Author of the publication

Minimum Sparsity of Unobservable Power Network Attacks.

, , and . IEEE Trans. Automat. Contr., 62 (7): 3354-3368 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biprism-based monocular stereovision system parameter optimization., , , , and . J. Electronic Imaging, 27 (03): 033020 (2018)Practical Adversarial Attack Against Object Detector., , , , , and . CoRR, (2018)Self-learning interval type-2 fuzzy neural network controllers for trajectory control of a Delta parallel robot., , and . Neurocomputing, (2018)Yinyang K-Means: A Drop-In Replacement of the Classic K-Means with Consistent Speedup., , , , and . ICML, volume 37 of JMLR Workshop and Conference Proceedings, page 579-587. JMLR.org, (2015)Optimization and performance evaluation of a conical mirror based fluorescence molecular tomography imaging system., , , and . Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging, volume 9788 of SPIE Proceedings, page 97880R. SPIE, (2016)A Novel Sensor for Noninvasive Detection of In Situ Stem Water Content Based on Standing Wave Ratio., , and . J. Sensors, (2019)Interactive Second Language Learning from News Websites., , , , and . NLP-TEA@ACL/IJCNLP, page 34-42. Association for Computational Linguistics, (2015)Research on Query-by-Committee Method of Active Learning and Application., , and . ADMA, volume 4093 of Lecture Notes in Computer Science, page 985-991. Springer, (2006)Kernel k'-means Algorithm for Clustering Analysis., , and . ICIC (2), volume 7996 of Lecture Notes in Computer Science, page 234-243. Springer, (2013)Preoperative Prediction of Infection Stones Using Radiomics Features From Computed Tomography., , , , , , , , and . IEEE Access, (2019)