Author of the publication

Collision avoidance method for multi-operator multi-robot teleoperation system.

, , , and . Robotica, 36 (1): 78-95 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacker Profiling Through Analysis of Attack Patterns in Geographically Distributed Honeypots., , and . CoRR, (2023)Collision avoidance method for multi-operator multi-robot teleoperation system., , , and . Robotica, 36 (1): 78-95 (2018)Survey on network-based botnet detection methods., , and . Secur. Commun. Networks, 7 (5): 878-903 (2014)Catch Me if You Can: Improving Adversaries in Cyber-Security with Q-Learning Algorithms., , , and . ICAART (3), page 442-449. SCITEPRESS, (2023)Observer Effect: How Intercepting HTTPS Traffic Forces Malware to Change Their Behavior., , and . CACIC, volume 790 of Communications in Computer and Information Science, page 272-281. Springer, (2017)The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning., and . ESORICS (4), volume 14347 of Lecture Notes in Computer Science, page 44-64. Springer, (2023)Growth and Commoditization of Remote Access Trojans., and . EuroS&P Workshops, page 454-462. IEEE, (2020)Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection., and . IEEE Symposium on Security and Privacy Workshops, page 70-75. IEEE Computer Society, (2018)Teleoperation of a mobile robot with time-varying delay and force feedback., , , and . Robotica, 30 (1): 67-77 (2012)Bridging the Explanation Gap in AI Security: A Task-Driven Approach to XAI Methods Evaluation., and . ICAART (3), page 1370-1377. SCITEPRESS, (2024)