    Funder
    Swedish Energy Agency, 305207
    Note

    Funding Agencies|Swedish Energy Agency (Energimyndigheten) [50181-1]

    Available from: 2023-11-21 Created: 2023-11-21 Last updated: 2025-11-20Bibliographically approved
    2. The Multi-Pump System Combinatorial Problem: A Filtering Approach Using Genetic Algorithms
    Open this publication in new window or tab >>The Multi-Pump System Combinatorial Problem: A Filtering Approach Using Genetic Algorithms
    2025 (English)In: The 19th Scandinavian International Conference on Fluid Power, SICFP'25 / [ed] Prof. Liselott Ericson, Linköping, Sweden: River Publishers, 2025, article id Article 33Conference paper, Published paper (Refereed)
    Abstract [en]

     Hybrid and fully electric heavy machinery introduce new possibilities for hydraulic system design. Due to their lower energy density compared to conventional combustion engine systems, improving hydraulic efficiency is crucial. Electro-hydraulic actuators can achieve this but often require high installed power, as each actuator must be sized for maximum demand. The multi-pump system (MPS) in this paper addresses this by allowing all hydraulic machines to serve any actuator via a network of on/off valves, reducing losses and installed power. However, its multiple degrees of freedom make optimal operation non-trivial. This paper proposes a filtering strategy using a genetic algorithm to identify efficient operating points for the MPS. Although applicable for larger systems, the results here focus on an MPS with two pumps and one actuator as an example. A quasi-static system model is introduced, which the GA uses to determine steady-state control signals that minimise power consumption. The results highlight ideal operating conditions, significantly narrowing the range of viable valve combinations and pump/motor speeds. Finally, the paper discusses the limitations of the approach and its potential extension to more complex multi-pump systems for the development of dynamic control strategies.

    Place, publisher, year, edition, pages
    Linköping, Sweden: River Publishers, 2025
    Keywords
    Multi-pump system, optimisation, genetic algorithm, hydraulic system modelling
    National Category
    Other Mechanical Engineering Other Engineering and Technologies
    Identifiers
    urn:nbn:se:liu:diva-216186 (URN)10.13052/rp-9788743808251A33 (DOI)9788743808251 (ISBN)
    Conference
    The 19th Scandinavian International Conference on Fluid Power, SICFP’25, Linköping, Sweden, June 2-4, 2025.
    Projects
    Energy-efficient compact electro-hydraulic component and system solutions for construction vehicles, E-hydraulics phase II
    Funder
    Swedish Energy Agency, P2023-00594
    Available from: 2025-08-04 Created: 2025-08-04 Last updated: 2025-11-21
    3. Control of Multi-Pump Systems
    Open this publication in new window or tab >>Control of Multi-Pump Systems
    2025 (English)In: Proceedings of the ASME 2025 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, 2025, Vol. 6, article id DETC2025-164506Conference paper, Published paper (Other academic)
    Abstract [en]

    With the electrification of mobile machinery comes the demand for new, efficient hydraulic systems. One system type of interest is the multi-pump architecture, which uses multiple pumps that can be connected to different actuators via on/off valves. This is a modular system that can perform efficiently, and the required installed power can be kept low compared to other similar approaches. It requires many valves, but offers many possible modes of operation. However, switching between modes is non-trivial and can cause disturbances and losses. In this paper, different controllers for a multi-pump system with two pumps and one actuator are investigated. Controllers that keep the pressure side of the pumps fixed are compared to controllers that allow varying pressure sides (meaning they can work in two or four quadrants, respectively). The ideal operating mode for each operating point was found using a genetic algorithm. The controllers were tested for different dynamics of the valves and pumps. It was found that the dynamics of the components have a similar impact regardless of the control strategy, assuming the dynamics are sufficiently fast. However, the controllers with fixed pressure sides generally performed marginally better.

    Keywords
    multi-pump system, fluid power, electrification, control
    National Category
    Control Engineering
    Identifiers
    urn:nbn:se:liu:diva-219587 (URN)10.1115/DETC2025-164506 (DOI)978-0-7918-8926-8 (ISBN)
    Conference
    ASME 2025 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference IDETC-CIE2025 August 17-20, 2025, Anaheim, CA
    Note

    Funding Agencies: This research was funded by the Strategic Vehicle Research and Innovation (FFI– Fordonsstrategisk forskning och innovation) program within the Swedish Energy Agency (Energimyndigheten) under grant number P2023-00594.

    Available from: 2025-11-19 Created: 2025-11-19 Last updated: 2025-11-20Bibliographically approved
    Download full text (pdf)
    fulltext
    Download (png)
    presentationsbild
  • Presentation: 2025-12-16 13:15 Ada Lovelace, B-building, LinköpingOrder onlineBuy this publication >>
    Oscar Colaco, Valency
    Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, Faculty of Science & Engineering.
    Hardening Tree Ensembles: Real-Time and Effective Evasion Defences Beyond Adversarial Re-Training2025Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Tree ensembles like random forests and gradient boosting machines are widely used machine learning (ML) models, often outperforming advanced techniques like deep neural networks on structured tabular data tasks. These models also have interpretable (human-understandable) structures that enable stakeholders to trace the decision-making process, making them particularly suitable for use in safety- and security-critical applications where trust in the model’s behaviour is paramount. Despite these advantages, recent work has shown that they are highly vulnerable to adversarial examples: carefully perturbed inputs that elicit misclassifications.

    These vulnerabilities are especially concerning as ML continues to permeate domains that are critical to societal functioning. Their seriousness is underscored by legislation such as the recently passed European Union Artificial Intelligence (AI) Act. This act mandates resilience against AI-specific vulnerabilities like evasion attacks caused by adversarial examples targeting ML models at inference time. Measures intended to improve resilience against such evasions, often referred to as hardening, generally involve two strategies: proactive defences, which aim to make models robust (e.g., adversarial re-training), and reactive defences, which focus on detecting and mitigating evasions at inference time. This thesis examines both strategies; it shows that proactive methods like model re-training are ineffective for tree ensembles and consequently advances the state-of-the-art in reactive defences.

    In the context of re-training, doubling the training set through targeted data augmentation steps left accuracy largely unchanged. However, robustness, when quantified using formal verification techniques, dropped by 28–82% across two case studies. This indicates that model re-training alone is ineffective for tree ensembles. To address this, we leveraged formal methods to develop Iceman, a prototype system that uses counterexample regions which violate the robustness property to detect evasion attempts. Iceman can detect evasion attacks regardless of the attack generation process without modifying the underlying tree ensemble. It outperforms the current state-of-the-art methods in evasion detection, OC-Score and GROOT. Across four case studies, it improves Matthews Correlation Coefficient scores by 0.20–0.91 and achieves detection speeds 5–115x faster than OC-Score. In addition, it provides alert filtering and prioritisation capabilities with over 98% accuracy to address alert fatigue in intrusion detection systems. However, Iceman’s applicability is limited to scenarios with fixed attacker perturbation budgets, characterised by pre-defined constraints on the input manipulations that an attacker can apply.

    To expand this applicability to unconstrained attacker perturbation budgets, we developed an additional system, called Maverick, designed to complement Iceman for a better defensive strategy. Just like Iceman, Maverick does not modify the underlying tree ensemble and can detect evasion attacks regardless of the attack generation process. We prove that Maverick’s core detection mechanism is mathematically equivalent to OC-Score, and present enhancements that achieve 85–563x speedups over OC-Score while maintaining identical detection performance and supporting evasion attack diagnostics with over 93% accuracy.

    List of papers
    1. Formal Verification of Tree Ensembles against Real-World Composite Geometric Perturbations
    Open this publication in new window or tab >>Formal Verification of Tree Ensembles against Real-World Composite Geometric Perturbations
    2023 (English)In: Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023) / [ed] Pedroza G., Huang X., Chen X.C., Theodorou A., Hernandez-Orallo J., Castillo-Effen M., Mallah R., McDermid J., CEUR-WS , 2023, Vol. 3381, article id 38Conference paper, Published paper (Refereed)
    Abstract [en]

    Since machine learning components are now being considered for integration in safety-critical systems, safety stakeholdersshould be able to provide convincing arguments that the systems are safe for use in realistic deployment settings. In the caseof vision-based systems, the use of tree ensembles calls for formal stability verification against a host of composite geometricperturbations that the system may encounter. Such perturbations are a combination of an affine transformation like rotation,scaling, or translation and a pixel-wise transformation like changes in lighting. However, existing verification approachesmostly target small norm-based perturbations, and do not account for composite geometric perturbations. In this work,we present a novel method to precisely define the desired stability regions for these types of perturbations. We propose afeature space modelling process that generates abstract intervals which can be passed to VoTE, an efficient formal verificationengine that is specialised for tree ensembles. Our method is implemented as an extension to VoTE by defining a new propertychecker. The applicability of the method is demonstrated by verifying classifier stability and computing metrics associatedwith stability and correctness, i.e., robustness, fragility, vulnerability, and breakage, in two case studies. In both case studies,targeted data augmentation pre-processing steps were applied for robust model training. Our results show that even modelstrained with augmented data are unable to handle these types of perturbations, thereby emphasising the need for certifiedrobust training for tree ensembles.

    Place, publisher, year, edition, pages
    CEUR-WS, 2023
    Series
    CEUR Workshop Proceedings, ISSN 1613-0073 ; 3381
    Keywords
    Machine Learning, Formal Verification, Tree Ensembles, Composite Perturbations, Geometric Perturbations, Random Forests, Gradient Boosting Machines, Semantic Perturbations, Stability, Robustness, Trustworthy AI, Trustworthy Computing
    National Category
    Computer Sciences
    Identifiers
    urn:nbn:se:liu:diva-195996 (URN)2-s2.0-85159287306 (Scopus ID)
    Conference
    The AAAI-23 Workshop on Artificial Intelligence Safety (SafeAI 2023), Washington DC, USA, February 13-14, 2023
    Funder
    Wallenberg AI, Autonomous Systems and Software Program (WASP)
    Available from: 2023-06-30 Created: 2023-06-30 Last updated: 2025-11-13Bibliographically approved
    2. Fast Evasion Detection & Alert Management in Tree-Ensemble-Based Intrusion Detection Systems
    Open this publication in new window or tab >>Fast Evasion Detection & Alert Management in Tree-Ensemble-Based Intrusion Detection Systems
    2024 (English)In: 2024 IEEE 36TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, ICTAI, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 404-412Conference paper, Published paper (Refereed)
    Abstract [en]

    Intrusion Detection Systems (IDSs) can help bolster cyber resilience in high-risk systems by promptly detecting anomalies and thwarting security threats which could have catastrophic consequences. While Machine Learning (ML) techniques like Tree Ensembles are well suited for tasks like detecting anomalies, the widespread adoption of these techniques in IDSs faces barriers due to the threat of evasion attacks. Moreover, ML-based IDSs are susceptible to producing a high rate of false positive alerts during detection, causing alert fatigue. To alleviate these problems, we present a method that uses counterexample regions to detect evasion attacks in tree-ensemble-based IDSs. We generate these counterexample regions by defining a modified mapping checker in VoTE, a fast & scalable formal verification tool specialized for tree ensembles. Our method also provides quaternary annotations, empowering security managers with nuanced insights to better handle alerts in the triage queue. Our approach does not require training a separate model and displays good detection performance (≥98 %) in both adversarial & non-adversarial scenarios in four real-world case studies when compared to several approaches in the literature. The prototype system we implement based on our method called Iceman has a very low prediction latency, making it 5-115x faster than the current state-of-the-art in evasion detection for tree ensembles. Finally, empirical evaluations show that Iceman can correctly re-annotate the samples in the presence of evasion attacks for alert management purposes with an accuracy of more than 98 % .

    Place, publisher, year, edition, pages
    Institute of Electrical and Electronics Engineers (IEEE), 2024
    Series
    Proceedings-International Conference on Tools With Artificial Intelligence, ISSN 1082-3409, E-ISSN 2375-0197
    Keywords
    Evasion Attacks; Adversarial Defences; Intrusion Detection Systems; Tree Ensembles; Formal Methods
    National Category
    Computer Sciences Computer Systems
    Identifiers
    urn:nbn:se:liu:diva-211768 (URN)10.1109/ICTAI62512.2024.00065 (DOI)001447778900056 ()2-s2.0-85217421895 (Scopus ID)9798331527242 (ISBN)9798331527235 (ISBN)
    Conference
    2024 IEEE 36th International Conference on Tools with Artificial Intelligence (ICTAI), Herndon, VA, OCT 28-30, 2024
    Funder
    Wallenberg AI, Autonomous Systems and Software Program (WASP)
    Note

    Funding Agencies|Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

    Available from: 2025-02-20 Created: 2025-02-20 Last updated: 2025-11-13
    3. Real-Time Evasion Detection in Tree Ensemble Automotive Intrusion Detection Systems
    Open this publication in new window or tab >>Real-Time Evasion Detection in Tree Ensemble Automotive Intrusion Detection Systems
    2025 (English)In: 16th IEEE Vehicular Networking Conference (VNC), IEEE, 2025Conference paper, Published paper (Refereed)
    Abstract [en]

    Safety-critical functions in modern vehicles rely on electronic control units that communicate using the controller area network (CAN) protocol, which lacks vital security features. In this context, machine learning (ML) based intrusion detection systems (IDSs) were proposed as a solution to improve cyber resilience through real-time attack detection. However, these ML-IDSs must also withstand evasion attacks that could compromise vehicular safety. To this end, this paper addresses such attacks in misuse-based tree ensemble IDSs and proposes a method that detects evasion attempts. It uses the ordered set of reached leaf nodes activated by correctly classified training samples as a normality baseline. An autoencoder-based detector then identifies deviations as likely evasion attempts. Our approach does not modify the protected tree ensemble IDS, assumes no knowledge of the process for generating adversarial examples (ensuring generalisability), and works with any additive tree ensemble. We also prove that it is mathematically equivalent to the state-of-the-art, which we advance in terms of detection speed by replacing its Hamming distance-based deviation search with an autoencoder-based model of typical predictive behavior trained using our custom loss function. This enhancement results in a detection process that is orders of magnitude faster. Additionally, our method offers nuanced insights regarding the pre-evasion attack signature prior to the adversarial perturbation, thereby enriching the security analysis of the features targeted during evasion attempts. The prototype system we present, called Maverick, has a very low prediction latency, making it 85-563x faster than the current state-of-the-art while maintaining identical detection accuracy. Finally, Maverick predicts the pre-evasion attack signatures of the evasion samples with an accuracy of more than 93% and has an average prediction time well below the message transmission rate for CAN 2.0 and CAN FD, thereby satisfying the criteria for an evasion-hardened & real-time automotive IDS.

    Place, publisher, year, edition, pages
    IEEE, 2025
    Series
    IEEE Vehicular Networking Conference, ISSN 2157-9857, E-ISSN 2157-9865
    Keywords
    Tree Ensembles, Autoencoders, Intrusion Detection Systems, Real-time Systems, Safety, Security, Controller Area Networks, Adversarial Examples
    National Category
    Computer Systems
    Identifiers
    urn:nbn:se:liu:diva-216350 (URN)10.1109/VNC64509.2025.11054177 (DOI)001540461700039 ()2-s2.0-105010777746 (Scopus ID)9798331524371 (ISBN)9798331524388 (ISBN)
    Conference
    2025 IEEE Vehicular Networking Conference (VNC), Porto, Portugal, JUN 02-04, 2025
    Funder
    Wallenberg AI, Autonomous Systems and Software Program (WASP)
    Note

    Funding Agencies|Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

    Available from: 2025-08-14 Created: 2025-08-14 Last updated: 2025-11-13
    Download full text (pdf)
    fulltext
    Download (png)
    presentationsbild