Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning Methods for Attack Detection in the Smart Grid., , , , and . CoRR, (2015)Multicasting in Large Wireless Networks: Bounds on the Minimum Energy per Bit, , and . CoRR, (2009)Distributed Learning in Wireless Sensor Networks, , and . CoRR, (2005)Robust and Low Complexity Distributed Kernel Least Squares Learning in Sensor Networks., and . IEEE Signal Process. Lett., 17 (4): 355-358 (2010)Multiagent Reinforcement Learning Based Spectrum Sensing Policies for Cognitive Radio Networks., , , and . IEEE J. Sel. Top. Signal Process., 7 (5): 858-868 (2013)Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models., , , , and . IEEE J. Sel. Areas Commun., 31 (7): 1306-1318 (2013)A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security., , , , , , and . Proc. VLDB Endow., 12 (12): 1802-1805 (2019)Attribute-Distributed Learning: Models, Limits, and Algorithms., , and . IEEE Trans. Signal Process., 59 (1): 386-398 (2011)Dimension expansion and customized spring potentials for sensor localization., , and . EURASIP J. Adv. Signal Process., (2013)Universal entropy estimation via block sorting., , and . IEEE Trans. Inf. Theory, 50 (7): 1551-1561 (2004)