Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed formation control with pose estimation in multi-robot systems., , , , and . ICCA, page 834-839. IEEE, (2013)Minimizing the Age of Information for Monitoring over a WiFi Network., , , and . GLOBECOM, page 383-388. IEEE, (2022)Age of Local Information for Fusion Freshness in Internet of Things., , and . ICCC, page 1-6. IEEE, (2023)Optimal Jamming Attack Strategy Against Wireless State Estimation: A Game Theoretic Approach., , , and . IECON, page 5989-5995. IEEE, (2018)A Systematic Study of Maximal Scheduling Algorithms in Multiradio Multichannel Wireless Networks., , , and . IEEE/ACM Trans. Netw., 23 (4): 1342-1355 (2015)Cooperative Message Authentication in Vehicular Cyber-Physical Systems., , , , and . IEEE Trans. Emerg. Top. Comput., 1 (1): 84-97 (2013)Joint Scheduling and Channel Allocation for Kalman Filtering Over Multihop WirelessHART Networks., , and . IEEE Trans. Ind. Informatics, 17 (5): 3555-3565 (2021)Promoting or Hindering: Stealthy Black-Box Attacks Against DRL-Based Traffic Signal Control., , , , , and . IEEE Internet Things J., 11 (4): 5816-5825 (February 2024)Probabilistic denial of service attack against remote state estimation over a Markov channel in cyber-physical systems., and . ASCC, page 946-951. IEEE, (2017)Sensing-Performance Tradeoff in Cognitive Radio Enabled Smart Grid., , , , , and . IEEE Trans. Smart Grid, 4 (1): 302-310 (2013)