Types of Games
暂无分享,去创建一个
Quanyan Zhu | Stefan Rass | Sandra König | Stefan Schauer | Quanyan Zhu | S. Rass | S. Schauer | Sandra König
[1] Quanyan Zhu,et al. A moving-horizon hybrid stochastic game for secure control of cyber-physical systems , 2014, 53rd IEEE Conference on Decision and Control.
[2] Sungwook Kim,et al. Nested game-based computation offloading scheme for Mobile Cloud IoT systems , 2015, EURASIP Journal on Wireless Communications and Networking.
[3] Quanyan Zhu,et al. Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.
[4] Quanyan Zhu,et al. DISTRIBUTED AND OPTIMAL RESILIENT PLANNING OF LARGE-SCALE INTERDEPENDENT CRITICAL INFRASTRUCTURES , 2018, 2018 Winter Simulation Conference (WSC).
[5] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[6] Quanyan Zhu,et al. A Multi-Layer Feedback System Approach to Resilient Connectivity of Remotely Deployed Mobile Internet of Things , 2018, IEEE Transactions on Cognitive Communications and Networking.
[7] Quanyan Zhu,et al. A cyber-physical game framework for secure and resilient multi-agent autonomous systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[8] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[9] Quanyan Zhu,et al. On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT) , 2018, IEEE Transactions on Wireless Communications.
[10] Quanyan Zhu,et al. Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.
[11] Quanyan Zhu,et al. Deceptive Routing in Relay Networks , 2012, GameSec.
[12] Quanyan Zhu,et al. Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception , 2018, Autonomous Cyber Deception.
[13] H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
[14] Quanyan Zhu,et al. A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[15] Stefan Rass,et al. Defending Against Advanced Persistent Threats Using Game-Theory , 2017, PloS one.
[16] Quanyan Zhu,et al. Distributed correlated Q-learning for dynamic transmission control of sensor networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[17] Stefan Rass. On Game-Theoretic Risk Management (Part One) - Towards a Theory of Games with Payoffs that are Probability-Distributions , 2015 .
[18] Stefan Rass,et al. Cut-The-Rope: A Game of Stealthy Intrusion , 2019, GameSec.
[19] Quanyan Zhu,et al. Interference Aware Routing Game for Cognitive Radio Multi-Hop Networks , 2012, IEEE Journal on Selected Areas in Communications.
[20] Walid Saad,et al. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[21] Stefan Rass,et al. Uncertainty in Games: Using Probability-Distributions as Payoffs , 2015, GameSec.
[22] Quanyan Zhu,et al. Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.
[23] Quanyan Zhu,et al. Network Security Configurations: A Nonzero-Sum Stochastic Game Approach , 2010, Proceedings of the 2010 American Control Conference.
[24] Quanyan Zhu,et al. Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles , 2017, GameSec.
[25] Quanyan Zhu,et al. Factored markov game theory for secure interdependent infrastructure networks , 2018 .
[26] Quanyan Zhu,et al. Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games , 2017, IEEE Transactions on Information Forensics and Security.
[27] Rui Zhang,et al. Attack-Aware Cyber Insurance of Interdependent Computer Networks , 2016 .
[28] Quanyan Zhu,et al. A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks , 2017, SCAV@CPSWeek.
[29] Quanyan Zhu,et al. A Stackelberg game perspective on the conflict between machine learning and data obfuscation , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[30] Stefan Rass,et al. Decisions with Uncertain Consequences—A Total Ordering on Loss-Distributions , 2016, PloS one.
[31] Quanyan Zhu,et al. A mean-field stackelberg game approach for obfuscation adoption in empirical risk minimization , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[32] Quanyan Zhu,et al. A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..
[33] Quanyan Zhu,et al. A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems , 2010, 2010 IEEE International Conference on Communications.
[34] Quanyan Zhu,et al. Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling Games , 2017, GameSec.
[35] Quanyan Zhu,et al. Optimizing mission critical data dissemination in massive IoT networks , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[36] Rui Zhang,et al. A game-theoretic analysis of label flipping attacks on distributed support vector machines , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).
[37] Quanyan Zhu,et al. Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.
[38] Tamer Basar,et al. With the Capacity 0.461(bits) and the Optimal Opd Being 'q = , 1998 .
[39] Stefan Rass. On Game-Theoretic Risk Management (Part Three) - Modeling and Applications , 2017 .
[40] Quanyan Zhu,et al. A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design , 2014, GameSec.
[41] Quanyan Zhu,et al. GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats , 2016, GameSec.
[42] Quanyan Zhu,et al. Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats , 2015, GameSec.
[43] Quanyan Zhu,et al. Distributed strategic learning with application to network security , 2011, Proceedings of the 2011 American Control Conference.
[44] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[45] Quanyan Zhu,et al. Dynamic Secure Routing Game in Distributed Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[46] Quanyan Zhu,et al. No-Regret Learning in Collaborative Spectrum Sensing with Malicious Nodes , 2010, 2010 IEEE International Conference on Communications.
[47] Quanyan Zhu,et al. Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks , 2015, GameSec.
[48] Quanyan Zhu,et al. Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks , 2018, IEEE Transactions on Information Forensics and Security.
[49] Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.
[50] H. W. Kuhn,et al. 11. Extensive Games and the Problem of Information , 1953 .
[51] Quanyan Zhu,et al. Optimal Secure Two-Layer IoT Network Design , 2017, IEEE Transactions on Control of Network Systems.
[52] Quanyan Zhu,et al. A dynamic game-theoretic approach to resilient control system design for cascading failures , 2012, HiCoNS '12.
[53] Stefan Rass. On Game-Theoretic Risk Management (Part Two) - Algorithms to Compute Nash-Equilibria in Games with Distributions as Payoffs , 2015, ArXiv.
[54] Quanyan Zhu,et al. Dynamic policy-based IDS configuration , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.
[55] Quanyan Zhu,et al. A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.
[56] Quanyan Zhu,et al. iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.
[57] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[58] Quanyan Zhu,et al. Indices of Power in Optimal IDS Default Configuration: Theory and Examples , 2011, GameSec.
[59] Quanyan Zhu,et al. A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017, IEEE Journal on Selected Areas in Communications.
[60] Quanyan Zhu,et al. A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network , 2019, IEEE Transactions on Information Forensics and Security.
[61] Quanyan Zhu,et al. Heterogeneous learning in zero-sum stochastic games with incomplete information , 2011, 49th IEEE Conference on Decision and Control (CDC).