Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Games in Cyber-Physical Security: An Overview., and . Dyn. Games Appl., 9 (4): 884-913 (2019)Asynchronous Policy Evaluation in Distributed Reinforcement Learning over Networks., , , , and . CoRR, (2020)Distributed Adaptive Newton Methods with Globally Superlinear Convergence., , and . CoRR, (2020)Authors' reply to comments on 'Risk-sensitive adaptive trackers for strict-feedback systems with output-measurements'., and . IEEE Trans. Automat. Contr., (2006)Evolution of Social Power in Social Networks With Dynamic Topology., , , , and . IEEE Trans. Automat. Contr., 63 (11): 3793-3808 (2018)Information spread in networks: Control, games, and equilibria., and . ITA, page 1-10. IEEE, (2014)Stochastic Subgradient Algorithms for Strongly Convex Optimization Over Distributed Networks., , , and . IEEE Trans. Network Science and Engineering, 4 (4): 248-260 (2017)Bayesian decision aggregation in collaborative intrusion detection networks., , , and . NOMS, page 349-356. IEEE, (2010)A game-theoretic formulation of multi-agent resource allocation., , , , , and . Agents, page 349-356. ACM, (2000)Scalar Quadratic-Gaussian Soft Watermarking Games., , , and . GameSec, volume 9996 of Lecture Notes in Computer Science, page 215-234. Springer, (2016)