default search action
Kemi Ding
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Wei Huo, Xiaomeng Chen, Kemi Ding, Subhrakanti Dey, Ling Shi:
Compression-Based Privacy Preservation for Distributed Nash Equilibrium Seeking in Aggregative Games. IEEE Control. Syst. Lett. 8: 886-891 (2024) - [j16]Xiaomeng Chen, Wei Huo, Kemi Ding, Subhrakanti Dey, Ling Shi:
Communication-Efficient and Differentially-Private Distributed Nash Equilibrium Seeking With Linear Convergence. IEEE Control. Syst. Lett. 8: 1787-1792 (2024) - [j15]Zai Cai, Kemi Ding:
Whittle's Index Based Sensor Scheduling for Multiprocess Systems Under DoS Attacks. J. Syst. Sci. Complex. 37(1): 329-350 (2024) - [j14]Kemi Ding, Yijun Chen, Lei Wang, Xiaoqiang Ren, Guodong Shi:
Network Learning in Quadratic Games From Best-Response Dynamics. IEEE/ACM Trans. Netw. 32(5): 3669-3684 (2024) - [i7]Wei Huo, Xiaomeng Chen, Kemi Ding, Subhrakanti Dey, Ling Shi:
Compression-based Privacy Preservation for Distributed Nash Equilibrium Seeking in Aggregative Games. CoRR abs/2405.03106 (2024) - [i6]Xiaomeng Chen, Wei Huo, Kemi Ding, Subhrakanti Dey, Ling Shi:
Communication-efficient and Differentially-private Distributed Nash Equilibrium Seeking with Linear Convergence. CoRR abs/2405.04757 (2024) - [i5]Wei Huo, Changxin Liu, Kemi Ding, Karl Henrik Johansson, Ling Shi:
Federated Cubic Regularized Newton Learning with Sparsification-amplified Differential Privacy. CoRR abs/2408.04315 (2024) - 2023
- [j13]Xiaomeng Chen, Lingying Huang, Kemi Ding, Subhrakanti Dey, Ling Shi:
Privacy-Preserving Push-Sum Average Consensus via State Decomposition. IEEE Trans. Autom. Control. 68(12): 7974-7981 (2023) - [j12]Mengyu Huang, Kemi Ding, Subhrakanti Dey, Yuzhe Li, Ling Shi:
Learning-Based DoS Attack Power Allocation in Multiprocess Systems. IEEE Trans. Neural Networks Learn. Syst. 34(10): 8017-8030 (2023) - [c3]Yijun Chen, Kemi Ding, Guodong Shi:
Network Learning from Best-Response Dynamics in LQ Games. ACC 2023: 1680-1685 - 2021
- [j11]Lingying Huang, Kemi Ding, Alex S. Leong, Daniel E. Quevedo, Ling Shi:
Encryption scheduling for remote state estimation under an operation constraint. Autom. 127: 109537 (2021) - [j10]Yuchi Wu, Kemi Ding, Yuzhe Li, Ling Shi:
Optimal unbiased linear sensor fusion over multiple lossy channels with collective observability. Autom. 128: 109568 (2021) - [j9]Kemi Ding, Xiaoqiang Ren, Hongsheng Qi, Guodong Shi, Xiaofan Wang, Ling Shi:
Interference Game for Intelligent Sensors in Cyber-physical Systems. Autom. 129: 109668 (2021) - [j8]Kemi Ding, Xiaoqiang Ren, Alex S. Leong, Daniel E. Quevedo, Ling Shi:
Remote State Estimation in the Presence of an Active Eavesdropper. IEEE Trans. Autom. Control. 66(1): 229-244 (2021) - [j7]Kemi Ding, Junfeng Wu, Lihua Xie:
Minimum-Degree Distributed Graph Filter Design. IEEE Trans. Signal Process. 69: 1083-1096 (2021) - 2020
- [j6]Kemi Ding, Xiaoqiang Ren, Daniel E. Quevedo, Subhrakanti Dey, Ling Shi:
Defensive deception against reactive jamming attacks in remote state estimation. Autom. 113: 108680 (2020) - [j5]Shuang Wu, Kemi Ding, Peng Cheng, Ling Shi:
Optimal Scheduling of Multiple Sensors Over Lossy and Bandwidth Limited Channels. IEEE Trans. Control. Netw. Syst. 7(3): 1188-1200 (2020) - [j4]Kemi Ding, Junshan Zhang:
Multi-Party Privacy Conflict Management in Online Social Networks: A Network Game Perspective. IEEE/ACM Trans. Netw. 28(6): 2685-2698 (2020) - [c2]Zhaofeng Zhang, Sen Lin, Mehmet Dedeoglu, Kemi Ding, Junshan Zhang:
Data-driven Distributionally Robust Optimization for Edge Intelligence. INFOCOM 2020: 2619-2628 - [i4]Xiaomeng Chen, Lingying Huang, Kemi Ding, Subhrakanti Dey, Ling Shi:
Privacy-Preserving Push-sum Average Consensus via State Decomposition. CoRR abs/2009.12029 (2020) - [i3]Yuchi Wu, Kemi Ding, Yuzhe Li, Ling Shi:
Optimal Unbiased Linear Sensor Fusion over Multiple Lossy Channels with Collective Observability. CoRR abs/2012.04896 (2020)
2010 – 2019
- 2019
- [j3]Kemi Ding, Xiaoqiang Ren, Daniel E. Quevedo, Subhrakanti Dey, Ling Shi:
DoS Attacks on Remote State Estimation With Asymmetric Information. IEEE Trans. Control. Netw. Syst. 6(2): 653-666 (2019) - [i2]Yuqing Ni, Kemi Ding, Yong Yang, Ling Shi:
On the Performance Analysis of Binary Hypothesis Testing with Byzantine Sensors. CoRR abs/1905.10118 (2019) - 2017
- [j2]Kemi Ding, Yuzhe Li, Daniel E. Quevedo, Subhrakanti Dey, Ling Shi:
A multi-channel transmission schedule for remote state estimation under DoS attacks. Autom. 78: 194-201 (2017) - [j1]Kemi Ding, Subhrakanti Dey, Daniel E. Quevedo, Ling Shi:
Stochastic Game in Remote Estimation Under DoS Attacks. IEEE Control. Syst. Lett. 1(1): 146-151 (2017) - [i1]Kemi Ding, Yuzhe Li, Subhrakanti Dey, Ling Shi:
Multi-sensor Transmission Management for Remote State Estimation under Coordination. CoRR abs/1703.09124 (2017) - 2016
- [c1]Kemi Ding, Daniel E. Quevedo, Subhrakanti Dey, Ling Shi:
A secure cross-layer design for remote estimation under DoS attack: When multi-sensor meets multi-channel. CDC 2016: 6297-6302
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint