Abstract
Motivated by cyber-physical security applications, we face the problem of estimating the state and the input of a linear system, where the input may r......
小提示:本篇文献需要登录阅读全文,点击跳转登录