Julien M. Hendrickx’s research while affiliated with Catholic University of Louvain and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (184)


Figure 2: Allowed regions for í µí±“ 2 as a function of í µí±” 2 , according to (3.3) and í µí± Ł í µí¼‡,í µí°¿ given í µí¼‡ = 1/2, í µí°¿ = 1, (í µí±¥ ★ , í µí±“ ★ , í µí±” ★ ) = (0, 0, 0), (í µí±¥ 1 , í µí±“ 1 , í µí±” 1 ) = (1, 1 4 , 1 2 ) and í µí±¥ 2 = 3 8 .
Figure 3: Allowed regions for í µí±“ 3 as a function of ℎ 3 , according to (3.5) and í µí± 0,í µíµƒ , given í µí°¿ í µí±¥ = í µí°¿ í µí±¦ = 1, (í µí±¥ 1 , í µí±“ 1 , í µí±” 1 ) = −1 0 , 1 2 , −1 0 , (í µí±¥ 2 , í µí±“ 2 , í µí±” 2 ) = 1 0 , 1 2 , 1 0 , í µí±¥ 3 = 0 1 and í µí±” 3 = 0 í µí±” (2) 3 .
Figure 4: Allowed regions for í µí±¡ 3 , according to í µí±ž 0,í µí°¿ or (3.8), given í µí°¿ = 1, (í µí±¥ 1 , í µí±¡ 1 ) = 0 0
Figure 6: From [15, Figure 3]. Allowed regions for í µí±“ (í µí±¦) as a function of ⟨∇í µí±“ (í µí±¦), í µí±¦⟩, according to [15, Corollary 3.2] and Corollary h.2, and given í µí°¿ = 1, (í µí±¥, í µí±“ (í µí±¥), ∇í µí±“ (í µí±¥)) = (0, 0, 0), ∥í µí±¦ ∥ 2 = 1, ∥∇í µí±“ (í µí±¦) ∥ 2 = 1 2 and min(dist(í µí±¥, ℝ í µí±‘ \ ¯ í µí±„), dist(í µí±¦, ℝ í µí±‘ \ ¯ í µí±„)) = 1. Corollary h.2 allows bounding í µí±“ í µí±¦ by B 1 , U 1 , while [15, Corollary 3.2] can only rely on B 2 , U 2 .
A constructive approach to strengthen algebraic descriptions of function and operator classes
  • Preprint
  • File available

April 2025

·

3 Reads

Anne Rubbens

·

Julien M. Hendrickx

·

Adrien Taylor

It is well known that functions (resp. operators) satisfying a property~p on a subset QRdQ\subset \mathbb{R}^d cannot necessarily be extended to a function (resp. operator) satisfying~p on the whole of~Rd\mathbb{R}^d. Given QRdQ \subseteq \mathbb{R}^d, this work considers the problem of obtaining necessary and ideally sufficient conditions to be satisfied by a function (resp. operator) on Q, ensuring the existence of an extension of this function (resp. operator) satisfying p on Rd\mathbb{R}^d. More precisely, given some property p, we present a refinement procedure to obtain stronger necessary conditions to be imposed on Q. This procedure can be applied iteratively until the stronger conditions are also sufficient. We illustrate the procedure on a few examples, including the strengthening of existing descriptions for the classes of smooth functions satisfying a \L{}ojasiewicz condition, convex blockwise smooth functions, Lipschitz monotone operators, strongly monotone cocoercive operators, and uniformly convex functions. In most cases, these strengthened descriptions can be represented, or relaxed, to semi-definite constraints, which can be used to formulate tractable optimization problems on functions (resp. operators) within those classes.

Download

Fig. 1: Feasible sets for z = M z − , with M in L L consistent with the data in Ex. 1 for increasing values of L. When L = 1, we find D = 0 and therefore the ellipses degenerates into a segment.
Physics-informed data-driven control without persistence of excitation

April 2025

·

114 Reads

We show that data that is not sufficiently informative to allow for system re-identification can still provide meaningful information when combined with external or physical knowledge of the system, such as bounded system matrix norms. We then illustrate how this information can be leveraged for safety and energy minimization problems and to enhance predictions in unmodelled dynamics. This preliminary work outlines key ideas toward using limited data for effective control by integrating physical knowledge of the system and exploiting interpolation conditions.


Consensus on Open Multi-Agent Systems Over Graphs Sampled from Graphons

March 2025

·

6 Reads

We show how graphons can be used to model and analyze open multi-agent systems, which are multi-agent systems subject to arrivals and departures, in the specific case of linear consensus. First, we analyze the case of replacements, where under the assumption of a deterministic interval between two replacements, we derive an upper bound for the disagreement in expectation. Then, we study the case of arrivals and departures, where we define a process for the evolution of the number of agents that guarantees a minimum and a maximum number of agents. Next, we derive an upper bound for the disagreement in expectation, and we establish a link with the spectrum of the expected graph used to generate the graph topologies. Finally, for stochastic block model (SBM) graphons, we prove that the computation of the spectrum of the expected graph can be performed based on a matrix whose dimension depends only on the graphon and it is independent of the number of agents.


Pitman-Yor processes model a wide range of discrete count distributions and the PYC correctly predicts their correctness
a Empirical vs. estimated correctness for all 400 surveyed datasets, across all corpora. b–i Posterior predictive checks for the empirical frequencies XΦ. We report the rank-size distribution of empirical samples (black) and 95% CI sampled from the MAP estimate of the PYP (orange for empirical data, blue for synthetic data). We sample random frequencies of anonymity sets from π ~ PY(h*, γ*), using stick-breaking representations, to obtain 95% confidence intervals on the inferred probability mass functions. (Inset) Empirical (black dots) and expected correctness according to the PYC model (solid line) for a population size ranging from 1 to n individuals. b Demographics from the ADULT corpus (ADULT-1). c Demographics from the HDV corpus (HDV-1). d Demographics from the MIDUS corpus (MIDUS-1). e Browser fingerprints from the WEB corpus (WEB-1). f Demographics from the USA corpus (USA-1). g Synthetic Geometric corpus (GEOM-1). h Synthetic Poisson corpus (POISSON-1). i Synthetic Zipf corpus (ZIPF-1).
The PYC-MB extrapolation method captures the correctness more accurately than previously-used heuristics and rules of thumb
We perform measurement-based extrapolation of (a) exact, (b) sparse, and (c) robust matching attacks. We report the performance of the PYC-MB method compared to three other functional forms (ENT—Entropy baseline with no tail complexity, orange line; EXP—exponential decay function, green line; POL—polynomial function, red line; see Supplementary Note S3.2). We report the performance when trained on (a) exact matching (ADULT-1, using discrete demographics), (b) sparse matching (APPS-1, using 2 installed Android apps), (c) robust matching (GEO-1, ML-based mobile phone geolocation matching). We measure the empirical correctness up to μ ∈ {1%, 5%, 10%} of the original data and, for each sampling fraction μ, fit the four functional forms. We display the fitted correctness with solid color lines and the training part with a gray background. We display the empirical correctness with black dots. In all examples, the PYC-MB achieves high accuracy with good model specification. Figs. S1 to S17 include additional examples on all studied corpora and Tables S3 to S7 report RSME values for all samples and corpora.
Forecasting the correctness of popular identification techniques with the PYC-MB model
Each panel shows the empirical correctness κ (black dots) in four identification scenarios, along with our prediction κ̂\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\widehat{\kappa }$$\end{document} (solid blue line) fitted on the empirical κ scores. a Identification of mobile phone users from their pseudonymized 1-hop social network (IIG-1, n = 43, 000 phones) by Creţu et al.²⁵. b Facial recognition using Google FaceNet V8 (FACEREC-2, n = 1M faces) by Kemelmacher-Shlizerman et al.⁵⁶. c Authorship attribution in textual data using Deep Learning (TEXT-1, n = 500 authors) by Saedi et al.²⁹. d Exact matching using simple browser fingerprints (HTTP accept, cookies and JavaScript enabled, timezone, display size, installed fonts, plugins, user agent, video) collected by Panopticlick (WEB-2, n = 5.5M fingerprints)⁵⁷.
Regimes for the number of unique records
We report the expected number of population unique records E[n⋅Ξ∣h,γ]\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathbb{E}}[n\cdot \Xi \,| \,h,\gamma ]$$\end{document} for γ = − 1 (finite uniform distribution of anonymity sets; green square), γ = 0 (geometric tail; purple circle), and γ = 1 (heavy tail; orange cross), for a fixed entropy h = 10bits and a population ranging from n = 1 to 8B.
Criticality and regimes of correctness
We report the expected correctness E[κ∣h,γ]\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathbb{E}}[\kappa \,| \,h,\gamma ]$$\end{document} in two scenarios for a fixed world population of n = 7.53 billion people. a Effect of the tail complexity parameter γ on the expected correctness. Each line represents the correctness for a fixed entropy h from 10 to 60 bits, with color indicating the entropy h. b Effect of the entropy h on the expected correctness. Critical behaviors arise for exponential tails (γ = 0, top) but not for heavy tails (γ = 0.5, middle; γ = 1, bottom).
A scaling law to model the effectiveness of identification techniques

January 2025

·

24 Reads

AI techniques are increasingly being used to identify individuals both offline and online. However, quantifying their effectiveness at scale and, by extension, the risks they pose remains a significant challenge. Here, we propose a two-parameter Bayesian model for exact matching techniques and derive an analytical expression for correctness (κ), the fraction of people accurately identified in a population. We then generalize the model to forecast how κ scales from small-scale experiments to the real world, for exact, sparse, and machine learning-based robust identification techniques. Despite having only two degrees of freedom, our method closely fits 476 correctness curves and strongly outperforms curve-fitting methods and entropy-based rules of thumb. Our work provides a principled framework for forecasting the privacy risks posed by identification techniques, while also supporting independent accountability efforts for AI-based biometric systems.



Local Identifiability of Networks with Nonlinear Node Dynamics

December 2024

·

4 Reads

We study the identifiability of nonlinear network systems with partial excitation and partial measurement when the network dynamics is linear on the edges and nonlinear on the nodes. We assume that the graph topology and the nonlinear functions at the node level are known, and we aim to identify the weight matrix of the graph. Our main result is to prove that fully-connected layered feed-forward networks are generically locally identifiable by exciting sources and measuring sinks in the class of analytic functions that cross the origin. This holds even when all other nodes remain unexcited and unmeasured and stands in sharp contrast to most findings on network identifiability requiring measurement and/or excitation of each node. The result applies in particular to feed-forward artificial neural networks with no offsets and generalizes previous literature by considering a broader class of functions and topologies.


Random Coordinate Descent for Resource Allocation in Open Multi-Agent Systems

November 2024

·

9 Reads

·

14 Citations

IEEE Transactions on Automatic Control

·

·

Julien M. Hendrickx

·

[...]

·

Paolo Frasca

We propose a method for analyzing the distributed random coordinate descent algorithm for solving separable resource allocation problems in the context of an open multi-agent system, where agents can be replaced during the process. In particular, we characterize the evolution of the distance to the minimizer in expectation by following a time-varying optimization approach which builds on two components. First, we establish the linear convergence of the algorithm in closed systems, in terms of the estimate towards the minimizer, for general graphs and appropriate step-size. Second, we estimate the change of the optimal solution after a replacement, in order to evaluate its effect on the distance between the current estimate and the minimizer. From these two elements, we derive stability conditions in open systems and establish the linear convergence of the algorithm towards a steady-state expected error. Our results enable to characterize the trade-off between speed of convergence and robustness to agent replacements, under the assumptions that local functions are smooth, strongly convex, and have their minimizers located in a given ball. The approach proposed in this paper can moreover be extended to other algorithms guaranteeing linear convergence in closed system.


Convergence, Consensus and Dissensus in the Weighted-Median Opinion Dynamics

October 2024

·

78 Reads

·

7 Citations

IEEE Transactions on Automatic Control

Mechanistic and tractable mathematical models play a key role in understanding how social influence shapes public opinions. Recently, a weighted-median mechanism has been proposed as a new micro-foundation of opinion dynamics and validated via experimental data. Numerical studies indicate that this new mechanism recreates some non-trivial real-world features of opinion evolution. In this paper, we conduct a thorough analysis of the weighted-median opinion dynamics. We fully characterize the equilibria set, and establish the almost-sure convergence for any initial condition. Moreover, we prove a necessary and sufficient condition for the almost-sure convergence to consensus, as well as a sufficient condition for almost-sure dissensus. We related the rich dynamical bevaior of the weighted-median opinion dynamics to two delicate network structures: the cohesive sets and the decisive links. To complement our sufficient conditions for almost-sure dissensus, we further prove that, given the influence network, determining whether the system almost surely achieves persistent dissensus is NP-hard, which reflects the complexity the network topology contributes to opinion evolution.


Fig. 5. Symmetry full excitation/full measurement does not hold for this DAG.
Nonlinear identifiability of directed acyclic graphs with partial excitation and measurement

September 2024

·

5 Reads

We analyze the identifiability of directed acyclic graphs in the case of partial excitation and measurement. We consider an additive model where the nonlinear functions located in the edges depend only on a past input, and we analyze the identifiability problem in the class of pure nonlinear functions satisfying f(0)=0. We show that any identification pattern (set of measured nodes and set of excited nodes) requires the excitation of sources, measurement of sinks and the excitation or measurement of the other nodes. Then, we show that a directed acyclic graph (DAG) is identifiable with a given identification pattern if and only if it is identifiable with the measurement of all the nodes. Next, we analyze the case of trees where we prove that any identification pattern guarantees the identifiability of the network. Finally, by introducing the notion of a generic nonlinear network matrix, we provide sufficient conditions for the identifiability of DAGs based on the notion of vertex-disjoint paths.



Citations (57)


... Identifiability of nonlinear systems is even more challenging and far less studied in the literature. The recent work in [10]- [12] addresses nonlinear network identifiability with full/partial excitation and partial measurement when the dynamics is additive on the edges. In nonlinear systems, identifiability depends on network topology and the types of nonlinear functions involved. ...

Reference:

Local Identifiability of Networks with Nonlinear Node Dynamics
Nonlinear identifiability of directed acyclic graphs with partial excitation and measurement
  • Citing Conference Paper
  • December 2024

... In this context, initial functions and extensions are required to satisfy properties with the same parameters. Building on this work, such conditions were then obtained, e.g., for smooth Lipschitz functions [49], indicator functions of (strongly) convex sets [36,49,50], difference-of-convex functions and relatively smooth and convex functions [14], and (strongly) monotone, cocoercive, Lipschitz or linear operators [12,48], and for a variety of other classes of functions (see, e.g., [25,23] and a partial list provided in the, PEPit documentation [22]). A comparison of the different versions of an interpolation condition arising from these contexts is provided in [47, Section 2]. ...

Interpolation Conditions for Linear Operators and Applications to Performance Estimation Problems
  • Citing Article
  • September 2024

SIAM Journal on Optimization

... The numerical experiments of this section rely on the CVXPY [9] modeling language used in combination with the MOSEK semidefinite solver [1]. For computing (4) we directly implemented the online algorithms within the PEPit software [13]. In all those numerical experiments, we used L = D = 1. ...

PEPit: computer-assisted worst-case analyses of first-order optimization methods in Python
  • Citing Article
  • August 2024

Mathematical Programming Computation

... First, we consider the case of replacements of agents, which are used to model an arrival followed immediately by a departure [1], [23] or to approximate processes with similar rates of arrivals and departures such that the variations of the size of the system are almost negligible [21], [24], [25]. ...

Random Coordinate Descent for Resource Allocation in Open Multi-Agent Systems
  • Citing Article
  • November 2024

IEEE Transactions on Automatic Control

... Open multi-agent systems are a framework used to analyze networks subject to arrivals, departures or replacements of agents at a rate similar to the scale time of the process [1], [2]. This type of systems are essentially characterized by the agent internal dynamics, the evolution of the network and the arrivals and departures [3]. Due to the complexity of the system, most of the works focus mainly on the agent internal dynamics and the processes for arrivals and departures, neglecting the influence of the network dynamics (changes on the set of nodes and connections). ...

Trends and Questions in Open Multi-agent Systems
  • Citing Chapter
  • March 2024

Lecture Notes in Control and Information Sciences

... Intuitively, α controls how individuals perceive the attractiveness of distant opinions: α > 1 suggests that distant opinions are more attractive, as the marginal cost increases with opinion distance. For α = 2, the bestresponse dynamics coincide with the classic DeGroot model [2], [3]; On the other hand, α < 1 indicates that agents are more attracted by nearby opinions; α = 1 neutralizes the effect of opinion distance on opinion attractiveness and has been theoretically analyzed in [4]. ...

Convergence, Consensus and Dissensus in the Weighted-Median Opinion Dynamics
  • Citing Article
  • October 2024

IEEE Transactions on Automatic Control

... Second, this analysis approach-expressing the desired quantity in terms of non-negative quantities involving co-coercivities, smoothness inequalities, and sum-of-squares terms-is motivated by the Performance Estimation Problem (PEP) framework pioneered by [24]. PEP has been recently used in many min-max settings [77,78]. However, typical PEP approaches rely on (variations of the) elegant fact from (non-min-max) convex optimization that in order to prove the tightest possible convergence rates for a first-order algorithm, it is sufficient to only use function and gradient evaluations at the algorithm's iterates [81]. ...

Interpolation Constraints for Computing Worst-Case Bounds in Performance Estimation Problems
  • Citing Conference Paper
  • December 2023

... Identifiability of nonlinear systems is even more challenging and far less studied in the literature. The recent work in [10]- [12] addresses nonlinear network identifiability with full/partial excitation and partial measurement when the dynamics is additive on the edges. In nonlinear systems, identifiability depends on network topology and the types of nonlinear functions involved. ...

Nonlinear Network Identifiability: The Static Case

... The paper [8], while not proposing a synthesis method, presented a new set of necessary conditions for network identifiability in the context of partial excitation and measurement. For this same context, a different approach was proposed in [9], [10]; it is not based on the synthesis of a valid EMP, but on an efficient and fast algorithm that allows to check the validity of large numbers of EMPs. ...

Combinatorial Characterization for Global Identifiability of Separable Networks with Partial Excitation and Measurement
  • Citing Conference Paper
  • December 2023