default search action
Michelle Chong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Anne van der Horst, Michelle S. Chong, Junsoo Kim, Henrik Sandberg:
Resilient Nonlinear State Estimation Using the Median Operation for a Network of Droop-Controlled Power Inverters. ECC 2024: 3070-3076 - [c22]Florian Reißner, Michelle S. Chong:
Secure Control for a Microgrid of VSMs with Virtual Friction. ECC 2024: 3083-3090 - 2023
- [j7]Michelle S. Chong, Masashi Wakaiki, João P. Hespanha:
Memory Saving State-Sharing Multi-Observer for a Class of Multi-Observer-Based Algorithms. IEEE Control. Syst. Lett. 7: 1772-1777 (2023) - [j6]Muhammad Umar B. Niazi, Amr Al-Anwar, Michelle S. Chong, Karl Henrik Johansson:
Resilient set-based state estimation for linear time-invariant systems using zonotopes. Eur. J. Control 74: 100837 (2023) - [c21]Yaodong Li, Michelle S. Chong:
Reachable Set-Based Dynamic Quantization for the Remote State Estimation of Linear Systems. CDC 2023: 4942-4947 - [c20]Yankai Lin, Michelle S. Chong, Carlos Murguia:
Secondary Controller Design for the Safety of Nonlinear Systems via Sum-of-Squares Programming. CDC 2023: 7649-7654 - [i10]Yankai Lin, Michelle S. Chong, Carlos Murguia:
Secondary Controller Design for the Safety of Nonlinear Systems via Sum-of-Squares Programming. CoRR abs/2304.10359 (2023) - [i9]Cédric Escudero, Michelle S. Chong, Paolo Massioni, Eric Zamaï:
Safety monitoring under stealthy sensor injection attacks using reachable sets. CoRR abs/2307.12715 (2023) - [i8]Muhammad Umar B. Niazi, Michelle S. Chong, Amr Alanwar, Karl Henrik Johansson:
Secure Set-Based State Estimation for Linear Systems under Adversarial Attacks on Sensors. CoRR abs/2309.05075 (2023) - [i7]Sribalaji Coimbatore Anand, Michelle S. Chong, André M. H. Teixeira:
Data-Driven Identification of Attack-free Sensors in Networked Control Systems. CoRR abs/2312.04845 (2023) - 2022
- [c19]Michelle S. Chong:
Controller confidentiality for nonlinear systems under sensor attacks. ACC 2022: 2976-2981 - [c18]Michelle S. Chong:
Entropy for incremental stability of nonlinear systems under disturbances. CDC 2022: 4740-4745 - [c17]Michelle S. Chong:
On the ellipsoidal bounds of the reachable set for a class of time-delayed nonlinear systems with bounded input. ECC 2022: 882-887 - [i6]Koen J. A. Scheres, Victor S. Dolk, Michelle S. Chong, Romain Postoyan, W. P. Maurice H. Heemels:
Distributed Periodic Event-triggered Control of Nonlinear Multi-Agent Systems. CoRR abs/2202.06282 (2022) - [i5]Muhammad Umar B. Niazi, Amr Alanwar, Michelle S. Chong, Karl Henrik Johansson:
Resilient Set-based State Estimation for Linear Time-Invariant Systems Using Zonotopes. CoRR abs/2211.08474 (2022) - [i4]Yankai Lin, Michelle S. Chong, Carlos Murguia:
Plug-and-Play Secondary Control for Safety of LTI Systems under Attacks. CoRR abs/2212.00593 (2022) - 2021
- [c16]Koen J. A. Scheres, Michelle S. Chong, Romain Postoyan, W. P. Maurice H. Heemels:
Event-Triggered State Estimation with Multiple Noisy Sensor Nodes. CDC 2021: 558-563 - [c15]Tomas J. Meijer, Victor S. Dolk, Michelle S. Chong, Romain Postoyan, Bram de Jager, Dragan Nesic, W. P. Maurice H. Heemels:
Joint Parameter and State Estimation of Noisy Discrete-Time Nonlinear Systems: A Supervisory Multi-Observer Approach. CDC 2021: 5163-5168 - [i3]Koen J. A. Scheres, Michelle S. Chong, Romain Postoyan, W. P. Maurice H. Heemels:
Event-Triggered State Estimation with Multiple Noisy Sensor Nodes. CoRR abs/2108.04591 (2021) - 2020
- [j5]Kazumune Hashimoto, Michelle S. Chong, Dimos V. Dimarogonas:
Distributed $\ell _1$-State-and-Fault Estimation for Multiagent Systems. IEEE Trans. Control. Netw. Syst. 7(2): 699-710 (2020) - [c14]Michelle S. Chong, Henrik Sandberg, João P. Hespanha:
A secure state estimation algorithm for nonlinear systems under sensor attacks. CDC 2020: 5743-5748
2010 – 2019
- 2019
- [j4]Zhanghan Tang, Margreta Kuijper, Michelle S. Chong, Iven Mareels, Christopher Leckie:
Linear system security - Detection and correction of adversarial sensor attacks in the noise-free case. Autom. 101: 53-59 (2019) - [c13]Kazumune Hashimoto, Michelle Chong, Dimos V. Dimarogonas:
Realtime l1-fault-and-state estimation for multi-agent systems. ACC 2019: 1175-1180 - [c12]Michelle S. Chong, David Umsonst, Henrik Sandberg:
Voltage regulation of a power distribution network in a radial configuration with a class of sector-bounded droop controllers. CDC 2019: 3515-3520 - [c11]Michelle S. Chong, Henrik Sandberg, André M. H. Teixeira:
A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems. ECC 2019: 968-978 - 2018
- [j3]Yasser Shoukry, Michelle Chong, Masashi Wakaiki, Pierluigi Nuzzo, Alberto L. Sangiovanni-Vincentelli, Sanjit A. Seshia, João Pedro Hespanha, Paulo Tabuada:
SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks. ACM Trans. Cyber Phys. Syst. 2(1): 5:1-5:27 (2018) - [c10]Michelle S. Chong, Henrik Sandberg:
Secure Patching of an Output-Feedback Controller for a Class of Nonlinear Systems Under Adversarial Attack. CDC 2018: 7255-7260 - [c9]Michelle S. Chong, Maria Sandsten, Anders Rantzer:
Estimating the Wigner distribution of linear time-invariant dynamical systems. ECC 2018: 1220-1225 - [c8]Florian Kintzler, Tobias Gawron-Deutsch, Stephan Cejka, Judith Schulte, Mathias Uslar, Eric M. S. P. Veith, Ewa Piatkowska, Paul Smith, Friederich Kupzog, Henrik Sandberg, Michelle S. Chong, David Umsonst, Marco Mittelsdorf:
Large Scale Rollout of Smart Grid Services. GIoTS 2018: 1-7 - 2017
- [c7]Michelle S. Chong, Romain Postoyan, Sei Zhen Khong, Dragan Nesic:
Supervisory observer for parameter and state estimation of nonlinear systems using the DIRECT algorithm. CDC 2017: 2089-2094 - [i2]Zhanghan Tang, Margreta Kuijper, Michelle Chong, Iven Mareels, Christopher Leckie:
Linear system security - detection and correction of adversarial attacks in the noise-free case. CoRR abs/1711.05400 (2017) - 2016
- [c6]Michelle S. Chong, Margreta Kuijper:
Characterising the vulnerability of linear control systems under sensor attacks using a system's security index. CDC 2016: 5906-5911 - [c5]Yasser Shoukry, Michelle Chong, Masashi Wakaiki, Pierluigi Nuzzo, Alberto L. Sangiovanni-Vincentelli, Sanjit A. Seshia, João Pedro Hespanha, Paulo Tabuada:
SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks. ICCPS 2016: 29:1-29:10 - [i1]Michelle S. Chong, Margreta Kuijper:
Vulnerability of linear systems against sensor attacks-a system's security index. CoRR abs/1602.06594 (2016) - 2015
- [j2]Michelle S. Chong, Dragan Nesic, Romain Postoyan, Levin Kuhlmann:
Parameter and State Estimation of Nonlinear Systems Using a Multi-Observer Under the Supervisory Framework. IEEE Trans. Autom. Control. 60(9): 2336-2349 (2015) - [c4]Michelle S. Chong, Masashi Wakaiki, João Pedro Hespanha:
Observability of linear systems under adversarial attacks. ACC 2015: 2439-2444 - 2014
- [c3]Michelle S. Chong, Dragan Nesic, Romain Postoyan, Levin Kuhlmann:
State and parameter estimation of nonlinear systems: A multi-observer approach. CDC 2014: 1067-1072 - 2012
- [j1]Michelle Chong, Romain Postoyan, Dragan Nesic, Levin Kuhlmann, Andrea Varsavsky:
A robust circle criterion observer with application to neural mass models. Autom. 48(11): 2986-2989 (2012) - [c2]Romain Postoyan, Michelle Chong, Dragan Nesic, Levin Kuhlmann:
Parameter and state estimation for a class of neural mass models. CDC 2012: 2322-2327 - 2011
- [c1]Michelle Chong, Romain Postoyan, Dragan Nesic, Levin Kuhlmann, Andrea Varsavsky:
A circle criterion observer for estimating the unmeasured membrane potential of neuronal populations. AuCC 2011: 493-498
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint