Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A formal verification approach to revealing stealth attacks on networked control systems., , , and . HiCoNS, page 67-76. ACM, (2014)Competitive Perimeter Defense of Conical Environments., , , , , , and . CoRR, (2021)A Multi-Fidelity Bayesian Approach to Safe Controller Design., , and . CoRR, (2023)Incentivizing Collaboration in Heterogeneous Teams via Common-Pool Resource Games., , and . IEEE Trans. Autom. Control., 68 (3): 1902-1909 (March 2023)Perimeter Defense Using a Turret with Finite Range and Startup Time., , , , and . ACC, page 3350-3355. IEEE, (2023)A Scenario Approach to Robust Simulation-based Path Planning., and . ACC, page 5024-5029. IEEE, (2022)Output-feedback Linear Quadratic Robust Control under Actuation and Deception Attacks., and . ACC, page 489-496. IEEE, (2019)Sequential randomized matrix factorization for Gaussian processes., and . IEEE BigData, page 3957-3959. IEEE Computer Society, (2016)Achieving Efficient Collaboration in Decentralized Heterogeneous Teams using Common-Pool Resource Games., , and . CDC, page 6924-6929. IEEE, (2019)Shortest Trajectory of a Dubins Vehicle with a Controllable Laser., , , , and . CoRR, (2024)