Author of the publication

Resilient and constrained consensus against adversarial attacks: A distributed MPC framework.

, , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of analytic hierarchy process in the selection of transit route for large-scale cargo transportation., and . FSKD, page 598-602. IEEE, (2011)Throughput Maximization by Time Switching in Multipoint WBAN With Fairness Consideration., , , , , and . IEEE Access, (2020)Using Word Mover's Distance with Spatial Constraints for Measuring Similarity Between Mongolian Word Images., , , and . ICONIP (4), volume 10637 of Lecture Notes in Computer Science, page 192-201. Springer, (2017)A Combined Radial Basis Function Model for Fingerprint Distortion., , and . ICIAR (2), volume 4142 of Lecture Notes in Computer Science, page 286-296. Springer, (2006)Measurement-converted Kalman filter tracking with Gaussian intensity attenuation signal in wireless sensor networks., , , and . IJDSN, (2017)Considering altruism in peer-to-peer internet streaming broadcast., and . NOSSDAV, page 10-15. ACM, (2004)KnotPad: Visualizing and Exploring Knot Theory with Fluid Reidemeister Moves., , , and . IEEE Trans. Vis. Comput. Graph., 18 (12): 2051-2060 (2012)Visualizing 2-dimensional Manifolds with Curve Handles in 4D., , and . IEEE Trans. Vis. Comput. Graph., 20 (12): 2575-2584 (2014)On robust width property for Lasso and Dantzig selector.. CoRR, (2015)Detect Related Bugs from Source Code Using Bug Information, , , and . CoRR, (2011)