Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tradeoffs in Stochastic Event-Triggered Control., , , and . IEEE Trans. Automat. Contr., 64 (6): 2567-2574 (2019)Power allocation for estimation outage minimization with secrecy outage constraints., , and . AusCTW, page 71-76. IEEE, (2016)On multi-sensor linear state estimation under high rate quantization., , and . ISCCSP, page 1-6. IEEE, (2012)On Scaling Laws of Diversity Schemes in Decentralized Estimation., and . IEEE Trans. Inf. Theory, 57 (7): 4740-4759 (2011)Distortion Outage Minimization in Distributed Estimation With Estimation Secrecy Outage Constraints., , and . IEEE Trans. Signal and Information Processing over Networks, 3 (1): 12-28 (2017)Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper., , , and . IEEE Trans. Automat. Contr., 64 (9): 3732-3739 (2019)Safe Learning of Uncertain Environments for Nonlinear Control-Affine Systems., , , and . CoRR, (2021)Finite Time Encryption Schedule in the Presence of an Eavesdropper with Operation Cost., , , and . ACC, page 4063-4068. IEEE, (2019)A Computationally-Friendly Data-Driven Safety Filter for Control-Affine Discrete-Time Systems Subject to Unknown Process Noise., , , and . ACC, page 3951-3956. IEEE, (2023)On the Use of Artificial Noise for Secure State Estimation in the Presence of Eavesdroppers., , , and . ECC, page 325-330. IEEE, (2018)