Iman Shames
Title
Cited by
Cited by
Year
A secure control framework for resource-limited adversaries
A Teixeira, I Shames, H Sandberg, KH Johansson
Automatica 51, 135-148, 2015
5422015
Optimal parameter selection for the alternating direction method of multipliers (ADMM): quadratic problems
E Ghadimi, A Teixeira, I Shames, M Johansson
IEEE Transactions on Automatic Control 60 (3), 644-658, 2014
3662014
Distributed fault detection for interconnected second-order systems
I Shames, AMH Teixeira, H Sandberg, KH Johansson
Automatica 47 (12), 2757 – 2764, 2011
3062011
Revealing stealthy attacks in control systems
A Teixeira, I Shames, H Sandberg, KH Johansson
2012 50th Annual Allerton Conference on Communication, Control, and …, 2012
1932012
Circumnavigation using distance measurements under slow drift
I Shames, S Dasgupta, B Fidan, BDO Anderson
IEEE Transactions on Automatic Control 57 (4), 889-903, 2011
1512011
Localization and circumnavigation of a slowly moving target using bearing measurements
M Deghat, I Shames, BDO Anderson, C Yu
IEEE Transactions on Automatic Control 59 (8), 2182-2188, 2014
1052014
Distributed fault detection and isolation resilient to network model uncertainties
A Teixeira, I Shames, H Sandberg, KH Johansson
IEEE transactions on cybernetics 44 (11), 2024-2037, 2014
1032014
On frame and orientation localization for relative sensing networks
G Piovan, I Shames, B Fidan, F Bullo, B Anderson
Automatica 49 (1), 206-213, 2013
972013
Stabilization of rigid formations with direction-only constraints
AN Bishop, I Shames, BDO Anderson
2011 50th IEEE Conference on Decision and Control and European Control …, 2011
792011
Formal theory of noisy sensor network localization
BDO Anderson, I Shames, G Mao, B Fidan
SIAM Journal on Discrete Mathematics 24 (2), 684-698, 2010
672010
Multi-step gradient methods for networked optimization
E Ghadimi, I Shames, M Johansson
IEEE Transactions on Signal Processing 61 (21), 5417-5429, 2013
632013
Topology design for optimal network coherence
T Summers, I Shames, J Lygeros, F Dörfler
2015 European Control Conference (ECC), 575-580, 2015
622015
Secure and private control using semi-homomorphic encryption
F Farokhi, I Shames, N Batterham
Control Engineering Practice 67, 13-20, 2017
612017
Distributed MPC via dual decomposition and Alternating direction method of multipliers
F Farokhi, I Shames, KH Johansson
Distributed Model Predictive Control Made Easy, 115-131, 2014
592014
Analysis of noisy bearing-only network localization
I Shames, AN Bishop, BDO Anderson
IEEE Transactions on Automatic Control 58 (1), 247-252, 2012
582012
Doppler shift target localization
I Shames, AN Bishop, M Smith, BDO Anderson
IEEE Transactions on Aerospace and Electronic Systems 49 (1), 266-276, 2013
522013
Target localization and circumnavigation using bearing measurements in 2D
M Deghat, I Shames, BDO Anderson, C Yu
Decision and Control (CDC), 2010 49th IEEE Conference on, 334-339, 2010
512010
Close target reconnaissance using autonomous UAV formations
I Shames, B Fidan, B Anderson
Decision and Control, 2008. CDC 2008. 47th IEEE Conference on, 1729-1734, 2008
492008
Secure and private cloud-based control using semi-homomorphic encryption
F Farokhi, I Shames, N Batterham
IFAC-PapersOnLine 49 (22), 163-168, 2016
442016
Minimization of the effect of noisy measurements on localization of multi-agent autonomous formations
I Shames, B Fidan, B Anderson
Automatica 45 (4), 1058-1065, 2009
442009
The system can't perform the operation now. Try again later.
Articles 1–20