PublicationsIf you are interested in any of the following works, please feel free to contact me.Sumbitted Papers[S1] Optimal DoS Attack and Proactive Deception Strategies on Remote State Estimation: Utilizing Subsystem Importance Journal Publications[J9]
Evolution of Cooperation within a Mixed Cooperative-Competitive Structured Population
[J8]
Optimal Privacy-preserving Transmission Schedule against Eavesdropping Attacks on Remote State Estimation
[J7]
A Two-network Adversarial Game Model, Strategy, and Structure
[J6]
Subsystem-importance-aware DoS Attacks and Countermeasures [J5]
Linear Attacks Against Remote State Estimation: Performance Analysis Under an Encryption Scheme [J4]
A Privacy-preserving Approach against Eavesdropping Attacks on Remote State Estimation for Cyber-physical Systems
[J3]
Rollout Approach to Sensor Scheduling for Remote State Estimation under Integrity Attack [J2] How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks [J1] An Online Approach to Physical Watermark Design Peer-reviewed Conference Publications[C7] Optimal Privacy-preserving Transmission Schedule against Eavesdropping Attacks on Remote State Estimation
[C6] Constrained Residual Race: An Efficient Hybrid Controller for Autonomous Racing
[C5] Importance-based DoS Attacks in Cyber-physical Systems
[C4]
Combining Deep Reinforcement Learning with Rule-based Constraints for Safe Highway Driving
[C3] Reinforcement Learning Based Approach for Flip Attack Detection
[C2] An Optimal Linear Attack Strategy on Remote State Estimation [C1] An On-line Design of Physical Watermarks
Book Chapter Publications[BC1] Active detection against replay attack: a survey on watermark design for cyber-physical systems |