Author of the publication

Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs.

, , , , , , , , and . MILCOM, page 1065-1069. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TCP/IP and Mobile IP over asymmetric wireless links., , , and . Space Communications, 16 (4): 207-214 (2000)Estimation and inference in sur models when the number of equations is large, and . Econometric Reviews, 19 (1): 105--130 (2000)Bootstrap prediction intervals for autoregression using asymptotically mean-unbiased estimators. International Journal of Forecasting, 20 (1): 85--97 (00 2004)Improved interval estimation of long run response from a dynamic linear model: A highest density region approach., , and . Comput. Stat. Data Anal., 55 (8): 2477-2489 (2011)Approaches to Quality of Service in High-Performance Networks., and . PCRCW, volume 1417 of Lecture Notes in Computer Science, page 1-20. Springer, (1997)Hidden Markov models with divergence based vector quantized variances., , and . ICASSP, page 125-128. IEEE Computer Society, (1999)Asymptotic and bootstrap prediction regions for vector autoregression. International Journal of Forecasting, 15 (4): 393--403 (October 1999)The Impact of Packetization in Wormhole-Routed Networks., and . PARLE, volume 694 of Lecture Notes in Computer Science, page 242-253. Springer, (1993)Experience with the host identity protocol for secure host mobility and multihoming., , and . WCNC, page 2120-2125. IEEE, (2003)DiffQ: Differential Backlog Congestion Control for Wireless Multi-hop Networks., , , , and . SECON, page 585-587. IEEE, (2008)