Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing State Estimation Under Sensor and Actuator Attacks: Theory and Design., , , and . CoRR, (2019)From nonlinear to Hamiltonian via feedback., and . IEEE Trans. Autom. Control., 48 (8): 1439-1442 (2003)Guest Editorial Special Issue on Control of Cyber-Physical Systems., , , and . IEEE Trans. Autom. Control., 59 (12): 3120-3121 (2014)Underminer: a framework for automatically identifying non-converging behaviors in black box system models., , , , and . EMSOFT, page 7:1-7:10. ACM, (2016)Model Checking LTL over Controllable Linear Systems Is Decidable., and . HSCC, volume 2623 of Lecture Notes in Computer Science, page 498-513. Springer, (2003)Pessoa 2.0: a controller synthesis tool for cyber-physical systems., , and . HSCC, page 315-316. ACM, (2011)On compositional symbolic controller synthesis inspired by small-gain theorems., and . CDC, page 6133-6138. IEEE, (2015)Attack-resilient state estimation in the presence of noise., , , and . CDC, page 5827-5832. IEEE, (2015)Learned Uncertainty Calibration for Visual Inertial Localization., , , and . ICRA, page 5311-5317. IEEE, (2021)Persistent Connected Power Constrained Surveillance with Unmanned Aerial Vehicles., , , and . IROS, page 1501-1508. IEEE, (2020)