Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Cyber-Attacks in Automotive Traffic Using Macroscopic Models and Gaussian Processes., , and . IEEE Control. Syst. Lett., (2022)CRNN-based UAV Detection using Acoustic Signature., , and . iSES, page 186-190. IEEE, (2023)Routing and traffic engineering in hybrid RF/FSO networks., and . ICC, page 3427-3433. IEEE, (2005)PDE-based Analysis of Automotive Cyber-Attacks in Imperfect Information Scenarios., , , and . ACC, page 1478-1484. IEEE, (2021)Robust Collision Avoidance of Quadric and Polygonal Surfaces Moving in Planar Environments., , and . CDC, page 7117-7124. IEEE, (2023)Modeling and Detection of Cyber-Attacks on Highway Networks Using a 2D-LWR Model and Gaussian Processes., , and . ACC, page 1764-1770. IEEE, (2024)Design and test of biologically inspired multi-fiber Hydro Muscle actuated ankle., , , , , and . ARSO, page 1-7. IEEE, (2017)Stability Analysis of Two-Species PDE Traffic Models in Cyber-Attack Scenarios., , and . CDC, page 3330-3336. IEEE, (2021)Robust design of wireless networks.. University of Maryland, College Park, MD, USA, (2006)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/4118).Robust Detection of Copy-Move Forgery Based on Wavelet Decomposition and Firefly Algorithm., , and . Comput. J., 65 (4): 983-996 (2022)