Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breath: A Self-Adapting Protocol for Wireless Sensor Networks in Control and Automation., , , , and . SECON, page 323-331. IEEE, (2008)Predictive control over wireless multi-hop networks., , , , and . CCA, page 1037-1042. IEEE, (2007)Secure Estimation and Zero-Error Secrecy Capacity., , , , , and . IEEE Trans. Automat. Contr., 64 (3): 1047-1062 (2019)Partial and full attitude synchronization of multiple underactuated spacecraft., , and . ISCCSP, page 479-482. IEEE, (2014)Examples of distance-based synchronization: An extremum seeking approach., , , and . Allerton, page 366-373. IEEE, (2013)Scalable scheduling algorithms for wireless networked control systems., , , , , and . CASE, page 409-414. IEEE, (2009)Network Scheduling and Control Co-Design for Multi-Loop MPC., , , , and . IEEE Trans. Automat. Contr., 64 (12): 5238-5245 (2019)Optimal Linear Cyber-Attack on Remote State Estimation., , , and . IEEE Trans. Control. Netw. Syst., 4 (1): 4-13 (2017)Cloud-Supported Formation Control of Second-Order Multiagent Systems., , , and . IEEE Trans. Control. Netw. Syst., 5 (4): 1563-1574 (2018)Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation., , , and . IEEE Trans. Control. Netw. Syst., 6 (1): 48-59 (2019)