Alert button
Picture for Henrik Sandberg

Henrik Sandberg

Alert button

Electrical Fault Localisation Over a Distributed Parameter Transmission Line

Add code
Bookmark button
Alert button
Oct 20, 2023
Daniel Selvaratnam, Amritam Das, Henrik Sandberg

Viaarxiv icon

How are policy gradient methods affected by the limits of control?

Add code
Bookmark button
Alert button
Jun 14, 2022
Ingvar Ziemann, Anastasios Tsiamis, Henrik Sandberg, Nikolai Matni

Figure 1 for How are policy gradient methods affected by the limits of control?
Viaarxiv icon

Single Trajectory Nonparametric Learning of Nonlinear Dynamics

Add code
Bookmark button
Alert button
Feb 19, 2022
Ingvar Ziemann, Henrik Sandberg, Nikolai Matni

Figure 1 for Single Trajectory Nonparametric Learning of Nonlinear Dynamics
Viaarxiv icon

Regret Lower Bounds for Learning Linear Quadratic Gaussian Systems

Add code
Bookmark button
Alert button
Jan 05, 2022
Ingvar Ziemann, Henrik Sandberg

Figure 1 for Regret Lower Bounds for Learning Linear Quadratic Gaussian Systems
Viaarxiv icon

On Uninformative Optimal Policies in Adaptive LQR with Unknown B-Matrix

Add code
Bookmark button
Alert button
Nov 19, 2020
Ingvar Ziemann, Henrik Sandberg

Viaarxiv icon

Privacy Preserving Set-Based Estimation Using Partially Homomorphic Encryption

Add code
Bookmark button
Alert button
Oct 19, 2020
Amr Alanwar, Victor Gassmann, Xingkang He, Hazem Said, Henrik Sandberg, Karl Henrik Johansson, Matthias Althoff

Figure 1 for Privacy Preserving Set-Based Estimation Using Partially Homomorphic Encryption
Figure 2 for Privacy Preserving Set-Based Estimation Using Partially Homomorphic Encryption
Figure 3 for Privacy Preserving Set-Based Estimation Using Partially Homomorphic Encryption
Figure 4 for Privacy Preserving Set-Based Estimation Using Partially Homomorphic Encryption
Viaarxiv icon

Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks

Add code
Bookmark button
Alert button
Sep 04, 2019
Song Fang, Karl Henrik Johansson, Mikael Skoglund, Henrik Sandberg, Hideaki Ishii

Figure 1 for Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks
Figure 2 for Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks
Figure 3 for Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks
Figure 4 for Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks
Viaarxiv icon