1 |
The Vulnerability of Cyber-Physical System Under Stealthy Attacks Sui TJ, Mo YL, Marelli D, Sun XM, Fu MY IEEE Transactions on Automatic Control, 66(2), 637, 2021 |
2 |
Analysis and Synthesis of MIMO Multi-Agent Systems Using Network Optimization Sharf M, Zelazo D IEEE Transactions on Automatic Control, 64(11), 4512, 2019 |
3 |
Switching Script capital L-2 gain for evaluating the fluctuations in transient responses after an unpredictable system switch Suyama K, Sebe N International Journal of Control, 92(5), 1084, 2019 |
4 |
Composability and controllability of structural linear time-invariant systems: Distributed verification Carvalho JF, Pequito S, Aguiar AP, Kar S, Johansson KH Automatica, 78, 123, 2017 |
5 |
A region-dependent gain condition for asymptotic stability Shiromoto HS, Andrieu V, Prieur C Automatica, 52, 309, 2015 |
6 |
Tracking Control for Hybrid Systems With State-Triggered Jumps Biemond JJB, van de Wouw N, Heemels WPMH, Nijmeijer H IEEE Transactions on Automatic Control, 58(4), 876, 2013 |
7 |
Thermoeconomic approach for the analysis of control system of energy plants Verda V, Baccino G Energy, 41(1), 38, 2012 |
8 |
Implicit discrete-time systems and accessibility Rieger K, Schlacher K Automatica, 47(9), 1849, 2011 |
9 |
Characterization of a complementary sensitivity property in feedback control: An information theoretic approach Okano K, Hara S, Ishii H Automatica, 45(2), 504, 2009 |
10 |
Characteristic transfer function matrix-based linear feedback control system analysis and synthesis Tagawa Y, Tagawa R, Stoten D International Journal of Control, 82(4), 585, 2009 |