Author of the publication

Synthesis of the Supremal Covert Attacker Against Unknown Supervisors by Using Observations.

, , , and . IEEE Trans. Autom. Control., 68 (6): 3453-3468 (June 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reinforcement learning-based algorithm for efficient and adaptive forwarding in named data networking., , , and . ICCC, page 1-6. IEEE, (2017)An Interval Intuitionistic Fuzzy VIKOR Evaluation Method Based on Unknown Weight., , , , and . ICNC-FSKD, volume 1074 of Advances in Intelligent Systems and Computing, page 836-844. Springer, (2019)A Multi-attribute Decision Making Method Based on Interval Pythagorean Fuzzy Language and the PROMETHEE Method., , , , and . ICNC-FSKD, volume 1074 of Advances in Intelligent Systems and Computing, page 818-826. Springer, (2019)LOCP: Latency-optimized channel pruning for CNN inference acceleration on GPUs., , , , , , , , and . J. Supercomput., 79 (13): 14313-14341 (September 2023)Synthesis of Supremal Successful Normal Actuator Attackers on Normal Supervisors., , , , , and . ACC, page 5614-5619. IEEE, (2019)A Topological Approach for Computing Supremal Sublanguages., , and . ICARCV, page 1015-1019. IEEE, (2020)Synthesis of Covert Sensor Attacks in Networked Discrete-Event Systems with Non-FIFO Channels., , , and . CoRR, (2021)A Dielectric Elastomer-Based Multimodal Capacitive Sensor., , and . Sensors, 22 (2): 622 (2022)Observation-Assisted Heuristic Synthesis of Covert Attackers Against Unknown Supervisors., , , and . CoRR, (2021)Synthesis of Actuator Attackers for Free., , and . CoRR, (2019)