A secure control framework for resource-limited adversaries A Teixeira, I Shames, H Sandberg, KH Johansson Automatica 51, 135-148, 2015 | 1078 | 2015 |
Optimal parameter selection for the alternating direction method of multipliers (ADMM): Quadratic problems E Ghadimi, A Teixeira, I Shames, M Johansson IEEE Transactions on Automatic Control 60 (3), 644-658, 2014 | 571 | 2014 |
Distributed fault detection for interconnected second-order systems I Shames, AMH Teixeira, H Sandberg, KH Johansson Automatica 47 (12), 2757 – 2764, 2011 | 436 | 2011 |
Revealing stealthy attacks in control systems A Teixeira, I Shames, H Sandberg, KH Johansson 2012 50th Annual Allerton Conference on Communication, Control, and …, 2012 | 327 | 2012 |
Circumnavigation using distance measurements under slow drift I Shames, S Dasgupta, B Fidan, BDO Anderson IEEE Transactions on Automatic Control 57 (4), 889-903, 2011 | 217 | 2011 |
Localization and circumnavigation of a slowly moving target using bearing measurements M Deghat, I Shames, BDO Anderson, C Yu IEEE Transactions on Automatic Control 59 (8), 2182-2188, 2014 | 213 | 2014 |
Secure and private control using semi-homomorphic encryption F Farokhi, I Shames, N Batterham Control Engineering Practice 67, 13-20, 2017 | 165 | 2017 |
Distributed fault detection and isolation resilient to network model uncertainties A Teixeira, I Shames, H Sandberg, KH Johansson IEEE transactions on cybernetics 44 (11), 2024-2037, 2014 | 160 | 2014 |
Towards encrypted MPC for linear constrained systems MS Darup, A Redder, I Shames, F Farokhi, D Quevedo IEEE Control Systems Letters 2 (2), 195-200, 2017 | 124 | 2017 |
On frame and orientation localization for relative sensing networks G Piovan, I Shames, B Fidan, F Bullo, B Anderson Automatica 49 (1), 206-213, 2013 | 118 | 2013 |
Secure and private cloud-based control using semi-homomorphic encryption F Farokhi, I Shames, N Batterham IFAC-PapersOnLine 49 (22), 163-168, 2016 | 96 | 2016 |
Multi-step gradient methods for networked optimization E Ghadimi, I Shames, M Johansson IEEE Transactions on Signal Processing 61 (21), 5417-5429, 2013 | 96 | 2013 |
Doppler shift target localization I Shames, AN Bishop, M Smith, BDO Anderson IEEE Transactions on Aerospace and Electronic Systems 49 (1), 266-276, 2013 | 94 | 2013 |
Stabilization of rigid formations with direction-only constraints AN Bishop, I Shames, BDO Anderson 2011 50th IEEE Conference on Decision and Control and European Control …, 2011 | 93 | 2011 |
Distributed MPC via dual decomposition and Alternating direction method of multipliers F Farokhi, I Shames, KH Johansson Distributed Model Predictive Control Made Easy, 115-131, 2014 | 92 | 2014 |
Formal theory of noisy sensor network localization BDO Anderson, I Shames, G Mao, B Fidan SIAM Journal on Discrete Mathematics 24 (2), 684-698, 2010 | 91 | 2010 |
Topology design for optimal network coherence T Summers, I Shames, J Lygeros, F Dörfler 2015 European Control Conference (ECC), 575-580, 2015 | 86 | 2015 |
Target localization and circumnavigation using bearing measurements in 2D M Deghat, I Shames, BDO Anderson, C Yu Decision and Control (CDC), 2010 49th IEEE Conference on, 334-339, 2010 | 84 | 2010 |
Analysis of noisy bearing-only network localization I Shames, AN Bishop, BDO Anderson IEEE Transactions on Automatic Control 58 (1), 247-252, 2012 | 83 | 2012 |
Secure and private implementation of dynamic controllers using semihomomorphic encryption C Murguia, F Farokhi, I Shames IEEE Transactions on Automatic Control 65 (9), 3950-3957, 2020 | 73 | 2020 |