Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Boxes to bees: Active learning in freshmen calculus., , , , , , , , and . EDUCON, page 59-68. IEEE, (2013)A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber-Physical Systems., , , and . Robotics Auton. Syst., (2017)Potential and optimal control of human head movement using Tait-Bryan parametrization., , , , , , and . Autom., 50 (2): 519-529 (2014)Structural control of single-input rank one bilinear systems., and . Autom., (2016)Sensitivity of Network Controllability to Weight-Based Edge Thresholding., and . CompleNet, volume 644 of Studies in Computational Intelligence, page 45-61. Springer, (2016)Optimal Control of Inhomogeneous Ensembles., and . IEEE Trans. Automat. Contr., 57 (8): 2021-2032 (2012)zonoLAB: A MATLAB toolbox for set-based control systems analysis using hybrid zonotopes., , , , , and . CoRR, (2023)LMI Framework for Set Reachability Inclusion in Discrete-Time LTI Systems., and . IEEE Trans. Autom. Control., 67 (6): 2997-3004 (2022)A Comparison of Stealthy Sensor Attacks on Control Systems., , and . ACC, page 973-979. IEEE, (2018)Gain Design via LMIs to Minimize the Impact of Stealthy Attacks., and . ACC, page 1274-1279. IEEE, (2020)