Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacks on Distributed Sequential Control in Manufacturing Automation., , and . IEEE Trans. Ind. Informatics, 17 (2): 775-786 (2021)Distributing Sequential Control for Manufacturing Automation Systems., , , and . IEEE Trans. Control. Syst. Technol., 28 (4): 1586-1594 (2020)Context-Aware Temporal Logic for Probabilistic Systems., , and . ATVA, volume 12302 of Lecture Notes in Computer Science, page 215-232. Springer, (2020)Secure Planning Against Stealthy Attacks via Model-Free Reinforcement Learning., , and . CoRR, (2020)The Wireless Control Network: A New Approach for Control Over Networks., , , and . IEEE Trans. Autom. Control., 56 (10): 2305-2318 (2011)ε-Neural Thompson Sampling of Deep Brain Stimulation for Parkinson Disease Treatment., , and . CoRR, (2024)Fuzzy inference mechanism for recognition of contact states in intelligent robotic assembly., , , and . J. Intell. Manuf., 25 (3): 571-587 (2014)Integrating Security in Resource-Constrained Cyber-Physical Systems., , and . ACM Trans. Cyber Phys. Syst., 4 (3): 28:1-28:27 (2020)Vulnerability Analysis of Nonlinear Control Systems to Stealthy False Data Injection Attacks., and . CoRR, (2023)Robust architectures for embedded wireless network control and actuation., , and . ACM Trans. Embed. Comput. Syst., 11 (4): 82:1-82:24 (2012)