Author of the publication

Vulnerabilities in Lagrange-Based DMPC in the Context of Cyber-Security.

, , , and . ICAC, page 215-220. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ishii, Hideaki
add a person with the name Ishii, Hideaki
 

Other publications of authors with the same name

Monte Carlo and Las Vegas Randomized Algorithms for Systems and Control?, and . Eur. J. Control, 13 (2-3): 189-203 (2007)Randomized algorithms for synthesis of switching rules for multimodal systems., , and . IEEE Trans. Automat. Contr., 50 (6): 754-767 (2005)Remote control of LTI systems over networks with state quantization., and . Systems & Control Letters, 54 (1): 15-31 (2005)Hinfinity control with limited communication and message losses.. Systems & Control Letters, 57 (4): 322-331 (2008)Networked Control of Uncertain Systems over Data Rate Limited and Lossy Channels., and . IEICE Transactions, 96-A (5): 853-860 (2013)Design constraints and limits of networked feedback in disturbance attenuation: An information-theoretic analysis., , and . Automatica, (2017)Fundamental limitations and intrinsic limits of feedback: An overview in an information age., , and . Annual Reviews in Control, (2019)Tradeoffs in Networked Feedback Systems: From Information-Theoretic Measures to Bode-Type Integrals., , and . IEEE Trans. Automat. Contr., 62 (3): 1046-1061 (2017)Event-triggered control over unreliable networks subject to jamming attacks., , and . CDC, page 4818-4823. IEEE, (2015)A High-Accuracy Rotation Estimation Algorithm Based on 1D Phase-Only Correlation., , , , and . ICIAR, volume 4633 of Lecture Notes in Computer Science, page 210-221. Springer, (2007)