Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Game of Age of Incorrect Information Against an Adversary Injecting False Data., , , and . CSR, page 347-352. IEEE, (2023)Design and Implementation of a State Observer for a Flexible Robot., and . ICRA (3), page 204-209. IEEE Computer Society Press, (1993)Virtual industrial training: Joining innovative interfaces with plant modeling., , , and . ITHET, page 1-6. IEEE, (2012)Assessing the Impact of Cyber Attacks on Interdependent Physical Systems., , , and . Critical Infrastructure Protection, volume 417 of IFIP Advances in Information and Communication Technology, page 215-227. Springer, (2013)Online Distributed Interdependency Estimation with Partial Information Sharing., , , and . COMPENG, page 82-84. IEEE Computer Society, (2010)Point to Point Learning Control of a Two-Link Flexible Arm., , and . ISER, volume 200 of Lecture Notes in Control and Information Sciences, page 545-560. Springer, (1993)Influence of Topological Features on Spatially-Structured Evolutionary Algorithms Dynamics, , and . CoRR, (2012)A networked transferable belief model approach for distributed data aggregation - Dynamic version., , , and . CDC, page 1237-1242. IEEE, (2010)Discrete-time LTI fuzzy systems: Stability and representation., , and . CDC, page 6181-6186. IEEE, (2012)INFUSION: A system for situation and threat assessment in current and foreseen scenarios., and . CogSIMA, page 316-323. IEEE, (2012)