165 results on '"Yasser Shoukry"'
Search Results
52. SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks.
53. SMC: Satisfiability Modulo Convex Programming.
54. Bounding the Complexity of Formally Verifying Neural Networks: A Geometric Approach.
55. Effective Formal Verification of Neural Networks using the Geometry of Linear Regions.
56. ShieldNN: A Provably Safe NN Filter for Unsafe NN Controllers.
57. SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks.
58. Scalable lazy SMT-based motion planning.
59. Privacy-aware quadratic optimization using partially homomorphic encryption.
60. Secure State Estimation Against Sensor Attacks in the Presence of Noise.
61. Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach.
62. Bio-inspired underwater electrolocation through adaptive system identification.
63. Sound and complete state estimation for linear dynamical systems under sensor attacks using Satisfiability Modulo Theory solving.
64. Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise.
65. PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks.
66. Secure state reconstruction in differentially flat systems under sensor attacks using satisfiability modulo theory solving.
67. AReN: Assured ReLU NN Architecture for Model Predictive Control of LTI Systems.
68. Securing State Estimation Under Sensor and Actuator Attacks: Theory and Design.
69. Event-Triggered State Observers for Sparse Sensor Noise/Attacks.
70. Social spring: encounter-based path refinement for indoor tracking systems.
71. ipShield: A Framework For Enforcing Context-Aware Privacy.
72. Event-triggered projected Luenberger observer for linear systems under sparse sensor attacks.
73. Minimax control for cyber-physical systems under network packet scheduling attacks.
74. Graph-based approach for software allocation in automotive networked embedded systems: A partition-and-map algorithm.
75. Non-invasive Spoofing Attacks for Anti-lock Braking Systems.
76. Input-output robustness for discrete systems.
77. Formal Verification of Neural Network Controlled Autonomous Systems.
78. Cloud-based Quadratic Optimization with Partially Homomorphic Encryption.
79. Networked embedded generalized predictive controller for an active suspension system.
80. Securing state reconstruction under sensor and actuator attacks: Theory and design.
81. Embedded software for robotics: challenges and future directions: special session.
82. An embedded implementation of the Generalized Predictive Control algorithm applied to automotive active suspension systems.
83. MPC-On-Chip: An Embedded GPC Coprocessor for Automotive Active Suspension Systems.
84. Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks.
85. A Satisfiability Modulo Theory Approach to Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks.
86. Secure State Estimation against Sensor Attacks in the Presence of Noise.
87. Secure State Estimation Under Sensor Attacks: A Satisfiability Modulo Theory Approach.
88. Security and Privacy in Cyber-Physical Systems: Physical Attacks and Countermeasures
89. Event-Triggered State Observers for Sparse Sensor Noise/Attacks.
90. The Secure State Estimation Problem
91. Privacy-aware quadratic optimization using partially homomorphic encryption
92. Practical Autodesk AutoCAD 2023 and AutoCAD LT 2023 : A Beginner's Guide to 2D Drafting and 3D Modeling with Autodesk AutoCAD
93. Non-invasive Spoofing Attacks for Anti-lock Braking Systems.
94. Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach
95. SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT
96. DoS-Resilient Multi-Robot Temporal Logic Motion Planning
97. Practical Autodesk AutoCAD 2021 and AutoCAD LT 2021 : A No-nonsense, Beginner's Guide to Drafting and 3D Modeling with Autodesk AutoCAD
98. AReN: Assured ReLU NN Architecture for Model Predictive Control of LTI Systems
99. A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area Network
100. Cloud-based Quadratic Optimization with Partially Homomorphic Encryption
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.