Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A formal verification approach to revealing stealth attacks on networked control systems., , , and . HiCoNS, page 67-76. ACM, (2014)Incentivizing Collaboration in Heterogeneous Teams via Common-Pool Resource Games., , and . IEEE Trans. Autom. Control., 68 (3): 1902-1909 (March 2023)A Multi-Fidelity Bayesian Approach to Safe Controller Design., , and . CoRR, (2023)Competitive Perimeter Defense of Conical Environments., , , , , , and . CoRR, (2021)Output-feedback Linear Quadratic Robust Control under Actuation and Deception Attacks., and . ACC, page 489-496. IEEE, (2019)Perimeter Defense Using a Turret with Finite Range and Startup Time., , , , and . ACC, page 3350-3355. IEEE, (2023)A Scenario Approach to Robust Simulation-based Path Planning., and . ACC, page 5024-5029. IEEE, (2022)Achieving Efficient Collaboration in Decentralized Heterogeneous Teams using Common-Pool Resource Games., , and . CDC, page 6924-6929. IEEE, (2019)Sequential randomized matrix factorization for Gaussian processes., and . IEEE BigData, page 3957-3959. IEEE Computer Society, (2016)Shortest Trajectory of a Dubins Vehicle with a Controllable Laser., , , , and . CoRR, (2024)