Author of the publication

Power allocation for estimation outage minimization with secrecy outage constraints.

, , and . AusCTW, page 71-76. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper., , , and . IEEE Trans. Automat. Contr., 64 (9): 3732-3739 (2019)On multi-sensor linear state estimation under high rate quantization., , and . ISCCSP, page 1-6. IEEE, (2012)A Computationally-Friendly Data-Driven Safety Filter for Control-Affine Discrete-Time Systems Subject to Unknown Process Noise., , , and . ACC, page 3951-3956. IEEE, (2023)Finite Time Encryption Schedule in the Presence of an Eavesdropper with Operation Cost., , , and . ACC, page 4063-4068. IEEE, (2019)On the Use of Artificial Noise for Secure State Estimation in the Presence of Eavesdroppers., , , and . ECC, page 325-330. IEEE, (2018)On Kalman filtering with faded measurements., , and . Allerton, page 607-614. IEEE, (2008)Power allocation for estimation outage minimization with secrecy outage constraints., , and . AusCTW, page 71-76. IEEE, (2016)Power allocation for distortion minimization in distributed estimation with security constraints., , and . SPAWC, page 299-303. IEEE, (2014)Sensor Scheduling in Variance Based Event Triggered Estimation with Packet Drops., , and . CoRR, (2015)Analog envelop constrained filter with input uncertainty., , and . ISCAS (1), page 1008-1011. IEEE, (2004)