Koutsoukos, Xenofon
252  results:
Search for persons X
?
1

Safeguarding Autonomous UAV Navigation: Agent Design using ..:

, In: 2024 IEEE International Systems Conference (SysCon),
 
?
2

On Zero Forcing Sets and Network Controllability—Computatio..:

Abbas, Waseem ; Shabbir, Mudassir ; Yazcoğlu, Yasin.
IEEE Transactions on Control of Network Systems.  11 (2024)  1 - p. 402-413 , 2024
 
?
3

Improving Graph Machine Learning Performance Through Featur..:

, In: 2024 32nd Mediterranean Conference on Control and Automation (MED),
Said, Anwar ; Ahmad, Obaid Ullah ; Abbas, Waseem.. - p. 322-327 , 2024
 
?
4

Network Controllability Perspectives on Graph Representatio:

Said, Anwar ; Ahmad, Obaid Ullah ; Abbas, Waseem..
IEEE Transactions on Knowledge and Data Engineering.  36 (2024)  8 - p. 4116-4128 , 2024
 
?
7

Enhanced Graph Neural Networks with Ego-Centric Spectral Su..:

, In: 2023 International Conference on Machine Learning and Applications (ICMLA),
Said, Anwar ; Shabbir, Mudassir ; Derr, Tyler.. - p. 2257-2264 , 2023
 
?
8

Circuit design completion using graph neural networks:

Said, Anwar ; Shabbir, Mudassir ; Broll, Brian...
Neural Computing and Applications.  35 (2023)  16 - p. 12145-12157 , 2023
 
?
9

Real-time detection of deception attacks in cyber-physical ..:

Cai, Feiyang ; Koutsoukos, Xenofon
International Journal of Information Security.  22 (2023)  5 - p. 1099-1114 , 2023
 
?
10

Safe Explainable Agents for Autonomous Navigation using Evo..:

, In: 2023 IEEE International Conference on Assured Autonomy (ICAA),
 
?
11

Surrogate Modeling using Physics-guided Learning:

, In: Proceedings of Cyber-Physical Systems and Internet of Things Week 2023,
 
?
12

Adaptive Learning from Peers for Distributed Actor-Critic A..:

, In: Lecture Notes in Networks and Systems; Distributed Computing and Artificial Intelligence, 20th International Conference,
 
?
13

Computation of the Distance-Based Bound on Strong Structura..:

Shabbir, Mudassir ; Abbas, Waseem ; Yazcoglu, A. Yasin.
IEEE Transactions on Automatic Control.  68 (2023)  3 - p. 1768-1775 , 2023
 
?
14

Correction: Real-time detection of deception attacks in cyb..:

Cai, Feiyang ; Koutsoukos, Xenofon
International Journal of Information Security.  22 (2023)  5 - p. 1383-1383 , 2023
 
?
15

Scaling up 3D Kernels with Bayesian Frequency Re-parameteri..:

, In: Lecture Notes in Computer Science; Medical Image Computing and Computer Assisted Intervention – MICCAI 2023,
Lee, Ho Hin ; Liu, Quan ; Bao, Shunxing... - p. 632-641 , 2023
 
1-15