Author of the publication

Secure Planning Against Stealthy Attacks via Model-Free Reinforcement Learning.

, , and . ICRA, page 10656-10662. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Security in Resource-Constrained Cyber-Physical Systems., , and . ACM Trans. Cyber Phys. Syst., 4 (3): 28:1-28:27 (2020)Vulnerability Analysis of Nonlinear Control Systems to Stealthy False Data Injection Attacks., and . CoRR, (2023)Cyber-Attacks on Wheeled Mobile Robotic Systems with Visual Servoing Control., , , , and . IROS, page 6342-6348. (2023)The Wireless Control Network: A New Approach for Control Over Networks., , , and . IEEE Trans. Autom. Control., 56 (10): 2305-2318 (2011)Topological Conditions for In-Network Stabilization of Dynamical Systems., , , and . IEEE J. Sel. Areas Commun., 31 (4): 794-807 (2013)Fuzzy inference mechanism for recognition of contact states in intelligent robotic assembly., , , and . J. Intell. Manuf., 25 (3): 571-587 (2014)RadCloud: Real-Time High-Resolution Point Cloud Generation Using Low-Cost Radars for Aerial and Ground Vehicles., , , , , , and . CoRR, (2024)Datasets, Models, and Algorithms for Multi-Sensor, Multi-agent Autonomy Using AVstack., and . CoRR, (2023)Robust architectures for embedded wireless network control and actuation., , and . ACM Trans. Embed. Comput. Syst., 11 (4): 82:1-82:24 (2012)Security Analysis of Camera-LiDAR Semantic-Level Fusion Against Black-Box Attacks on Autonomous Vehicles., , and . CoRR, (2021)