Author of the publication

Medium access scheduling for input reconstruction under deception attacks.

, , and . J. Frankl. Inst., 354 (9): 3678-3689 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Medium access scheduling for input reconstruction under deception attacks., , and . J. Frankl. Inst., 354 (9): 3678-3689 (2017)Security challenges in autonomous vehicles: a case study of Camera and LiDAR sensors., , and . ATSIP, page 212-217. IEEE, (2024)Identification of the dynamic parameters of the planar robot model at 2 degrees of freedom using the least squares method., , , , and . ATSIP, page 1-5. IEEE, (2022)High level Petri nets-based proposal of an integrated intrusion detection and prevention mechanism in network controlled systems., , and . IET Commun., 17 (4): 469-477 (March 2023)Fault Detection and Diagnosis for Building Systems: New Challenges., , , , and . SSD, page 832-837. IEEE, (2018)State filtering with intermittent unknown input and retransmission delay., , , , and . SSD, page 219-224. IEEE, (2019)Diagnosis in buildings: New trends illustrated by an application., , , , and . ICCAD, page 1-6. IEEE, (2019)Determining the Dynamic Parameters of a Robot Using the Method of Instrument Variables., , and . SSD, page 184-189. IEEE, (2023)Integrated prevention mechanism based on high level Petri nets., , and . SSD, page 1033-1038. IEEE, (2023)Synergetic Theory for Observation of Triangular Systems., , and . SSD, page 548-553. IEEE, (2018)