Author of the publication

State constrained stochastic optimal control for continuous and hybrid dynamical systems using DFBSDE.

, , , and . Autom., (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Upper Bound for the Distribution Overlap Index and Its Applications., , , and . CoRR, (2022)R-LPIPS: An Adversarially Robust Perceptual Similarity Metric., , , , and . CoRR, (2023)Pop Quiz! Can a Large Language Model Help With Reverse Engineering?, , , , , and . CoRR, (2022)Differential Analysis of Triggers and Benign Features for Black-Box DNN Backdoor Detection., , , and . IEEE Trans. Inf. Forensics Secur., (2023)HPC-Based Malware Detectors Actually Work: Transition to Practice After a Decade of Research., , , , , and . IEEE Des. Test, 39 (4): 23-32 (2022)Adaptive nonlinear excitation control of power systems with unknown interconnections., , and . IEEE Trans. Contr. Sys. Techn., 2 (4): 436-446 (1994)A Golden-Free Approach to Detect Trojans in COTS Multi-PCB Systems., , , , , and . IEEE Micro, 43 (5): 64-76 (September 2023)Robust adaptive prescribed-time stabilization via output feedback for uncertain nonlinear strict-feedback-like systems., , and . Eur. J. Control, (2020)A Deep Neural Network Algorithm for Linear-Quadratic Portfolio Optimization With MGARCH and Small Transaction Costs., , , and . IEEE Access, (2023)A Feature-Based On-Line Detector to Remove Adversarial-Backdoors by Iterative Demarcation., , , , and . IEEE Access, (2022)