Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kogiso, Kiminao
add a person with the name Kogiso, Kiminao
 

Other publications of authors with the same name

Fault Analysis of Aging McKibben Pneumatic Artificial Muscle in Terms of its Model Parameters., , and . CCTA, page 398-403. IEEE, (2018)Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks., , and . IEEE Access, (2024)Application of game-theoretic learning to gray-box modeling of McKibben pneumatic artificial muscle systems., , and . IROS, page 5795-5802. IEEE, (2013)Secure Motion-Copying via Homomorphic Encryption., , and . CoRR, (2023)Rewrite Rules for Automated Depth Reduction of Encrypted Control Expressions with Somewhat Homomorphic Encryption., , , and . AIM, page 804-809. IEEE, (2022)Upper-Bound Analysis of Performance Degradation in Encrypted Control System.. ACC, page 1250-1255. IEEE, (2018)Encrypted Gain Scheduling with Quantizers for Stability Guarantee *., and . CDC, page 5628-5633. IEEE, (2021)Towards Provably Secure Encrypted Control Using Homomorphic Encryption*., and . CDC, page 7740-7745. IEEE, (2022)Constrained remote control of construction machine with time-varying delay and packet loss., , , , , and . Adv. Robotics, 37 (1-2): 46-60 (January 2023)Cyber-Secure Teleoperation With Encrypted Four-Channel Bilateral Control., , , , , and . CoRR, (2023)