Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed formation control with pose estimation in multi-robot systems., , , , and . ICCA, page 834-839. IEEE, (2013)Optimal jamming attack schedule for remote state estimation with two sensors., , , and . J. Frankl. Inst., 355 (14): 6859-6876 (2018)Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee., , , , , and . CoRR, (2014)Cooperative Message Authentication in Vehicular Cyber-Physical Systems., , , , and . IEEE Trans. Emerg. Top. Comput., 1 (1): 84-97 (2013)Promoting or Hindering: Stealthy Black-Box Attacks Against DRL-Based Traffic Signal Control., , , , , and . IEEE Internet Things J., 11 (4): 5816-5825 (February 2024)Securely Solving Linear Algebraic Equations in a Distributed Framework Enhanced With Communication-Efficient Algorithms., , , , and . IEEE Trans. Netw. Sci. Eng., 7 (3): 1027-1042 (2020)Joint Scheduling and Channel Allocation for Kalman Filtering Over Multihop WirelessHART Networks., , and . IEEE Trans. Ind. Informatics, 17 (5): 3555-3565 (2021)A Systematic Study of Maximal Scheduling Algorithms in Multiradio Multichannel Wireless Networks., , , and . IEEE/ACM Trans. Netw., 23 (4): 1342-1355 (2015)Modeling and Detection Scheme for Zero-Dynamics Attack on Wind Power System., , , , , and . IEEE Trans. Smart Grid, 15 (1): 934-943 (January 2024)Building-Environment Control With Wireless Sensor and Actuator Networks: Centralized Versus Distributed., , , and . IEEE Trans. Ind. Electron., 57 (11): 3596-3605 (2010)