Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preface to the Special Issue on Privacy and Security for Internet of Things., , and . Int. J. Wirel. Inf. Networks, 29 (4): 405-406 (2022)Using MOEAs To Outperform Stock Benchmarks In The Presence of Typical Investment Constraints, and . CoRR, (2011)A System for a Hand Gesture-Manipulated Virtual Reality Environment., and . SAICSIT, page 10:1-10:10. ACM, (2016)Multiscale Object-Based Classification and Feature Extraction along Arctic Coasts., , , and . Remote. Sens., 14 (13): 2982 (2022)A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats., , , , , , and . IEEE Trans. Autom. Control., 65 (12): 5248-5263 (2020)LQG Reference Tracking With Safety and Reachability Guarantees Under Unknown False Data Injection Attacks., , and . IEEE Trans. Autom. Control., 68 (2): 1245-1252 (February 2023)Flummox | Minimal, isomorphic Flux. (2015)A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats., , , , , , and . CoRR, (2018)Model-based Reinforcement Learning with Provable Safety Guarantees via Control Barrier Functions., , and . ICRA, page 792-798. IEEE, (2021)LQG Reference Tracking with Safety and Reachability Guarantees under False Data Injection Attacks., , and . ACC, page 2950-2957. IEEE, (2019)