Author of the publication

Jamming-based adversarial control of network flow allocation: A passivity approach.

, , , , and . ACC, page 4710-4716. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiscale Object-Based Classification and Feature Extraction along Arctic Coasts., , , and . Remote. Sens., 14 (13): 2982 (2022)Preface to the Special Issue on Privacy and Security for Internet of Things., , and . Int. J. Wirel. Inf. Networks, 29 (4): 405-406 (2022)LQG Reference Tracking With Safety and Reachability Guarantees Under Unknown False Data Injection Attacks., , and . IEEE Trans. Autom. Control., 68 (2): 1245-1252 (February 2023)A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats., , , , , , and . IEEE Trans. Autom. Control., 65 (12): 5248-5263 (2020)A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats., , , , , , and . CoRR, (2018)Flummox | Minimal, isomorphic Flux. (2015)Model-based Reinforcement Learning with Provable Safety Guarantees via Control Barrier Functions., , and . ICRA, page 792-798. IEEE, (2021)Using MOEAs To Outperform Stock Benchmarks In The Presence of Typical Investment Constraints, and . CoRR, (2011)A System for a Hand Gesture-Manipulated Virtual Reality Environment., and . SAICSIT, page 10:1-10:10. ACM, (2016)Abstraction-Free Control Synthesis to Satisfy Temporal Logic Constraints under Sensor Faults and Attacks., , and . CDC, page 1568-1575. IEEE, (2022)