Author of the publication

Error variance-constrained ∞ filtering for a class of nonlinear stochastic systems with degraded measurements: the finite horizon case.

, , , and . Int. J. Systems Science, 43 (12): 2361-2372 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliable H∞ control for a class of nonlinear time-varying stochastic systems with randomly occurring sensor failures., , , and . Int. J. Systems Science, 45 (7): 1383-1392 (2014)Error variance-constrained ∞ filtering for a class of nonlinear stochastic systems with degraded measurements: the finite horizon case., , , and . Int. J. Systems Science, 43 (12): 2361-2372 (2012)Envelope-constrained H∞ filtering for nonlinear systems with quantization effects: The finite horizon case., , , and . Autom., (2018)Ultimately Bounded PID Control for T-S Fuzzy Systems Under FlexRay Communication Protocol., , , , and . IEEE Trans. Fuzzy Syst., 31 (12): 4308-4320 (December 2023)Private Synchronization Control of Complex Networks Against Eavesdropping Attacks: A Differential Privacy Scheme., , , , and . IEEE Trans. Netw. Sci. Eng., 11 (3): 3028-3038 (May 2024)A survey on privacy-preserving control and filtering of networked control systems., , , and . Int. J. Syst. Sci., 55 (11): 2269-2288 (August 2024)Event-based distributed information fusion over sensor networks., , and . Inf. Fusion, (2018)Event-triggered regional stabilization for T-S fuzzy systems subject to communication delays and actuator saturations., , , and . J. Frankl. Inst., 361 (4): 106653 (2024)Passivity analysis for discrete-time neural networks with mixed time-delays and randomly occurring quantization effects., , and . Neurocomputing, (2016)Consensus control for nonlinear multi-agent systems subject to deception attacks., , and . ICAC, page 21-26. IEEE, (2016)