default search action
Quanyan Zhu
Person information
- affiliation: New York University, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [e3]Arunesh Sinha, Jie Fu, Quanyan Zhu, Tao Zhang:
Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings. Lecture Notes in Computer Science 14908, Springer 2025, ISBN 978-3-031-74834-9 [contents] - 2024
- [j86]Linan Huang, Quanyan Zhu:
ZETAR: Modeling and Computational Design of Strategic and Adaptive Compliance Policies. IEEE Trans. Comput. Soc. Syst. 11(3): 4001-4015 (2024) - [j85]Veronica Adetola, Thomas Edgar, Sai Pushpak Nandanoori, Quanyan Zhu, Craig Rieger, Masoud Abbaszadeh:
Guest Editorial: Special section on Resilient Control of Cyber-Physical Power and Energy Systems. IEEE Trans. Control. Syst. Technol. 32(5): 1688-1691 (2024) - [j84]Yuhan Zhao, Juntao Chen, Quanyan Zhu:
Integrated Cyber-Physical Resiliency for Power Grids Under IoT-Enabled Dynamic Botnet Attacks. IEEE Trans. Control. Syst. Technol. 32(5): 1755-1769 (2024) - [j83]Yunfei Ge, Quanyan Zhu:
GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks. IEEE Trans. Inf. Forensics Secur. 19: 540-554 (2024) - [j82]Yeongwoo Kim, György Dán, Quanyan Zhu:
Human-in-the-Loop Cyber Intrusion Detection Using Active Learning. IEEE Trans. Inf. Forensics Secur. 19: 8658-8672 (2024) - [c182]Junjie Huang, Quanyan Zhu:
PenHeal: A Two-Stage LLM Framework for Automated Pentesting and Optimal Remediation. AutonomousCyber@CCS 2024: 11-22 - [c181]Yunfei Ge, Quanyan Zhu:
MEGA-PT: A Meta-game Framework for Agile Penetration Testing. GameSec 2024: 24-44 - [c180]Mingsheng Yin, Tao Li, Haozhe Lei, Yaqi Hu, Sundeep Rangan, Quanyan Zhu:
Zero-Shot Wireless Indoor Navigation through Physics-Informed Reinforcement Learning. ICRA 2024: 5111-5118 - [c179]Yuhan Zhao, Quanyan Zhu:
Stackelberg Game-Theoretic Trajectory Guidance for Multi-Robot Systems with Koopman Operator. ICRA 2024: 12326-12332 - [i211]Yuhan Zhao, Juntao Chen, Quanyan Zhu:
Integrated Cyber-Physical Resiliency for Power Grids under IoT-Enabled Dynamic Botnet Attacks. CoRR abs/2401.01963 (2024) - [i210]Kim Hammar, Tao Li, Rolf Stadler, Quanyan Zhu:
Automated Security Response through Online Learning with Adaptive Conjectures. CoRR abs/2402.12499 (2024) - [i209]Tao Li, Kim Hammar, Rolf Stadler, Quanyan Zhu:
Conjectural Online Learning with First-order Beliefs in Asymmetric Information Stochastic Games. CoRR abs/2402.18781 (2024) - [i208]Yinan Hu, Juntao Chen, Quanyan Zhu:
Understanding Police Force Resource Allocation using Adversarial Optimal Transport with Incomplete Information. CoRR abs/2403.00972 (2024) - [i207]Quanyan Zhu, Tamer Basar:
Disentangling Resilience from Robustness: Contextual Dualism, Interactionism, and Game-Theoretic Paradigms. CoRR abs/2403.06299 (2024) - [i206]Tao Li, Quanyan Zhu:
Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare. CoRR abs/2403.10570 (2024) - [i205]Yuhan Zhao, Quanyan Zhu:
Incentive-Compatible and Distributed Allocation for Robotic Service Provision Through Contract Theory. CoRR abs/2403.10733 (2024) - [i204]Yuhan Zhao, Quanyan Zhu:
Stackelberg Meta-Learning Based Shared Control for Assistive Driving. CoRR abs/2403.10736 (2024) - [i203]Yunian Pan, Tao Li, Quanyan Zhu:
On the Variational Interpretation of Mirror Play in Monotone Games. CoRR abs/2403.15636 (2024) - [i202]Quanyan Zhu:
Foundations of Cyber Resilience: The Confluence of Game, Control, and Learning Theories. CoRR abs/2404.01205 (2024) - [i201]Yuhan Zhao, Lan Shi, Quanyan Zhu:
Stackelberg Game-Theoretic Learning for Collaborative Assembly Task Planning. CoRR abs/2404.12570 (2024) - [i200]Ya-Ting Yang, Tao Zhang, Quanyan Zhu:
A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd. CoRR abs/2404.16195 (2024) - [i199]Yunfei Ge, Quanyan Zhu:
Attributing Responsibility in AI-Induced Incidents: A Computational Reflective Equilibrium Framework for Accountability. CoRR abs/2404.16957 (2024) - [i198]Xuan Liu, Jie Zhang, Song Guo, Haoyang Shang, Chengxu Yang, Quanyan Zhu:
Exploring Prosocial Irrationality for LLM Agents: A Social Cognition View. CoRR abs/2405.14744 (2024) - [i197]Yunian Pan, Quanyan Zhu:
Model-Agnostic Zeroth-Order Policy Optimization for Meta-Learning of Ergodic Linear Quadratic Regulators. CoRR abs/2405.17370 (2024) - [i196]Tao Li, Zilin Bian, Haozhe Lei, Fan Zuo, Ya-Ting Yang, Quanyan Zhu, Zhenning Li, Zhibin Chen, Kaan Ozbay:
Digital Twin-based Driver Risk-Aware Intelligent Mobility Analytics for Urban Transportation Management. CoRR abs/2407.15025 (2024) - [i195]Junjie Huang, Quanyan Zhu:
PenHeal: A Two-Stage LLM Framework for Automated Pentesting and Optimal Remediation. CoRR abs/2407.17788 (2024) - [i194]Shuo Huang, Fred Jones, Nikolos Gurney, David V. Pynadath, Kunal Srivastava, Stoney Trent, Peggy Wu, Quanyan Zhu:
PsybORG+: Modeling and Simulation for Detecting Cognitive Biases in Advanced Persistent Threats. CoRR abs/2408.01310 (2024) - [i193]Tao Li, Zilin Bian, Haozhe Lei, Fan Zuo, Ya-Ting Yang, Quanyan Zhu, Zhenning Li, Kaan Ozbay:
Multi-level Traffic-Responsive Tilt Camera Surveillance through Predictive Correlated Online Learning. CoRR abs/2408.02208 (2024) - [i192]Ya-Ting Yang, Haozhe Lei, Quanyan Zhu:
Adaptive Incentive-Compatible Navigational Route Recommendations in Urban Transportation Networks. CoRR abs/2409.00236 (2024) - [i191]Ya-Ting Yang, Haozhe Lei, Quanyan Zhu:
PRADA: Proactive Risk Assessment and Mitigation of Misinformed Demand Attacks on Navigational Route Recommendations. CoRR abs/2409.00243 (2024) - [i190]Yunfei Ge, Quanyan Zhu:
MEGA-PT: A Meta-Game Framework for Agile Penetration Testing. CoRR abs/2409.14219 (2024) - [i189]Paula Chanfreut, José M. Maestre, Quanyan Zhu, W. P. M. H. Heemels:
Cooperative nonlinear distributed model predictive control with dissimilar control horizons. CoRR abs/2410.10428 (2024) - [i188]Tao Li, Henger Li, Yunian Pan, Tianyi Xu, Zizhan Zheng, Quanyan Zhu:
Meta Stackelberg Game: Robust Federated Learning against Adaptive and Mixed Poisoning Attacks. CoRR abs/2410.17431 (2024) - [i187]Xinhong Xie, Tao Li, Quanyan Zhu:
Learning from Response not Preference: A Stackelberg Approach for LLM Detoxification using Non-parallel Data. CoRR abs/2410.20298 (2024) - [i186]Haozhe Lei, Yunfei Ge, Quanyan Zhu:
ADAPT: A Game-Theoretic and Neuro-Symbolic Framework for Automated Distributed Adaptive Penetration Testing. CoRR abs/2411.00217 (2024) - [i185]Ya-Ting Yang, Tao Li, Quanyan Zhu:
Transparent Tagging for Strategic Social Nudges on User-Generated Misinformation. CoRR abs/2411.00825 (2024) - [i184]Quanyan Zhu, Tamer Basar:
Revisiting Game-Theoretic Control in Socio-Technical Networks: Emerging Design Frameworks and Contemporary Applications. CoRR abs/2411.01794 (2024) - 2023
- [b6]Linan Huang, Quanyan Zhu:
Cognitive Security - A System-Scientific Approach. Springer Briefs in Computer Science, Springer 2023, ISBN 978-3-031-30708-9, pp. 1-110 - [j81]Juntao Chen, Muhammad Junaid Farooq, Quanyan Zhu:
QoS-Based Contract Design for Profit Maximization in IoT-Enabled Data Markets. IEEE Internet Things J. 10(11): 10080-10094 (2023) - [j80]Juntao Chen, Quanyan Zhu:
A Cross-Layer Design Approach to Strategic Cyber Defense and Robust Switching Control of Cyber-Physical Wind Energy Systems. IEEE Trans Autom. Sci. Eng. 20(1): 624-635 (2023) - [j79]Shutian Liu, Tao Li, Quanyan Zhu:
Game-Theoretic Distributed Empirical Risk Minimization With Strategic Network Design. IEEE Trans. Signal Inf. Process. over Networks 9: 542-556 (2023) - [c178]Tao Zhang, Quanyan Zhu:
Stochastic Game with Interactive Information Acquisition: A Fixed-Point Alignment Principle. Allerton 2023: 1-8 - [c177]Madhu Dhiman, Chen Peng, Veeraruna Kavitha, Quanyan Zhu:
Integrative Modeling and Analysis of the Interplay Between Epidemic and News Propagation Processes. ACC 2023: 2436-2443 - [c176]Yunian Pan, Tao Li, Quanyan Zhu:
On the Resilience of Traffic Networks under Non-Equilibrium Learning. ACC 2023: 3484-3489 - [c175]Tao Li, Quanyan Zhu:
On the Price of Transparency: A Comparison Between Overt Persuasion and Covert Signaling. CDC 2023: 4267-4272 - [c174]Yunian Pan, Tao Li, Quanyan Zhu:
Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks? A Traffic Assignment Resilience Study. CDC 2023: 8328-8333 - [c173]Ya-Ting Yang, Tao Zhang, Quanyan Zhu:
A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd. GameSec 2023: 349-368 - [c172]Tao Li, Haozhe Lei, Quanyan Zhu:
Self-Adaptive Driving in Nonstationary Environments through Conjectural Online Lookahead Adaptation. ICRA 2023: 7205-7211 - [c171]Yunfei Ge, Tao Li, Quanyan Zhu:
Scenario-Agnostic Zero-Trust Defense with Explainable Threshold Policy: A Meta-Learning Approach. INFOCOM Workshops 2023: 1-6 - [c170]Chen Peng, Quanyan Zhu:
Trust-Aware Resource Management for Secure and Optimal Network Slicing in 5G Mobile Edge Networks. INFOCOM Workshops 2023: 1-6 - [c169]Yuhan Zhao, Quanyan Zhu:
Stackelberg Meta-Learning for Strategic Guidance in Multi-Robot Trajectory Planning. IROS 2023: 11342-11347 - [c168]Yinan Hu, Quanyan Zhu:
Detection in Human-Sensor Systems Under Quantum Prospect Theory Using Bayesian Persuasion Frameworks. SSP 2023: 36-40 - [c167]Ya-Ting Yang, Tao Li, Quanyan Zhu:
Designing Policies for Truth: Combating Misinformation with Transparency and Information Design. WiOpt 2023: 127-134 - [i183]Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu:
A Rolling Horizon Game Considering Network Effect in Cluster Forming for Dynamic Resilient Multiagent Systems. CoRR abs/2301.03302 (2023) - [i182]Juntao Chen, Junaid Farooq, Quanyan Zhu:
QoS Based Contract Design for Profit Maximization in IoT-Enabled Data Markets. CoRR abs/2301.04691 (2023) - [i181]Linan Huang, Quanyan Zhu:
An Introduction of System-Scientific Approaches to Cognitive Security. CoRR abs/2301.05920 (2023) - [i180]Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu:
Cluster Forming of Multiagent Systems in Rolling Horizon Games with Non-uniform Horizons. CoRR abs/2301.11152 (2023) - [i179]Quanyan Zhu:
The Doctrine of Cyber Effect: An Ethics Framework for Defensive Cyber Deception. CoRR abs/2302.13362 (2023) - [i178]Yunfei Ge, Tao Li, Quanyan Zhu:
Scenario-Agnostic Zero-Trust Defense with Explainable Threshold Policy: A Meta-Learning Approach. CoRR abs/2303.03349 (2023) - [i177]Tao Li, Quanyan Zhu:
On the Price of Transparency: A Comparison between Overt Persuasion and Covert Signaling. CoRR abs/2304.00096 (2023) - [i176]Yunian Pan, Tao Li, Quanyan Zhu:
Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks? A Traffic Assignment Resilience Study. CoRR abs/2304.01161 (2023) - [i175]Tao Zhang, Quanyan Zhu:
Multiagent Incentive Design for Dynamic Task Delegation with Off-Menu Actions. CoRR abs/2304.06842 (2023) - [i174]Ya-Ting Yang, Tao Li, Quanyan Zhu:
Designing Policies for Truth: Combating Misinformation with Transparency and Information Design. CoRR abs/2304.08588 (2023) - [i173]Yunfei Ge, Quanyan Zhu:
AI Liability Insurance With an Example in AI-Powered E-diagnosis System. CoRR abs/2306.01149 (2023) - [i172]Mingsheng Yin, Tao Li, Haozhe Lei, Yaqi Hu, Sundeep Rangan, Quanyan Zhu:
Generalizable Wireless Navigation through Physics-Informed Reinforcement Learning in Wireless Digital Twin. CoRR abs/2306.06766 (2023) - [i171]Henger Li, Tianyi Xu, Tao Li, Yunian Pan, Quanyan Zhu, Zizhan Zheng:
A First Order Meta Stackelberg Method for Robust Federated Learning (Technical Report). CoRR abs/2306.13273 (2023) - [i170]Yunian Pan, Tao Li, Henger Li, Tianyi Xu, Zizhan Zheng, Quanyan Zhu:
A First Order Meta Stackelberg Method for Robust Federated Learning. CoRR abs/2306.13800 (2023) - [i169]Mustafa Abdallah, Saurabh Bagchi, Shaunak D. Bopardikar, Kevin Chan, Xing Gao, Murat Kantarcioglu, Congmiao Li, Peng Liu, Quanyan Zhu:
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions. CoRR abs/2309.01281 (2023) - [i168]Haozhe Lei, Quanyan Zhu:
Neurosymbolic Meta-Reinforcement Lookahead Learning Achieves Safe Self-Driving in Non-Stationary Environments. CoRR abs/2309.02328 (2023) - [i167]Yinan Hu, Quanyan Zhu:
Game of Travesty: Decoy-based Psychological Cyber Deception for Proactive Human Agents. CoRR abs/2309.13403 (2023) - [i166]Yuhan Zhao, Quanyan Zhu:
Stackelberg Game-Theoretic Trajectory Guidance for Multi-Robot Systems with Koopman Operator. CoRR abs/2309.16098 (2023) - [i165]Ya-Ting Yang, Haozhe Lei, Quanyan Zhu:
Strategic Information Attacks on Incentive-Compatible Navigational Recommendations in Intelligent Transportation Systems. CoRR abs/2310.01646 (2023) - [i164]Tao Li, Yunian Pan, Quanyan Zhu:
Decision-Dominant Strategic Defense Against Lateral Movement for 5G Zero-Trust Multi-Domain Networks. CoRR abs/2310.01675 (2023) - [i163]Tao Li, Juan Guevara, Xinghong Xie, Quanyan Zhu:
Self-Confirming Transformer for Locally Consistent Online Adaptation in Multi-Agent Reinforcement Learning. CoRR abs/2310.04579 (2023) - [i162]Yunfei Ge, Quanyan Zhu:
Zero Trust for Cyber Resilience. CoRR abs/2312.02882 (2023) - [i161]Shutian Liu, Quanyan Zhu:
Cyber Insurance for Cyber Resilience. CoRR abs/2312.02921 (2023) - 2022
- [b5]Carol S. Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, Linan Huang, Xiaoxu Diao, Rakibul Talukdar, Michael C. Pietrykowski:
Cyber-Security Threats and Response Models in Nuclear Power Plants. Springer Briefs in Computer Science, Springer 2022, ISBN 978-3-031-12710-6, pp. 1-90 - [b4]Timothy Kieras, Junaid Farooq, Quanyan Zhu:
IoT Supply Chain Security Risk Analysis and Mitigation - Modeling, Computations, and Software Tools. Springer Briefs in Computer Science, Springer 2022, ISBN 978-3-031-08479-9, pp. 1-125 - [j78]Quanyan Zhu, Hideaki Ishii:
Introduction to the special section on learning and security for multi-agent systems. Annu. Rev. Control. 53: 249-251 (2022) - [j77]Yunhan Huang, Linan Huang, Quanyan Zhu:
Reinforcement Learning for feedback-enabled cyber resilience. Annu. Rev. Control. 53: 273-295 (2022) - [j76]Tao Li, Yuhan Zhao, Quanyan Zhu:
The role of information structures in game-theoretic multi-agent learning. Annu. Rev. Control. 53: 296-314 (2022) - [j75]Linan Huang, Quanyan Zhu:
RADAMS: Resilient and adaptive alert and attention management strategy against Informational Denial-of-Service (IDoS) attacks. Comput. Secur. 121: 102844 (2022) - [j74]Julian Barreiro-Gomez, Quanyan Zhu:
Coalitional Stochastic Differential Games for Networks. IEEE Control. Syst. Lett. 6: 2707-2712 (2022) - [j73]Quanyan Zhu, Elena A. Gubar, Eitan Altman:
Preface to Special Issue on Dynamic Games for Modeling and Control of Epidemics. Dyn. Games Appl. 12(1): 1-6 (2022) - [j72]Yunhan Huang, Quanyan Zhu:
Game-Theoretic Frameworks for Epidemic Spreading and Human Decision-Making: A Review. Dyn. Games Appl. 12(1): 7-48 (2022) - [j71]Shutian Liu, Yuhan Zhao, Quanyan Zhu:
Herd Behaviors in Epidemics: A Dynamics-Coupled Evolutionary Games Approach. Dyn. Games Appl. 12(1): 183-213 (2022) - [j70]Tao Zhang, Quanyan Zhu:
On Incentive Compatibility in Dynamic Mechanism Design With Exit Option in a Markovian Environment. Dyn. Games Appl. 12(2): 701-745 (2022) - [j69]Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu:
Rolling horizon games of resilient networks with non-uniform horizons. Eur. J. Control 68: 100693 (2022) - [j68]Linan Huang, Quanyan Zhu:
A Dynamic Game Framework for Rational and Persistent Robot Deception With an Application to Deceptive Pursuit-Evasion. IEEE Trans Autom. Sci. Eng. 19(4): 2918-2932 (2022) - [j67]Rui Zhang, Quanyan Zhu:
Optimal Cyber-Insurance Contract Design for Dynamic Risk Management and Mitigation. IEEE Trans. Comput. Soc. Syst. 9(4): 1087-1100 (2022) - [j66]Linan Huang, Shumeng Jia, Emily Balcetis, Quanyan Zhu:
ADVERT: An Adaptive and Data-Driven Attention Enhancement Mechanism for Phishing Prevention. IEEE Trans. Inf. Forensics Secur. 17: 2585-2597 (2022) - [c166]Yunhan Huang, Tao Zhang, Quanyan Zhu:
The Inverse Problem of Linear-Quadratic Differential Games: When is a Control Strategies Profile Nash? Allerton 2022: 1-7 - [c165]Shutian Liu, Quanyan Zhu:
EPROACH: A Population Vaccination Game for Strategic Information Design to Enable Responsible COVID Reopening. ACC 2022: 568-573 - [c164]Shutian Liu, Yuhan Zhao, Quanyan Zhu:
Understanding the Interplay Between Herd Behaviors and Epidemic Spreading Using Federated Evolutionary Games. ACC 2022: 593-598 - [c163]Yuhan Zhao, Quanyan Zhu:
Distributed and Resilient Planning-Control for Optimal LEO Satellite Constellation Coverage. ACC 2022: 1841-1846 - [c162]José M. Maestre, Eva Masero, José Ramón Salvador, D. R. Ramirez, Quanyan Zhu:
On Data Reutilization for Historian Based Predictive Control. CDC 2022: 474-478 - [c161]Yinan Hu, Quanyan Zhu:
Evasion-Aware Neyman-Pearson Detectors: A Game-Theoretic Approach. CDC 2022: 6111-6117 - [c160]Juntao Chen, Yunhan Huang, Quanyan Zhu:
Transactive Resilience in Renewable Microgrids: A Contract-Theoretic Approach. CISS 2022: 1-6 - [c159]Yunfei Ge, Quanyan Zhu:
Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks. CNS 2022: 359-364 - [c158]Shutian Liu, Quanyan Zhu:
On the Role of Risk Perceptions in Cyber Insurance Contracts. CNS 2022: 377-382 - [c157]Yunian Pan, Quanyan Zhu:
On Poisoned Wardrop Equilibrium in Congestion Games. GameSec 2022: 191-211 - [c156]Yuhan Zhao, Baichuan Huang, Jingjin Yu, Quanyan Zhu:
Stackelberg Strategic Guidance for Heterogeneous Robots Collaboration. ICRA 2022: 4922-4928 - [c155]Yunfei Ge, Quanyan Zhu:
MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks. MILCOM 2022: 571-576 - [i160]Tao Zhang, Quanyan Zhu:
Bayesian Promised Persuasion: Dynamic Forward-Looking Multiagent Delegation with Informational Burning. CoRR abs/2201.06081 (2022) - [i159]Yunfei Ge, Quanyan Zhu:
Accountability and Insurance in IoT Supply Chain. CoRR abs/2201.11855 (2022) - [i158]Yuhan Zhao, Baichuan Huang, Jingjin Yu, Quanyan Zhu:
Stackelberg Strategic Guidance for Heterogeneous Robots Collaboration. CoRR abs/2202.01877 (2022) - [i157]Yuhan Zhao, Quanyan Zhu:
Autonomous and Resilient Control for Optimal LEO Satellite Constellation Coverage Against Space Threats. CoRR abs/2203.02050 (2022) - [i156]Yunhan Huang, Quanyan Zhu:
Reinforcement Learning for Linear Quadratic Control is Vulnerable Under Cost Manipulation. CoRR abs/2203.05774 (2022) - [i155]Tao Zhang, Quanyan Zhu:
Forward-Looking Dynamic Persuasion for Pipeline Stochastic Bayesian Game: A Fixed-Point Alignment Principle. CoRR abs/2203.09725 (2022) - [i154]Shutian Liu, Quanyan Zhu:
Mitigating Moral Hazard in Cyber Insurance Using Risk Preference Design. CoRR abs/2203.12001 (2022) - [i153]Linan Huang, Quanyan Zhu:
ZETAR: Modeling and Computational Design of Strategic and Adaptive Compliance Policies. CoRR abs/2204.02294 (2022) - [i152]Yinan Hu, Quanyan Zhu:
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion. CoRR abs/2206.05276 (2022) - [i151]Shutian Liu, Quanyan Zhu:
Stackelberg Risk Preference Design. CoRR abs/2206.12938 (2022) - [i150]Yunhan Huang, Tao Zhang, Quanyan Zhu:
The Inverse Problem of Linear-Quadratic Differential Games: When is a Control Strategies Profile Nash? CoRR abs/2207.05303 (2022) - [i149]Tao Li, Haozhe Lei, Quanyan Zhu:
Sampling Attacks on Meta Reinforcement Learning: A Minimax Formulation and Complexity Analysis. CoRR abs/2208.00081 (2022) - [i148]Yuhan Zhao, Craig Rieger, Quanyan Zhu:
Multi-Agent Learning for Resilient Distributed Control Systems. CoRR abs/2208.05060 (2022) - [i147]Yunian Pan, Quanyan Zhu:
On Poisoned Wardrop Equilibrium in Congestion Games. CoRR abs/2209.00094 (2022) - [i146]Tao Li, Haozhe Lei, Quanyan Zhu:
Self-Adaptive Driving in Nonstationary Environments through Conjectural Online Lookahead Adaptation. CoRR abs/2210.03209 (2022) - [i145]Yunian Pan, Tao Li, Quanyan Zhu:
On the Resilience of Traffic Networks under Non-Equilibrium Learning. CoRR abs/2210.03214 (2022) - [i144]Shutian Liu, Quanyan Zhu:
On the Role of Risk Perceptions in Cyber Insurance Contracts. CoRR abs/2210.15010 (2022) - [i143]Yuhan Zhao, Quanyan Zhu:
Stackelberg Meta-Learning Based Control for Guided Cooperative LQG Systems. CoRR abs/2211.06512 (2022) - [i142]Yuhan Zhao, Quanyan Zhu:
Stackelberg Meta-Learning for Strategic Guidance in Multi-Robot Trajectory Planning. CoRR abs/2211.13336 (2022) - [i141]Yurid Nugraha, Tomohisa Hayakawa, Hideaki Ishii, Ahmet Cetinkaya, Quanyan Zhu:
Two-Player Incomplete Games of Resilient Multiagent Systems. CoRR abs/2212.01570 (2022) - [i140]Haozhe Lei, Quanyan Zhu:
Level-k Meta-Learning for Pedestrian-Aware Self-Driving. CoRR abs/2212.08800 (2022) - [i139]Tao Li, Quanyan Zhu:
Commitment with Signaling under Double-sided Information Asymmetry. CoRR abs/2212.11446 (2022) - 2021
- [j65]Timothy Kieras, Muhammad Junaid Farooq, Quanyan Zhu:
I-SCRAM: A Framework for IoT Supply Chain Risk Analysis and Mitigation Decisions. IEEE Access 9: 29827-29840 (2021) - [j64]Guanze Peng, Juntao Chen, Quanyan Zhu:
Distributed Stabilization of Two Interdependent Markov Jump Linear Systems With Partial Information. IEEE Control. Syst. Lett. 5(2): 713-718 (2021) - [j63]Shutian Liu, Quanyan Zhu:
Robust and Stochastic Optimization With a Hybrid Coherent Risk Measure With an Application to Supervised Learning. IEEE Control. Syst. Lett. 5(3): 965-970 (2021) - [j62]Suyog Kapsikar, Indrajit Saha, Khushboo Agarwal, Veeraruna Kavitha, Quanyan Zhu:
Controlling Fake News by Collective Tagging: A Branching Process Analysis. IEEE Control. Syst. Lett. 5(6): 2108-2113 (2021) - [j61]Juntao Chen, Quanyan Zhu, Tamer Basar:
Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks. Dyn. Games Appl. 11(2): 294-325 (2021) - [j60]Quanyan Zhu, Stefan Rass, Bernhard Dieber, Víctor Mayoral Vilches:
Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice. Found. Trends Robotics 9(1): 1-129 (2021) - [j59]Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu:
Dynamic Resilient Network Games With Applications to Multiagent Consensus. IEEE Trans. Control. Netw. Syst. 8(1): 246-259 (2021) - [j58]Linan Huang, Quanyan Zhu:
Duplicity Games for Deception Design With an Application to Insider Threat Mitigation. IEEE Trans. Inf. Forensics Secur. 16: 4843-4856 (2021) - [j57]Muhammad Junaid Farooq, Quanyan Zhu:
QoE Based Revenue Maximizing Dynamic Resource Allocation and Pricing for Fog-Enabled Mission-Critical IoT Applications. IEEE Trans. Mob. Comput. 20(12): 3395-3408 (2021) - [j56]Juntao Chen, Corinne Touati, Quanyan Zhu:
A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled Infrastructure Network. IEEE Trans. Netw. Sci. Eng. 8(3): 2601-2612 (2021) - [j55]Juntao Chen, Yunhan Huang, Rui Zhang, Quanyan Zhu:
Optimal Curing Strategy for Competing Epidemics Spreading Over Complex Networks. IEEE Trans. Signal Inf. Process. over Networks 7: 294-308 (2021) - [c154]Song Fang, Quanyan Zhu:
Information-Theoretic Performance Limitations of Feedback Control: Underlying Entropic Laws and Generic $\mathcal{L}_{p}$ Bounds. ACC 2021: 1281-1286 - [c153]Suyog Kapsikar, Indrajit Saha, Khushboo Agarwal, Veeraruna Kavitha, Quanyan Zhu:
Controlling Fake News by Collective Tagging: A Branching Process Analysis. ACC 2021: 1332-1337 - [c152]Song Fang, Quanyan Zhu:
Fundamental Limits of Obfuscation for Linear Gaussian Dynamical Systems: An Information-Theoretic Approach. ACC 2021: 4574-4579 - [c151]Guanze Peng, Tao Li, Shutian Liu, Juntao Chen, Quanyan Zhu:
Locally-Aware Constrained Games on Networks. ACC 2021: 4606-4611 - [c150]Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu:
Cluster Formation in Multiagent Consensus via Dynamic Resilient Graph Games. CCTA 2021: 735-740 - [c149]Yunian Pan, Quanyan Zhu:
Efficient Episodic Learning of Nonstationary and Unknown Zero-Sum Games Using Expert Game Ensembles. CDC 2021: 1669-1676 - [c148]Yunhan Huang, Juntao Chen, Quanyan Zhu:
Defending an Asset with Partial Information and Selected Observations: A Differential Game Framework. CDC 2021: 2366-2373 - [c147]Yunhan Huang, Quanyan Zhu:
Self-Triggered Markov Decision Processes. CDC 2021: 4507-4514 - [c146]Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu:
Rolling Horizon Games for Cluster Formation of Resilient Multiagent Systems. CDC 2021: 4829-4934 - [c145]Tao Li, Guanze Peng, Quanyan Zhu:
Blackwell Online Learning for Markov Decision Processes. CISS 2021: 1-6 - [c144]Yunhan Huang, Zehui Xiong, Quanyan Zhu:
Cross-Layer Coordinated Attacks on Cyber-Physical Systems: A LQG Game Framework with Controlled Observations. ECC 2021: 521-528 - [c143]Song Fang, Quanyan Zhu:
Fundamental Stealthiness-Distortion Tradeoffs in Dynamical Systems under Injection Attacks: A Power Spectral Analysis. ECC 2021: 964-969 - [c142]Yuhan Zhao, Yunfei Ge, Quanyan Zhu:
Combating Ransomware in Internet of Things: A Games-in-Games Approach for Cross-Layer Cyber Defense and Security Investment. GameSec 2021: 208-228 - [c141]Linan Huang, Quanyan Zhu:
Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability. GameSec 2021: 314-333 - [i138]Song Fang, Quanyan Zhu:
Relativistic Rocket Control (Relativistic Space-Travel Flight Control): Feedback Control of Relativistic Dynamics Propelled by Ejecting Mass. CoRR abs/2101.00957 (2021) - [i137]Tao Zhang, Quanyan Zhu:
On the Differential Private Data Market: Endogenous Evolution, Dynamic Pricing, and Incentive Compatibility. CoRR abs/2101.04357 (2021) - [i136]Song Fang, Quanyan Zhu:
Feedback Capacity of Parallel ACGN Channels and Kalman Filter: Power Allocation with Feedback. CoRR abs/2102.02730 (2021) - [i135]Yunhan Huang, Quanyan Zhu:
A Pursuit-Evasion Differential Game with Strategic Information Acquisition. CoRR abs/2102.05469 (2021) - [i134]Tao Zhang, Quanyan Zhu:
On the Equilibrium Elicitation of Markov Games Through Information Design. CoRR abs/2102.07152 (2021) - [i133]Yunhan Huang, Quanyan Zhu:
Self-Triggered Markov Decision Processes. CoRR abs/2102.08571 (2021) - [i132]Linan Huang, Quanyan Zhu:
Convergence of Bayesian Nash Equilibrium in Infinite Bayesian Games under Discretization. CoRR abs/2102.12059 (2021) - [i131]Quanyan Zhu, Stefan Rass, Bernhard Dieber, Victor Mayoral Vilches:
Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice. CoRR abs/2103.05789 (2021) - [i130]Yunhan Huang, Juntao Chen, Quanyan Zhu:
Assets Defending Differential Games with Partial Information and Selected Observations. CoRR abs/2103.13230 (2021) - [i129]Juntao Chen, Yunhan Huang, Quanyan Zhu:
Transactive Resilience in Renewable Microgrids: A Contract-Theoretic Approach. CoRR abs/2103.17089 (2021) - [i128]Tao Zhang, Quanyan Zhu:
Informational Design of Dynamic Multi-Agent System. CoRR abs/2105.03052 (2021) - [i127]Tao Li, Guanze Peng, Quanyan Zhu, Tamer Basar:
The Confluence of Networks, Games and Learning. CoRR abs/2105.08158 (2021) - [i126]Yunhan Huang, Quanyan Zhu:
Game-Theoretic Frameworks for Epidemic Spreading and Human Decision Making: A Review. CoRR abs/2106.00214 (2021) - [i125]Linan Huang, Quanyan Zhu:
INADVERT: An Interactive and Adaptive Counterdeception Platform for Attention Enhancement and Phishing Prevention. CoRR abs/2106.06907 (2021) - [i124]Shutian Liu, Yuhan Zhao, Quanyan Zhu:
Herd Behaviors in Epidemics: A Dynamics-Coupled Evolutionary Games Approach. CoRR abs/2106.08998 (2021) - [i123]Yunhan Huang, Linan Huang, Quanyan Zhu:
Reinforcement Learning for Feedback-Enabled Cyber Resilience. CoRR abs/2107.00783 (2021) - [i122]Yunian Pan, Quanyan Zhu:
Efficient Episodic Learning of Nonstationary and Unknown Zero-Sum Games Using Expert Game Ensembles. CoRR abs/2107.13632 (2021) - [i121]Linan Huang, Quanyan Zhu:
Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability. CoRR abs/2108.08255 (2021) - [i120]Juntao Chen, Corinne Touati, Quanyan Zhu:
A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled Infrastructure Network. CoRR abs/2108.13159 (2021) - [i119]Shutian Liu, Quanyan Zhu:
EPROACH: A Population Vaccination Game for Strategic Information Design to Enable Responsible COVID Reopening. CoRR abs/2110.06881 (2021) - [i118]Linan Huang, Quanyan Zhu:
RADAMS: Resilient and Adaptive Alert and Attention Management Strategy against Informational Denial-of-Service (IDoS) Attacks. CoRR abs/2111.03463 (2021) - 2020
- [b3]Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu:
Cyber-Security in Critical Infrastructures - A Game-Theoretic Approach. Springer 2020, ISBN 978-3-030-46907-8, pp. 1-282 - [b2]Quanyan Zhu, Zhiheng Xu:
Cross-Layer Design for Secure and Resilient Cyber-Physical Systems - A Decision and Game Theoretic Approach, 3. Advances in Information Security 81, Springer 2020, ISBN 978-3-030-60250-5, pp. 3-183 - [j54]Linan Huang, Quanyan Zhu:
A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems. Comput. Secur. 89 (2020) - [j53]Stefan Rass, Quanyan Zhu:
Computer & security special issue editorial. Comput. Secur. 89 (2020) - [j52]Yunfei Zhao, Linan Huang, Carol S. Smidts, Quanyan Zhu:
Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants. Reliab. Eng. Syst. Saf. 201: 106878 (2020) - [j51]Aneel Tanwani, Quanyan Zhu:
Feedback Nash Equilibrium for Randomly Switching Differential-Algebraic Games. IEEE Trans. Autom. Control. 65(8): 3286-3301 (2020) - [j50]Manjesh Kumar Hanawal, Yezekael Hayel, Quanyan Zhu:
Effective Utilization of Licensed and Unlicensed Spectrum in Large Scale Ad Hoc Networks. IEEE Trans. Cogn. Commun. Netw. 6(2): 618-630 (2020) - [j49]Juntao Chen, Corinne Touati, Quanyan Zhu:
Optimal Secure Two-Layer IoT Network Design. IEEE Trans. Control. Netw. Syst. 7(1): 398-409 (2020) - [j48]Yunhan Huang, Quanyan Zhu:
A Differential Game Approach to Decentralized Virus-Resistant Weight Adaptation Policy Over Complex Networks. IEEE Trans. Control. Netw. Syst. 7(2): 944-955 (2020) - [j47]Juntao Chen, Quanyan Zhu:
Control of Multilayer Mobile Autonomous Systems in Adversarial Environments: A Games-in-Games Approach. IEEE Trans. Control. Netw. Syst. 7(3): 1056-1068 (2020) - [j46]Juntao Chen, Corinne Touati, Quanyan Zhu:
A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network. IEEE Trans. Inf. Forensics Secur. 15: 462-474 (2020) - [j45]Rui Zhang, Quanyan Zhu:
FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things. IEEE Trans. Inf. Forensics Secur. 15: 2026-2041 (2020) - [c140]Yun Li, Tao Zhang, Quanyan Zhu:
Distributed Multi-Battery Coordination for Cooperative Energy Management via ADMM-based Iterative Learning. ACC 2020: 2232-2237 - [c139]Zhentian Qian, Jie Fu, Quanyan Zhu:
A Receding-Horizon MDP Approach for Performance Evaluation of Moving Target Defense in Networks. CCTA 2020: 1-7 - [c138]Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu:
Dynamic Resilient Network Games Considering Connectivity. CDC 2020: 3779-3784 - [c137]Song Fang, Quanyan Zhu:
Fundamental Limitations in Sequential Prediction and Recursive Algorithms: Lp Bounds via an Entropic Analysis. CISS 2020: 1-6 - [c136]Guanze Peng, Quanyan Zhu:
Sequential Hypothesis Testing Game. CISS 2020: 1-6 - [c135]Linan Huang, Quanyan Zhu:
Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots. GameSec 2020: 125-146 - [c134]Yuhan Zhao, Quanyan Zhu:
Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber Supply Chain Ecosystem. GameSec 2020: 326-345 - [c133]Yunian Pan, Guanze Peng, Juntao Chen, Quanyan Zhu:
MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation. GameSec 2020: 365-384 - [c132]Guanze Peng, Tao Zhang, Quanyan Zhu:
A Data-Driven Distributionally Robust Game Using Wasserstein Distance. GameSec 2020: 405-421 - [c131]Song Fang, Quanyan Zhu:
A Connection between Feedback Capacity and Kalman Filter for Colored Gaussian Noises. ISIT 2020: 2055-2060 - [c130]Timothy Kieras, Muhammad Junaid Farooq, Quanyan Zhu:
Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties. SP (Workshops) 2020: 163-170 - [c129]Muhammad Junaid Farooq, Quanyan Zhu:
PhD Forum: Enabling Autonomic IoT for Smart Urban Services. WF-IoT 2020: 1-2 - [c128]Timothy Kieras, Muhammad Junaid Farooq, Quanyan Zhu:
RIoTS: Risk Analysis of IoT Supply Chain Threats. WF-IoT 2020: 1-6 - [p1]Linan Huang, Quanyan Zhu:
Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense. Adaptive Autonomous Secure Cyber Systems 2020: 205-230 - [e2]Quanyan Zhu, John S. Baras, Radha Poovendran, Juntao Chen:
Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings. Lecture Notes in Computer Science 12513, Springer 2020, ISBN 978-3-030-64792-6 [contents] - [i117]Quanyan Zhu:
Control Challenges for Resilient Control Systems. CoRR abs/2001.00712 (2020) - [i116]Muhammad Junaid Farooq, Quanyan Zhu:
PhD Forum: Enabling Autonomic IoT for Smart Urban Services. CoRR abs/2001.01561 (2020) - [i115]Song Fang, Quanyan Zhu:
A Connection between Feedback Capacity and Kalman Filter for Colored Gaussian Noises. CoRR abs/2001.03108 (2020) - [i114]Song Fang, Quanyan Zhu:
Fundamental Limits of Online Learning: An Entropic-Innovations Viewpoint. CoRR abs/2001.03813 (2020) - [i113]Yunhan Huang, Quanyan Zhu:
Manipulating Reinforcement Learning: Poisoning Attacks on Cost Signals. CoRR abs/2002.03827 (2020) - [i112]Zhentian Qian, Jie Fu, Quanyan Zhu:
A Receding-Horizon MDP Approach for Performance Evaluation of Moving Target Defense in Networks. CoRR abs/2002.05146 (2020) - [i111]Tao Zhang, Quanyan Zhu:
Implementability of Honest Multi-Agent Sequential Decision-Making with Dynamic Population. CoRR abs/2003.03173 (2020) - [i110]Rui Zhang, Quanyan Zhu:
Security of Distributed Machine Learning: A Game-Theoretic Approach to Design Secure DSVM. CoRR abs/2003.04735 (2020) - [i109]Guanze Peng, Juntao Chen, Quanyan Zhu:
Distributed Stabilization of State Interdependent Markov Jump LinearSystem-of-Systems with Partial Information. CoRR abs/2003.06493 (2020) - [i108]Timothy Kieras, Muhammad Junaid Farooq, Quanyan Zhu:
Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties. CoRR abs/2003.12363 (2020) - [i107]Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu:
Dynamic Resilient Network Games with Applications to Multi-Agent Consensus. CoRR abs/2003.13554 (2020) - [i106]Tao Zhang, Quanyan Zhu:
Differentially Private Collaborative Intrusion Detection Systems For VANETs. CoRR abs/2005.00703 (2020) - [i105]Guanze Peng, Veeraruna Kavitha, Quanyan Zhu:
On Optimal Control of Discounted Cost Infinite-Horizon Markov Decision Processes Under Local State Information Structures. CoRR abs/2005.03169 (2020) - [i104]Linan Huang, Quanyan Zhu:
Game of Duplicity: A Proactive Automated Defense Mechanism by Deception Design. CoRR abs/2006.07942 (2020) - [i103]Muhammad Junaid Farooq, Quanyan Zhu:
QoE Based Revenue Maximizing Dynamic Resource Allocation and Pricing for Fog-Enabled Mission-Critical IoT Applications. CoRR abs/2006.16894 (2020) - [i102]Linan Huang, Quanyan Zhu:
Cognitive Honeypots against Lateral Movement for Mitigation of Long-Term Vulnerability. CoRR abs/2007.13981 (2020) - [i101]Song Fang, Quanyan Zhu:
Channel Leakage and Fundamental Limits of Privacy Leakage for Streaming Data. CoRR abs/2008.04893 (2020) - [i100]Zhili Zhang, Quanyan Zhu:
Deceptive Kernel Function on Observations of Discrete POMDP. CoRR abs/2008.05585 (2020) - [i99]Suyog Kapsikar, Indrajit Saha, Khushboo Agarwal, Veeraruna Kavitha, Quanyan Zhu:
Controlling Fake News by Tagging: A Branching Process Analysis. CoRR abs/2009.02275 (2020) - [i98]Song Fang, Quanyan Zhu:
Fundamental Limits of Obfuscation for Linear Gaussian Dynamical Systems: An Information-Theoretic Approach. CoRR abs/2011.00718 (2020) - [i97]Shutian Liu, Tao Li, Quanyan Zhu:
Communication-Efficient Distributed Machine Learning over Strategic Networks: A Two-Layer Game Approach. CoRR abs/2011.01455 (2020) - [i96]Song Fang, Quanyan Zhu:
Independent Gaussian Distributions Minimize the Kullback-Leibler (KL) Divergence from Independent Gaussian Distributions. CoRR abs/2011.02560 (2020) - [i95]Guanze Peng, Tao Li, Shutian Liu, Juntao Chen, Quanyan Zhu:
Locally-Aware Constrained Games on Networks. CoRR abs/2011.10095 (2020) - [i94]Juntao Chen, Yunhan Huang, Rui Zhang, Quanyan Zhu:
Optimal Quarantining Strategy for Interdependent Epidemics Spreading over Complex Networks. CoRR abs/2011.14262 (2020) - [i93]Song Fang, Quanyan Zhu:
Fundamental Stealthiness-Distortion Tradeoffs in Dynamical (Control) Systems under Injection Attacks: A Power Spectral Analysis. CoRR abs/2012.02009 (2020) - [i92]Yunhan Huang, Quanyan Zhu:
Cross-Layer Coordinated Attacks on Cyber-Physical Systems: A LQG Game Framework with Controlled Observations. CoRR abs/2012.02384 (2020) - [i91]Song Fang, Quanyan Zhu:
Independent Elliptical Distributions Minimize Their W2 Wasserstein Distance from Independent Elliptical Distributions with the Same Density Generator. CoRR abs/2012.03809 (2020) - [i90]Song Fang, Quanyan Zhu:
The Spectral-Domain W2 Wasserstein Distance for Elliptical Processes and the Spectral-Domain Gelbrich Bound. CoRR abs/2012.04023 (2020) - [i89]Song Fang, Quanyan Zhu:
Fundamental Limits on the Maximum Deviations in Control Systems: How Short Can Distribution Tails be Made by Feedback? CoRR abs/2012.12174 (2020) - [i88]Tao Li, Guanze Peng, Quanyan Zhu:
Blackwell Online Learning for Markov Decision Processes. CoRR abs/2012.14043 (2020) - [i87]Yunhan Huang, Quanyan Zhu:
Infinite-Horizon Linear-Quadratic-Gaussian Control with Costly Measurements. CoRR abs/2012.14925 (2020)
2010 – 2019
- 2019
- [j44]Jeffrey Pawlick, Edward Colbert, Quanyan Zhu:
A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy. ACM Comput. Surv. 52(4): 82:1-82:28 (2019) - [j43]Jeffrey Pawlick, Juntao Chen, Quanyan Zhu:
iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things. IEEE Trans. Inf. Forensics Secur. 14(6): 1654-1669 (2019) - [j42]Jeffrey Pawlick, Edward Colbert, Quanyan Zhu:
Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence. IEEE Trans. Inf. Forensics Secur. 14(7): 1871-1886 (2019) - [j41]Muhammad Junaid Farooq, Quanyan Zhu:
Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks. IEEE Trans. Inf. Forensics Secur. 14(9): 2412-2426 (2019) - [j40]Juntao Chen, Quanyan Zhu:
Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things. IEEE Trans. Inf. Forensics Secur. 14(11): 2958-2971 (2019) - [j39]Rui Zhang, Quanyan Zhu:
Consensus-Based Distributed Discrete Optimal Transport for Decentralized Resource Matching. IEEE Trans. Signal Inf. Process. over Networks 5(3): 511-524 (2019) - [c127]Yunhan Huang, Veeraruna Kavitha, Quanyan Zhu:
Continuous-Time Markov Decision Processes with Controlled Observations. Allerton 2019: 32-39 - [c126]Guanze Peng, Quanyan Zhu:
Game-Theoretic Analysis of Optimal Control and Sampling for Linear Stochastic Systems. Allerton 2019: 647-654 - [c125]Yurid Nugraha, Tomohisa Hayakawa, Ahmet Cetinkaya, Hideaki Ishii, Quanyan Zhu:
Subgame Perfect Equilibrium Analysis for Jamming Attacks on Resilient Graphs. ACC 2019: 2060-2065 - [c124]Linan Huang, Quanyan Zhu:
Adaptive Honeypot Engagement Through Reinforcement Learning of Semi-Markov Decision Processes. GameSec 2019: 196-216 - [c123]Yunhan Huang, Quanyan Zhu:
Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals. GameSec 2019: 217-237 - [c122]Quanyan Zhu:
Game theory for cyber deception: a tutorial. HotSoS 2019: 8:1-8:3 - [c121]Song Fang, Mikael Skoglund, Karl Henrik Johansson, Hideaki Ishii, Quanyan Zhu:
Generic Variance Bounds on Estimation and Prediction Errors in Time Series Analysis: An Entropy Perspective. ITW 2019: 1-5 - [c120]Song Fang, Quanyan Zhu:
Generic Bounds On The Maximum Deviations In Sequential Prediction: An Information-Theoretic Analysis. MLSP 2019: 1-6 - [c119]Tao Li, Quanyan Zhu:
On Convergence Rate of Adaptive Multiscale Value Function Approximation for Reinforcement Learning. MLSP 2019: 1-6 - [c118]Jeffrey Pawlick, Thi Thu Hang Nguyen, Edward Colbert, Quanyan Zhu:
Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats. WiOpt 2019: 1-8 - [c117]Sachin Shetty, Indrajit Ray, Nurcin Celik, Michael Mesham, Nathaniel Bastian, Quanyan Zhu:
Simulation for Cyber Risk Management - Where are we, and Where do we Want to Go? WSC 2019: 726-737 - [i86]Muhammad Junaid Farooq, Quanyan Zhu:
Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks. CoRR abs/1901.00741 (2019) - [i85]Muhammad Junaid Farooq, Quanyan Zhu:
Dynamic Spatio-Temporal Resource Provisioning for On-Demand Urban Services in Smart Cities. CoRR abs/1901.08331 (2019) - [i84]Tao Zhang, Linan Huang, Jeffrey Pawlick, Quanyan Zhu:
Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation. CoRR abs/1902.03925 (2019) - [i83]Quanyan Zhu:
Game Theory for Cyber Deception: A Tutorial. CoRR abs/1903.01442 (2019) - [i82]Rui Zhang, Quanyan Zhu:
Consensus-based Distributed Discrete Optimal Transport for Decentralized Resource Matching. CoRR abs/1904.04318 (2019) - [i81]Song Fang, Mikael Skoglund, Karl Henrik Johansson, Hideaki Ishii, Quanyan Zhu:
Generic Variance Bounds on Estimation and Prediction Errors in Time Series Analysis: An Entropy Perspective. CoRR abs/1904.04765 (2019) - [i80]Juntao Chen, Quanyan Zhu:
Interdependent Strategic Security Risk Management with Bounded Rationality in the Internet of Things. CoRR abs/1905.09341 (2019) - [i79]Juntao Chen, Quanyan Zhu:
A Games-in-Games Approach to Mosaic Command and Control Design of Dynamic Network-of-Networks for Secure and Resilient Multi-Domain Operations. CoRR abs/1906.02114 (2019) - [i78]Juntao Chen, Corinne Touati, Quanyan Zhu:
A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network. CoRR abs/1906.07185 (2019) - [i77]Linan Huang, Quanyan Zhu:
A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems. CoRR abs/1906.09687 (2019) - [i76]Yunhan Huang, Quanyan Zhu:
Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals. CoRR abs/1906.10571 (2019) - [i75]Linan Huang, Quanyan Zhu:
Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes. CoRR abs/1906.12182 (2019) - [i74]Linan Huang, Quanyan Zhu:
N-Person Discrete-Time Dynamic Games of Asymmetric Information. CoRR abs/1907.00459 (2019) - [i73]Mohammad Ashiqur Rahman, Md Hasan Shahriar, Ehab Al-Shaer, Quanyan Zhu:
A Formal Approach for Efficient Navigation Management of Hybrid Electric Vehicles on Long Trips. CoRR abs/1907.00540 (2019) - [i72]Linan Huang, Quanyan Zhu:
Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense. CoRR abs/1907.01396 (2019) - [i71]Yunhan Huang, Veeraruna Kavitha, Quanyan Zhu:
Continuous-Time Markov Decision Processes with Controlled Observations. CoRR abs/1907.06128 (2019) - [i70]Juntao Chen, Quanyan Zhu, Tamer Basar:
Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks. CoRR abs/1908.04431 (2019) - [i69]Muhammad Junaid Farooq, Quanyan Zhu:
IoT Supply Chain Security: Overview, Challenges, and the Road Ahead. CoRR abs/1908.07828 (2019) - [i68]Tao Li, Quanyan Zhu:
On Convergence Rate of Adaptive Multiscale Value Function Approximation For Reinforcement Learning. CoRR abs/1908.08578 (2019) - [i67]Tao Zhang, Quanyan Zhu:
On Incentive Compatibility in Dynamic Mechanism Design With Exit Option in a Markovian Environment. CoRR abs/1909.13720 (2019) - [i66]Song Fang, Quanyan Zhu:
Generic Bounds on the Maximum Deviations in Sequential Prediction: An Information-Theoretic Analysis. CoRR abs/1910.06742 (2019) - [i65]Yunhan Huang, Juntao Chen, Linan Huang, Quanyan Zhu:
Dynamic Games for Secure and Resilient Control System Design. CoRR abs/1910.07510 (2019) - [i64]Rui Zhang, Quanyan Zhu:
FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things. CoRR abs/1911.10100 (2019) - [i63]Timothy Kieras, Muhammad Junaid Farooq, Quanyan Zhu:
RIoTS: Risk Analysis of IoT Supply Chain Threats. CoRR abs/1911.12862 (2019) - [i62]Song Fang, Quanyan Zhu:
Fundamental Limitations in Sequential Prediction and Recursive Algorithms: Lp Bounds via an Entropic Analysis. CoRR abs/1912.02628 (2019) - [i61]Song Fang, Quanyan Zhu:
Relativistic Control: Feedback Control of Relativistic Dynamics. CoRR abs/1912.03367 (2019) - [i60]Juntao Chen, Quanyan Zhu:
Control of Multi-Layer Mobile Autonomous Systems in Adversarial Environments: A Games-in-Games Approach. CoRR abs/1912.04082 (2019) - [i59]Song Fang, Quanyan Zhu:
Fundamental Entropic Laws and Lp Limitations of Feedback Systems: Implications for Machine-Learning-in-the-Loop Control. CoRR abs/1912.05541 (2019) - [i58]Tao Zhang, Quanyan Zhu:
Optimal Two-Sided Market Mechanism Design for Large-Scale Data Sharing and Trading in Massive IoT Networks. CoRR abs/1912.06229 (2019) - 2018
- [j38]Quanyan Zhu, Stefan Rass:
On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats. IEEE Access 6: 13958-13971 (2018) - [j37]Seyede Fatemeh Noorani, Mohammad Hossein Manshaei, Mohammad Ali Montazeri, Quanyan Zhu:
Game-Theoretic Approach to Group Learning Enhancement Through Peer-to-Peer Explanation and Competition. IEEE Access 6: 53684-53697 (2018) - [j36]Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas:
A hybrid stochastic game for secure control of cyber-physical systems. Autom. 93: 55-63 (2018) - [j35]Elena A. Gubar, Vladislav Taynitskiy, Quanyan Zhu:
Optimal Control of Heterogeneous Mutating Viruses. Games 9(4): 103 (2018) - [j34]Linan Huang, Quanyan Zhu:
Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks. SIGMETRICS Perform. Evaluation Rev. 46(2): 52-56 (2018) - [j33]Muhammad Junaid Farooq, Quanyan Zhu:
A Multi-Layer Feedback System Approach to Resilient Connectivity of Remotely Deployed Mobile Internet of Things. IEEE Trans. Cogn. Commun. Netw. 4(2): 422-432 (2018) - [j32]Rui Zhang, Quanyan Zhu:
A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines. IEEE Trans. Neural Networks Learn. Syst. 29(11): 5512-5527 (2018) - [j31]Juntao Chen, Quanyan Zhu:
A Stackelberg Game Approach for Two-Level Distributed Energy Management in Smart Grids. IEEE Trans. Smart Grid 9(6): 6554-6565 (2018) - [j30]Tao Zhang, Quanyan Zhu:
Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs. IEEE Trans. Signal Inf. Process. over Networks 4(1): 148-161 (2018) - [j29]Muhammad Junaid Farooq, Quanyan Zhu:
On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT). IEEE Trans. Wirel. Commun. 17(4): 2618-2632 (2018) - [c116]Juntao Chen, Quanyan Zhu:
A Linear Quadratic Differential Game Approach to Dynamic Contract Design for Systemic Cyber Risk Management under Asymmetric Information. Allerton 2018: 575-582 - [c115]Muhammad Junaid Farooq, Quanyan Zhu:
Adaptive and Resilient Revenue Maximizing Dynamic Resource Allocation and Pricing for Cloud-Enabled IoT Systems. ACC 2018: 5292-5297 - [c114]Quanyan Zhu, Stefan Rass:
Game Theory Meets Network Security: A Tutorial. CCS 2018: 2163-2165 - [c113]Zhiheng Xu, Quanyan Zhu:
Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems. CCTA 2018: 1712-1717 - [c112]Aneel Tanwani, Quanyan Zhu:
Feedback Nash Equilibrium for Markov Jump Games under Differential-Algebraic Constraints with Application to Robust Control. CDC 2018: 1124-1129 - [c111]Juntao Chen, Quanyan Zhu:
Security investment under cognitive constraints: A Gestalt Nash equilibrium approach. CISS 2018: 1-6 - [c110]Alex Dunyak, Quanyan Zhu:
Understanding mean-field effects of large-population user data obfuscation in machine learning. CISS 2018: 1-6 - [c109]Rui Zhang, Quanyan Zhu:
Consensus-based transfer linear support vector machines for decentralized multi-task multi-agent learning. CISS 2018: 1-6 - [c108]Linan Huang, Quanyan Zhu:
Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems. GameSec 2018: 205-226 - [c107]Tao Zhang, Quanyan Zhu:
Hypothesis Testing Game for Cyber Deception. GameSec 2018: 540-555 - [c106]Muhammad Junaid Farooq, Quanyan Zhu:
Optimal dynamic contract for spectrum reservation in mission-critical UNB-IoT systems. WiOpt 2018: 1-6 - [c105]Linan Huang, Juntao Chen, Quanyan Zhu:
Distributed and Optimal Resilient Planning of Large-Scale Interdependent Critical Infrastructures. WSC 2018: 1096-1107 - [i57]Muhammad Junaid Farooq, Quanyan Zhu:
On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT). CoRR abs/1801.09986 (2018) - [i56]Rui Zhang, Quanyan Zhu:
A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines. CoRR abs/1802.02907 (2018) - [i55]Hamza Anwar, Quanyan Zhu:
ADMM-based Networked Stochastic Variational Inference. CoRR abs/1802.10168 (2018) - [i54]Muhammad Junaid Farooq, Quanyan Zhu:
Optimal Dynamic Contract for Spectrum Reservation in Mission-Critical UNB-IoT Systems. CoRR abs/1803.07842 (2018) - [i53]Rui Zhang, Quanyan Zhu:
Optimal Cyber Insurance Policy Design for Dynamic Risk Management and Mitigation. CoRR abs/1804.00998 (2018) - [i52]Jeffrey Pawlick, Edward Colbert, Quanyan Zhu:
Modeling and Analysis of Leaky Deception using Signaling Games with Evidence. CoRR abs/1804.06831 (2018) - [i51]Jeffrey Pawlick, Juntao Chen, Quanyan Zhu:
iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things. CoRR abs/1805.00403 (2018) - [i50]Muhammad Junaid Farooq, Quanyan Zhu:
A Multi-Layer Feedback System Approach to Resilient Connectivity of Remotely Deployed Mobile Internet of Things. CoRR abs/1805.05824 (2018) - [i49]Quanyan Zhu, Stefan Rass:
Game Theory Meets Network Security: A Tutorial at ACM CCS. CoRR abs/1808.08066 (2018) - [i48]Linan Huang, Quanyan Zhu:
Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception. CoRR abs/1809.02013 (2018) - [i47]Linan Huang, Quanyan Zhu:
Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks. CoRR abs/1809.02227 (2018) - [i46]Linan Huang, Juntao Chen, Quanyan Zhu:
Distributed and Optimal Resilient Planning of Large-Scale Interdependent Critical Infrastructures. CoRR abs/1809.02231 (2018) - [i45]Quanyan Zhu, Stefan Rass, Peter Schartner:
Community-Based Security for the Internet of Things. CoRR abs/1810.00281 (2018) - [i44]Quanyan Zhu:
Multi-Layer Cyber-Physical Security and Resilience for Smart Grid. CoRR abs/1810.00282 (2018) - [i43]Quanyan Zhu:
Cyber Insurance. CoRR abs/1810.00290 (2018) - [i42]Tao Zhang, Quanyan Zhu:
A Game-Theoretic Foundation of Deception: Knowledge Acquisition and Fundamental Limits. CoRR abs/1810.00752 (2018) - [i41]Vladislav Taynitskiy, Elena A. Gubar, Quanyan Zhu:
Optimal Impulse Control of SIR Epidemics over Scale-Free Networks. CoRR abs/1810.04797 (2018) - [i40]Jin Shang, Muhammad Junaid Farooq, Quanyan Zhu:
Real-Time Transmission Mechanism Design for Wireless IoT Sensors with Energy Harvesting under Power Saving Mode. CoRR abs/1812.02615 (2018) - 2017
- [j28]Stefan Rass, Ali Alshawish, Mohamed Amine Abid, Stefan Schauer, Quanyan Zhu, Hermann de Meer:
Physical Intrusion Games - Optimizing Surveillance by Simulation and Game Theory. IEEE Access 5: 8394-8407 (2017) - [j27]Bahareh Khazaei, Javad Salimi Sartakhti, Mohammad Hossein Manshaei, Quanyan Zhu, Mehdi Sadeghi, Seyed Rasoul Mousavi:
HIV-1-infected T-cells dynamics and prognosis: An evolutionary game model. Comput. Methods Programs Biomed. 152: 1-14 (2017) - [j26]Rui Zhang, Quanyan Zhu, Yezekael Hayel:
A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks. IEEE J. Sel. Areas Commun. 35(3): 779-794 (2017) - [j25]Juntao Chen, Corinne Touati, Quanyan Zhu:
A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery: 125. SIGMETRICS Perform. Evaluation Rev. 45(2): 128 (2017) - [j24]Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas:
Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks. IEEE Trans. Control. Netw. Syst. 4(1): 106-117 (2017) - [j23]Yuan Liu, Jie Zhang, Quanyan Zhu, Xingwei Wang:
CONGRESS: A Hybrid Reputation System for Coping with Rating Subjectivity. IEEE Trans. Comput. Soc. Syst. 4(3): 163-178 (2017) - [j22]Tao Zhang, Quanyan Zhu:
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning. IEEE Trans. Inf. Forensics Secur. 12(1): 172-187 (2017) - [j21]Yezekael Hayel, Quanyan Zhu:
Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games. IEEE Trans. Inf. Forensics Secur. 12(8): 1786-1800 (2017) - [j20]Juntao Chen, Quanyan Zhu:
Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach. IEEE Trans. Inf. Forensics Secur. 12(11): 2736-2750 (2017) - [j19]Jeffrey Pawlick, Quanyan Zhu:
Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control. IEEE Trans. Inf. Forensics Secur. 12(12): 2906-2919 (2017) - [j18]Liuwei Zhou, Quanyan Zhu, Zhijie Wang, Wuneng Zhou, Hongye Su:
Adaptive Exponential Synchronization of Multislave Time-Delayed Recurrent Neural Networks With Lévy Noise and Regime Switching. IEEE Trans. Neural Networks Learn. Syst. 28(12): 2885-2898 (2017) - [j17]Juntao Chen, Quanyan Zhu:
A Game-Theoretic Framework for Resilient and Distributed Generation Control of Renewable Energies in Microgrids. IEEE Trans. Smart Grid 8(1): 285-295 (2017) - [c104]Rui Zhang, Quanyan Zhu:
A game-theoretic defense against data poisoning attacks in distributed support vector machines. CDC 2017: 4582-4587 - [c103]Hamza Anwar, Quanyan Zhu:
Minimax robust optimal control of multiscale linear-quadratic systems. CISS 2017: 1-6 - [c102]Rui Zhang, Quanyan Zhu:
A game-theoretic analysis of label flipping attacks on distributed support vector machines. CISS 2017: 1-6 - [c101]Jeffrey Pawlick, Quanyan Zhu:
Quantitative models of imperfect deception in network security using signaling games with evidence [IEEE CNS 17 Poster]. CNS 2017: 394-395 - [c100]Zhiheng Xu, Quanyan Zhu:
Secure and practical output feedback control for cloud-enabled cyber-physical systems. CNS 2017: 416-420 - [c99]Zhiheng Xu, Quanyan Zhu:
A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks. SCAV@CPSWeek 2017: 27-34 - [c98]Varghese Kurian, Juntao Chen, Quanyan Zhu:
Electric power dependent dynamic tariffs for water distribution systems. CySWATER@CPSWeek 2017: 35-38 - [c97]Elena A. Gubar, Quanyan Zhu, Vladislav Taynitskiy:
Optimal Control of Multi-strain Epidemic Processes in Complex Networks. GAMENETS 2017: 108-117 - [c96]Tao Zhang, Quanyan Zhu:
Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles. GameSec 2017: 213-233 - [c95]Karel Horák, Quanyan Zhu, Branislav Bosanský:
Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security. GameSec 2017: 273-294 - [c94]Jeffrey Pawlick, Quanyan Zhu:
Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling Games. GameSec 2017: 336-356 - [c93]Linan Huang, Juntao Chen, Quanyan Zhu:
A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks. GameSec 2017: 357-376 - [c92]Yezekael Hayel, Quanyan Zhu:
Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous Complex Networks. GameSec 2017: 506-518 - [c91]Jeffrey Pawlick, Quanyan Zhu:
A mean-field stackelberg game approach for obfuscation adoption in empirical risk minimization. GlobalSIP 2017: 518-522 - [c90]Hamza Anwar, Quanyan Zhu:
Minimax game-theoretic approach to multiscale H-infinity optimal filtering. GlobalSIP 2017: 853-857 - [c89]Juntao Chen, Corinne Touati, Quanyan Zhu:
Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures. GLOBECOM 2017: 1-6 - [c88]Muhammad Junaid Farooq, Quanyan Zhu:
Cognitive Connectivity Resilience in Multi-Layer Remotely Deployed Mobile Internet of Things. GLOBECOM 2017: 1-6 - [c87]Imen Triki, Rachid El Azouzi, Majed Haddad, Quanyan Zhu, Zhiheng Xu:
Learning from experience: A dynamic closed-loop QoE optimization for video adaptation and delivery. PIMRC 2017: 1-5 - [c86]Weiyu Wang, Quanyan Zhu:
On the Detection of Adversarial Attacks against Deep Neural Networks. SafeConfig@CCS 2017: 27-30 - [c85]Muhammad Junaid Farooq, Hesham ElSawy, Quanyan Zhu, Mohamed-Slim Alouini:
Optimizing mission critical data dissemination in massive IoT networks. WiOpt 2017: 1-6 - [c84]Muhammad Junaid Farooq, Quanyan Zhu:
Secure and reconfigurable network design for critical information dissemination in the Internet of battlefield things (IoBT). WiOpt 2017: 1-8 - [c83]Manjesh Kumar Hanawal, Yezekael Hayel, Quanyan Zhu:
Throughput maximization of large-scale secondary networks over licensed and unlicensed spectra. WiOpt 2017: 1-6 - [i39]Muhammad Junaid Farooq, Quanyan Zhu:
Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT). CoRR abs/1703.01224 (2017) - [i38]Imen Triki, Quanyan Zhu, Rachid El Azouzi, Majed Haddad, Zhiheng Xu:
Learning from Experience: A Dynamic Closed-Loop QoE Optimization for Video Adaptation and Delivery. CoRR abs/1703.01986 (2017) - [i37]Muhammad Junaid Farooq, Quanyan Zhu:
Optimizing Mission Critical Data Dissemination in Massive IoT Networks. CoRR abs/1704.05954 (2017) - [i36]Jeffrey Pawlick, Quanyan Zhu:
A Mean-Field Stackelberg Game Approach for Obfuscation Adoption in Empirical Risk Minimization. CoRR abs/1706.02693 (2017) - [i35]Rui Zhang, Quanyan Zhu:
Distributed Transfer Linear Support Vector Machines. CoRR abs/1706.05039 (2017) - [i34]Jeffrey Pawlick, Quanyan Zhu:
Proactive Defense Against Physical Denial of Service Attacks using Poisson Signaling Games. CoRR abs/1707.03708 (2017) - [i33]Juntao Chen, Corinne Touati, Quanyan Zhu:
Optimal Secure Multi-Layer IoT Network Design. CoRR abs/1707.07046 (2017) - [i32]Juntao Chen, Corinne Touati, Quanyan Zhu:
A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery. CoRR abs/1707.07054 (2017) - [i31]Hamza Anwar, Quanyan Zhu:
Minimax Game-Theoretic Approach to Multiscale $H_{\infty}$ Optimal Filtering. CoRR abs/1707.07642 (2017) - [i30]Jeffrey Pawlick, Thi Thu Hang Nguyen, Quanyan Zhu:
Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats. CoRR abs/1707.08031 (2017) - [i29]Jeffrey Pawlick, Quanyan Zhu:
Quantitative Models of Imperfect Deception in Network Security using Signaling Games with Evidence. CoRR abs/1707.08035 (2017) - [i28]Muhammad Junaid Farooq, Quanyan Zhu:
Adaptive and Resilient Revenue Maximizing Resource Allocation and Pricing in Cloud Computing Environments. CoRR abs/1707.08691 (2017) - [i27]Muhammad Junaid Farooq, Quanyan Zhu:
Cognitive Connectivity Resilience in Multi-layer Remotely Deployed Mobile Internet of Things. CoRR abs/1709.00621 (2017) - [i26]Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas:
A Moving-Horizon Hybrid Stochastic Game for Secure Control of Cyber-Physical Systems. CoRR abs/1710.00288 (2017) - [i25]Rui Zhang, Quanyan Zhu:
Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries. CoRR abs/1710.04677 (2017) - [i24]Juntao Chen, Rui Zhang, Quanyan Zhu:
Optimal Control of Interdependent Epidemics in Complex Networks. CoRR abs/1710.06454 (2017) - [i23]Jeffrey Pawlick, Edward Colbert, Quanyan Zhu:
A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy. CoRR abs/1712.05441 (2017) - 2016
- [j16]Carol J. Fung, Quanyan Zhu:
FACID: A trust-based collaborative decision framework for intrusion detection networks. Ad Hoc Networks 53: 17-31 (2016) - [j15]William Casey, Jose Andre Morales, Evan Wright, Quanyan Zhu, Bud Mishra:
Compliance signaling games: toward modeling the deterrence of insider threats. Comput. Math. Organ. Theory 22(3): 318-349 (2016) - [j14]Dario Bauso, Quanyan Zhu, Tamer Basar:
Decomposition and Mean-Field Approach to Mixed Integer Optimal Compensation Problems. J. Optim. Theory Appl. 169(2): 606-630 (2016) - [j13]Eran Simhon, Yezekael Hayel, David Starobinski, Quanyan Zhu:
Optimal information disclosure policies in strategic queueing games. Oper. Res. Lett. 44(1): 109-113 (2016) - [j12]Sabita Maharjan, Quanyan Zhu, Yan Zhang, Stein Gjessing, Tamer Basar:
Demand Response Management in the Smart Grid in a Large Population Regime. IEEE Trans. Smart Grid 7(1): 189-199 (2016) - [c82]Zhiheng Xu, Quanyan Zhu:
Cross-layer secure cyber-physical control system design for networked 3D printers. ACC 2016: 1191-1196 - [c81]Juntao Chen, Quanyan Zhu:
Interdependent network formation games with an application to critical infrastructures. ACC 2016: 2870-2875 - [c80]Tao Zhang, Quanyan Zhu:
A Dual Perturbation Approach for Differential Private ADMM-Based Distributed Empirical Risk Minimization. AISec@CCS 2016: 129-137 - [c79]Juntao Chen, Quanyan Zhu:
Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment. CDC 2016: 5183-5188 - [c78]Stefan Rass, Quanyan Zhu:
GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats. GameSec 2016: 314-326 - [c77]Juntao Chen, Quanyan Zhu:
Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things. GameSec 2016: 329-348 - [c76]Amin Mohammadi, Mohammad Hossein Manshaei, Monireh Mohebbi Moghaddam, Quanyan Zhu:
A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars. GameSec 2016: 382-394 - [c75]Amnol Monga, Quanyan Zhu:
On solving large-scale low-rank zero-sum security games of incomplete information. WIFS 2016: 1-6 - [c74]Jeffrey Pawlick, Quanyan Zhu:
A Stackelberg game perspective on the conflict between machine learning and data obfuscation. WIFS 2016: 1-6 - [e1]Quanyan Zhu, Tansu Alpcan, Emmanouil A. Panaousis, Milind Tambe, William Casey:
Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings. Lecture Notes in Computer Science 9996, Springer 2016, ISBN 978-3-319-47412-0 [contents] - [i22]Tao Zhang, Quanyan Zhu:
Dynamic Privacy For Distributed Machine Learning Over Network. CoRR abs/1601.03466 (2016) - [i21]Juntao Chen, Quanyan Zhu:
A Game-Theoretic Framework for Resilient and Distributed Generation Control of Renewable Energies in Microgrids. CoRR abs/1601.04583 (2016) - [i20]Juntao Chen, Quanyan Zhu:
Interdependent Network Formation Games. CoRR abs/1602.07745 (2016) - [i19]Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas:
Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks. CoRR abs/1605.08962 (2016) - [i18]Jeffrey Pawlick, Quanyan Zhu:
A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation. CoRR abs/1608.02546 (2016) - [i17]Juntao Chen, Quanyan Zhu:
A Stackelberg Game Approach for Two-Level Distributed Energy Management in Smart Grids. CoRR abs/1608.08253 (2016) - 2015
- [c73]Zhiheng Xu, Quanyan Zhu:
Secure and Resilient Control Design for Cloud Enabled Networked Control Systems. CPS-SPC@CCS 2015: 31-42 - [c72]William Austin Casey, Quanyan Zhu, Jose Andre Morales, Bud Mishra:
Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games. MIST@CCS 2015: 53-62 - [c71]Yezekael Hayel, Quanyan Zhu:
Evolutionary Poisson games for controlling large population behaviors. CDC 2015: 300-305 - [c70]Zhiheng Xu, Quanyan Zhu:
A cyber-physical game framework for secure and resilient multi-agent autonomous systems. CDC 2015: 5156-5161 - [c69]Yezekael Hayel, Eran Simhon, David Starobinski, Quanyan Zhu:
Distributed strategic mode selection for large-scale D2D communications based on Queue State Information. CISS 2015: 1-3 - [c68]Yezekael Hayel, Quanyan Zhu:
Resilient and secure network design for cyber attack-induced cascading link failures in critical infrastructures. CISS 2015: 1-3 - [c67]Sadegh Farhang, Yezekael Hayel, Quanyan Zhu:
PHY-layer location privacy-preserving access point selection mechanism in next-generation wireless networks. CNS 2015: 263-271 - [c66]Rui Zhang, Quanyan Zhu:
Secure and resilient distributed machine learning under adversarial environments. FUSION 2015: 644-651 - [c65]Yezekael Hayel, Quanyan Zhu:
Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks. GameSec 2015: 22-34 - [c64]Jeffrey Pawlick, Sadegh Farhang, Quanyan Zhu:
Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats. GameSec 2015: 289-308 - [c63]Monireh Mohebbi Moghaddam, Mohammad Hossein Manshaei, Quanyan Zhu:
To Trust or Not: A Security Signaling Game Between Service Provider and Client. GameSec 2015: 322-333 - [c62]Zhiheng Xu, Quanyan Zhu:
Environment-aware power generation scheduling in smart grids. SmartGridComm 2015: 253-258 - [c61]Juntao Chen, Liuwei Zhou, Quanyan Zhu:
Resilient control design for wind turbines using Markov jump linear system model with lévy noise. SmartGridComm 2015: 828-833 - [c60]Jeffrey Pawlick, Quanyan Zhu:
Deception by Design: Evidence-Based Signaling Games for Network Defense. WEIS 2015 - [c59]Sadegh Farhang, Yezekael Hayel, Quanyan Zhu:
Physical layer location privacy issue in wireless small cell networks. WISEC 2015: 32:1-32:2 - [i16]Jeffrey Pawlick, Quanyan Zhu:
Deception by Design: Evidence-Based Signaling Games for Network Defense. CoRR abs/1503.05458 (2015) - [i15]Yezekael Hayel, Quanyan Zhu:
Evolutionary Poisson Games for Controlling Large Population Behaviors. CoRR abs/1503.08085 (2015) - [i14]Saboor Zahir, John Pak, Jatinder Singh, Jeffrey Pawlick, Quanyan Zhu:
Protection and Deception: Discovering Game Theory and Cyber Literacy through a Novel Board Game Experience. CoRR abs/1505.05570 (2015) - [i13]Juntao Chen, Quanyan Zhu:
Resilient and Decentralized Control of Multi-level Cooperative Robotic Networks to Maintain Connectivity under Adversarial Attacks. CoRR abs/1505.07158 (2015) - [i12]Jeffrey Pawlick, Sadegh Farhang, Quanyan Zhu:
Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats. CoRR abs/1507.00576 (2015) - 2014
- [j11]Ronghui Hou, Chuqing Wang, Quanyan Zhu, Jiandong Li:
Interference-aware QoS multicast routing for smart grid. Ad Hoc Networks 22: 13-26 (2014) - [j10]Hamidou Tembine, Quanyan Zhu, Tamer Basar:
Risk-Sensitive Mean-Field Games. IEEE Trans. Autom. Control. 59(4): 835-850 (2014) - [c58]Fei Miao, Quanyan Zhu:
A moving-horizon hybrid stochastic game for secure control of cyber-physical systems. CDC 2014: 517-522 - [c57]Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas:
Coding sensor outputs for injection attacks detection. CDC 2014: 5776-5781 - [c56]Muhammad Qasim Ali, Reza Yousefian, Ehab Al-Shaer, Sukumar Kamalasadan, Quanyan Zhu:
Two-tier data-driven intrusion detection for automatic generation control in smart grid. CNS 2014: 292-300 - [c55]Sadegh Farhang, Mohammad Hossein Manshaei, Milad Nasr Esfahani, Quanyan Zhu:
A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design. GameSec 2014: 319-328 - 2013
- [b1]Quanyan Zhu:
Game-theoretic methods for security and resilience in cyber-physical systems. University of Illinois Urbana-Champaign, USA, 2013 - [j9]Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Basar, Jean-Pierre Hubaux:
Game theory meets network security and privacy. ACM Comput. Surv. 45(3): 25:1-25:39 (2013) - [j8]Quanyan Zhu, Tamer Basar:
Multi-Resolution Large Population Stochastic Differential Games and Their Application to Demand Response Management in the Smart Grid. Dyn. Games Appl. 3(1): 68-88 (2013) - [j7]Qi Zhang, Quanyan Zhu, Mohamed Faten Zhani, Raouf Boutaba, Joseph L. Hellerstein:
Dynamic Service Placement in Geographically Distributed Clouds. IEEE J. Sel. Areas Commun. 31(12-Supplement): 762-772 (2013) - [j6]Sabita Maharjan, Quanyan Zhu, Yan Zhang, Stein Gjessing, Tamer Basar:
Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach. IEEE Trans. Smart Grid 4(1): 120-132 (2013) - [c54]Quanyan Zhu, Linda Bushnell:
Networked cyber-physical systems: Interdependence, resilience and information exchange. Allerton 2013: 763-769 - [c53]Andrew Clark, Quanyan Zhu, Radha Poovendran, Tamer Basar:
An impact-aware defense against Stuxnet. ACC 2013: 4140-4147 - [c52]Quanyan Zhu, Andrew Clark, Radha Poovendran, Tamer Basar:
Deployment and exploitation of deceptive honeybots in social networks. CDC 2013: 212-219 - [c51]Matthew Zyskowski, Quanyan Zhu:
Price and variance of anarchy in mean-variance cost density-shaping stochastic differential games. CDC 2013: 1720-1725 - [c50]Quanyan Zhu, Linda Bushnell, Tamer Basar:
Resilient Distributed Control of Multi-agent Cyber-Physical Systems. CPSW@CISS 2013: 301-316 - [c49]Elena A. Gubar, Quanyan Zhu:
Optimal control of influenza epidemic model with virus mutations. ECC 2013: 3125-3130 - [c48]Quanyan Zhu, Tamer Basar:
Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense. GameSec 2013: 246-263 - [c47]György Dán, King-Shan Lui, Rehana Tabassum, Quanyan Zhu, Klara Nahrstedt:
SELINDA: A secure, scalable and light-weight data collection protocol for smart grids. SmartGridComm 2013: 480-485 - [i11]Wei Chen, Dayu Huang, Ankur A. Kulkarni, Jayakrishnan Unnikrishnan, Quanyan Zhu, Prashant G. Mehta, Sean P. Meyn, Adam Wierman:
Approximate dynamic programming using fluid and diffusion approximations with applications to power management. CoRR abs/1307.1759 (2013) - 2012
- [j5]Quanyan Zhu, Zhou Yuan, Ju Bin Song, Zhu Han, Tamer Basar:
Interference Aware Routing Game for Cognitive Radio Multi-Hop Networks. IEEE J. Sel. Areas Commun. 30(10): 2006-2015 (2012) - [j4]Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar:
GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks. IEEE J. Sel. Areas Commun. 30(11): 2220-2230 (2012) - [c46]Dario Bauso, Quanyan Zhu, Tamer Basar:
Mixed integer optimal compensation: Decompositions and mean-field approximations. ACC 2012: 2663-2668 - [c45]Quanyan Zhu, Jiangmeng Zhang, Peter W. Sauer, Alejandro D. Domínguez-García, Tamer Basar:
A game-theoretic framework for control of distributed renewable-based energy resources in smart grids. ACC 2012: 3623-3628 - [c44]Quanyan Zhu, Andrew Clark, Radha Poovendran, Tamer Basar:
Deceptive routing games. CDC 2012: 2704-2711 - [c43]Quanyan Zhu, Linda Bushnell, Tamer Basar:
Game-theoretic analysis of node capture and cloning attack with multiple attackers in wireless sensor networks. CDC 2012: 3404-3411 - [c42]Andrew Clark, Quanyan Zhu, Radha Poovendran, Tamer Basar:
Deceptive Routing in Relay Networks. GameSec 2012: 171-185 - [c41]Quanyan Zhu, Tamer Basar:
A dynamic game-theoretic approach to resilient control system design for cascading failures. HiCoNS 2012: 41-46 - [c40]Qi Zhang, Mohamed Faten Zhani, Shuo Zhang, Quanyan Zhu, Raouf Boutaba, Joseph L. Hellerstein:
Dynamic energy-aware capacity provisioning for cloud computing environments. ICAC 2012: 145-154 - [c39]Quanyan Zhu, Zhu Han, Tamer Basar:
A differential game approach to distributed demand side management in smart grid. ICC 2012: 3345-3350 - [c38]Qi Zhang, Quanyan Zhu, Mohamed Faten Zhani, Raouf Boutaba:
Dynamic Service Placement in Geographically Distributed Clouds. ICDCS 2012: 526-535 - [c37]Quanyan Zhu, Carl A. Gunter, Tamer Basar:
Tragedy of Anticommons in Digital Right Management of Medical Records. HealthSec 2012 - [i10]Quanyan Zhu, Andrew Clark, Radha Poovendran, Tamer Basar:
SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks. CoRR abs/1207.5844 (2012) - [i9]Hamidou Tembine, Quanyan Zhu, Tamer Basar:
Risk-Sensitive Mean Field Games. CoRR abs/1210.2806 (2012) - 2011
- [j3]Tamer Basar, Quanyan Zhu:
Prices of Anarchy, Information, and Cooperation in Differential Games. Dyn. Games Appl. 1(1): 50-73 (2011) - [c36]Hui Sun, Quanyan Zhu, Naira Hovakimyan, Tamer Basar:
ℒ1 adaptive control for positive LTI systems. ACC 2011: 13-18 - [c35]Quanyan Zhu, Hamidou Tembine, Tamer Basar:
Distributed strategic learning with application to network security. ACC 2011: 4057-4062 - [c34]Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar:
Poster: SMURFEN: a rule sharing collaborative intrusion detection network. CCS 2011: 761-764 - [c33]Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar:
A game-theoretic approach to rule sharing mechanism in networked intrusion detection systems: Robustness, incentives and security. CDC/ECC 2011: 243-248 - [c32]Quanyan Zhu, Tamer Basar:
Robust and resilient control design for cyber-physical systems with an application to power systems. CDC/ECC 2011: 4066-4071 - [c31]Quanyan Zhu, Hamidou Tembine, Tamer Basar:
Hybrid risk-sensitive mean-field stochastic differential games with application to molecular biology. CDC/ECC 2011: 4491-4497 - [c30]Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar:
SMURFEN: A system framework for rule sharing collaborative intrusion detection. CNSM 2011: 1-6 - [c29]Quanyan Zhu:
Nash meets Van Valkenburg: A game-theoretic approach to effective learning and teaching in engineering. FIE 2011: S4 - [c28]Quanyan Zhu, Tamer Basar:
Indices of Power in Optimal IDS Default Configuration: Theory and Examples. GameSec 2011: 7-21 - [c27]Quanyan Zhu, Ju Bin Song, Tamer Basar:
Dynamic Secure Routing Game in Distributed Cognitive Radio Networks. GLOBECOM 2011: 1-6 - [c26]Quanyan Zhu, Walid Saad, Zhu Han, H. Vincent Poor, Tamer Basar:
Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. MILCOM 2011: 119-124 - [c25]Quanyan Zhu, Tamer Basar:
A multi-resolution large population game framework for smart grid demand response management. NetGCoop 2011: 1-8 - [c24]Yuan Liu, Jie Zhang, Quanyan Zhu:
Design of a Reputation System Based on Dynamic Coalition Formation. SocInfo 2011: 135-144 - [c23]Qi Zhang, Quanyan Zhu, Raouf Boutaba:
Dynamic Resource Allocation for Spot Markets in Cloud Computing Environments. UCC 2011: 178-185 - [i8]Quanyan Zhu, Lacra Pavel:
Enabling Differentiated Services Using Generalized Power Control Model in Optical Networks. CoRR abs/1103.2490 (2011) - [i7]Quanyan Zhu, Hamidou Tembine, Tamer Basar:
Heterogeneous Learning in Zero-Sum Stochastic Games with Incomplete Information. CoRR abs/1103.2491 (2011) - [i6]Quanyan Zhu, Hamidou Tembine, Tamer Basar:
A Constrained Evolutionary Gaussian Multiple Access Channel Game. CoRR abs/1103.2493 (2011) - [i5]Quanyan Zhu, Hamidou Tembine, Tamer Basar:
Evolutionary Games for Multiple Access Control. CoRR abs/1103.2496 (2011) - [i4]Tamer Basar, Quanyan Zhu:
Prices of Anarchy, Information, and Cooperation in Differential Games. CoRR abs/1103.2579 (2011) - [i3]Quanyan Zhu, Tamer Basar:
Indices of Power in Optimal IDS Default Configuration: Theory and Examples. CoRR abs/1110.1862 (2011) - 2010
- [c22]Quanyan Zhu, Tamer Basar:
Price of anarchy and price of information in N-person linear-quadratic differential games. ACC 2010: 762-767 - [c21]Quanyan Zhu, Hamidou Tembine, Tamer Basar:
Network Security Configurations: A Nonzero-Sum Stochastic Game Approach. ACC 2010: 1059-1064 - [c20]Quanyan Zhu, Hamidou Tembine, Tamer Basar:
Heterogeneous learning in zero-sum stochastic games with incomplete information. CDC 2010: 219-224 - [c19]Quanyan Zhu, Zhou Yuan, Ju Bin Song, Zhu Han, Tamer Basar:
Dynamic Interference Minimization Routing Game for On-Demand Cognitive Pilot Channel. GLOBECOM 2010: 1-6 - [c18]Jane W. Huang, Quanyan Zhu, Vikram Krishnamurthy, Tamer Basar:
Distributed correlated Q-learning for dynamic transmission control of sensor networks. ICASSP 2010: 1982-1985 - [c17]Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar:
A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks. ICC 2010: 1-6 - [c16]Quanyan Zhu, Zhu Han, Tamer Basar:
No-Regret Learning in Collaborative Spectrum Sensing with Malicious Nodes. ICC 2010: 1-6 - [c15]Quanyan Zhu, Husheng Li, Zhu Han, Tamer Basar:
A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems. ICC 2010: 1-6 - [c14]Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar:
Bayesian decision aggregation in collaborative intrusion detection networks. NOMS 2010: 349-356 - [i2]Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar:
A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks. CoRR abs/1002.3190 (2010) - [i1]Quanyan Zhu, Zhou Yuan, Ju Bin Song, Zhu Han, Tamer Basar:
Dynamic Interference Minimization Routing Game for On-Demand Cognitive Pilot Channel. CoRR abs/1008.5340 (2010)
2000 – 2009
- 2009
- [j2]Quanyan Zhu, Lacra Pavel:
Enabling differentiated services using generalized power control model in optical networks. IEEE Trans. Commun. 57(9): 2570-2575 (2009) - [c13]Wei Chen, Dayu Huang, Ankur A. Kulkarni, Jayakrishnan Unnikrishnan, Quanyan Zhu, Prashant G. Mehta, Sean P. Meyn, Adam Wierman:
Approximate dynamic programming using fluid and diffusion approximations with applications to power management. CDC 2009: 3575-3580 - [c12]Quanyan Zhu, Tamer Basar:
Dynamic policy-based IDS configuration. CDC 2009: 8600-8605 - [c11]Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar:
A game-theoretical approach to incentive design in collaborative intrusion detection networks. GAMENETS 2009: 384-392 - [c10]Quanyan Zhu, Hamidou Tembine, Tamer Basar:
A constrained evolutionary Gaussian multiple access channel game. GAMENETS 2009: 403-410 - [c9]Walid Saad, Quanyan Zhu, Tamer Basar, Zhu Han, Are Hjørungnes:
Hierarchical Network Formation Games in the Uplink of Multi-Hop Wireless Networks. GLOBECOM 2009: 1-6 - [c8]Quanyan Zhu, Hamidou Tembine, Tamer Basar:
Evolutionary Games for Hybrid Additive White Gaussian Noise Multiple Access Control. GLOBECOM 2009: 1-6 - 2008
- [j1]Quanyan Zhu, Lacra Pavel:
End-to-end DWDM optical link power-control via a Stackelberg revenue-maximizing model. Int. J. Netw. Manag. 18(6): 505-520 (2008) - [c7]Quanyan Zhu, Lacra Pavel:
Stackelberg game approach to constrained OSNR nash game in WDM optical networks. ACC 2008: 1967-1972 - [c6]Quanyan Zhu:
A Lagrangian approach to constrained potential games: Theory and examples. CDC 2008: 2420-2425 - [c5]Quanyan Zhu, Raouf Boutaba:
Nonlinear Quadratic Pricing for Concavifiable Utilities in Network Rate Control. GLOBECOM 2008: 1593-1598 - [c4]Quanyan Zhu, Lacra Pavel:
Service Differentiation via Power Management in WDM Optical Networks. ICC 2008: 5344-5348 - [c3]Quanyan Zhu, Lacra Pavel:
Theory of Linear Games with Constraints and Its Application to Power Control of Optical Networks. INFOCOM 2008: 1984-1992 - 2007
- [c2]Quanyan Zhu, Lacra Pavel:
Solving constrained OSNR Nash game in WDM optical networks with a fictitious player. BROADNETS 2007: 922-927 - [c1]Quanyan Zhu, Lacra Pavel:
End-to-end link power control in optical networks using Nash bargaining solution. VALUETOOLS 2007: 10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint