Author of the publication

On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks.

, and . IEEE Trans. Automat. Contr., 61 (9): 2618-2624 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Threshold Policies for Robust Data Center Control., , , , and . CoRR, (2017)Detecting Integrity Attacks on SCADA Systems., , and . IEEE Trans. Contr. Sys. Techn., 22 (4): 1396-1407 (2014)A kernel-based learning approach to ad hoc sensor network localization., , and . ACM Trans. Sens. Networks, 1 (1): 134-152 (2005)Foundations of Control and Estimation Over Lossy Networks., , , , and . Proc. IEEE, 95 (1): 163-187 (2007)Large Deviations Performance of Consensus+Innovations Distributed Detection With Non-Gaussian Observations., , , , and . IEEE Trans. Signal Process., 60 (11): 5987-6002 (2012)Network observability for source localization in graphs with unobserved edges., , , and . GlobalSIP, page 857-861. IEEE, (2014)Modeling Dynamical Phenomena in the Era of Big Data., and . Principles of Modeling, volume 10760 of Lecture Notes in Computer Science, page 162-181. Springer, (2018)A Linear Programming Approach to Computing Safe Sets for Software Rejuvenation., , , , and . IEEE Control. Syst. Lett., (2022)Stochastic Event-Triggered Sensor Schedule for Remote State Estimation., , , , , and . IEEE Trans. Autom. Control., 60 (10): 2661-2675 (2015)Detection in Adversarial Environments., , , and . IEEE Trans. Autom. Control., 59 (12): 3209-3223 (2014)