Author of the publication

Boundary Defense Against Cyber Threat for Power System State Estimation.

, , , and . IEEE Trans. Inf. Forensics Secur., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal decentralized control problem as a rank-constrained optimization.. Allerton, page 39-45. IEEE, (2013)Convexification of generalized network flow problem., , and . Math. Program., 173 (1-2): 353-391 (2019)Inverse function theorem for polynomial equations using semidefinite programming., , and . CDC, page 6589-6596. IEEE, (2015)Convex analysis of generalized flow networks., and . CDC, page 1569-1576. IEEE, (2015)Simultaneous LQ control of a set of LTI systems using constrained generalized sampled-data hold functions., and . Autom., 43 (2): 274-280 (2007)LQ suboptimal decentralised controllers with disturbance rejection property for hierarchical systems., , and . Int. J. Control, 81 (11): 1720-1732 (2008)Large-Scale Traffic Signal Offset Optimization., , , and . CoRR, (2019)Conic Optimization for Quadratic Regression Under Sparse Noise., , and . J. Mach. Learn. Res., (2020)A Survey of Distributed Optimization and Control Algorithms for Electric Power Systems., , , , , , and . IEEE Trans. Smart Grid, 8 (6): 2941-2962 (2017)Guest Editorial Distributed Control and Efficient Optimization Methods for Smart Grid., , , , , , and . IEEE Trans. Smart Grid, 8 (6): 2939-2940 (2017)