scispace - formally typeset
P

Paulo Tabuada

Researcher at University of California, Los Angeles

Publications -  300
Citations -  25801

Paulo Tabuada is an academic researcher from University of California, Los Angeles. The author has contributed to research in topics: Control system & Control theory. The author has an hindex of 60, co-authored 288 publications receiving 20444 citations. Previous affiliations of Paulo Tabuada include University of California, Berkeley & Instituto Superior Técnico.

Papers
More filters
Posted Content

Symbolic models for nonlinear control systems without stability assumptions

TL;DR: In this paper, the authors propose a new abstraction technique that is applicable to any smooth control system as long as we are only interested in its behavior in a compact set, and moreover, the exact computation of reachable sets is not required.
Proceedings Article

Demo Abstract: PrOLoc: Resilient Localization with Private Observers Using Partial Homomorphic Encryption

TL;DR: PrOLoc is a localization system that combines partially homomorphic encryption with a new way ofstructuring the localization problem to enable efficient and accurate computation of a target’s location while preserving the privacy of the observers.
Proceedings ArticleDOI

Watch and Learn: Learning to control feedback linearizable systems from expert demonstrations

TL;DR: This paper shows how to combine expert demonstrations into a stabilizing controller, provided that demonstrations are sufficiently long and there are at least $n+1$ of them, where $n$ is the number of states of the system being controlled.
Proceedings ArticleDOI

Discrete synchronization of hybrid systems

TL;DR: This work gives initial steps towards discrete synchronization problems for systems which are compositions of several, possibly distributed, hybrid systems, where each agent is modeled as a hybrid system.
Posted Content

Distorting an Adversary's View in Cyber-Physical Systems

TL;DR: This paper proposes distortion-based metrics to protect CPSs communication and shows that it is possible to confuse adversaries with just a few bits of pre-shared keys.