Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation                
                						            
                     
                         
        
        
            
                
                
                    Optimal False Data Injection Attack against Automatic Generation Control in Power Grids                
                						            
                     
                         
        
        
            
                
                
                    Optimal HEVC Configuration for Wireless Video Communication Under Energy Constraints                
                						            
                     
                         
        
        
            
                
                
                    Perception, Planning, Control, and Coordination for Autonomous Vehicles                
                						            
                     
                         
        
        
            
                
                
                    Personalized Itinerary Recommendation with Queuing Time Awareness                
                						            
                     
                         
        
        
            
                
                
                    Personalized Recommendation of Travel Itineraries based on Tourist Interests and Preferences                
                						            
                     
                         
        
        
            
                
                
                    Personalized Tour Recommendation based on User Interests and Points of Interest Visit Durations                
                						            
                     
                         
        
        
            
                
                
                    PersTour: A Personalized Tour Recommendation and Planning System                
                						            
                     
                         
        
        
            
                
                
                    Physical Loci: Leveraging Spatial, Object and Semantic Memory for Command Selection                
                						            
                     
                         
        
        
            
                
                
                    Physical-Layer Secret Key Generation with Colluding Un- trusted Relays                
                						            
                     
         									 
			 
		 
		 
 
		
		We use cookies to ensure you get the best experience on our website. By selecting “I agree”, you consent to our use of cookies.