no code implementations • 26 Sep 2023 • Axel Grönland, Alessio Russo, Yassir Jedra, Bleron Klaiqi, Xavier Gelabert
In the Centralized-Radio Access Network (C-RAN) architecture, functions can be placed in the central or distributed locations.
no code implementations • 16 Jul 2023 • Mahsa Farjadnia, Angela Fontan, Alessio Russo, Karl Henrik Johansson, Marco Molinari
Window-opening and window-closing behaviors play an important role in indoor environmental conditions and therefore have an impact on building energy efficiency.
no code implementations • 5 Apr 2023 • Daniele Foffano, Alessio Russo, Alexandre Proutiere
Reinforcement Learning aims at identifying and evaluating efficient control policies from data.
1 code implementation • 28 Nov 2022 • Alessio Russo, Alexandre Proutiere
Arms consist of two components: one that is shared across tasks (that we call representation) and one that is task-specific (that we call predictor).
no code implementations • 16 Nov 2022 • Viktor Eriksson Möllerstedt, Alessio Russo, Maxime Bouton
Non-differentiable controllers and rule-based policies are widely used for controlling real systems such as telecommunication networks and robots.
3 code implementations • 16 Nov 2022 • Alessio Russo
In recent years, there has been a growing interest in the effects of data poisoning attacks on data-driven control methods.
no code implementations • 2 Oct 2022 • Damianos Tranos, Alessio Russo, Alexandre Proutiere
We present Self-Tuning Tube-based Model Predictive Control (STT-MPC), an adaptive robust control algorithm for uncertain linear systems with additive disturbances based on the least-squares estimator and polytopic tubes.
1 code implementation • 7 Sep 2022 • Alessio Russo, Alexandre Proutiere
We present a novel tube-based data-driven predictive control method for linear systems affected by a bounded addictive disturbance.
1 code implementation • NeurIPS 2021 • Alberto Maria Metelli, Alessio Russo, Marcello Restelli
Importance Sampling (IS) is a widely used building block for a large variety of off-policy estimation and learning algorithms.
1 code implementation • 15 Sep 2021 • Alessio Russo, Alexandre Proutiere
In such an attack, drawing inspiration from adversarial examples used in supervised learning, the amplitude of the adversarial perturbation is limited according to some norm, with the hope that this constraint will make the attack imperceptible.
no code implementations • 1 Jun 2021 • Alessio Russo
Recent successes in the Machine Learning community have led to a steep increase in the number of papers submitted to conferences.
no code implementations • 10 Mar 2021 • Alessio Russo, Alexandre Proutiere
This paper investigates poisoning attacks against data-driven control methods.
no code implementations • 10 Mar 2021 • Alessio Russo, Marco Molinari, Alexandre Proutiere
This work investigates the feasibility of using input-output data-driven control techniques for building control and their susceptibility to data-poisoning techniques.
1 code implementation • 2 Mar 2021 • Alessio Russo, Alexandre Proutiere
In contrast to previous work on privacy, we study the problem for an online sequence of data.
no code implementations • 31 Jul 2019 • Alessio Russo, Alexandre Proutiere
Finally, we show that from the main agent perspective, the system uncertainties and the attacker can be modeled as a Partially Observable Markov Decision Process.