From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Opportunities and Challenges in Monitoring Cyber-Physical Systems Security., , и . ISoLA (4), том 11247 из Lecture Notes in Computer Science, стр. 9-18. Springer, (2018)Deep Imitative Reinforcement Learning for Temporal Logic Robot Motion Planning with Noisy Semantic Observations., , и . ICRA, стр. 8490-8496. IEEE, (2020)Off-Policy Evaluation for Human Feedback., , , , , и . CoRR, (2023)Spatio-Temporal Techniques for Anti-Jamming in Embedded Wireless Networks., и . EURASIP J. Wirel. Commun. Netw., (2010)Lightweight Verification of Hyperproperties., , , , , , и . ATVA, том 14216 из Lecture Notes in Computer Science, стр. 3-25. Springer, (2023)Optimal Myopic Attacks on Nonlinear Estimation., , и . CDC, стр. 5480-5485. IEEE, (2022)Power-aware communication for wireless sensor-actuator systems., , , и . CDC, стр. 4006-4011. IEEE, (2013)Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks., , , и . IEEE Trans. Control. Netw. Syst., 4 (1): 106-117 (2017)Attack-Resilient State Estimation for Noisy Dynamical Systems., , и . IEEE Trans. Control. Netw. Syst., 4 (1): 82-92 (2017)Adaptive Droplet Routing for MEDA Biochips via Deep Reinforcement Learning., , , и . DATE, стр. 640-645. IEEE, (2022)