Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Encryption scheduling for remote state estimation under an operation constraint., , , , and . Autom., (2021)Branch and Bound in Mixed Integer Linear Programming Problems: A Survey of Techniques and Trends., , , , , , and . CoRR, (2021)LQG Control Over SWIPT-enabled Wireless Communication Network., , , , and . CoRR, (2023)Preserving Data-Privacy Cooperative Control of Discrete-Time Multi-Agent Systems., , , , , and . CDC, page 2415-2420. IEEE, (2023)Modeling of Driver Cut-in Behavior Towards a Platoon., , , , and . IEEE Trans. Intell. Transp. Syst., 23 (12): 24636-24648 (2022)Stochastic Event-Based Sensor Schedules for Remote State Estimation in Cognitive Radio Sensor Networks., , , , , and . IEEE Trans. Autom. Control., 66 (5): 2407-2414 (2021)Privacy-Preserving Push-Sum Average Consensus via State Decomposition., , , , and . IEEE Trans. Autom. Control., 68 (12): 7974-7981 (December 2023)Finite Time Encryption Schedule in the Presence of an Eavesdropper with Operation Cost., , , and . ACC, page 4063-4068. IEEE, (2019)Sensor Scheduling Design for Complex Networks under a Distributed State Estimation Framework., , , , and . CoRR, (2022)Modeling Driver Decision Behavior of the Cut-In Process., , , , and . IEEE Trans. Intell. Transp. Syst., 25 (5): 4133-4144 (May 2024)