From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Covert Channel-Based Transmitter Authentication in Controller Area Networks., , , , и . CoRR, (2019)Minimizing Convergence Error in Multi-Agent Systems via Leader Selection: A Supermodular Optimization Approach., , , и . CoRR, (2013)Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework., , , и . CoRR, (2014)Maximizing the Smallest Eigenvalue of a Symmetric Matrix: A Submodular Optimization Approach., , , и . CoRR, (2017)Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks., , , , и . IEEE Trans. Inf. Forensics Secur., 14 (9): 2300-2314 (2019)A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense., , , и . GameSec, том 9406 из Lecture Notes in Computer Science, стр. 3-21. Springer, (2015)Distributed online submodular maximization in resource-constrained networks., , , и . WiOpt, стр. 397-404. IEEE, (2014)A submodular optimization approach to leader-follower consensus in networks with negative edges., , , и . ACC, стр. 1346-1352. IEEE, (2017)On leader selection for performance and controllability in multi-agent systems., , и . CDC, стр. 86-93. IEEE, (2012)Minimal input selection for robust control., , , , , , и . CDC, стр. 2659-2966. IEEE, (2017)