Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Cyber Attack Detection Method in Networked Control Systems., , , and . IEEE Trans. Cybern., 48 (11): 3254-3264 (2018)Extending the Harris Index performance assessment technique: A plant-wide focus., , , and . AuCC, page 186-191. IEEE, (2016)Data-driven subspace-based distributed control and its algorithmic convergence., , , , , , and . AuCC, page 221-224. IEEE, (2015)Detection of Cyber Attacks on Leader-Following Multi-Agent Systems., , , , and . IECON, page 6243-6248. IEEE, (2019)Cyber-physical attacks detection in networked control systems with limited communication bandwidth., , , and . ANZCC, page 53-58. IEEE, (2017)Cooperation Among Autonomous Robots: Unsignalised Road Intersection Problem., , , and . DARS, page 151-160. Springer, (1998)An on-line process dead-time estimation algorithm., , , and . ASCC, page 339-344. IEEE, (2017)Real-time co-operative decision making & control systems., , and . ICAT, page 1-10. IEEE, (2011)Steps Toward Industry 5.0: Building "6S" Parallel Industries With Cyber-Physical-Social Intelligence., , , , , , , , , and . IEEE CAA J. Autom. Sinica, 10 (8): 1692-1703 (2023)The Emerging Intelligent Vehicles and Intelligent Vehicle Carriers Collaborative Systems., , , , , , , , and . IV, page 639-644. IEEE, (2024)