Author of the publication

Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems.

, , , , and . Neurocomputing, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee., , , , , and . CoRR, (2014)Distributed formation control with pose estimation in multi-robot systems., , , , and . ICCA, page 834-839. IEEE, (2013)Optimal jamming attack schedule for remote state estimation with two sensors., , , and . J. Frankl. Inst., 355 (14): 6859-6876 (2018)Promoting or Hindering: Stealthy Black-Box Attacks Against DRL-Based Traffic Signal Control., , , , , and . IEEE Internet Things J., 11 (4): 5816-5825 (February 2024)Building-Environment Control With Wireless Sensor and Actuator Networks: Centralized Versus Distributed., , , and . IEEE Trans. Ind. Electron., 57 (11): 3596-3605 (2010)Securely Solving Linear Algebraic Equations in a Distributed Framework Enhanced With Communication-Efficient Algorithms., , , , and . IEEE Trans. Netw. Sci. Eng., 7 (3): 1027-1042 (2020)Cooperative Message Authentication in Vehicular Cyber-Physical Systems., , , , and . IEEE Trans. Emerg. Top. Comput., 1 (1): 84-97 (2013)Joint Scheduling and Channel Allocation for Kalman Filtering Over Multihop WirelessHART Networks., , and . IEEE Trans. Ind. Informatics, 17 (5): 3555-3565 (2021)A Systematic Study of Maximal Scheduling Algorithms in Multiradio Multichannel Wireless Networks., , , and . IEEE/ACM Trans. Netw., 23 (4): 1342-1355 (2015)Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach., , , and . IEEE Trans. Parallel Distributed Syst., 25 (4): 1055-1065 (2014)