Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-Driven Distributed Online Learning Control for Islanded Microgrids., , and . IEEE J. Emerg. Sel. Topics Circuits Syst., 12 (1): 194-204 (2022)Optimal Bounded Ellipsoid Identification With Deterministic and Bounded Learning Gains: Design and Application to Euler-Lagrange Systems., , and . IEEE Trans. Cybern., 52 (10): 10800-10813 (2022)Intelligent control for robotic manipulator with adaptive learning rate and variable prescribed performance boundaries., , , and . J. Frankl. Inst., 360 (11): 7037-7062 (2023)A Trust-based Real-time Map Updating Scheme., , , and . ICCC, page 334-339. IEEE, (2019)SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems., , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 274-283. Springer, (2015)Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud., , and . ICCCS (2), volume 10603 of Lecture Notes in Computer Science, page 268-279. Springer, (2017)Classifying EEG Using Incremental Support Vector Machine in BCIs., , , , and . LSMS/ICSEE, volume 6330 of Lecture Notes in Computer Science, page 604-610. Springer, (2010)Viewing the Web as a Cube: The Vision and Approach., , and . APWeb, volume 3007 of Lecture Notes in Computer Science, page 903-906. Springer, (2004)Privacy-preserving genomic computation through program specialization., , , , , and . ACM Conference on Computer and Communications Security, page 338-347. ACM, (2009)Joint Optimal Channel Probing and Transmission in Collocated Wireless Networks., and . INFOCOM, page 2266-2270. IEEE, (2007)