暂无分享,去创建一个
Quanyan Zhu | Juntao Chen | Yunhan Huang | Linan Huang | Quanyan Zhu | Yunhan Huang | Linan Huang | Juntao Chen
[1] Quanyan Zhu,et al. Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks , 2019, Dynamic Games and Applications.
[2] Quanyan Zhu,et al. Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants , 2020, Reliab. Eng. Syst. Saf..
[3] Quanyan Zhu,et al. Feedback Nash Equilibrium for Randomly Switching Differential–Algebraic Games , 2020, IEEE Transactions on Automatic Control.
[4] Quanyan Zhu,et al. Control of Multilayer Mobile Autonomous Systems in Adversarial Environments: A Games-in-Games Approach , 2019, IEEE Transactions on Control of Network Systems.
[5] Quanyan Zhu,et al. A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems , 2019, Comput. Secur..
[6] Quanyan Zhu,et al. A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network , 2019, IEEE Transactions on Information Forensics and Security.
[7] Quanyan Zhu,et al. A Differential Game Approach to Decentralized Virus-Resistant Weight Adaptation Policy Over Complex Networks , 2019, IEEE Transactions on Control of Network Systems.
[8] Quanyan Zhu,et al. Optimal Secure Two-Layer IoT Network Design , 2017, IEEE Transactions on Control of Network Systems.
[9] Quanyan Zhu,et al. A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design , 2020, SpringerBriefs in Electrical and Computer Engineering.
[10] Tamer Basar,et al. Dynamic Games in Cyber-Physical Security: An Overview , 2019, Dyn. Games Appl..
[11] Wanlei Zhou,et al. Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach , 2019, IEEE Transactions on Information Forensics and Security.
[12] Quanyan Zhu,et al. Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes , 2019, GameSec.
[13] Quanyan Zhu,et al. Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals , 2019, GameSec.
[14] Quanyan Zhu,et al. A games-in-games approach to mosaic command and control design of dynamic network-of-networks for secure and resilient multi-domain operations , 2019, Defense + Commercial Sensing.
[15] Karl Henrik Johansson,et al. Design of Attack-Resilient Consensus Dynamics: A Game-Theoretic Approach , 2019, 2019 18th European Control Conference (ECC).
[16] Quanyan Zhu,et al. Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things , 2019, IEEE Transactions on Information Forensics and Security.
[17] Quanyan Zhu,et al. Game theory for cyber deception: a tutorial , 2019, HotSoS.
[18] Lei Guo,et al. Controllability of Nash Equilibrium in Game-Based Control Systems , 2019, IEEE Transactions on Automatic Control.
[19] Tamer Basar,et al. Communication scheduling and remote estimation with adversarial intervention , 2019, IEEE/CAA Journal of Automatica Sinica.
[20] Karl Henrik Johansson,et al. A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems , 2018, 2019 American Control Conference (ACC).
[21] Quanyan Zhu,et al. Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.
[22] Quanyan Zhu,et al. iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.
[23] Quanyan Zhu,et al. Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.
[24] Shreyas Sundaram,et al. Byzantine-resilient distributed observers for LTI systems , 2018, Autom..
[25] Quanyan Zhu,et al. A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..
[26] M. Pirani,et al. A systems and control perspective of CPS security , 2019, Annu. Rev. Control..
[27] Radha Poovendran,et al. A Game Theoretical Framework for Inter-process Adversarial Intervention Detection , 2018, GameSec.
[28] Quanyan Zhu,et al. Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.
[29] Quanyan Zhu,et al. A Linear Quadratic Differential Game Approach to Dynamic Contract Design for Systemic Cyber Risk Management under Asymmetric Information , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[30] Quanyan Zhu,et al. Game Theory Meets Network Security: A Tutorial , 2018, CCS.
[31] Quanyan Zhu,et al. Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems , 2018, 2018 IEEE Conference on Control Technology and Applications (CCTA).
[32] Quanyan Zhu,et al. A hybrid stochastic game for secure control of cyber-physical systems , 2018, Autom..
[33] Jason R. Marden,et al. Game Theory and Control , 2018, Annu. Rev. Control. Robotics Auton. Syst..
[34] Quanyan Zhu,et al. On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats , 2018, IEEE Access.
[35] Quanyan Zhu,et al. Factored markov game theory for secure interdependent infrastructure networks , 2018 .
[36] Richard J. La. Estimation of externalities in interdependent security: A case study of large systems , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[37] Quanyan Zhu,et al. A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.
[38] Quanyan Zhu,et al. Secure and practical output feedback control for cloud-enabled cyber-physical systems , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[39] Walid Saad,et al. Colonel Blotto Game for Secure State Estimation in Interdependent Critical Infrastructure , 2017, ArXiv.
[40] Ling Shi,et al. A Game-theoretic Approach to Remote State Estimation in Presence of a DoS Attacker , 2017 .
[41] Quanyan Zhu,et al. Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach , 2017, IEEE Transactions on Information Forensics and Security.
[42] Valery A. Ugrinovskii,et al. Controller-jammer game models of Denial of Service in control systems operating over packet-dropping links , 2017, Autom..
[43] Quanyan Zhu,et al. Electric power dependent dynamic tariffs for water distribution systems , 2017, CySWATER@CPSWeek.
[44] Quanyan Zhu,et al. A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks , 2017, SCAV@CPSWeek.
[45] Quanyan Zhu,et al. Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory , 2017, IEEE Access.
[46] Quanyan Zhu,et al. A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017, IEEE Journal on Selected Areas in Communications.
[47] Sanjit Dhami,et al. The Foundations of Behavioral Economic Analysis , 2017 .
[48] Quanyan Zhu,et al. A Game-Theoretic Framework for Resilient and Distributed Generation Control of Renewable Energies in Microgrids , 2016, IEEE Transactions on Smart Grid.
[49] Quanyan Zhu,et al. GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats , 2016, GameSec.
[50] Quanyan Zhu,et al. Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things , 2016, GameSec.
[51] Ping Zhang,et al. Detection of covert attacks and zero dynamics attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).
[52] Quanyan Zhu,et al. Cross-layer secure cyber-physical control system design for networked 3D printers , 2016, 2016 American Control Conference (ACC).
[53] Yevgeniy Vorobeychik,et al. Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments , 2016, GameSec.
[54] Jing Liu,et al. A Survey of Game Theoretic Methods for Cyber Security , 2016, 2016 IEEE First International Conference on Data Science in Cyberspace (DSC).
[55] Walid Saad,et al. On bounded rationality in cyber-physical systems security: Game-theoretic analysis with application to smart grid protection , 2016, 2016 Joint Workshop on Cyber- Physical Security and Resilience in Smart Grids (CPSR-SG).
[56] Jiming Chen,et al. Optimal Denial-of-Service Attack Policy against Wireless Industrial Control Systems , 2016 .
[57] Lei Guo,et al. Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach , 2016, IEEE Transactions on Industrial Informatics.
[58] Quanyan Zhu,et al. Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment , 2015, 2016 IEEE 55th Conference on Decision and Control (CDC).
[59] K. Ramachandran,et al. Dynamic Game Theories in Cyber Security , 2016 .
[60] Tamer Basar,et al. A Zero-Sum Game Between the Network Designer and an Adversary in Consensus Protocols , 2016 .
[61] Anuradha M. Annaswamy,et al. Emerging research topics in control for smart infrastructures , 2016, Annu. Rev. Control..
[62] Paul Strauss. Human Factors In Engineering And Design , 2016 .
[63] Paulo Tabuada,et al. Attack-resilient state estimation in the presence of noise , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[64] Quanyan Zhu,et al. Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks , 2015, GameSec.
[65] Quanyan Zhu,et al. Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.
[66] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[67] Mehdi Kharrazi,et al. A composite-metric based path selection technique for the Tor anonymity network , 2015, J. Syst. Softw..
[68] Yuval Elovici,et al. Detection of malicious PDF files and directions for enhancements: A state-of-the art survey , 2015, Comput. Secur..
[69] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[70] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[71] Quanyan Zhu,et al. Hierarchical architectures of resilient control systems: Concepts, metrics and design principles , 2015 .
[72] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[73] Quanyan Zhu,et al. A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design , 2014, GameSec.
[74] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[75] Aron Laszka,et al. Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game , 2013, GameSec.
[76] Quanyan Zhu,et al. An impact-aware defense against Stuxnet , 2013, 2013 American Control Conference.
[77] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[78] B. Obama. Presidential Policy Directive 21: Critical Infrastructure Security and Resilience , 2013 .
[79] Yang Xiao,et al. Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.
[80] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[81] A. Lee Swindlehurst,et al. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.
[82] W. Ziemba,et al. Growth-optimal investments and numeraire portfolios under transactions costs , 2013 .
[83] Quanyan Zhu,et al. Resilient Distributed Control of Multi-agent Cyber-Physical Systems , 2013, CPSW@CISS.
[84] S. Shankar Sastry,et al. Security of interdependent and identical networked control systems , 2013, Autom..
[85] David A. Castañón,et al. Dynamic network interdiction games with imperfect information and deception , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[86] Quanyan Zhu,et al. Deceptive routing games , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[87] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[88] Quanyan Zhu,et al. Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.
[89] Quanyan Zhu,et al. Heterogeneous learning in zero-sum stochastic games with incomplete information , 2011, 49th IEEE Conference on Decision and Control (CDC).
[90] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[91] Samuel Greengard,et al. The new face of war , 2010, Commun. ACM.
[92] Kun Ji,et al. Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights , 2010, 2010 3rd International Symposium on Resilient Control Systems.
[93] Quanyan Zhu,et al. Network Security Configurations: A Nonzero-Sum Stochastic Game Approach , 2010, Proceedings of the 2010 American Control Conference.
[94] Ana Sokolova,et al. Information-Acquisition-as-a-Service for Cyber-Physical Cloud Computing , 2010, HotCloud.
[95] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[96] Christopher A. Sims,et al. RATIONAL INATTENTION AND MONETARY ECONOMICS , 2010 .
[97] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .
[98] Huseyin Cavusoglu,et al. Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment , 2008, J. Manag. Inf. Syst..
[99] Richard M. Murray,et al. Recent Research in Cooperative Control of Multivehicle Systems , 2007 .
[100] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[101] Michael Chertoff. Department of Homeland Security. , 2007, Disaster medicine and public health preparedness.
[102] R. Pesenti,et al. Mechanism Design for Optimal Consensus Problems , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.
[103] Ranjan K. Mallik,et al. Analysis of an on-off jamming situation as a dynamic game , 2000, IEEE Trans. Commun..
[104] J. Doyle,et al. Essentials of Robust Control , 1997 .
[105] Tuomas Aura,et al. Strategies against replay attacks , 1997, Proceedings 10th Computer Security Foundations Workshop.
[106] T. Basar,et al. H∞-0ptimal Control and Related Minimax Design Problems: A Dynamic Game Approach , 1996, IEEE Trans. Autom. Control..
[107] Tamer Başar,et al. H1-Optimal Control and Related Minimax Design Problems , 1995 .
[108] A. Tversky,et al. Advances in prospect theory: Cumulative representation of uncertainty , 1992 .
[109] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[110] R. Thaler. Some empirical evidence on dynamic inconsistency , 1981 .
[111] L. Shapley,et al. Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.