Author of the publication

A polynomial-time method to find the sparsest unobservable attacks in power networks.

, , and . ACC, page 276-282. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Truncated power control in code-division multiple-access communications., and . IEEE Trans. Vehicular Technology, 49 (3): 965-972 (2000)Generalized Capacity and Source-Channel Coding for Packet Erasure Channels., , and . GLOBECOM, page 951-955. IEEE, (2008)Antenna Array Processing in Fading and Interference: An Interference-Cancellation vs. Diversity Comparative Performance., and . ICC, page 1108-1113. IEEE, (2007)Adaptive Channel Reuse in Cellular Systems., and . ICC, page 857-862. IEEE, (2007)Recursive Power Allocation in Gaussian Layered Broadcast Coding with Successive Refinement., , , and . ICC, page 889-896. IEEE, (2007)One-Bit Null Space Learning for MIMO underlay cognitive radio., and . ITA, page 1-7. IEEE, (2013)Analysis of MIMO Beamforming with Channel Response Variations Over the Frame Interval., , , and . GLOBECOM, page 1597-1601. IEEE, (2007)Shannon meets Nyquist: Capacity limits of sampled analog channels., , and . ICASSP, page 3104-3107. IEEE, (2011)ViterbiNet: A Deep Learning Based Viterbi Algorithm for Symbol Detection., , , and . CoRR, (2019)Source Transmission over Relay Channel with Correlated Relay Side Information., , , and . ISIT, page 611-615. IEEE, (2007)