Author of the publication

Mitigation and Resiliency of Multi-Agent Systems Subject to Malicious Cyber Attacks on Communication Links.

, , , and . CCTA, page 857-862. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Information-Based Learning Approach to Dual Control., and . IEEE Trans. Neural Networks Learn. Syst., 26 (11): 2736-2748 (2015)Optimal contract design for effort-averse sensors., , and . Int. J. Control, 93 (3): 738-745 (2020)Modelling and Contouring Error Bounded Control of a Biaxial Industrial Gantry Machine., , , , and . CCTA, page 388-393. IEEE, (2019)Cyber Attack and Machine Induced Fault Detection and Isolation Methodologies for Cyber-Physical Systems., , , and . CoRR, (2020)On modularity in reactive control architectures, with an application to formal verification., , and . CoRR, (2020)Learning Safety Filters for Unknown Discrete-Time Linear Systems., , , and . IEEE Control. Syst. Lett., (2023)Target localization and circumnavigation by a non-holonomic robot., , , , , and . IROS, page 1227-1232. IEEE, (2012)Stability analysis for distributed perimeter controlled traffic networks., , and . ACC, page 809-814. IEEE, (2016)On reconstructability of quadratic utility functions from the iterations in gradient methods., , , and . Autom., (2016)Fault Detection and Mitigation in Kirchhoff Networks., , , and . IEEE Signal Process. Lett., 19 (11): 749-752 (2012)