Author of the publication

Optimal innovation-based deception attack on remote state estimation.

, , , , and . ACC, page 3017-3022. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Textual Appropriation and Citing Behaviors of University Undergraduates. Applied Linguistics, (2010)Optimal Periodic Sensor Schedule for Steady-State Estimation Under Average Transmission Energy Constraint., , , , and . IEEE Trans. Automat. Contr., 58 (12): 3265-3271 (2013)Event-Based State Estimation of Hidden Markov Models Through a Gilbert-Elliott Channel., , , and . IEEE Trans. Automat. Contr., 62 (7): 3626-3633 (2017)Networked Control Systems over Correlated Wireless Fading Channels., , and . CoRR, (2016)Fake-acknowledgment attack on ACK-based sensor power schedule for remote state estimation., , , and . CDC, page 5795-5800. IEEE, (2015)State estimation of finite-state hidden Markov models subject to stochastically event-triggered measurements., , , and . CDC, page 3712-3717. IEEE, (2015)Deterministic Sensor Data Scheduling Under Limited Communication Resource., and . IEEE Trans. Signal Process., 59 (10): 5050-5056 (2011)Infinite Horizon Optimal Transmission Power Control for Remote State Estimation over Fading Channels., , , , and . CoRR, (2016)Optimal Design of a Conveyor-Based Automatic Sorting System., , , and . ICCA, page 1124-1129. IEEE, (2020)Performance analysis for cyber-physical systems under two types of stealthy deception attacks., , , , , and . Autom., (February 2024)