Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection in Adversarial Environments., , , and . IEEE Trans. Automat. Contr., 59 (12): 3209-3223 (2014)Secure detection with correlated binary sensors., and . ACC, page 3874-3879. IEEE, (2015)Large Deviations Performance of Consensus+Innovations Distributed Detection With Non-Gaussian Observations., , , , and . IEEE Trans. Signal Processing, 60 (11): 5987-6002 (2012)Distributed Inference Over Directed Networks: Performance Limits and Optimal Design., , , and . IEEE Trans. Signal Processing, 64 (13): 3308-3323 (2016)Stochastic Event-Triggered Sensor Schedule for Remote State Estimation., , , , , and . IEEE Trans. Automat. Contr., 60 (10): 2661-2675 (2015)Detecting Integrity Attacks on SCADA Systems., , and . IEEE Trans. Contr. Sys. Techn., 22 (4): 1396-1407 (2014)Distributed Detection over Time Varying Networks: Large Deviations Analysis, , , , and . CoRR, (2010)Optimal Threshold Policies for Robust Data Center Control., , , , and . CoRR, (2017)Minimum Sensor Placement for Robust Observability of Structured Complex Networks., , , , and . CoRR, (2015)A kernel-based learning approach to ad hoc sensor network localization., , and . TOSN, 1 (1): 134-152 (2005)