Author of the publication

A submodular optimization approach to controlled islanding under cascading failure.

, , , , , and . ICCPS, page 187-196. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games., , , , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 113-129. Springer, (2015)A host takeover game model for competing malware., , , , and . CDC, page 4523-4530. IEEE, (2015)Inorganic Rubidium Cation as an Enhancer for Photovoltaic Performance and Moisture Stability of HC(NH2)2PbI3 Perovskite Solar Cells, , , , , , , and . Advanced Functional Materials, 27 (16): n/a--n/a (2017)A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems., , , and . CoRR, (2013)Combinatorial Algorithms for Control of Biological Regulatory Networks., , , , and . CoRR, (2017)Athena 2.0: Contextualized Dialogue Management for an Alexa Prize SocialBot., , , , , , , , , and 5 other author(s). CoRR, (2021)Graph-based verification and misbehavior detection in multi-agent networks., , , , and . HiCoNS, page 77-84. ACM, (2014)MinGen: Minimal generator set selection for small signal stability in power systems: A submodular framework., , , , , and . CDC, page 4122-4129. IEEE, (2016)Jamming-based adversarial control of network flow allocation: A passivity approach., , , , and . ACC, page 4710-4716. IEEE, (2015)Exploring Privacy Breaches and Mitigation Strategies of Occupancy Sensors in Smart Buildings., , , , , and . TESCA, page 18-21. ACM, (2019)