Author of the publication

Finite Time Encryption Schedule in the Presence of an Eavesdropper with Operation Cost.

, , , and . ACC, page 4063-4068. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the use of a relay for Kalman filtering over packet dropping links., and . ACC, page 3320-3325. IEEE, (2013)On the identification of FIR systems with binary input and output observations., , and . CDC, page 2932-2937. IEEE, (2016)Pricing and Selection of Channels for Remote State Estimation Using a Stackelberg Game Framework., , , and . IEEE Trans. Signal and Information Processing over Networks, 5 (4): 657-668 (2019)Co-design of jump estimators and transmission policies for wireless multi-hop networks with fading channels., , , , and . Autom., (2017)Analog envelop constrained filter with input uncertainty., , and . ISCAS (1), page 1008-1011. IEEE, (2004)Sensor Scheduling in Variance Based Event Triggered Estimation with Packet Drops., , and . CoRR, (2015)Power allocation for distortion minimization in distributed estimation with security constraints., , and . SPAWC, page 299-303. IEEE, (2014)On Network Topology Reconfiguration for Remote State Estimation., , , and . IEEE Trans. Autom. Control., 61 (12): 3842-3856 (2016)On the optimality of threshold policies in event triggered estimation with packet drops., , and . ECC, page 927-933. IEEE, (2015)A Game-Theoretic Approach to Covert Communications., , and . PIMRC, page 1-6. IEEE, (2020)