{"id":19,"date":"2015-09-02T12:24:16","date_gmt":"2015-09-02T16:24:16","guid":{"rendered":"https:\/\/cecas.clemson.edu\/ndcl\/?page_id=19"},"modified":"2024-07-03T11:54:46","modified_gmt":"2024-07-03T15:54:46","slug":"research","status":"publish","type":"page","link":"https:\/\/cecas.clemson.edu\/ndcl\/research\/","title":{"rendered":"Research"},"content":{"rendered":"<h3><strong>Privacy protection in distributed optimization and learning<\/strong><\/h3>\n<h3><strong>Saddle point avoidance in nonconvex optimization and learning<\/strong><\/h3>\n<h3><strong>Security and privacy in distributed cyber-physical systems<\/strong><\/h3>\n<h3><strong>Trustfulness enhancement in distributed cyber-physical systems<\/strong><\/h3>\n<h3><strong>Bio-inspired clock synchronization for wireless sensor networks<\/strong><\/h3>\n<h3><\/h3>\n<h3 style=\"text-align: justify;\"><strong>Cooperative control of multi-agent systems<\/strong><\/h3>\n<h3 style=\"text-align: justify;\"><a href=\"https:\/\/cecas.clemson.edu\/ndcl\/wp-content\/uploads\/2015\/09\/RESEARCH6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-106 alignnone\" src=\"https:\/\/cecas.clemson.edu\/ndcl\/wp-content\/uploads\/2015\/09\/RESEARCH6-300x258.png\" alt=\"RESEARCH6\" width=\"279\" height=\"240\" srcset=\"https:\/\/cecas.clemson.edu\/ndcl\/wp-content\/uploads\/2015\/09\/RESEARCH6-300x258.png 300w, https:\/\/cecas.clemson.edu\/ndcl\/wp-content\/uploads\/2015\/09\/RESEARCH6.png 403w\" sizes=\"auto, (max-width: 279px) 100vw, 279px\" \/><\/a> <a href=\"https:\/\/cecas.clemson.edu\/ndcl\/wp-content\/uploads\/2015\/09\/RESEARCH7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-108 alignnone\" src=\"https:\/\/cecas.clemson.edu\/ndcl\/wp-content\/uploads\/2015\/09\/RESEARCH7-300x247.png\" alt=\"RESEARCH7\" width=\"292\" height=\"240\" srcset=\"https:\/\/cecas.clemson.edu\/ndcl\/wp-content\/uploads\/2015\/09\/RESEARCH7-300x247.png 300w, https:\/\/cecas.clemson.edu\/ndcl\/wp-content\/uploads\/2015\/09\/RESEARCH7.png 451w\" sizes=\"auto, (max-width: 292px) 100vw, 292px\" \/><\/a><\/h3>\n<h5 style=\"text-align: justify;\"><\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Privacy protection in distributed optimization and learning Saddle point avoidance in nonconvex optimization and learning Security and privacy in distributed cyber-physical systems Trustfulness enhancement in distributed cyber-physical systems Bio-inspired clock synchronization for wireless sensor networks Cooperative control of multi-agent systems<\/p>\n","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"template-onecolumn.php","meta":{"footnotes":""},"class_list":["post-19","page","type-page","status-publish","hentry","nodate","item-wrap"],"_links":{"self":[{"href":"https:\/\/cecas.clemson.edu\/ndcl\/wp-json\/wp\/v2\/pages\/19","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cecas.clemson.edu\/ndcl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cecas.clemson.edu\/ndcl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ndcl\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ndcl\/wp-json\/wp\/v2\/comments?post=19"}],"version-history":[{"count":16,"href":"https:\/\/cecas.clemson.edu\/ndcl\/wp-json\/wp\/v2\/pages\/19\/revisions"}],"predecessor-version":[{"id":1004,"href":"https:\/\/cecas.clemson.edu\/ndcl\/wp-json\/wp\/v2\/pages\/19\/revisions\/1004"}],"wp:attachment":[{"href":"https:\/\/cecas.clemson.edu\/ndcl\/wp-json\/wp\/v2\/media?parent=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}