A Dynamic Game Framework for Rational and Persistent Robot Deception With an Application to Deceptive Pursuit-Evasion
暂无分享,去创建一个
[1] Quanyan Zhu,et al. Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.
[2] Quanyan Zhu,et al. Duplicity Games for Deception Design With an Application to Insider Threat Mitigation , 2021, IEEE Transactions on Information Forensics and Security.
[3] Quanyan Zhu,et al. Dynamic games for secure and resilient control system design , 2019, National science review.
[4] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[5] M. Athans,et al. Solution of some nonclassical LQG stochastic decision problems , 1974 .
[6] Quanyan Zhu,et al. A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems , 2019, Comput. Secur..
[7] Nagi Gebraeel,et al. Detection and Differentiation of Replay Attack and Equipment Faults in SCADA Systems , 2021, IEEE Transactions on Automation Science and Engineering.
[8] Benjamin J. Raphael,et al. Network propagation: a universal amplifier of genetic associations , 2017, Nature Reviews Genetics.
[9] Kai Xu,et al. Single Real Goal, Magnitude-Based Deceptive Path-Planning , 2020, Entropy.
[10] Ronald C. Arkin,et al. A Taxonomy of Robot Deception and Its Benefits in HRI , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.
[11] S Bhattacharya,et al. Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.
[12] John Lygeros,et al. A Noncooperative Game Approach to Autonomous Racing , 2017, IEEE Transactions on Control Systems Technology.
[13] Jose B. Cruz,et al. Defending an Asset: A Linear Quadratic Game Approach , 2011, IEEE Transactions on Aerospace and Electronic Systems.
[14] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[15] R. Nickerson. Confirmation Bias: A Ubiquitous Phenomenon in Many Guises , 1998 .
[16] Quanyan Zhu,et al. Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.
[17] J. B. Cruz,et al. Moving horizon Nash strategies for a military air operation , 2002 .
[18] Ufuk Topcu,et al. Optimal Deceptive and Reference Policies for Supervisory Control , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).
[19] Peter G. Bennett,et al. Hypergames: Developing a model of conflict☆ , 1980 .
[20] Quanyan Zhu,et al. Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants , 2020, Reliab. Eng. Syst. Saf..
[21] Aldo Morales,et al. An Adaptive Markov Process for Robot Deception , 2019, ArXiv.
[22] Siddhartha S. Srinivasa,et al. An Analysis of Deceptive Robot Motion , 2014, Robotics: Science and Systems.
[23] Yuanqing Xia,et al. Optimal Stealthy Deception Attack Against Cyber-Physical Systems , 2020, IEEE Transactions on Cybernetics.
[24] Ufuk Topcu,et al. Deception in Optimal Control , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[25] Rajdeep Singh,et al. Deception in Autonomous Vehicle Decision Making in an Adversarial Environment , 2005 .
[26] Vijay Kumar,et al. Dynamics, Control and Planning for Cooperative Manipulation of Payloads Suspended by Cables from Multiple Quadrotor Robots , 2013, Robotics: Science and Systems.
[27] Ruochi Zhang,et al. Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff , 2017, IEEE Transactions on Information Forensics and Security.
[28] D. Smith,et al. Why We Lie: The Evolutionary Roots of Deception and the Unconscious Mind , 2004 .
[29] Peta Masters. Goal recognition and deception in path-planning , 2019 .
[30] Ronald C. Arkin,et al. Other-oriented robot deception: A computational approach for deceptive action generation to benefit the mark , 2014, 2014 IEEE International Conference on Robotics and Biomimetics (ROBIO 2014).
[31] David Fridovich-Keil,et al. An Iterative Quadratic Method for General-Sum Differential Games with Feedback Linearizable Dynamics , 2020, 2020 IEEE International Conference on Robotics and Automation (ICRA).
[32] Vrizlynn L. L. Thing,et al. Autonomous Vehicle Security: A Taxonomy of Attacks and Defences , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[33] Quanyan Zhu,et al. Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.
[34] Branislav Bosanský,et al. Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security , 2017, GameSec.
[35] M. Ani Hsieh,et al. Cooperative transport of a buoyant load: A differential geometric approach , 2017, 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[36] Roberta L. Klatzky,et al. Visual-Feedback Distortion in a Robotic Rehabilitation Environment , 2006, Proceedings of the IEEE.
[37] Ahmed Ouammi,et al. Supervisory Model Predictive Control for Optimal Energy Management of Networked Smart Greenhouses Integrated Microgrid , 2020, IEEE Transactions on Automation Science and Engineering.
[38] Quanyan Zhu,et al. Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception , 2018, Autonomous Cyber Deception.
[39] Ronald C. Arkin,et al. Acting Deceptively: Providing Robots with the Capacity for Deception , 2011, Int. J. Soc. Robotics.
[40] Xiaofan He,et al. Dynamic Security Games with Deception , 2018 .