Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regression Estimation from an Individual Stable Sequence, , and . Statistics, 33 (2): 99--118 (1999)Finite-time lower bounds for the two-armed bandit problem., and . IEEE Trans. Automat. Contr., 45 (4): 711-714 (2000)Introduction to the Issue on Signal Processing Methods in Finance and Electronic Trading., , , and . J. Sel. Topics Signal Processing, 6 (4): 297 (2012)Machine Learning Methods for Attack Detection in the Smart Grid., , , , and . CoRR, (2015)Distributed Learning in Wireless Sensor Networks, , and . CoRR, (2005)Multicasting in Large Wireless Networks: Bounds on the Minimum Energy per Bit, , and . CoRR, (2009)Robust and Low Complexity Distributed Kernel Least Squares Learning in Sensor Networks., and . IEEE Signal Process. Lett., 17 (4): 355-358 (2010)Multiagent Reinforcement Learning Based Spectrum Sensing Policies for Cognitive Radio Networks., , , and . IEEE J. Sel. Top. Signal Process., 7 (5): 858-868 (2013)Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models., , , , and . IEEE J. Sel. Areas Commun., 31 (7): 1306-1318 (2013)A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security., , , , , , and . Proc. VLDB Endow., 12 (12): 1802-1805 (2019)