Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Quanyan Zhu
@article{DBLP:journals/tifs/GeZ24, author = {Yunfei Ge and Quanyan Zhu}, title = {{GAZETA:} GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {540--554}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326975}, doi = {10.1109/TIFS.2023.3326975}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GeZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-01963, author = {Yuhan Zhao and Juntao Chen and Quanyan Zhu}, title = {Integrated Cyber-Physical Resiliency for Power Grids under IoT-Enabled Dynamic Botnet Attacks}, journal = {CoRR}, volume = {abs/2401.01963}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.01963}, doi = {10.48550/ARXIV.2401.01963}, eprinttype = {arXiv}, eprint = {2401.01963}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-01963.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-12499, author = {Kim Hammar and Tao Li and Rolf Stadler and Quanyan Zhu}, title = {Automated Security Response through Online Learning with Adaptive Conjectures}, journal = {CoRR}, volume = {abs/2402.12499}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.12499}, doi = {10.48550/ARXIV.2402.12499}, eprinttype = {arXiv}, eprint = {2402.12499}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-12499.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-18781, author = {Tao Li and Kim Hammar and Rolf Stadler and Quanyan Zhu}, title = {Conjectural Online Learning with First-order Beliefs in Asymmetric Information Stochastic Games}, journal = {CoRR}, volume = {abs/2402.18781}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.18781}, doi = {10.48550/ARXIV.2402.18781}, eprinttype = {arXiv}, eprint = {2402.18781}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-18781.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-00972, author = {Yinan Hu and Juntao Chen and Quanyan Zhu}, title = {Understanding Police Force Resource Allocation using Adversarial Optimal Transport with Incomplete Information}, journal = {CoRR}, volume = {abs/2403.00972}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.00972}, doi = {10.48550/ARXIV.2403.00972}, eprinttype = {arXiv}, eprint = {2403.00972}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-00972.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-06299, author = {Quanyan Zhu and Tamer Basar}, title = {Disentangling Resilience from Robustness: Contextual Dualism, Interactionism, and Game-Theoretic Paradigms}, journal = {CoRR}, volume = {abs/2403.06299}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.06299}, doi = {10.48550/ARXIV.2403.06299}, eprinttype = {arXiv}, eprint = {2403.06299}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-06299.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-10570, author = {Tao Li and Quanyan Zhu}, title = {Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare}, journal = {CoRR}, volume = {abs/2403.10570}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.10570}, doi = {10.48550/ARXIV.2403.10570}, eprinttype = {arXiv}, eprint = {2403.10570}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-10570.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-10733, author = {Yuhan Zhao and Quanyan Zhu}, title = {Incentive-Compatible and Distributed Allocation for Robotic Service Provision Through Contract Theory}, journal = {CoRR}, volume = {abs/2403.10733}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.10733}, doi = {10.48550/ARXIV.2403.10733}, eprinttype = {arXiv}, eprint = {2403.10733}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-10733.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-10736, author = {Yuhan Zhao and Quanyan Zhu}, title = {Stackelberg Meta-Learning Based Shared Control for Assistive Driving}, journal = {CoRR}, volume = {abs/2403.10736}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.10736}, doi = {10.48550/ARXIV.2403.10736}, eprinttype = {arXiv}, eprint = {2403.10736}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-10736.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-15636, author = {Yunian Pan and Tao Li and Quanyan Zhu}, title = {On the Variational Interpretation of Mirror Play in Monotone Games}, journal = {CoRR}, volume = {abs/2403.15636}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.15636}, doi = {10.48550/ARXIV.2403.15636}, eprinttype = {arXiv}, eprint = {2403.15636}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-15636.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-01205, author = {Quanyan Zhu}, title = {Foundations of Cyber Resilience: The Confluence of Game, Control, and Learning Theories}, journal = {CoRR}, volume = {abs/2404.01205}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.01205}, doi = {10.48550/ARXIV.2404.01205}, eprinttype = {arXiv}, eprint = {2404.01205}, timestamp = {Wed, 08 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-01205.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/HuangZ23, author = {Linan Huang and Quanyan Zhu}, title = {Cognitive Security - {A} System-Scientific Approach}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30709-6}, doi = {10.1007/978-3-031-30709-6}, isbn = {978-3-031-30708-9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/HuangZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ChenFZ23, author = {Juntao Chen and Muhammad Junaid Farooq and Quanyan Zhu}, title = {QoS-Based Contract Design for Profit Maximization in IoT-Enabled Data Markets}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {11}, pages = {10080--10094}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3236795}, doi = {10.1109/JIOT.2023.3236795}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ChenFZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tase/ChenZ23, author = {Juntao Chen and Quanyan Zhu}, title = {A Cross-Layer Design Approach to Strategic Cyber Defense and Robust Switching Control of Cyber-Physical Wind Energy Systems}, journal = {{IEEE} Trans Autom. Sci. Eng.}, volume = {20}, number = {1}, pages = {624--635}, year = {2023}, url = {https://doi.org/10.1109/TASE.2022.3164860}, doi = {10.1109/TASE.2022.3164860}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tase/ChenZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsipn/LiuLZ23, author = {Shutian Liu and Tao Li and Quanyan Zhu}, title = {Game-Theoretic Distributed Empirical Risk Minimization With Strategic Network Design}, journal = {{IEEE} Trans. Signal Inf. Process. over Networks}, volume = {9}, pages = {542--556}, year = {2023}, url = {https://doi.org/10.1109/TSIPN.2023.3306106}, doi = {10.1109/TSIPN.2023.3306106}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsipn/LiuLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/allerton/ZhangZ23, author = {Tao Zhang and Quanyan Zhu}, title = {Stochastic Game with Interactive Information Acquisition: {A} Fixed-Point Alignment Principle}, booktitle = {59th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2023, Monticello, IL, USA, September 26-29, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/Allerton58177.2023.10313448}, doi = {10.1109/ALLERTON58177.2023.10313448}, timestamp = {Wed, 29 Nov 2023 10:22:21 +0100}, biburl = {https://dblp.org/rec/conf/allerton/ZhangZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/DhimanPKZ23, author = {Madhu Dhiman and Chen Peng and Veeraruna Kavitha and Quanyan Zhu}, title = {Integrative Modeling and Analysis of the Interplay Between Epidemic and News Propagation Processes}, booktitle = {American Control Conference, {ACC} 2023, San Diego, CA, USA, May 31 - June 2, 2023}, pages = {2436--2443}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/ACC55779.2023.10155976}, doi = {10.23919/ACC55779.2023.10155976}, timestamp = {Tue, 11 Jul 2023 16:44:02 +0200}, biburl = {https://dblp.org/rec/conf/amcc/DhimanPKZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/PanLZ23, author = {Yunian Pan and Tao Li and Quanyan Zhu}, title = {On the Resilience of Traffic Networks under Non-Equilibrium Learning}, booktitle = {American Control Conference, {ACC} 2023, San Diego, CA, USA, May 31 - June 2, 2023}, pages = {3484--3489}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/ACC55779.2023.10156139}, doi = {10.23919/ACC55779.2023.10156139}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/PanLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/LiZ23, author = {Tao Li and Quanyan Zhu}, title = {On the Price of Transparency: {A} Comparison Between Overt Persuasion and Covert Signaling}, booktitle = {62nd {IEEE} Conference on Decision and Control, {CDC} 2023, Singapore, December 13-15, 2023}, pages = {4267--4272}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CDC49753.2023.10383897}, doi = {10.1109/CDC49753.2023.10383897}, timestamp = {Mon, 29 Jan 2024 17:30:32 +0100}, biburl = {https://dblp.org/rec/conf/cdc/LiZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/PanLZ23, author = {Yunian Pan and Tao Li and Quanyan Zhu}, title = {Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks? {A} Traffic Assignment Resilience Study}, booktitle = {62nd {IEEE} Conference on Decision and Control, {CDC} 2023, Singapore, December 13-15, 2023}, pages = {8328--8333}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CDC49753.2023.10384003}, doi = {10.1109/CDC49753.2023.10384003}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cdc/PanLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icra/LiLZ23, author = {Tao Li and Haozhe Lei and Quanyan Zhu}, title = {Self-Adaptive Driving in Nonstationary Environments through Conjectural Online Lookahead Adaptation}, booktitle = {{IEEE} International Conference on Robotics and Automation, {ICRA} 2023, London, UK, May 29 - June 2, 2023}, pages = {7205--7211}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICRA48891.2023.10161368}, doi = {10.1109/ICRA48891.2023.10161368}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icra/LiLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/GeLZ23, author = {Yunfei Ge and Tao Li and Quanyan Zhu}, title = {Scenario-Agnostic Zero-Trust Defense with Explainable Threshold Policy: {A} Meta-Learning Approach}, booktitle = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications Workshop, Hoboken, NJ, USA, May 20, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225816}, doi = {10.1109/INFOCOMWKSHPS57453.2023.10225816}, timestamp = {Tue, 05 Sep 2023 20:33:23 +0200}, biburl = {https://dblp.org/rec/conf/infocom/GeLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/PengZ23, author = {Chen Peng and Quanyan Zhu}, title = {Trust-Aware Resource Management for Secure and Optimal Network Slicing in 5G Mobile Edge Networks}, booktitle = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications Workshop, Hoboken, NJ, USA, May 20, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225773}, doi = {10.1109/INFOCOMWKSHPS57453.2023.10225773}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/PengZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iros/ZhaoZ23, author = {Yuhan Zhao and Quanyan Zhu}, title = {Stackelberg Meta-Learning for Strategic Guidance in Multi-Robot Trajectory Planning}, booktitle = {{IROS}}, pages = {11342--11347}, year = {2023}, url = {https://doi.org/10.1109/IROS55552.2023.10342202}, doi = {10.1109/IROS55552.2023.10342202}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iros/ZhaoZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssp/HuZ23, author = {Yinan Hu and Quanyan Zhu}, title = {Detection in Human-Sensor Systems Under Quantum Prospect Theory Using Bayesian Persuasion Frameworks}, booktitle = {{IEEE} Statistical Signal Processing Workshop, {SSP} 2023, Hanoi, Vietnam, July 2-5, 2023}, pages = {36--40}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SSP53291.2023.10208035}, doi = {10.1109/SSP53291.2023.10208035}, timestamp = {Thu, 17 Aug 2023 15:16:12 +0200}, biburl = {https://dblp.org/rec/conf/ssp/HuZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wiopt/YangLZ23, author = {Ya{-}Ting Yang and Tao Li and Quanyan Zhu}, title = {Designing Policies for Truth: Combating Misinformation with Transparency and Information Design}, booktitle = {21st International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2023, Singapore, August 24-27, 2023}, pages = {127--134}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/WiOpt58741.2023.10349848}, doi = {10.23919/WIOPT58741.2023.10349848}, timestamp = {Thu, 25 Jan 2024 09:25:31 +0100}, biburl = {https://dblp.org/rec/conf/wiopt/YangLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-03302, author = {Yurid Nugraha and Ahmet Cetinkaya and Tomohisa Hayakawa and Hideaki Ishii and Quanyan Zhu}, title = {A Rolling Horizon Game Considering Network Effect in Cluster Forming for Dynamic Resilient Multiagent Systems}, journal = {CoRR}, volume = {abs/2301.03302}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.03302}, doi = {10.48550/ARXIV.2301.03302}, eprinttype = {arXiv}, eprint = {2301.03302}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-03302.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-04691, author = {Juntao Chen and Junaid Farooq and Quanyan Zhu}, title = {QoS Based Contract Design for Profit Maximization in IoT-Enabled Data Markets}, journal = {CoRR}, volume = {abs/2301.04691}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.04691}, doi = {10.48550/ARXIV.2301.04691}, eprinttype = {arXiv}, eprint = {2301.04691}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-04691.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-05920, author = {Linan Huang and Quanyan Zhu}, title = {An Introduction of System-Scientific Approaches to Cognitive Security}, journal = {CoRR}, volume = {abs/2301.05920}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.05920}, doi = {10.48550/ARXIV.2301.05920}, eprinttype = {arXiv}, eprint = {2301.05920}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-05920.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-11152, author = {Yurid Nugraha and Ahmet Cetinkaya and Tomohisa Hayakawa and Hideaki Ishii and Quanyan Zhu}, title = {Cluster Forming of Multiagent Systems in Rolling Horizon Games with Non-uniform Horizons}, journal = {CoRR}, volume = {abs/2301.11152}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.11152}, doi = {10.48550/ARXIV.2301.11152}, eprinttype = {arXiv}, eprint = {2301.11152}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-11152.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-13362, author = {Quanyan Zhu}, title = {The Doctrine of Cyber Effect: An Ethics Framework for Defensive Cyber Deception}, journal = {CoRR}, volume = {abs/2302.13362}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.13362}, doi = {10.48550/ARXIV.2302.13362}, eprinttype = {arXiv}, eprint = {2302.13362}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-13362.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-03349, author = {Yunfei Ge and Tao Li and Quanyan Zhu}, title = {Scenario-Agnostic Zero-Trust Defense with Explainable Threshold Policy: {A} Meta-Learning Approach}, journal = {CoRR}, volume = {abs/2303.03349}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.03349}, doi = {10.48550/ARXIV.2303.03349}, eprinttype = {arXiv}, eprint = {2303.03349}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-03349.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-00096, author = {Tao Li and Quanyan Zhu}, title = {On the Price of Transparency: {A} Comparison between Overt Persuasion and Covert Signaling}, journal = {CoRR}, volume = {abs/2304.00096}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.00096}, doi = {10.48550/ARXIV.2304.00096}, eprinttype = {arXiv}, eprint = {2304.00096}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-00096.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-01161, author = {Yunian Pan and Tao Li and Quanyan Zhu}, title = {Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks? {A} Traffic Assignment Resilience Study}, journal = {CoRR}, volume = {abs/2304.01161}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.01161}, doi = {10.48550/ARXIV.2304.01161}, eprinttype = {arXiv}, eprint = {2304.01161}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-01161.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-06842, author = {Tao Zhang and Quanyan Zhu}, title = {Multiagent Incentive Design for Dynamic Task Delegation with Off-Menu Actions}, journal = {CoRR}, volume = {abs/2304.06842}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.06842}, doi = {10.48550/ARXIV.2304.06842}, eprinttype = {arXiv}, eprint = {2304.06842}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-06842.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-08588, author = {Ya{-}Ting Yang and Tao Li and Quanyan Zhu}, title = {Designing Policies for Truth: Combating Misinformation with Transparency and Information Design}, journal = {CoRR}, volume = {abs/2304.08588}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.08588}, doi = {10.48550/ARXIV.2304.08588}, eprinttype = {arXiv}, eprint = {2304.08588}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-08588.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-01149, author = {Yunfei Ge and Quanyan Zhu}, title = {{AI} Liability Insurance With an Example in AI-Powered E-diagnosis System}, journal = {CoRR}, volume = {abs/2306.01149}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.01149}, doi = {10.48550/ARXIV.2306.01149}, eprinttype = {arXiv}, eprint = {2306.01149}, timestamp = {Mon, 12 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-01149.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-06766, author = {Mingsheng Yin and Tao Li and Haozhe Lei and Yaqi Hu and Sundeep Rangan and Quanyan Zhu}, title = {Generalizable Wireless Navigation through Physics-Informed Reinforcement Learning in Wireless Digital Twin}, journal = {CoRR}, volume = {abs/2306.06766}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.06766}, doi = {10.48550/ARXIV.2306.06766}, eprinttype = {arXiv}, eprint = {2306.06766}, timestamp = {Fri, 16 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-06766.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-13273, author = {Henger Li and Tianyi Xu and Tao Li and Yunian Pan and Quanyan Zhu and Zizhan Zheng}, title = {A First Order Meta Stackelberg Method for Robust Federated Learning (Technical Report)}, journal = {CoRR}, volume = {abs/2306.13273}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.13273}, doi = {10.48550/ARXIV.2306.13273}, eprinttype = {arXiv}, eprint = {2306.13273}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-13273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-13800, author = {Yunian Pan and Tao Li and Henger Li and Tianyi Xu and Zizhan Zheng and Quanyan Zhu}, title = {A First Order Meta Stackelberg Method for Robust Federated Learning}, journal = {CoRR}, volume = {abs/2306.13800}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.13800}, doi = {10.48550/ARXIV.2306.13800}, eprinttype = {arXiv}, eprint = {2306.13800}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-13800.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-01281, author = {Mustafa Abdallah and Saurabh Bagchi and Shaunak D. Bopardikar and Kevin Chan and Xing Gao and Murat Kantarcioglu and Congmiao Li and Peng Liu and Quanyan Zhu}, title = {Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions}, journal = {CoRR}, volume = {abs/2309.01281}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.01281}, doi = {10.48550/ARXIV.2309.01281}, eprinttype = {arXiv}, eprint = {2309.01281}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-01281.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-02328, author = {Haozhe Lei and Quanyan Zhu}, title = {Neurosymbolic Meta-Reinforcement Lookahead Learning Achieves Safe Self-Driving in Non-Stationary Environments}, journal = {CoRR}, volume = {abs/2309.02328}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.02328}, doi = {10.48550/ARXIV.2309.02328}, eprinttype = {arXiv}, eprint = {2309.02328}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-02328.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-13403, author = {Yinan Hu and Quanyan Zhu}, title = {Game of Travesty: Decoy-based Psychological Cyber Deception for Proactive Human Agents}, journal = {CoRR}, volume = {abs/2309.13403}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.13403}, doi = {10.48550/ARXIV.2309.13403}, eprinttype = {arXiv}, eprint = {2309.13403}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-13403.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-16098, author = {Yuhan Zhao and Quanyan Zhu}, title = {Stackelberg Game-Theoretic Trajectory Guidance for Multi-Robot Systems with Koopman Operator}, journal = {CoRR}, volume = {abs/2309.16098}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.16098}, doi = {10.48550/ARXIV.2309.16098}, eprinttype = {arXiv}, eprint = {2309.16098}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-16098.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-01646, author = {Ya{-}Ting Yang and Haozhe Lei and Quanyan Zhu}, title = {Strategic Information Attacks on Incentive-Compatible Navigational Recommendations in Intelligent Transportation Systems}, journal = {CoRR}, volume = {abs/2310.01646}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.01646}, doi = {10.48550/ARXIV.2310.01646}, eprinttype = {arXiv}, eprint = {2310.01646}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-01646.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-01675, author = {Tao Li and Yunian Pan and Quanyan Zhu}, title = {Decision-Dominant Strategic Defense Against Lateral Movement for 5G Zero-Trust Multi-Domain Networks}, journal = {CoRR}, volume = {abs/2310.01675}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.01675}, doi = {10.48550/ARXIV.2310.01675}, eprinttype = {arXiv}, eprint = {2310.01675}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-01675.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-04579, author = {Tao Li and Juan Guevara and Xinghong Xie and Quanyan Zhu}, title = {Self-Confirming Transformer for Locally Consistent Online Adaptation in Multi-Agent Reinforcement Learning}, journal = {CoRR}, volume = {abs/2310.04579}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.04579}, doi = {10.48550/ARXIV.2310.04579}, eprinttype = {arXiv}, eprint = {2310.04579}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-04579.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-02882, author = {Yunfei Ge and Quanyan Zhu}, title = {Zero Trust for Cyber Resilience}, journal = {CoRR}, volume = {abs/2312.02882}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.02882}, doi = {10.48550/ARXIV.2312.02882}, eprinttype = {arXiv}, eprint = {2312.02882}, timestamp = {Thu, 28 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-02882.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-02921, author = {Shutian Liu and Quanyan Zhu}, title = {Cyber Insurance for Cyber Resilience}, journal = {CoRR}, volume = {abs/2312.02921}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.02921}, doi = {10.48550/ARXIV.2312.02921}, eprinttype = {arXiv}, eprint = {2312.02921}, timestamp = {Thu, 28 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-02921.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/SmidtsRZVZHDTP22, author = {Carol S. Smidts and Indrajit Ray and Quanyan Zhu and Pavan Kumar Vaddi and Yunfei Zhao and Linan Huang and Xiaoxu Diao and Rakibul Talukdar and Michael C. Pietrykowski}, title = {Cyber-Security Threats and Response Models in Nuclear Power Plants}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-12711-3}, doi = {10.1007/978-3-031-12711-3}, isbn = {978-3-031-12710-6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/SmidtsRZVZHDTP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/KierasFZ22, author = {Timothy Kieras and Junaid Farooq and Quanyan Zhu}, title = {IoT Supply Chain Security Risk Analysis and Mitigation - Modeling, Computations, and Software Tools}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-08480-5}, doi = {10.1007/978-3-031-08480-5}, isbn = {978-3-031-08479-9}, timestamp = {Sat, 17 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/KierasFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/arc/ZhuI22, author = {Quanyan Zhu and Hideaki Ishii}, title = {Introduction to the special section on learning and security for multi-agent systems}, journal = {Annu. Rev. Control.}, volume = {53}, pages = {249--251}, year = {2022}, url = {https://doi.org/10.1016/j.arcontrol.2022.03.002}, doi = {10.1016/J.ARCONTROL.2022.03.002}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/arc/ZhuI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/arc/HuangHZ22, author = {Yunhan Huang and Linan Huang and Quanyan Zhu}, title = {Reinforcement Learning for feedback-enabled cyber resilience}, journal = {Annu. Rev. Control.}, volume = {53}, pages = {273--295}, year = {2022}, url = {https://doi.org/10.1016/j.arcontrol.2022.01.001}, doi = {10.1016/J.ARCONTROL.2022.01.001}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/arc/HuangHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/arc/LiZZ22, author = {Tao Li and Yuhan Zhao and Quanyan Zhu}, title = {The role of information structures in game-theoretic multi-agent learning}, journal = {Annu. Rev. Control.}, volume = {53}, pages = {296--314}, year = {2022}, url = {https://doi.org/10.1016/j.arcontrol.2022.03.003}, doi = {10.1016/J.ARCONTROL.2022.03.003}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/arc/LiZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangZ22, author = {Linan Huang and Quanyan Zhu}, title = {{RADAMS:} Resilient and adaptive alert and attention management strategy against Informational Denial-of-Service (IDoS) attacks}, journal = {Comput. Secur.}, volume = {121}, pages = {102844}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102844}, doi = {10.1016/J.COSE.2022.102844}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csysl/Barreiro-GomezZ22, author = {Julian Barreiro{-}Gomez and Quanyan Zhu}, title = {Coalitional Stochastic Differential Games for Networks}, journal = {{IEEE} Control. Syst. Lett.}, volume = {6}, pages = {2707--2712}, year = {2022}, url = {https://doi.org/10.1109/LCSYS.2022.3175333}, doi = {10.1109/LCSYS.2022.3175333}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csysl/Barreiro-GomezZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dga/ZhuGA22, author = {Quanyan Zhu and Elena A. Gubar and Eitan Altman}, title = {Preface to Special Issue on Dynamic Games for Modeling and Control of Epidemics}, journal = {Dyn. Games Appl.}, volume = {12}, number = {1}, pages = {1--6}, year = {2022}, url = {https://doi.org/10.1007/s13235-022-00432-4}, doi = {10.1007/S13235-022-00432-4}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dga/ZhuGA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dga/HuangZ22, author = {Yunhan Huang and Quanyan Zhu}, title = {Game-Theoretic Frameworks for Epidemic Spreading and Human Decision-Making: {A} Review}, journal = {Dyn. Games Appl.}, volume = {12}, number = {1}, pages = {7--48}, year = {2022}, url = {https://doi.org/10.1007/s13235-022-00428-0}, doi = {10.1007/S13235-022-00428-0}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dga/HuangZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dga/LiuZZ22, author = {Shutian Liu and Yuhan Zhao and Quanyan Zhu}, title = {Herd Behaviors in Epidemics: {A} Dynamics-Coupled Evolutionary Games Approach}, journal = {Dyn. Games Appl.}, volume = {12}, number = {1}, pages = {183--213}, year = {2022}, url = {https://doi.org/10.1007/s13235-022-00433-3}, doi = {10.1007/S13235-022-00433-3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dga/LiuZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dga/ZhangZ22, author = {Tao Zhang and Quanyan Zhu}, title = {On Incentive Compatibility in Dynamic Mechanism Design With Exit Option in a Markovian Environment}, journal = {Dyn. Games Appl.}, volume = {12}, number = {2}, pages = {701--745}, year = {2022}, url = {https://doi.org/10.1007/s13235-021-00388-x}, doi = {10.1007/S13235-021-00388-X}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dga/ZhangZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejcon/NugrahaCHIZ22, author = {Yurid Nugraha and Ahmet Cetinkaya and Tomohisa Hayakawa and Hideaki Ishii and Quanyan Zhu}, title = {Rolling horizon games of resilient networks with non-uniform horizons}, journal = {Eur. J. Control}, volume = {68}, pages = {100693}, year = {2022}, url = {https://doi.org/10.1016/j.ejcon.2022.100693}, doi = {10.1016/J.EJCON.2022.100693}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejcon/NugrahaCHIZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tase/HuangZ22, author = {Linan Huang and Quanyan Zhu}, title = {A Dynamic Game Framework for Rational and Persistent Robot Deception With an Application to Deceptive Pursuit-Evasion}, journal = {{IEEE} Trans Autom. Sci. Eng.}, volume = {19}, number = {4}, pages = {2918--2932}, year = {2022}, url = {https://doi.org/10.1109/TASE.2021.3097286}, doi = {10.1109/TASE.2021.3097286}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tase/HuangZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/ZhangZ22, author = {Rui Zhang and Quanyan Zhu}, title = {Optimal Cyber-Insurance Contract Design for Dynamic Risk Management and Mitigation}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {9}, number = {4}, pages = {1087--1100}, year = {2022}, url = {https://doi.org/10.1109/TCSS.2021.3117905}, doi = {10.1109/TCSS.2021.3117905}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/ZhangZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangJBZ22, author = {Linan Huang and Shumeng Jia and Emily Balcetis and Quanyan Zhu}, title = {{ADVERT:} An Adaptive and Data-Driven Attention Enhancement Mechanism for Phishing Prevention}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {2585--2597}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3189530}, doi = {10.1109/TIFS.2022.3189530}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangJBZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/allerton/HuangZZ22, author = {Yunhan Huang and Tao Zhang and Quanyan Zhu}, title = {The Inverse Problem of Linear-Quadratic Differential Games: When is a Control Strategies Profile Nash?}, booktitle = {58th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2022, Monticello, IL, USA, September 27-30, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/Allerton49937.2022.9929408}, doi = {10.1109/ALLERTON49937.2022.9929408}, timestamp = {Fri, 11 Nov 2022 16:53:12 +0100}, biburl = {https://dblp.org/rec/conf/allerton/HuangZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/LiuZ22, author = {Shutian Liu and Quanyan Zhu}, title = {{EPROACH:} {A} Population Vaccination Game for Strategic Information Design to Enable Responsible {COVID} Reopening}, booktitle = {American Control Conference, {ACC} 2022, Atlanta, GA, USA, June 8-10, 2022}, pages = {568--573}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/ACC53348.2022.9867229}, doi = {10.23919/ACC53348.2022.9867229}, timestamp = {Mon, 06 Nov 2023 12:57:51 +0100}, biburl = {https://dblp.org/rec/conf/amcc/LiuZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/LiuZZ22, author = {Shutian Liu and Yuhan Zhao and Quanyan Zhu}, title = {Understanding the Interplay Between Herd Behaviors and Epidemic Spreading Using Federated Evolutionary Games}, booktitle = {American Control Conference, {ACC} 2022, Atlanta, GA, USA, June 8-10, 2022}, pages = {593--598}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/ACC53348.2022.9867809}, doi = {10.23919/ACC53348.2022.9867809}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/LiuZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/ZhaoZ22, author = {Yuhan Zhao and Quanyan Zhu}, title = {Distributed and Resilient Planning-Control for Optimal {LEO} Satellite Constellation Coverage}, booktitle = {American Control Conference, {ACC} 2022, Atlanta, GA, USA, June 8-10, 2022}, pages = {1841--1846}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/ACC53348.2022.9867536}, doi = {10.23919/ACC53348.2022.9867536}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/ZhaoZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/HuZ22, author = {Yinan Hu and Quanyan Zhu}, title = {Evasion-Aware Neyman-Pearson Detectors: {A} Game-Theoretic Approach}, booktitle = {61st {IEEE} Conference on Decision and Control, {CDC} 2022, Cancun, Mexico, December 6-9, 2022}, pages = {6111--6117}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CDC51059.2022.9993423}, doi = {10.1109/CDC51059.2022.9993423}, timestamp = {Wed, 18 Jan 2023 15:37:37 +0100}, biburl = {https://dblp.org/rec/conf/cdc/HuZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/ChenHZ22, author = {Juntao Chen and Yunhan Huang and Quanyan Zhu}, title = {Transactive Resilience in Renewable Microgrids: {A} Contract-Theoretic Approach}, booktitle = {56th Annual Conference on Information Sciences and Systems, {CISS} 2022, Princeton, NJ, USA, March 9-11, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CISS53076.2022.9751195}, doi = {10.1109/CISS53076.2022.9751195}, timestamp = {Fri, 22 Apr 2022 19:18:39 +0200}, biburl = {https://dblp.org/rec/conf/ciss/ChenHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GeZ22, author = {Yunfei Ge and Quanyan Zhu}, title = {Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {359--364}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947263}, doi = {10.1109/CNS56114.2022.9947263}, timestamp = {Fri, 25 Nov 2022 09:04:32 +0100}, biburl = {https://dblp.org/rec/conf/cns/GeZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuZ22, author = {Shutian Liu and Quanyan Zhu}, title = {On the Role of Risk Perceptions in Cyber Insurance Contracts}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {377--382}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947268}, doi = {10.1109/CNS56114.2022.9947268}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiuZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PanZ22, author = {Yunian Pan and Quanyan Zhu}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {On Poisoned Wardrop Equilibrium in Congestion Games}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {191--211}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_10}, doi = {10.1007/978-3-031-26369-9\_10}, timestamp = {Wed, 07 Feb 2024 17:23:12 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/PanZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icra/ZhaoHYZ22, author = {Yuhan Zhao and Baichuan Huang and Jingjin Yu and Quanyan Zhu}, title = {Stackelberg Strategic Guidance for Heterogeneous Robots Collaboration}, booktitle = {2022 International Conference on Robotics and Automation, {ICRA} 2022, Philadelphia, PA, USA, May 23-27, 2022}, pages = {4922--4928}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICRA46639.2022.9811678}, doi = {10.1109/ICRA46639.2022.9811678}, timestamp = {Wed, 20 Jul 2022 18:22:23 +0200}, biburl = {https://dblp.org/rec/conf/icra/ZhaoHYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/GeZ22, author = {Yunfei Ge and Quanyan Zhu}, title = {{MUFAZA:} Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks}, booktitle = {{IEEE} Military Communications Conference, {MILCOM} 2022, Rockville, MD, USA, November 28 - December 2, 2022}, pages = {571--576}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MILCOM55135.2022.10017839}, doi = {10.1109/MILCOM55135.2022.10017839}, timestamp = {Wed, 08 Feb 2023 17:46:14 +0100}, biburl = {https://dblp.org/rec/conf/milcom/GeZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-06081, author = {Tao Zhang and Quanyan Zhu}, title = {Bayesian Promised Persuasion: Dynamic Forward-Looking Multiagent Delegation with Informational Burning}, journal = {CoRR}, volume = {abs/2201.06081}, year = {2022}, url = {https://arxiv.org/abs/2201.06081}, eprinttype = {arXiv}, eprint = {2201.06081}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-06081.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-11855, author = {Yunfei Ge and Quanyan Zhu}, title = {Accountability and Insurance in IoT Supply Chain}, journal = {CoRR}, volume = {abs/2201.11855}, year = {2022}, url = {https://arxiv.org/abs/2201.11855}, eprinttype = {arXiv}, eprint = {2201.11855}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-11855.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-01877, author = {Yuhan Zhao and Baichuan Huang and Jingjin Yu and Quanyan Zhu}, title = {Stackelberg Strategic Guidance for Heterogeneous Robots Collaboration}, journal = {CoRR}, volume = {abs/2202.01877}, year = {2022}, url = {https://arxiv.org/abs/2202.01877}, eprinttype = {arXiv}, eprint = {2202.01877}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-01877.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-02050, author = {Yuhan Zhao and Quanyan Zhu}, title = {Autonomous and Resilient Control for Optimal {LEO} Satellite Constellation Coverage Against Space Threats}, journal = {CoRR}, volume = {abs/2203.02050}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.02050}, doi = {10.48550/ARXIV.2203.02050}, eprinttype = {arXiv}, eprint = {2203.02050}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-02050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-05774, author = {Yunhan Huang and Quanyan Zhu}, title = {Reinforcement Learning for Linear Quadratic Control is Vulnerable Under Cost Manipulation}, journal = {CoRR}, volume = {abs/2203.05774}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.05774}, doi = {10.48550/ARXIV.2203.05774}, eprinttype = {arXiv}, eprint = {2203.05774}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-05774.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-09725, author = {Tao Zhang and Quanyan Zhu}, title = {Forward-Looking Dynamic Persuasion for Pipeline Stochastic Bayesian Game: {A} Fixed-Point Alignment Principle}, journal = {CoRR}, volume = {abs/2203.09725}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.09725}, doi = {10.48550/ARXIV.2203.09725}, eprinttype = {arXiv}, eprint = {2203.09725}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-09725.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-12001, author = {Shutian Liu and Quanyan Zhu}, title = {Mitigating Moral Hazard in Cyber Insurance Using Risk Preference Design}, journal = {CoRR}, volume = {abs/2203.12001}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.12001}, doi = {10.48550/ARXIV.2203.12001}, eprinttype = {arXiv}, eprint = {2203.12001}, timestamp = {Tue, 29 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-12001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-02294, author = {Linan Huang and Quanyan Zhu}, title = {{ZETAR:} Modeling and Computational Design of Strategic and Adaptive Compliance Policies}, journal = {CoRR}, volume = {abs/2204.02294}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.02294}, doi = {10.48550/ARXIV.2204.02294}, eprinttype = {arXiv}, eprint = {2204.02294}, timestamp = {Wed, 06 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-02294.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-05276, author = {Yinan Hu and Quanyan Zhu}, title = {Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion}, journal = {CoRR}, volume = {abs/2206.05276}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.05276}, doi = {10.48550/ARXIV.2206.05276}, eprinttype = {arXiv}, eprint = {2206.05276}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-05276.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-12938, author = {Shutian Liu and Quanyan Zhu}, title = {Stackelberg Risk Preference Design}, journal = {CoRR}, volume = {abs/2206.12938}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.12938}, doi = {10.48550/ARXIV.2206.12938}, eprinttype = {arXiv}, eprint = {2206.12938}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-12938.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-05303, author = {Yunhan Huang and Tao Zhang and Quanyan Zhu}, title = {The Inverse Problem of Linear-Quadratic Differential Games: When is a Control Strategies Profile Nash?}, journal = {CoRR}, volume = {abs/2207.05303}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.05303}, doi = {10.48550/ARXIV.2207.05303}, eprinttype = {arXiv}, eprint = {2207.05303}, timestamp = {Tue, 19 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-05303.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-00081, author = {Tao Li and Haozhe Lei and Quanyan Zhu}, title = {Sampling Attacks on Meta Reinforcement Learning: {A} Minimax Formulation and Complexity Analysis}, journal = {CoRR}, volume = {abs/2208.00081}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.00081}, doi = {10.48550/ARXIV.2208.00081}, eprinttype = {arXiv}, eprint = {2208.00081}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-00081.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-05060, author = {Yuhan Zhao and Craig Rieger and Quanyan Zhu}, title = {Multi-Agent Learning for Resilient Distributed Control Systems}, journal = {CoRR}, volume = {abs/2208.05060}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.05060}, doi = {10.48550/ARXIV.2208.05060}, eprinttype = {arXiv}, eprint = {2208.05060}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-05060.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-00094, author = {Yunian Pan and Quanyan Zhu}, title = {On Poisoned Wardrop Equilibrium in Congestion Games}, journal = {CoRR}, volume = {abs/2209.00094}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.00094}, doi = {10.48550/ARXIV.2209.00094}, eprinttype = {arXiv}, eprint = {2209.00094}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-00094.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-03209, author = {Tao Li and Haozhe Lei and Quanyan Zhu}, title = {Self-Adaptive Driving in Nonstationary Environments through Conjectural Online Lookahead Adaptation}, journal = {CoRR}, volume = {abs/2210.03209}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.03209}, doi = {10.48550/ARXIV.2210.03209}, eprinttype = {arXiv}, eprint = {2210.03209}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-03209.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-03214, author = {Yunian Pan and Tao Li and Quanyan Zhu}, title = {On the Resilience of Traffic Networks under Non-Equilibrium Learning}, journal = {CoRR}, volume = {abs/2210.03214}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.03214}, doi = {10.48550/ARXIV.2210.03214}, eprinttype = {arXiv}, eprint = {2210.03214}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-03214.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-15010, author = {Shutian Liu and Quanyan Zhu}, title = {On the Role of Risk Perceptions in Cyber Insurance Contracts}, journal = {CoRR}, volume = {abs/2210.15010}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.15010}, doi = {10.48550/ARXIV.2210.15010}, eprinttype = {arXiv}, eprint = {2210.15010}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-15010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-06512, author = {Yuhan Zhao and Quanyan Zhu}, title = {Stackelberg Meta-Learning Based Control for Guided Cooperative {LQG} Systems}, journal = {CoRR}, volume = {abs/2211.06512}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.06512}, doi = {10.48550/ARXIV.2211.06512}, eprinttype = {arXiv}, eprint = {2211.06512}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-06512.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-13336, author = {Yuhan Zhao and Quanyan Zhu}, title = {Stackelberg Meta-Learning for Strategic Guidance in Multi-Robot Trajectory Planning}, journal = {CoRR}, volume = {abs/2211.13336}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.13336}, doi = {10.48550/ARXIV.2211.13336}, eprinttype = {arXiv}, eprint = {2211.13336}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-13336.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-01570, author = {Yurid Nugraha and Tomohisa Hayakawa and Hideaki Ishii and Ahmet Cetinkaya and Quanyan Zhu}, title = {Two-Player Incomplete Games of Resilient Multiagent Systems}, journal = {CoRR}, volume = {abs/2212.01570}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.01570}, doi = {10.48550/ARXIV.2212.01570}, eprinttype = {arXiv}, eprint = {2212.01570}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-01570.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-08800, author = {Haozhe Lei and Quanyan Zhu}, title = {Level-k Meta-Learning for Pedestrian-Aware Self-Driving}, journal = {CoRR}, volume = {abs/2212.08800}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.08800}, doi = {10.48550/ARXIV.2212.08800}, eprinttype = {arXiv}, eprint = {2212.08800}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-08800.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-11446, author = {Tao Li and Quanyan Zhu}, title = {Commitment with Signaling under Double-sided Information Asymmetry}, journal = {CoRR}, volume = {abs/2212.11446}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.11446}, doi = {10.48550/ARXIV.2212.11446}, eprinttype = {arXiv}, eprint = {2212.11446}, timestamp = {Wed, 04 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-11446.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KierasFZ21, author = {Timothy Kieras and Muhammad Junaid Farooq and Quanyan Zhu}, title = {{I-SCRAM:} {A} Framework for IoT Supply Chain Risk Analysis and Mitigation Decisions}, journal = {{IEEE} Access}, volume = {9}, pages = {29827--29840}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3058338}, doi = {10.1109/ACCESS.2021.3058338}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KierasFZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csysl/PengCZ21, author = {Guanze Peng and Juntao Chen and Quanyan Zhu}, title = {Distributed Stabilization of Two Interdependent Markov Jump Linear Systems With Partial Information}, journal = {{IEEE} Control. Syst. Lett.}, volume = {5}, number = {2}, pages = {713--718}, year = {2021}, url = {https://doi.org/10.1109/LCSYS.2020.3004649}, doi = {10.1109/LCSYS.2020.3004649}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csysl/PengCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csysl/LiuZ21, author = {Shutian Liu and Quanyan Zhu}, title = {Robust and Stochastic Optimization With a Hybrid Coherent Risk Measure With an Application to Supervised Learning}, journal = {{IEEE} Control. Syst. Lett.}, volume = {5}, number = {3}, pages = {965--970}, year = {2021}, url = {https://doi.org/10.1109/LCSYS.2020.3007645}, doi = {10.1109/LCSYS.2020.3007645}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csysl/LiuZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csysl/KapsikarSAKZ21, author = {Suyog Kapsikar and Indrajit Saha and Khushboo Agarwal and Veeraruna Kavitha and Quanyan Zhu}, title = {Controlling Fake News by Collective Tagging: {A} Branching Process Analysis}, journal = {{IEEE} Control. Syst. Lett.}, volume = {5}, number = {6}, pages = {2108--2113}, year = {2021}, url = {https://doi.org/10.1109/LCSYS.2020.3045299}, doi = {10.1109/LCSYS.2020.3045299}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csysl/KapsikarSAKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dga/ChenZB21, author = {Juntao Chen and Quanyan Zhu and Tamer Basar}, title = {Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks}, journal = {Dyn. Games Appl.}, volume = {11}, number = {2}, pages = {294--325}, year = {2021}, url = {https://doi.org/10.1007/s13235-020-00363-y}, doi = {10.1007/S13235-020-00363-Y}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dga/ChenZB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftrob/ZhuRDV21, author = {Quanyan Zhu and Stefan Rass and Bernhard Dieber and V{\'{\i}}ctor Mayoral Vilches}, title = {Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice}, journal = {Found. Trends Robotics}, volume = {9}, number = {1}, pages = {1--129}, year = {2021}, url = {https://doi.org/10.1561/2300000061}, doi = {10.1561/2300000061}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftrob/ZhuRDV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcns/NugrahaCHIZ21, author = {Yurid Nugraha and Ahmet Cetinkaya and Tomohisa Hayakawa and Hideaki Ishii and Quanyan Zhu}, title = {Dynamic Resilient Network Games With Applications to Multiagent Consensus}, journal = {{IEEE} Trans. Control. Netw. Syst.}, volume = {8}, number = {1}, pages = {246--259}, year = {2021}, url = {https://doi.org/10.1109/TCNS.2020.3016839}, doi = {10.1109/TCNS.2020.3016839}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcns/NugrahaCHIZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangZ21, author = {Linan Huang and Quanyan Zhu}, title = {Duplicity Games for Deception Design With an Application to Insider Threat Mitigation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4843--4856}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3118886}, doi = {10.1109/TIFS.2021.3118886}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuangZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/FarooqZ21, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {QoE Based Revenue Maximizing Dynamic Resource Allocation and Pricing for Fog-Enabled Mission-Critical IoT Applications}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {20}, number = {12}, pages = {3395--3408}, year = {2021}, url = {https://doi.org/10.1109/TMC.2020.2999895}, doi = {10.1109/TMC.2020.2999895}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/FarooqZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/ChenTZ21, author = {Juntao Chen and Corinne Touati and Quanyan Zhu}, title = {A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled Infrastructure Network}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {3}, pages = {2601--2612}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2021.3100801}, doi = {10.1109/TNSE.2021.3100801}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/ChenTZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsipn/ChenHZZ21, author = {Juntao Chen and Yunhan Huang and Rui Zhang and Quanyan Zhu}, title = {Optimal Curing Strategy for Competing Epidemics Spreading Over Complex Networks}, journal = {{IEEE} Trans. Signal Inf. Process. over Networks}, volume = {7}, pages = {294--308}, year = {2021}, url = {https://doi.org/10.1109/TSIPN.2021.3075338}, doi = {10.1109/TSIPN.2021.3075338}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsipn/ChenHZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/FangZ21, author = {Song Fang and Quanyan Zhu}, title = {Information-Theoretic Performance Limitations of Feedback Control: Underlying Entropic Laws and Generic {\textdollar}{\textbackslash}mathcal\{L\}{\_}\{p\}{\textdollar} Bounds}, booktitle = {2021 American Control Conference, {ACC} 2021, New Orleans, LA, USA, May 25-28, 2021}, pages = {1281--1286}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/ACC50511.2021.9483083}, doi = {10.23919/ACC50511.2021.9483083}, timestamp = {Fri, 30 Jul 2021 11:11:12 +0200}, biburl = {https://dblp.org/rec/conf/amcc/FangZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/KapsikarSAKZ21, author = {Suyog Kapsikar and Indrajit Saha and Khushboo Agarwal and Veeraruna Kavitha and Quanyan Zhu}, title = {Controlling Fake News by Collective Tagging: {A} Branching Process Analysis}, booktitle = {2021 American Control Conference, {ACC} 2021, New Orleans, LA, USA, May 25-28, 2021}, pages = {1332--1337}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/ACC50511.2021.9483257}, doi = {10.23919/ACC50511.2021.9483257}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/KapsikarSAKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/FangZ21a, author = {Song Fang and Quanyan Zhu}, title = {Fundamental Limits of Obfuscation for Linear Gaussian Dynamical Systems: An Information-Theoretic Approach}, booktitle = {2021 American Control Conference, {ACC} 2021, New Orleans, LA, USA, May 25-28, 2021}, pages = {4574--4579}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/ACC50511.2021.9483148}, doi = {10.23919/ACC50511.2021.9483148}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/FangZ21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/PengLLCZ21, author = {Guanze Peng and Tao Li and Shutian Liu and Juntao Chen and Quanyan Zhu}, title = {Locally-Aware Constrained Games on Networks}, booktitle = {2021 American Control Conference, {ACC} 2021, New Orleans, LA, USA, May 25-28, 2021}, pages = {4606--4611}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/ACC50511.2021.9482895}, doi = {10.23919/ACC50511.2021.9482895}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/PengLLCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccta/NugrahaCHIZ21, author = {Yurid Nugraha and Ahmet Cetinkaya and Tomohisa Hayakawa and Hideaki Ishii and Quanyan Zhu}, title = {Cluster Formation in Multiagent Consensus via Dynamic Resilient Graph Games}, booktitle = {{IEEE} Conference on Control Technology and Applications, {CCTA} 2021, San Diego, CA, USA, August 9-11, 2021}, pages = {735--740}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CCTA48906.2021.9659182}, doi = {10.1109/CCTA48906.2021.9659182}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccta/NugrahaCHIZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/PanZ21, author = {Yunian Pan and Quanyan Zhu}, title = {Efficient Episodic Learning of Nonstationary and Unknown Zero-Sum Games Using Expert Game Ensembles}, booktitle = {2021 60th {IEEE} Conference on Decision and Control (CDC), Austin, TX, USA, December 14-17, 2021}, pages = {1669--1676}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CDC45484.2021.9682998}, doi = {10.1109/CDC45484.2021.9682998}, timestamp = {Tue, 17 May 2022 15:53:17 +0200}, biburl = {https://dblp.org/rec/conf/cdc/PanZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/HuangCZ21, author = {Yunhan Huang and Juntao Chen and Quanyan Zhu}, title = {Defending an Asset with Partial Information and Selected Observations: {A} Differential Game Framework}, booktitle = {2021 60th {IEEE} Conference on Decision and Control (CDC), Austin, TX, USA, December 14-17, 2021}, pages = {2366--2373}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CDC45484.2021.9683431}, doi = {10.1109/CDC45484.2021.9683431}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cdc/HuangCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/HuangZ21, author = {Yunhan Huang and Quanyan Zhu}, title = {Self-Triggered Markov Decision Processes}, booktitle = {2021 60th {IEEE} Conference on Decision and Control (CDC), Austin, TX, USA, December 14-17, 2021}, pages = {4507--4514}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CDC45484.2021.9682918}, doi = {10.1109/CDC45484.2021.9682918}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cdc/HuangZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/NugrahaCHIZ21, author = {Yurid Nugraha and Ahmet Cetinkaya and Tomohisa Hayakawa and Hideaki Ishii and Quanyan Zhu}, title = {Rolling Horizon Games for Cluster Formation of Resilient Multiagent Systems}, booktitle = {2021 60th {IEEE} Conference on Decision and Control (CDC), Austin, TX, USA, December 14-17, 2021}, pages = {4829--4934}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CDC45484.2021.9683409}, doi = {10.1109/CDC45484.2021.9683409}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdc/NugrahaCHIZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/LiPZ21, author = {Tao Li and Guanze Peng and Quanyan Zhu}, title = {Blackwell Online Learning for Markov Decision Processes}, booktitle = {55th Annual Conference on Information Sciences and Systems, {CISS} 2021, Baltimore, MD, USA, March 24-26, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CISS50987.2021.9400319}, doi = {10.1109/CISS50987.2021.9400319}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/LiPZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucc/HuangXZ21, author = {Yunhan Huang and Zehui Xiong and Quanyan Zhu}, title = {Cross-Layer Coordinated Attacks on Cyber-Physical Systems: {A} {LQG} Game Framework with Controlled Observations}, booktitle = {2021 European Control Conference, {ECC} 2021, Virtual Event / Delft, The Netherlands, June 29 - July 2, 2021}, pages = {521--528}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/ECC54610.2021.9654874}, doi = {10.23919/ECC54610.2021.9654874}, timestamp = {Thu, 31 Mar 2022 11:10:43 +0200}, biburl = {https://dblp.org/rec/conf/eucc/HuangXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucc/FangZ21, author = {Song Fang and Quanyan Zhu}, title = {Fundamental Stealthiness-Distortion Tradeoffs in Dynamical Systems under Injection Attacks: {A} Power Spectral Analysis}, booktitle = {2021 European Control Conference, {ECC} 2021, Virtual Event / Delft, The Netherlands, June 29 - July 2, 2021}, pages = {964--969}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/ECC54610.2021.9654871}, doi = {10.23919/ECC54610.2021.9654871}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eucc/FangZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhaoGZ21, author = {Yuhan Zhao and Yunfei Ge and Quanyan Zhu}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Combating Ransomware in Internet of Things: {A} Games-in-Games Approach for Cross-Layer Cyber Defense and Security Investment}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {208--228}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_12}, doi = {10.1007/978-3-030-90370-1\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhaoGZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangZ21, author = {Linan Huang and Quanyan Zhu}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {314--333}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_17}, doi = {10.1007/978-3-030-90370-1\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HuangZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-00957, author = {Song Fang and Quanyan Zhu}, title = {Relativistic Rocket Control (Relativistic Space-Travel Flight Control): Feedback Control of Relativistic Dynamics Propelled by Ejecting Mass}, journal = {CoRR}, volume = {abs/2101.00957}, year = {2021}, url = {https://arxiv.org/abs/2101.00957}, eprinttype = {arXiv}, eprint = {2101.00957}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-00957.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-04357, author = {Tao Zhang and Quanyan Zhu}, title = {On the Differential Private Data Market: Endogenous Evolution, Dynamic Pricing, and Incentive Compatibility}, journal = {CoRR}, volume = {abs/2101.04357}, year = {2021}, url = {https://arxiv.org/abs/2101.04357}, eprinttype = {arXiv}, eprint = {2101.04357}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-04357.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-02730, author = {Song Fang and Quanyan Zhu}, title = {Feedback Capacity of Parallel {ACGN} Channels and Kalman Filter: Power Allocation with Feedback}, journal = {CoRR}, volume = {abs/2102.02730}, year = {2021}, url = {https://arxiv.org/abs/2102.02730}, eprinttype = {arXiv}, eprint = {2102.02730}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-02730.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-05469, author = {Yunhan Huang and Quanyan Zhu}, title = {A Pursuit-Evasion Differential Game with Strategic Information Acquisition}, journal = {CoRR}, volume = {abs/2102.05469}, year = {2021}, url = {https://arxiv.org/abs/2102.05469}, eprinttype = {arXiv}, eprint = {2102.05469}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-05469.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-07152, author = {Tao Zhang and Quanyan Zhu}, title = {On the Equilibrium Elicitation of Markov Games Through Information Design}, journal = {CoRR}, volume = {abs/2102.07152}, year = {2021}, url = {https://arxiv.org/abs/2102.07152}, eprinttype = {arXiv}, eprint = {2102.07152}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-07152.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-08571, author = {Yunhan Huang and Quanyan Zhu}, title = {Self-Triggered Markov Decision Processes}, journal = {CoRR}, volume = {abs/2102.08571}, year = {2021}, url = {https://arxiv.org/abs/2102.08571}, eprinttype = {arXiv}, eprint = {2102.08571}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-08571.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-12059, author = {Linan Huang and Quanyan Zhu}, title = {Convergence of Bayesian Nash Equilibrium in Infinite Bayesian Games under Discretization}, journal = {CoRR}, volume = {abs/2102.12059}, year = {2021}, url = {https://arxiv.org/abs/2102.12059}, eprinttype = {arXiv}, eprint = {2102.12059}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-12059.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-05789, author = {Quanyan Zhu and Stefan Rass and Bernhard Dieber and Victor Mayoral Vilches}, title = {Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice}, journal = {CoRR}, volume = {abs/2103.05789}, year = {2021}, url = {https://arxiv.org/abs/2103.05789}, eprinttype = {arXiv}, eprint = {2103.05789}, timestamp = {Tue, 16 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-05789.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-13230, author = {Yunhan Huang and Juntao Chen and Quanyan Zhu}, title = {Assets Defending Differential Games with Partial Information and Selected Observations}, journal = {CoRR}, volume = {abs/2103.13230}, year = {2021}, url = {https://arxiv.org/abs/2103.13230}, eprinttype = {arXiv}, eprint = {2103.13230}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-13230.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-17089, author = {Juntao Chen and Yunhan Huang and Quanyan Zhu}, title = {Transactive Resilience in Renewable Microgrids: {A} Contract-Theoretic Approach}, journal = {CoRR}, volume = {abs/2103.17089}, year = {2021}, url = {https://arxiv.org/abs/2103.17089}, eprinttype = {arXiv}, eprint = {2103.17089}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-17089.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-03052, author = {Tao Zhang and Quanyan Zhu}, title = {Informational Design of Dynamic Multi-Agent System}, journal = {CoRR}, volume = {abs/2105.03052}, year = {2021}, url = {https://arxiv.org/abs/2105.03052}, eprinttype = {arXiv}, eprint = {2105.03052}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-03052.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-08158, author = {Tao Li and Guanze Peng and Quanyan Zhu and Tamer Basar}, title = {The Confluence of Networks, Games and Learning}, journal = {CoRR}, volume = {abs/2105.08158}, year = {2021}, url = {https://arxiv.org/abs/2105.08158}, eprinttype = {arXiv}, eprint = {2105.08158}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-08158.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-00214, author = {Yunhan Huang and Quanyan Zhu}, title = {Game-Theoretic Frameworks for Epidemic Spreading and Human Decision Making: {A} Review}, journal = {CoRR}, volume = {abs/2106.00214}, year = {2021}, url = {https://arxiv.org/abs/2106.00214}, eprinttype = {arXiv}, eprint = {2106.00214}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-00214.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-06907, author = {Linan Huang and Quanyan Zhu}, title = {{INADVERT:} An Interactive and Adaptive Counterdeception Platform for Attention Enhancement and Phishing Prevention}, journal = {CoRR}, volume = {abs/2106.06907}, year = {2021}, url = {https://arxiv.org/abs/2106.06907}, eprinttype = {arXiv}, eprint = {2106.06907}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-06907.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-08998, author = {Shutian Liu and Yuhan Zhao and Quanyan Zhu}, title = {Herd Behaviors in Epidemics: {A} Dynamics-Coupled Evolutionary Games Approach}, journal = {CoRR}, volume = {abs/2106.08998}, year = {2021}, url = {https://arxiv.org/abs/2106.08998}, eprinttype = {arXiv}, eprint = {2106.08998}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-08998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-00783, author = {Yunhan Huang and Linan Huang and Quanyan Zhu}, title = {Reinforcement Learning for Feedback-Enabled Cyber Resilience}, journal = {CoRR}, volume = {abs/2107.00783}, year = {2021}, url = {https://arxiv.org/abs/2107.00783}, eprinttype = {arXiv}, eprint = {2107.00783}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-00783.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-13632, author = {Yunian Pan and Quanyan Zhu}, title = {Efficient Episodic Learning of Nonstationary and Unknown Zero-Sum Games Using Expert Game Ensembles}, journal = {CoRR}, volume = {abs/2107.13632}, year = {2021}, url = {https://arxiv.org/abs/2107.13632}, eprinttype = {arXiv}, eprint = {2107.13632}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-13632.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-08255, author = {Linan Huang and Quanyan Zhu}, title = {Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability}, journal = {CoRR}, volume = {abs/2108.08255}, year = {2021}, url = {https://arxiv.org/abs/2108.08255}, eprinttype = {arXiv}, eprint = {2108.08255}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-08255.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-13159, author = {Juntao Chen and Corinne Touati and Quanyan Zhu}, title = {A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled Infrastructure Network}, journal = {CoRR}, volume = {abs/2108.13159}, year = {2021}, url = {https://arxiv.org/abs/2108.13159}, eprinttype = {arXiv}, eprint = {2108.13159}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-13159.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-06881, author = {Shutian Liu and Quanyan Zhu}, title = {{EPROACH:} {A} Population Vaccination Game for Strategic Information Design to Enable Responsible {COVID} Reopening}, journal = {CoRR}, volume = {abs/2110.06881}, year = {2021}, url = {https://arxiv.org/abs/2110.06881}, eprinttype = {arXiv}, eprint = {2110.06881}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-06881.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-03463, author = {Linan Huang and Quanyan Zhu}, title = {{RADAMS:} Resilient and Adaptive Alert and Attention Management Strategy against Informational Denial-of-Service (IDoS) Attacks}, journal = {CoRR}, volume = {abs/2111.03463}, year = {2021}, url = {https://arxiv.org/abs/2111.03463}, eprinttype = {arXiv}, eprint = {2111.03463}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-03463.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/RassSKZ20, author = {Stefan Rass and Stefan Schauer and Sandra K{\"{o}}nig and Quanyan Zhu}, title = {Cyber-Security in Critical Infrastructures - {A} Game-Theoretic Approach}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-46908-5}, doi = {10.1007/978-3-030-46908-5}, isbn = {978-3-030-46907-8}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/RassSKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/ZhuX20, author = {Quanyan Zhu and Zhiheng Xu}, title = {Cross-Layer Design for Secure and Resilient Cyber-Physical Systems - {A} Decision and Game Theoretic Approach, 3}, series = {Advances in Information Security}, volume = {81}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60251-2}, doi = {10.1007/978-3-030-60251-2}, isbn = {978-3-030-60250-5}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/ZhuX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangZ20, author = {Linan Huang and Quanyan Zhu}, title = {A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101660}, doi = {10.1016/J.COSE.2019.101660}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RassZ20, author = {Stefan Rass and Quanyan Zhu}, title = {Computer {\&} security special issue editorial}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101678}, doi = {10.1016/J.COSE.2019.101678}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RassZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/ZhaoHSZ20, author = {Yunfei Zhao and Linan Huang and Carol S. Smidts and Quanyan Zhu}, title = {Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants}, journal = {Reliab. Eng. Syst. Saf.}, volume = {201}, pages = {106878}, year = {2020}, url = {https://doi.org/10.1016/j.ress.2020.106878}, doi = {10.1016/J.RESS.2020.106878}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ress/ZhaoHSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tac/TanwaniZ20, author = {Aneel Tanwani and Quanyan Zhu}, title = {Feedback Nash Equilibrium for Randomly Switching Differential-Algebraic Games}, journal = {{IEEE} Trans. Autom. Control.}, volume = {65}, number = {8}, pages = {3286--3301}, year = {2020}, url = {https://doi.org/10.1109/TAC.2019.2943577}, doi = {10.1109/TAC.2019.2943577}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tac/TanwaniZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tccn/HanawalHZ20, author = {Manjesh Kumar Hanawal and Yezekael Hayel and Quanyan Zhu}, title = {Effective Utilization of Licensed and Unlicensed Spectrum in Large Scale Ad Hoc Networks}, journal = {{IEEE} Trans. Cogn. Commun. Netw.}, volume = {6}, number = {2}, pages = {618--630}, year = {2020}, url = {https://doi.org/10.1109/TCCN.2019.2950249}, doi = {10.1109/TCCN.2019.2950249}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tccn/HanawalHZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcns/ChenTZ20, author = {Juntao Chen and Corinne Touati and Quanyan Zhu}, title = {Optimal Secure Two-Layer IoT Network Design}, journal = {{IEEE} Trans. Control. Netw. Syst.}, volume = {7}, number = {1}, pages = {398--409}, year = {2020}, url = {https://doi.org/10.1109/TCNS.2019.2906893}, doi = {10.1109/TCNS.2019.2906893}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcns/ChenTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcns/HuangZ20, author = {Yunhan Huang and Quanyan Zhu}, title = {A Differential Game Approach to Decentralized Virus-Resistant Weight Adaptation Policy Over Complex Networks}, journal = {{IEEE} Trans. Control. Netw. Syst.}, volume = {7}, number = {2}, pages = {944--955}, year = {2020}, url = {https://doi.org/10.1109/TCNS.2019.2931862}, doi = {10.1109/TCNS.2019.2931862}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcns/HuangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcns/ChenZ20, author = {Juntao Chen and Quanyan Zhu}, title = {Control of Multilayer Mobile Autonomous Systems in Adversarial Environments: {A} Games-in-Games Approach}, journal = {{IEEE} Trans. Control. Netw. Syst.}, volume = {7}, number = {3}, pages = {1056--1068}, year = {2020}, url = {https://doi.org/10.1109/TCNS.2019.2962316}, doi = {10.1109/TCNS.2019.2962316}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcns/ChenZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenTZ20, author = {Juntao Chen and Corinne Touati and Quanyan Zhu}, title = {A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {462--474}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2924130}, doi = {10.1109/TIFS.2019.2924130}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZ20, author = {Rui Zhang and Quanyan Zhu}, title = {\texttt{FlipIn}: {A} Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2026--2041}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2955891}, doi = {10.1109/TIFS.2019.2955891}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/LiZZ20, author = {Yun Li and Tao Zhang and Quanyan Zhu}, title = {Distributed Multi-Battery Coordination for Cooperative Energy Management via ADMM-based Iterative Learning}, booktitle = {2020 American Control Conference, {ACC} 2020, Denver, CO, USA, July 1-3, 2020}, pages = {2232--2237}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ACC45564.2020.9147988}, doi = {10.23919/ACC45564.2020.9147988}, timestamp = {Sun, 08 Aug 2021 01:40:57 +0200}, biburl = {https://dblp.org/rec/conf/amcc/LiZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccta/QianFZ20, author = {Zhentian Qian and Jie Fu and Quanyan Zhu}, title = {A Receding-Horizon {MDP} Approach for Performance Evaluation of Moving Target Defense in Networks}, booktitle = {2020 {IEEE} Conference on Control Technology and Applications, {CCTA} 2020, Montreal, QC, Canada, August 24-26, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CCTA41146.2020.9206360}, doi = {10.1109/CCTA41146.2020.9206360}, timestamp = {Wed, 07 Oct 2020 19:50:15 +0200}, biburl = {https://dblp.org/rec/conf/ccta/QianFZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/NugrahaCHIZ20, author = {Yurid Nugraha and Ahmet Cetinkaya and Tomohisa Hayakawa and Hideaki Ishii and Quanyan Zhu}, title = {Dynamic Resilient Network Games Considering Connectivity}, booktitle = {59th {IEEE} Conference on Decision and Control, {CDC} 2020, Jeju Island, South Korea, December 14-18, 2020}, pages = {3779--3784}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CDC42340.2020.9304479}, doi = {10.1109/CDC42340.2020.9304479}, timestamp = {Fri, 04 Mar 2022 13:31:02 +0100}, biburl = {https://dblp.org/rec/conf/cdc/NugrahaCHIZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/FangZ20, author = {Song Fang and Quanyan Zhu}, title = {Fundamental Limitations in Sequential Prediction and Recursive Algorithms: Lp Bounds via an Entropic Analysis}, booktitle = {54th Annual Conference on Information Sciences and Systems, {CISS} 2020, Princeton, NJ, USA, March 18-20, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CISS48834.2020.1570617026}, doi = {10.1109/CISS48834.2020.1570617026}, timestamp = {Wed, 20 May 2020 12:05:09 +0200}, biburl = {https://dblp.org/rec/conf/ciss/FangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/PengZ20, author = {Guanze Peng and Quanyan Zhu}, title = {Sequential Hypothesis Testing Game}, booktitle = {54th Annual Conference on Information Sciences and Systems, {CISS} 2020, Princeton, NJ, USA, March 18-20, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CISS48834.2020.1570617162}, doi = {10.1109/CISS48834.2020.1570617162}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/PengZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangZ20, author = {Linan Huang and Quanyan Zhu}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {125--146}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_7}, doi = {10.1007/978-3-030-64793-3\_7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HuangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhaoZ20, author = {Yuhan Zhao and Quanyan Zhu}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Combating Online Counterfeits: {A} Game-Theoretic Analysis of Cyber Supply Chain Ecosystem}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {326--345}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_18}, doi = {10.1007/978-3-030-64793-3\_18}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/ZhaoZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PanPCZ20, author = {Yunian Pan and Guanze Peng and Juntao Chen and Quanyan Zhu}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {{MASAGE:} Model-Agnostic Sequential and Adaptive Game Estimation}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {365--384}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_20}, doi = {10.1007/978-3-030-64793-3\_20}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/PanPCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PengZZ20, author = {Guanze Peng and Tao Zhang and Quanyan Zhu}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {A Data-Driven Distributionally Robust Game Using Wasserstein Distance}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {405--421}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_22}, doi = {10.1007/978-3-030-64793-3\_22}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/PengZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/FangZ20, author = {Song Fang and Quanyan Zhu}, title = {A Connection between Feedback Capacity and Kalman Filter for Colored Gaussian Noises}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2020, Los Angeles, CA, USA, June 21-26, 2020}, pages = {2055--2060}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISIT44484.2020.9174357}, doi = {10.1109/ISIT44484.2020.9174357}, timestamp = {Tue, 15 Sep 2020 10:18:53 +0200}, biburl = {https://dblp.org/rec/conf/isit/FangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KierasFZ20, author = {Timothy Kieras and Muhammad Junaid Farooq and Quanyan Zhu}, title = {Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties}, booktitle = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco, CA, USA, May 21, 2020}, pages = {163--170}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SPW50608.2020.00043}, doi = {10.1109/SPW50608.2020.00043}, timestamp = {Thu, 21 Sep 2023 16:11:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/KierasFZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/FarooqZ20, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {PhD Forum: Enabling Autonomic IoT for Smart Urban Services}, booktitle = {6th {IEEE} World Forum on Internet of Things, WF-IoT 2020, New Orleans, LA, USA, June 2-16, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/WF-IoT48130.2020.9221230}, doi = {10.1109/WF-IOT48130.2020.9221230}, timestamp = {Mon, 19 Oct 2020 12:52:29 +0200}, biburl = {https://dblp.org/rec/conf/wf-iot/FarooqZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/KierasFZ20, author = {Timothy Kieras and Muhammad Junaid Farooq and Quanyan Zhu}, title = {RIoTS: Risk Analysis of IoT Supply Chain Threats}, booktitle = {6th {IEEE} World Forum on Internet of Things, WF-IoT 2020, New Orleans, LA, USA, June 2-16, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/WF-IoT48130.2020.9221323}, doi = {10.1109/WF-IOT48130.2020.9221323}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wf-iot/KierasFZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/HuangZ20, author = {Linan Huang and Quanyan Zhu}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {205--230}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_10}, doi = {10.1007/978-3-030-33432-1\_10}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/HuangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2020, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3}, doi = {10.1007/978-3-030-64793-3}, isbn = {978-3-030-64792-6}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-00712, author = {Quanyan Zhu}, title = {Control Challenges for Resilient Control Systems}, journal = {CoRR}, volume = {abs/2001.00712}, year = {2020}, url = {http://arxiv.org/abs/2001.00712}, eprinttype = {arXiv}, eprint = {2001.00712}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-00712.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-01561, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {PhD Forum: Enabling Autonomic IoT for Smart Urban Services}, journal = {CoRR}, volume = {abs/2001.01561}, year = {2020}, url = {http://arxiv.org/abs/2001.01561}, eprinttype = {arXiv}, eprint = {2001.01561}, timestamp = {Mon, 13 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-01561.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-03108, author = {Song Fang and Quanyan Zhu}, title = {A Connection between Feedback Capacity and Kalman Filter for Colored Gaussian Noises}, journal = {CoRR}, volume = {abs/2001.03108}, year = {2020}, url = {http://arxiv.org/abs/2001.03108}, eprinttype = {arXiv}, eprint = {2001.03108}, timestamp = {Mon, 13 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-03108.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-03813, author = {Song Fang and Quanyan Zhu}, title = {Fundamental Limits of Online Learning: An Entropic-Innovations Viewpoint}, journal = {CoRR}, volume = {abs/2001.03813}, year = {2020}, url = {https://arxiv.org/abs/2001.03813}, eprinttype = {arXiv}, eprint = {2001.03813}, timestamp = {Fri, 17 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-03813.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-03827, author = {Yunhan Huang and Quanyan Zhu}, title = {Manipulating Reinforcement Learning: Poisoning Attacks on Cost Signals}, journal = {CoRR}, volume = {abs/2002.03827}, year = {2020}, url = {https://arxiv.org/abs/2002.03827}, eprinttype = {arXiv}, eprint = {2002.03827}, timestamp = {Wed, 12 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-03827.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-05146, author = {Zhentian Qian and Jie Fu and Quanyan Zhu}, title = {A Receding-Horizon {MDP} Approach for Performance Evaluation of Moving Target Defense in Networks}, journal = {CoRR}, volume = {abs/2002.05146}, year = {2020}, url = {https://arxiv.org/abs/2002.05146}, eprinttype = {arXiv}, eprint = {2002.05146}, timestamp = {Fri, 14 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-05146.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-03173, author = {Tao Zhang and Quanyan Zhu}, title = {Implementability of Honest Multi-Agent Sequential Decision-Making with Dynamic Population}, journal = {CoRR}, volume = {abs/2003.03173}, year = {2020}, url = {https://arxiv.org/abs/2003.03173}, eprinttype = {arXiv}, eprint = {2003.03173}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-03173.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-04735, author = {Rui Zhang and Quanyan Zhu}, title = {Security of Distributed Machine Learning: {A} Game-Theoretic Approach to Design Secure {DSVM}}, journal = {CoRR}, volume = {abs/2003.04735}, year = {2020}, url = {https://arxiv.org/abs/2003.04735}, eprinttype = {arXiv}, eprint = {2003.04735}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-04735.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-06493, author = {Guanze Peng and Juntao Chen and Quanyan Zhu}, title = {Distributed Stabilization of State Interdependent Markov Jump LinearSystem-of-Systems with Partial Information}, journal = {CoRR}, volume = {abs/2003.06493}, year = {2020}, url = {https://arxiv.org/abs/2003.06493}, eprinttype = {arXiv}, eprint = {2003.06493}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-06493.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-12363, author = {Timothy Kieras and Muhammad Junaid Farooq and Quanyan Zhu}, title = {Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties}, journal = {CoRR}, volume = {abs/2003.12363}, year = {2020}, url = {https://arxiv.org/abs/2003.12363}, eprinttype = {arXiv}, eprint = {2003.12363}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-12363.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-13554, author = {Yurid Nugraha and Ahmet Cetinkaya and Tomohisa Hayakawa and Hideaki Ishii and Quanyan Zhu}, title = {Dynamic Resilient Network Games with Applications to Multi-Agent Consensus}, journal = {CoRR}, volume = {abs/2003.13554}, year = {2020}, url = {https://arxiv.org/abs/2003.13554}, eprinttype = {arXiv}, eprint = {2003.13554}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-13554.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-00703, author = {Tao Zhang and Quanyan Zhu}, title = {Differentially Private Collaborative Intrusion Detection Systems For VANETs}, journal = {CoRR}, volume = {abs/2005.00703}, year = {2020}, url = {https://arxiv.org/abs/2005.00703}, eprinttype = {arXiv}, eprint = {2005.00703}, timestamp = {Fri, 08 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-00703.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-03169, author = {Guanze Peng and Veeraruna Kavitha and Quanyan Zhu}, title = {On Optimal Control of Discounted Cost Infinite-Horizon Markov Decision Processes Under Local State Information Structures}, journal = {CoRR}, volume = {abs/2005.03169}, year = {2020}, url = {https://arxiv.org/abs/2005.03169}, eprinttype = {arXiv}, eprint = {2005.03169}, timestamp = {Sat, 09 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-03169.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-07942, author = {Linan Huang and Quanyan Zhu}, title = {Game of Duplicity: {A} Proactive Automated Defense Mechanism by Deception Design}, journal = {CoRR}, volume = {abs/2006.07942}, year = {2020}, url = {https://arxiv.org/abs/2006.07942}, eprinttype = {arXiv}, eprint = {2006.07942}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-07942.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-16894, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {QoE Based Revenue Maximizing Dynamic Resource Allocation and Pricing for Fog-Enabled Mission-Critical IoT Applications}, journal = {CoRR}, volume = {abs/2006.16894}, year = {2020}, url = {https://arxiv.org/abs/2006.16894}, eprinttype = {arXiv}, eprint = {2006.16894}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-16894.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-13981, author = {Linan Huang and Quanyan Zhu}, title = {Cognitive Honeypots against Lateral Movement for Mitigation of Long-Term Vulnerability}, journal = {CoRR}, volume = {abs/2007.13981}, year = {2020}, url = {https://arxiv.org/abs/2007.13981}, eprinttype = {arXiv}, eprint = {2007.13981}, timestamp = {Mon, 03 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-13981.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-04893, author = {Song Fang and Quanyan Zhu}, title = {Channel Leakage and Fundamental Limits of Privacy Leakage for Streaming Data}, journal = {CoRR}, volume = {abs/2008.04893}, year = {2020}, url = {https://arxiv.org/abs/2008.04893}, eprinttype = {arXiv}, eprint = {2008.04893}, timestamp = {Sun, 16 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-04893.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-05585, author = {Zhili Zhang and Quanyan Zhu}, title = {Deceptive Kernel Function on Observations of Discrete {POMDP}}, journal = {CoRR}, volume = {abs/2008.05585}, year = {2020}, url = {https://arxiv.org/abs/2008.05585}, eprinttype = {arXiv}, eprint = {2008.05585}, timestamp = {Mon, 17 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-05585.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-02275, author = {Suyog Kapsikar and Indrajit Saha and Khushboo Agarwal and Veeraruna Kavitha and Quanyan Zhu}, title = {Controlling Fake News by Tagging: {A} Branching Process Analysis}, journal = {CoRR}, volume = {abs/2009.02275}, year = {2020}, url = {https://arxiv.org/abs/2009.02275}, eprinttype = {arXiv}, eprint = {2009.02275}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-02275.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-00718, author = {Song Fang and Quanyan Zhu}, title = {Fundamental Limits of Obfuscation for Linear Gaussian Dynamical Systems: An Information-Theoretic Approach}, journal = {CoRR}, volume = {abs/2011.00718}, year = {2020}, url = {https://arxiv.org/abs/2011.00718}, eprinttype = {arXiv}, eprint = {2011.00718}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-00718.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-01455, author = {Shutian Liu and Tao Li and Quanyan Zhu}, title = {Communication-Efficient Distributed Machine Learning over Strategic Networks: {A} Two-Layer Game Approach}, journal = {CoRR}, volume = {abs/2011.01455}, year = {2020}, url = {https://arxiv.org/abs/2011.01455}, eprinttype = {arXiv}, eprint = {2011.01455}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-01455.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-02560, author = {Song Fang and Quanyan Zhu}, title = {Independent Gaussian Distributions Minimize the Kullback-Leibler {(KL)} Divergence from Independent Gaussian Distributions}, journal = {CoRR}, volume = {abs/2011.02560}, year = {2020}, url = {https://arxiv.org/abs/2011.02560}, eprinttype = {arXiv}, eprint = {2011.02560}, timestamp = {Mon, 09 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-02560.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-10095, author = {Guanze Peng and Tao Li and Shutian Liu and Juntao Chen and Quanyan Zhu}, title = {Locally-Aware Constrained Games on Networks}, journal = {CoRR}, volume = {abs/2011.10095}, year = {2020}, url = {https://arxiv.org/abs/2011.10095}, eprinttype = {arXiv}, eprint = {2011.10095}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-10095.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-14262, author = {Juntao Chen and Yunhan Huang and Rui Zhang and Quanyan Zhu}, title = {Optimal Quarantining Strategy for Interdependent Epidemics Spreading over Complex Networks}, journal = {CoRR}, volume = {abs/2011.14262}, year = {2020}, url = {https://arxiv.org/abs/2011.14262}, eprinttype = {arXiv}, eprint = {2011.14262}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-14262.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-02009, author = {Song Fang and Quanyan Zhu}, title = {Fundamental Stealthiness-Distortion Tradeoffs in Dynamical (Control) Systems under Injection Attacks: {A} Power Spectral Analysis}, journal = {CoRR}, volume = {abs/2012.02009}, year = {2020}, url = {https://arxiv.org/abs/2012.02009}, eprinttype = {arXiv}, eprint = {2012.02009}, timestamp = {Fri, 04 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-02009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-02384, author = {Yunhan Huang and Quanyan Zhu}, title = {Cross-Layer Coordinated Attacks on Cyber-Physical Systems: {A} {LQG} Game Framework with Controlled Observations}, journal = {CoRR}, volume = {abs/2012.02384}, year = {2020}, url = {https://arxiv.org/abs/2012.02384}, eprinttype = {arXiv}, eprint = {2012.02384}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-02384.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-03809, author = {Song Fang and Quanyan Zhu}, title = {Independent Elliptical Distributions Minimize Their W\({}_{\mbox{2}}\) Wasserstein Distance from Independent Elliptical Distributions with the Same Density Generator}, journal = {CoRR}, volume = {abs/2012.03809}, year = {2020}, url = {https://arxiv.org/abs/2012.03809}, eprinttype = {arXiv}, eprint = {2012.03809}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-03809.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-04023, author = {Song Fang and Quanyan Zhu}, title = {The Spectral-Domain W\({}_{\mbox{2}}\) Wasserstein Distance for Elliptical Processes and the Spectral-Domain Gelbrich Bound}, journal = {CoRR}, volume = {abs/2012.04023}, year = {2020}, url = {https://arxiv.org/abs/2012.04023}, eprinttype = {arXiv}, eprint = {2012.04023}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-04023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-12174, author = {Song Fang and Quanyan Zhu}, title = {Fundamental Limits on the Maximum Deviations in Control Systems: How Short Can Distribution Tails be Made by Feedback?}, journal = {CoRR}, volume = {abs/2012.12174}, year = {2020}, url = {https://arxiv.org/abs/2012.12174}, eprinttype = {arXiv}, eprint = {2012.12174}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-12174.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-14043, author = {Tao Li and Guanze Peng and Quanyan Zhu}, title = {Blackwell Online Learning for Markov Decision Processes}, journal = {CoRR}, volume = {abs/2012.14043}, year = {2020}, url = {https://arxiv.org/abs/2012.14043}, eprinttype = {arXiv}, eprint = {2012.14043}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-14043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-14925, author = {Yunhan Huang and Quanyan Zhu}, title = {Infinite-Horizon Linear-Quadratic-Gaussian Control with Costly Measurements}, journal = {CoRR}, volume = {abs/2012.14925}, year = {2020}, url = {https://arxiv.org/abs/2012.14925}, eprinttype = {arXiv}, eprint = {2012.14925}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-14925.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/PawlickCZ19, author = {Jeffrey Pawlick and Edward Colbert and Quanyan Zhu}, title = {A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy}, journal = {{ACM} Comput. Surv.}, volume = {52}, number = {4}, pages = {82:1--82:28}, year = {2019}, url = {https://doi.org/10.1145/3337772}, doi = {10.1145/3337772}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/PawlickCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PawlickCZ19, author = {Jeffrey Pawlick and Juntao Chen and Quanyan Zhu}, title = {iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {6}, pages = {1654--1669}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2883272}, doi = {10.1109/TIFS.2018.2883272}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PawlickCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PawlickCZ19a, author = {Jeffrey Pawlick and Edward Colbert and Quanyan Zhu}, title = {Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {7}, pages = {1871--1886}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2886472}, doi = {10.1109/TIFS.2018.2886472}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PawlickCZ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FarooqZ19, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {9}, pages = {2412--2426}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2898817}, doi = {10.1109/TIFS.2019.2898817}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FarooqZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenZ19, author = {Juntao Chen and Quanyan Zhu}, title = {Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {11}, pages = {2958--2971}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2911112}, doi = {10.1109/TIFS.2019.2911112}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsipn/ZhangZ19, author = {Rui Zhang and Quanyan Zhu}, title = {Consensus-Based Distributed Discrete Optimal Transport for Decentralized Resource Matching}, journal = {{IEEE} Trans. Signal Inf. Process. over Networks}, volume = {5}, number = {3}, pages = {511--524}, year = {2019}, url = {https://doi.org/10.1109/TSIPN.2019.2910476}, doi = {10.1109/TSIPN.2019.2910476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsipn/ZhangZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/allerton/HuangKZ19, author = {Yunhan Huang and Veeraruna Kavitha and Quanyan Zhu}, title = {Continuous-Time Markov Decision Processes with Controlled Observations}, booktitle = {57th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2019, Monticello, IL, USA, September 24-27, 2019}, pages = {32--39}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ALLERTON.2019.8919744}, doi = {10.1109/ALLERTON.2019.8919744}, timestamp = {Fri, 13 Dec 2019 14:46:22 +0100}, biburl = {https://dblp.org/rec/conf/allerton/HuangKZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/allerton/PengZ19, author = {Guanze Peng and Quanyan Zhu}, title = {Game-Theoretic Analysis of Optimal Control and Sampling for Linear Stochastic Systems}, booktitle = {57th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2019, Monticello, IL, USA, September 24-27, 2019}, pages = {647--654}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ALLERTON.2019.8919794}, doi = {10.1109/ALLERTON.2019.8919794}, timestamp = {Fri, 13 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/allerton/PengZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/NugrahaHCIZ19, author = {Yurid Nugraha and Tomohisa Hayakawa and Ahmet Cetinkaya and Hideaki Ishii and Quanyan Zhu}, title = {Subgame Perfect Equilibrium Analysis for Jamming Attacks on Resilient Graphs}, booktitle = {2019 American Control Conference, {ACC} 2019, Philadelphia, PA, USA, July 10-12, 2019}, pages = {2060--2065}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/ACC.2019.8814607}, doi = {10.23919/ACC.2019.8814607}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/NugrahaHCIZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangZ19, author = {Linan Huang and Quanyan Zhu}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Adaptive Honeypot Engagement Through Reinforcement Learning of Semi-Markov Decision Processes}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {196--216}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_13}, doi = {10.1007/978-3-030-32430-8\_13}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HuangZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangZ19a, author = {Yunhan Huang and Quanyan Zhu}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {217--237}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_14}, doi = {10.1007/978-3-030-32430-8\_14}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HuangZ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/Zhu19, author = {Quanyan Zhu}, editor = {Xenofon D. Koutsoukos and Alvaro A. C{\'{a}}rdenas and Ehab Al{-}Shaer}, title = {Game theory for cyber deception: a tutorial}, booktitle = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019}, pages = {8:1--8:3}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314058.3314067}, doi = {10.1145/3314058.3314067}, timestamp = {Sat, 22 Jun 2019 19:13:09 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/Zhu19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/FangSJIZ19, author = {Song Fang and Mikael Skoglund and Karl Henrik Johansson and Hideaki Ishii and Quanyan Zhu}, title = {Generic Variance Bounds on Estimation and Prediction Errors in Time Series Analysis: An Entropy Perspective}, booktitle = {2019 {IEEE} Information Theory Workshop, {ITW} 2019, Visby, Sweden, August 25-28, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ITW44776.2019.8989240}, doi = {10.1109/ITW44776.2019.8989240}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/FangSJIZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlsp/FangZ19, author = {Song Fang and Quanyan Zhu}, title = {Generic Bounds On The Maximum Deviations In Sequential Prediction: An Information-Theoretic Analysis}, booktitle = {29th {IEEE} International Workshop on Machine Learning for Signal Processing, {MLSP} 2019, Pittsburgh, PA, USA, October 13-16, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/MLSP.2019.8918758}, doi = {10.1109/MLSP.2019.8918758}, timestamp = {Thu, 12 Dec 2019 12:15:35 +0100}, biburl = {https://dblp.org/rec/conf/mlsp/FangZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlsp/LiZ19, author = {Tao Li and Quanyan Zhu}, title = {On Convergence Rate of Adaptive Multiscale Value Function Approximation for Reinforcement Learning}, booktitle = {29th {IEEE} International Workshop on Machine Learning for Signal Processing, {MLSP} 2019, Pittsburgh, PA, USA, October 13-16, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/MLSP.2019.8918816}, doi = {10.1109/MLSP.2019.8918816}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mlsp/LiZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wiopt/PawlickNCZ19, author = {Jeffrey Pawlick and Thi Thu Hang Nguyen and Edward Colbert and Quanyan Zhu}, title = {Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats}, booktitle = {International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOPT 2019, Avignon, France, June 3-7, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://dl.ifip.org/db/conf/wiopt/wiopt2019/1570517592.pdf}, doi = {10.23919/WIOPT47501.2019.9144123}, timestamp = {Thu, 09 Dec 2021 12:24:09 +0100}, biburl = {https://dblp.org/rec/conf/wiopt/PawlickNCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/ShettyRCMBZ19, author = {Sachin Shetty and Indrajit Ray and Nurcin Celik and Michael Mesham and Nathaniel Bastian and Quanyan Zhu}, title = {Simulation for Cyber Risk Management - Where are we, and Where do we Want to Go?}, booktitle = {2019 Winter Simulation Conference, {WSC} 2019, National Harbor, MD, USA, December 8-11, 2019}, pages = {726--737}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WSC40007.2019.9004688}, doi = {10.1109/WSC40007.2019.9004688}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wsc/ShettyRCMBZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-00741, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks}, journal = {CoRR}, volume = {abs/1901.00741}, year = {2019}, url = {http://arxiv.org/abs/1901.00741}, eprinttype = {arXiv}, eprint = {1901.00741}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-00741.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-08331, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {Dynamic Spatio-Temporal Resource Provisioning for On-Demand Urban Services in Smart Cities}, journal = {CoRR}, volume = {abs/1901.08331}, year = {2019}, url = {http://arxiv.org/abs/1901.08331}, eprinttype = {arXiv}, eprint = {1901.08331}, timestamp = {Sat, 02 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-08331.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-03925, author = {Tao Zhang and Linan Huang and Jeffrey Pawlick and Quanyan Zhu}, title = {Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation}, journal = {CoRR}, volume = {abs/1902.03925}, year = {2019}, url = {http://arxiv.org/abs/1902.03925}, eprinttype = {arXiv}, eprint = {1902.03925}, timestamp = {Wed, 04 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-03925.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-01442, author = {Quanyan Zhu}, title = {Game Theory for Cyber Deception: {A} Tutorial}, journal = {CoRR}, volume = {abs/1903.01442}, year = {2019}, url = {http://arxiv.org/abs/1903.01442}, eprinttype = {arXiv}, eprint = {1903.01442}, timestamp = {Sat, 30 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-01442.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-04318, author = {Rui Zhang and Quanyan Zhu}, title = {Consensus-based Distributed Discrete Optimal Transport for Decentralized Resource Matching}, journal = {CoRR}, volume = {abs/1904.04318}, year = {2019}, url = {http://arxiv.org/abs/1904.04318}, eprinttype = {arXiv}, eprint = {1904.04318}, timestamp = {Sun, 22 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-04318.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-04765, author = {Song Fang and Mikael Skoglund and Karl Henrik Johansson and Hideaki Ishii and Quanyan Zhu}, title = {Generic Variance Bounds on Estimation and Prediction Errors in Time Series Analysis: An Entropy Perspective}, journal = {CoRR}, volume = {abs/1904.04765}, year = {2019}, url = {http://arxiv.org/abs/1904.04765}, eprinttype = {arXiv}, eprint = {1904.04765}, timestamp = {Thu, 25 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-04765.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-09341, author = {Juntao Chen and Quanyan Zhu}, title = {Interdependent Strategic Security Risk Management with Bounded Rationality in the Internet of Things}, journal = {CoRR}, volume = {abs/1905.09341}, year = {2019}, url = {http://arxiv.org/abs/1905.09341}, eprinttype = {arXiv}, eprint = {1905.09341}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-09341.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-02114, author = {Juntao Chen and Quanyan Zhu}, title = {A Games-in-Games Approach to Mosaic Command and Control Design of Dynamic Network-of-Networks for Secure and Resilient Multi-Domain Operations}, journal = {CoRR}, volume = {abs/1906.02114}, year = {2019}, url = {http://arxiv.org/abs/1906.02114}, eprinttype = {arXiv}, eprint = {1906.02114}, timestamp = {Thu, 13 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-02114.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-07185, author = {Juntao Chen and Corinne Touati and Quanyan Zhu}, title = {A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network}, journal = {CoRR}, volume = {abs/1906.07185}, year = {2019}, url = {http://arxiv.org/abs/1906.07185}, eprinttype = {arXiv}, eprint = {1906.07185}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-07185.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-09687, author = {Linan Huang and Quanyan Zhu}, title = {A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems}, journal = {CoRR}, volume = {abs/1906.09687}, year = {2019}, url = {http://arxiv.org/abs/1906.09687}, eprinttype = {arXiv}, eprint = {1906.09687}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-09687.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10571, author = {Yunhan Huang and Quanyan Zhu}, title = {Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals}, journal = {CoRR}, volume = {abs/1906.10571}, year = {2019}, url = {http://arxiv.org/abs/1906.10571}, eprinttype = {arXiv}, eprint = {1906.10571}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10571.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-12182, author = {Linan Huang and Quanyan Zhu}, title = {Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes}, journal = {CoRR}, volume = {abs/1906.12182}, year = {2019}, url = {http://arxiv.org/abs/1906.12182}, eprinttype = {arXiv}, eprint = {1906.12182}, timestamp = {Mon, 01 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-12182.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-00459, author = {Linan Huang and Quanyan Zhu}, title = {N-Person Discrete-Time Dynamic Games of Asymmetric Information}, journal = {CoRR}, volume = {abs/1907.00459}, year = {2019}, url = {http://arxiv.org/abs/1907.00459}, eprinttype = {arXiv}, eprint = {1907.00459}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-00459.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-00540, author = {Mohammad Ashiqur Rahman and Md Hasan Shahriar and Ehab Al{-}Shaer and Quanyan Zhu}, title = {A Formal Approach for Efficient Navigation Management of Hybrid Electric Vehicles on Long Trips}, journal = {CoRR}, volume = {abs/1907.00540}, year = {2019}, url = {http://arxiv.org/abs/1907.00540}, eprinttype = {arXiv}, eprint = {1907.00540}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-00540.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-01396, author = {Linan Huang and Quanyan Zhu}, title = {Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense}, journal = {CoRR}, volume = {abs/1907.01396}, year = {2019}, url = {http://arxiv.org/abs/1907.01396}, eprinttype = {arXiv}, eprint = {1907.01396}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-01396.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-06128, author = {Yunhan Huang and Veeraruna Kavitha and Quanyan Zhu}, title = {Continuous-Time Markov Decision Processes with Controlled Observations}, journal = {CoRR}, volume = {abs/1907.06128}, year = {2019}, url = {http://arxiv.org/abs/1907.06128}, eprinttype = {arXiv}, eprint = {1907.06128}, timestamp = {Wed, 17 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-06128.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-04431, author = {Juntao Chen and Quanyan Zhu and Tamer Basar}, title = {Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks}, journal = {CoRR}, volume = {abs/1908.04431}, year = {2019}, url = {http://arxiv.org/abs/1908.04431}, eprinttype = {arXiv}, eprint = {1908.04431}, timestamp = {Mon, 19 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-04431.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-07828, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {IoT Supply Chain Security: Overview, Challenges, and the Road Ahead}, journal = {CoRR}, volume = {abs/1908.07828}, year = {2019}, url = {http://arxiv.org/abs/1908.07828}, eprinttype = {arXiv}, eprint = {1908.07828}, timestamp = {Mon, 26 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-07828.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-08578, author = {Tao Li and Quanyan Zhu}, title = {On Convergence Rate of Adaptive Multiscale Value Function Approximation For Reinforcement Learning}, journal = {CoRR}, volume = {abs/1908.08578}, year = {2019}, url = {http://arxiv.org/abs/1908.08578}, eprinttype = {arXiv}, eprint = {1908.08578}, timestamp = {Mon, 26 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-08578.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-13720, author = {Tao Zhang and Quanyan Zhu}, title = {On Incentive Compatibility in Dynamic Mechanism Design With Exit Option in a Markovian Environment}, journal = {CoRR}, volume = {abs/1909.13720}, year = {2019}, url = {http://arxiv.org/abs/1909.13720}, eprinttype = {arXiv}, eprint = {1909.13720}, timestamp = {Wed, 02 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-13720.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-06742, author = {Song Fang and Quanyan Zhu}, title = {Generic Bounds on the Maximum Deviations in Sequential Prediction: An Information-Theoretic Analysis}, journal = {CoRR}, volume = {abs/1910.06742}, year = {2019}, url = {http://arxiv.org/abs/1910.06742}, eprinttype = {arXiv}, eprint = {1910.06742}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-06742.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-07510, author = {Yunhan Huang and Juntao Chen and Linan Huang and Quanyan Zhu}, title = {Dynamic Games for Secure and Resilient Control System Design}, journal = {CoRR}, volume = {abs/1910.07510}, year = {2019}, url = {http://arxiv.org/abs/1910.07510}, eprinttype = {arXiv}, eprint = {1910.07510}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-07510.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-10100, author = {Rui Zhang and Quanyan Zhu}, title = {FlipIn: {A} Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things}, journal = {CoRR}, volume = {abs/1911.10100}, year = {2019}, url = {http://arxiv.org/abs/1911.10100}, eprinttype = {arXiv}, eprint = {1911.10100}, timestamp = {Wed, 04 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-10100.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-12862, author = {Timothy Kieras and Muhammad Junaid Farooq and Quanyan Zhu}, title = {RIoTS: Risk Analysis of IoT Supply Chain Threats}, journal = {CoRR}, volume = {abs/1911.12862}, year = {2019}, url = {http://arxiv.org/abs/1911.12862}, eprinttype = {arXiv}, eprint = {1911.12862}, timestamp = {Wed, 08 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-12862.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-02628, author = {Song Fang and Quanyan Zhu}, title = {Fundamental Limitations in Sequential Prediction and Recursive Algorithms: L\({}_{\mbox{p}}\) Bounds via an Entropic Analysis}, journal = {CoRR}, volume = {abs/1912.02628}, year = {2019}, url = {http://arxiv.org/abs/1912.02628}, eprinttype = {arXiv}, eprint = {1912.02628}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-02628.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-03367, author = {Song Fang and Quanyan Zhu}, title = {Relativistic Control: Feedback Control of Relativistic Dynamics}, journal = {CoRR}, volume = {abs/1912.03367}, year = {2019}, url = {http://arxiv.org/abs/1912.03367}, eprinttype = {arXiv}, eprint = {1912.03367}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-03367.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-04082, author = {Juntao Chen and Quanyan Zhu}, title = {Control of Multi-Layer Mobile Autonomous Systems in Adversarial Environments: {A} Games-in-Games Approach}, journal = {CoRR}, volume = {abs/1912.04082}, year = {2019}, url = {http://arxiv.org/abs/1912.04082}, eprinttype = {arXiv}, eprint = {1912.04082}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-04082.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-05541, author = {Song Fang and Quanyan Zhu}, title = {Fundamental Entropic Laws and L\({}_{\mbox{p}}\) Limitations of Feedback Systems: Implications for Machine-Learning-in-the-Loop Control}, journal = {CoRR}, volume = {abs/1912.05541}, year = {2019}, url = {http://arxiv.org/abs/1912.05541}, eprinttype = {arXiv}, eprint = {1912.05541}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-05541.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-06229, author = {Tao Zhang and Quanyan Zhu}, title = {Optimal Two-Sided Market Mechanism Design for Large-Scale Data Sharing and Trading in Massive IoT Networks}, journal = {CoRR}, volume = {abs/1912.06229}, year = {2019}, url = {http://arxiv.org/abs/1912.06229}, eprinttype = {arXiv}, eprint = {1912.06229}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-06229.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhuR18, author = {Quanyan Zhu and Stefan Rass}, title = {On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats}, journal = {{IEEE} Access}, volume = {6}, pages = {13958--13971}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2814481}, doi = {10.1109/ACCESS.2018.2814481}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhuR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NooraniMMZ18, author = {Seyede Fatemeh Noorani and Mohammad Hossein Manshaei and Mohammad Ali Montazeri and Quanyan Zhu}, title = {Game-Theoretic Approach to Group Learning Enhancement Through Peer-to-Peer Explanation and Competition}, journal = {{IEEE} Access}, volume = {6}, pages = {53684--53697}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2871155}, doi = {10.1109/ACCESS.2018.2871155}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/NooraniMMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/automatica/MiaoZPP18, author = {Fei Miao and Quanyan Zhu and Miroslav Pajic and George J. Pappas}, title = {A hybrid stochastic game for secure control of cyber-physical systems}, journal = {Autom.}, volume = {93}, pages = {55--63}, year = {2018}, url = {https://doi.org/10.1016/j.automatica.2018.03.012}, doi = {10.1016/J.AUTOMATICA.2018.03.012}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/automatica/MiaoZPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/games/GubarTZ18, author = {Elena A. Gubar and Vladislav Taynitskiy and Quanyan Zhu}, title = {Optimal Control of Heterogeneous Mutating Viruses}, journal = {Games}, volume = {9}, number = {4}, pages = {103}, year = {2018}, url = {https://doi.org/10.3390/g9040103}, doi = {10.3390/G9040103}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/games/GubarTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/HuangZ18, author = {Linan Huang and Quanyan Zhu}, title = {Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {46}, number = {2}, pages = {52--56}, year = {2018}, url = {https://doi.org/10.1145/3305218.3305239}, doi = {10.1145/3305218.3305239}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmetrics/HuangZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tccn/FarooqZ18, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {A Multi-Layer Feedback System Approach to Resilient Connectivity of Remotely Deployed Mobile Internet of Things}, journal = {{IEEE} Trans. Cogn. Commun. Netw.}, volume = {4}, number = {2}, pages = {422--432}, year = {2018}, url = {https://doi.org/10.1109/TCCN.2018.2837907}, doi = {10.1109/TCCN.2018.2837907}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tccn/FarooqZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ZhangZ18a, author = {Rui Zhang and Quanyan Zhu}, title = {A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {29}, number = {11}, pages = {5512--5527}, year = {2018}, url = {https://doi.org/10.1109/TNNLS.2018.2802721}, doi = {10.1109/TNNLS.2018.2802721}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/ZhangZ18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/ChenZ18, author = {Juntao Chen and Quanyan Zhu}, title = {A Stackelberg Game Approach for Two-Level Distributed Energy Management in Smart Grids}, journal = {{IEEE} Trans. Smart Grid}, volume = {9}, number = {6}, pages = {6554--6565}, year = {2018}, url = {https://doi.org/10.1109/TSG.2017.2715663}, doi = {10.1109/TSG.2017.2715663}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/ChenZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsipn/0011Z18, author = {Tao Zhang and Quanyan Zhu}, title = {Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs}, journal = {{IEEE} Trans. Signal Inf. Process. over Networks}, volume = {4}, number = {1}, pages = {148--161}, year = {2018}, url = {https://doi.org/10.1109/TSIPN.2018.2801622}, doi = {10.1109/TSIPN.2018.2801622}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsipn/0011Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/FarooqZ18, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {17}, number = {4}, pages = {2618--2632}, year = {2018}, url = {https://doi.org/10.1109/TWC.2018.2799860}, doi = {10.1109/TWC.2018.2799860}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/FarooqZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/allerton/ChenZ18, author = {Juntao Chen and Quanyan Zhu}, title = {A Linear Quadratic Differential Game Approach to Dynamic Contract Design for Systemic Cyber Risk Management under Asymmetric Information}, booktitle = {56th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2018, Monticello, IL, USA, October 2-5, 2018}, pages = {575--582}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ALLERTON.2018.8636007}, doi = {10.1109/ALLERTON.2018.8636007}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/allerton/ChenZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/FarooqZ18, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {Adaptive and Resilient Revenue Maximizing Dynamic Resource Allocation and Pricing for Cloud-Enabled IoT Systems}, booktitle = {2018 Annual American Control Conference, {ACC} 2018, Milwaukee, WI, USA, June 27-29, 2018}, pages = {5292--5297}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ACC.2018.8430776}, doi = {10.23919/ACC.2018.8430776}, timestamp = {Sun, 08 Aug 2021 01:40:57 +0200}, biburl = {https://dblp.org/rec/conf/amcc/FarooqZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuR18, author = {Quanyan Zhu and Stefan Rass}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Game Theory Meets Network Security: {A} Tutorial}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2163--2165}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3264421}, doi = {10.1145/3243734.3264421}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccta/XuZ18, author = {Zhiheng Xu and Quanyan Zhu}, title = {Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems}, booktitle = {{IEEE} Conference on Control Technology and Applications, {CCTA} 2018, Copenhagen, Denmark, August 21-24, 2018}, pages = {1712--1717}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CCTA.2018.8511500}, doi = {10.1109/CCTA.2018.8511500}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ccta/XuZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/TanwaniZ18, author = {Aneel Tanwani and Quanyan Zhu}, title = {Feedback Nash Equilibrium for Markov Jump Games under Differential-Algebraic Constraints with Application to Robust Control}, booktitle = {57th {IEEE} Conference on Decision and Control, {CDC} 2018, Miami, FL, USA, December 17-19, 2018}, pages = {1124--1129}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CDC.2018.8619628}, doi = {10.1109/CDC.2018.8619628}, timestamp = {Fri, 04 Mar 2022 13:30:11 +0100}, biburl = {https://dblp.org/rec/conf/cdc/TanwaniZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/ChenZ18, author = {Juntao Chen and Quanyan Zhu}, title = {Security investment under cognitive constraints: {A} Gestalt Nash equilibrium approach}, booktitle = {52nd Annual Conference on Information Sciences and Systems, {CISS} 2018, Princeton, NJ, USA, March 21-23, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CISS.2018.8362263}, doi = {10.1109/CISS.2018.8362263}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ciss/ChenZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/DunyakZ18, author = {Alex Dunyak and Quanyan Zhu}, title = {Understanding mean-field effects of large-population user data obfuscation in machine learning}, booktitle = {52nd Annual Conference on Information Sciences and Systems, {CISS} 2018, Princeton, NJ, USA, March 21-23, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CISS.2018.8362267}, doi = {10.1109/CISS.2018.8362267}, timestamp = {Wed, 30 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/DunyakZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/ZhangZ18, author = {Rui Zhang and Quanyan Zhu}, title = {Consensus-based transfer linear support vector machines for decentralized multi-task multi-agent learning}, booktitle = {52nd Annual Conference on Information Sciences and Systems, {CISS} 2018, Princeton, NJ, USA, March 21-23, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CISS.2018.8362195}, doi = {10.1109/CISS.2018.8362195}, timestamp = {Sun, 22 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/ZhangZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangZ18, author = {Linan Huang and Quanyan Zhu}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {205--226}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_12}, doi = {10.1007/978-3-030-01554-1\_12}, timestamp = {Tue, 07 May 2024 20:08:32 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HuangZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/0011Z18, author = {Tao Zhang and Quanyan Zhu}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Hypothesis Testing Game for Cyber Deception}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {540--555}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_31}, doi = {10.1007/978-3-030-01554-1\_31}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/0011Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wiopt/FarooqZ18, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {Optimal dynamic contract for spectrum reservation in mission-critical UNB-IoT systems}, booktitle = {16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2018, Shanghai, China, May 7-11, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://dl.ifip.org/db/conf/wiopt/wiopt2018/1570423849.pdf}, doi = {10.23919/WIOPT.2018.8362861}, timestamp = {Mon, 28 Aug 2023 21:17:48 +0200}, biburl = {https://dblp.org/rec/conf/wiopt/FarooqZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/HuangCZ18, author = {Linan Huang and Juntao Chen and Quanyan Zhu}, editor = {Bj{\"{o}}rn Johansson and Sanjay Jain}, title = {Distributed and Optimal Resilient Planning of Large-Scale Interdependent Critical Infrastructures}, booktitle = {2018 Winter Simulation Conference, {WSC} 2018, Gothenburg, Sweden, December 9-12, 2018}, pages = {1096--1107}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/WSC.2018.8632399}, doi = {10.1109/WSC.2018.8632399}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/wsc/HuangCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-09986, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)}, journal = {CoRR}, volume = {abs/1801.09986}, year = {2018}, url = {http://arxiv.org/abs/1801.09986}, eprinttype = {arXiv}, eprint = {1801.09986}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-09986.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-02907, author = {Rui Zhang and Quanyan Zhu}, title = {A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines}, journal = {CoRR}, volume = {abs/1802.02907}, year = {2018}, url = {http://arxiv.org/abs/1802.02907}, eprinttype = {arXiv}, eprint = {1802.02907}, timestamp = {Sun, 22 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-02907.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-10168, author = {Hamza Anwar and Quanyan Zhu}, title = {ADMM-based Networked Stochastic Variational Inference}, journal = {CoRR}, volume = {abs/1802.10168}, year = {2018}, url = {http://arxiv.org/abs/1802.10168}, eprinttype = {arXiv}, eprint = {1802.10168}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-10168.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-07842, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {Optimal Dynamic Contract for Spectrum Reservation in Mission-Critical UNB-IoT Systems}, journal = {CoRR}, volume = {abs/1803.07842}, year = {2018}, url = {http://arxiv.org/abs/1803.07842}, eprinttype = {arXiv}, eprint = {1803.07842}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-07842.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-00998, author = {Rui Zhang and Quanyan Zhu}, title = {Optimal Cyber Insurance Policy Design for Dynamic Risk Management and Mitigation}, journal = {CoRR}, volume = {abs/1804.00998}, year = {2018}, url = {http://arxiv.org/abs/1804.00998}, eprinttype = {arXiv}, eprint = {1804.00998}, timestamp = {Sun, 22 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-00998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-06831, author = {Jeffrey Pawlick and Edward Colbert and Quanyan Zhu}, title = {Modeling and Analysis of Leaky Deception using Signaling Games with Evidence}, journal = {CoRR}, volume = {abs/1804.06831}, year = {2018}, url = {http://arxiv.org/abs/1804.06831}, eprinttype = {arXiv}, eprint = {1804.06831}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-06831.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-00403, author = {Jeffrey Pawlick and Juntao Chen and Quanyan Zhu}, title = {iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things}, journal = {CoRR}, volume = {abs/1805.00403}, year = {2018}, url = {http://arxiv.org/abs/1805.00403}, eprinttype = {arXiv}, eprint = {1805.00403}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-00403.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-05824, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {A Multi-Layer Feedback System Approach to Resilient Connectivity of Remotely Deployed Mobile Internet of Things}, journal = {CoRR}, volume = {abs/1805.05824}, year = {2018}, url = {http://arxiv.org/abs/1805.05824}, eprinttype = {arXiv}, eprint = {1805.05824}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-05824.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-08066, author = {Quanyan Zhu and Stefan Rass}, title = {Game Theory Meets Network Security: {A} Tutorial at {ACM} {CCS}}, journal = {CoRR}, volume = {abs/1808.08066}, year = {2018}, url = {http://arxiv.org/abs/1808.08066}, eprinttype = {arXiv}, eprint = {1808.08066}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-08066.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-02013, author = {Linan Huang and Quanyan Zhu}, title = {Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception}, journal = {CoRR}, volume = {abs/1809.02013}, year = {2018}, url = {http://arxiv.org/abs/1809.02013}, eprinttype = {arXiv}, eprint = {1809.02013}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-02013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-02227, author = {Linan Huang and Quanyan Zhu}, title = {Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks}, journal = {CoRR}, volume = {abs/1809.02227}, year = {2018}, url = {http://arxiv.org/abs/1809.02227}, eprinttype = {arXiv}, eprint = {1809.02227}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-02227.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-02231, author = {Linan Huang and Juntao Chen and Quanyan Zhu}, title = {Distributed and Optimal Resilient Planning of Large-Scale Interdependent Critical Infrastructures}, journal = {CoRR}, volume = {abs/1809.02231}, year = {2018}, url = {http://arxiv.org/abs/1809.02231}, eprinttype = {arXiv}, eprint = {1809.02231}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-02231.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-00281, author = {Quanyan Zhu and Stefan Rass and Peter Schartner}, title = {Community-Based Security for the Internet of Things}, journal = {CoRR}, volume = {abs/1810.00281}, year = {2018}, url = {http://arxiv.org/abs/1810.00281}, eprinttype = {arXiv}, eprint = {1810.00281}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-00281.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-00282, author = {Quanyan Zhu}, title = {Multi-Layer Cyber-Physical Security and Resilience for Smart Grid}, journal = {CoRR}, volume = {abs/1810.00282}, year = {2018}, url = {http://arxiv.org/abs/1810.00282}, eprinttype = {arXiv}, eprint = {1810.00282}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-00282.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-00290, author = {Quanyan Zhu}, title = {Cyber Insurance}, journal = {CoRR}, volume = {abs/1810.00290}, year = {2018}, url = {http://arxiv.org/abs/1810.00290}, eprinttype = {arXiv}, eprint = {1810.00290}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-00290.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-00752, author = {Tao Zhang and Quanyan Zhu}, title = {A Game-Theoretic Foundation of Deception: Knowledge Acquisition and Fundamental Limits}, journal = {CoRR}, volume = {abs/1810.00752}, year = {2018}, url = {http://arxiv.org/abs/1810.00752}, eprinttype = {arXiv}, eprint = {1810.00752}, timestamp = {Wed, 04 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-00752.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-04797, author = {Vladislav Taynitskiy and Elena A. Gubar and Quanyan Zhu}, title = {Optimal Impulse Control of {SIR} Epidemics over Scale-Free Networks}, journal = {CoRR}, volume = {abs/1810.04797}, year = {2018}, url = {http://arxiv.org/abs/1810.04797}, eprinttype = {arXiv}, eprint = {1810.04797}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-04797.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-02615, author = {Jin Shang and Muhammad Junaid Farooq and Quanyan Zhu}, title = {Real-Time Transmission Mechanism Design for Wireless IoT Sensors with Energy Harvesting under Power Saving Mode}, journal = {CoRR}, volume = {abs/1812.02615}, year = {2018}, url = {http://arxiv.org/abs/1812.02615}, eprinttype = {arXiv}, eprint = {1812.02615}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-02615.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RassAASZM17, author = {Stefan Rass and Ali Alshawish and Mohamed Amine Abid and Stefan Schauer and Quanyan Zhu and Hermann de Meer}, title = {Physical Intrusion Games - Optimizing Surveillance by Simulation and Game Theory}, journal = {{IEEE} Access}, volume = {5}, pages = {8394--8407}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2693425}, doi = {10.1109/ACCESS.2017.2693425}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/RassAASZM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cmpb/KhazaeiSMZSM17, author = {Bahareh Khazaei and Javad Salimi Sartakhti and Mohammad Hossein Manshaei and Quanyan Zhu and Mehdi Sadeghi and Seyed Rasoul Mousavi}, title = {HIV-1-infected T-cells dynamics and prognosis: An evolutionary game model}, journal = {Comput. Methods Programs Biomed.}, volume = {152}, pages = {1--14}, year = {2017}, url = {https://doi.org/10.1016/j.cmpb.2017.08.021}, doi = {10.1016/J.CMPB.2017.08.021}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cmpb/KhazaeiSMZSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ZhangZH17, author = {Rui Zhang and Quanyan Zhu and Yezekael Hayel}, title = {A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {35}, number = {3}, pages = {779--794}, year = {2017}, url = {https://doi.org/10.1109/JSAC.2017.2672378}, doi = {10.1109/JSAC.2017.2672378}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ZhangZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/ChenTZ17, author = {Juntao Chen and Corinne Touati and Quanyan Zhu}, title = {A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery: 125}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {45}, number = {2}, pages = {128}, year = {2017}, url = {https://doi.org/10.1145/3152042.3152079}, doi = {10.1145/3152042.3152079}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/ChenTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcns/MiaoZPP17, author = {Fei Miao and Quanyan Zhu and Miroslav Pajic and George J. Pappas}, title = {Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks}, journal = {{IEEE} Trans. Control. Netw. Syst.}, volume = {4}, number = {1}, pages = {106--117}, year = {2017}, url = {https://doi.org/10.1109/TCNS.2016.2573039}, doi = {10.1109/TCNS.2016.2573039}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcns/MiaoZPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/LiuZZW17, author = {Yuan Liu and Jie Zhang and Quanyan Zhu and Xingwei Wang}, title = {{CONGRESS:} {A} Hybrid Reputation System for Coping with Rating Subjectivity}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {4}, number = {3}, pages = {163--178}, year = {2017}, url = {https://doi.org/10.1109/TCSS.2017.2724503}, doi = {10.1109/TCSS.2017.2724503}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/LiuZZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZ17, author = {Tao Zhang and Quanyan Zhu}, title = {Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {172--187}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2607691}, doi = {10.1109/TIFS.2016.2607691}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HayelZ17, author = {Yezekael Hayel and Quanyan Zhu}, title = {Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1786--1800}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2687883}, doi = {10.1109/TIFS.2017.2687883}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HayelZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenZ17, author = {Juntao Chen and Quanyan Zhu}, title = {Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: {A} Contract Design Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2736--2750}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2718489}, doi = {10.1109/TIFS.2017.2718489}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PawlickZ17, author = {Jeffrey Pawlick and Quanyan Zhu}, title = {Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2906--2919}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2725224}, doi = {10.1109/TIFS.2017.2725224}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PawlickZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ZhouZWZS17, author = {Liuwei Zhou and Quanyan Zhu and Zhijie Wang and Wuneng Zhou and Hongye Su}, title = {Adaptive Exponential Synchronization of Multislave Time-Delayed Recurrent Neural Networks With L{\'{e}}vy Noise and Regime Switching}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {28}, number = {12}, pages = {2885--2898}, year = {2017}, url = {https://doi.org/10.1109/TNNLS.2016.2609439}, doi = {10.1109/TNNLS.2016.2609439}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/ZhouZWZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/ChenZ17, author = {Juntao Chen and Quanyan Zhu}, title = {A Game-Theoretic Framework for Resilient and Distributed Generation Control of Renewable Energies in Microgrids}, journal = {{IEEE} Trans. Smart Grid}, volume = {8}, number = {1}, pages = {285--295}, year = {2017}, url = {https://doi.org/10.1109/TSG.2016.2598771}, doi = {10.1109/TSG.2016.2598771}, timestamp = {Thu, 27 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/ChenZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/ZhangZ17a, author = {Rui Zhang and Quanyan Zhu}, title = {A game-theoretic defense against data poisoning attacks in distributed support vector machines}, booktitle = {56th {IEEE} Annual Conference on Decision and Control, {CDC} 2017, Melbourne, Australia, December 12-15, 2017}, pages = {4582--4587}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CDC.2017.8264336}, doi = {10.1109/CDC.2017.8264336}, timestamp = {Fri, 04 Mar 2022 13:29:55 +0100}, biburl = {https://dblp.org/rec/conf/cdc/ZhangZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/AnwarZ17, author = {Hamza Anwar and Quanyan Zhu}, title = {Minimax robust optimal control of multiscale linear-quadratic systems}, booktitle = {51st Annual Conference on Information Sciences and Systems, {CISS} 2017, Baltimore, MD, USA, March 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CISS.2017.7926155}, doi = {10.1109/CISS.2017.7926155}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ciss/AnwarZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/ZhangZ17, author = {Rui Zhang and Quanyan Zhu}, title = {A game-theoretic analysis of label flipping attacks on distributed support vector machines}, booktitle = {51st Annual Conference on Information Sciences and Systems, {CISS} 2017, Baltimore, MD, USA, March 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CISS.2017.7926118}, doi = {10.1109/CISS.2017.7926118}, timestamp = {Fri, 18 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/ZhangZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PawlickZ17, author = {Jeffrey Pawlick and Quanyan Zhu}, title = {Quantitative models of imperfect deception in network security using signaling games with evidence {[IEEE} {CNS} 17 Poster]}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {394--395}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228694}, doi = {10.1109/CNS.2017.8228694}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/PawlickZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XuZ17, author = {Zhiheng Xu and Quanyan Zhu}, title = {Secure and practical output feedback control for cloud-enabled cyber-physical systems}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {416--420}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228703}, doi = {10.1109/CNS.2017.8228703}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/XuZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpsweek/XuZ17, author = {Zhiheng Xu and Quanyan Zhu}, title = {A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks}, booktitle = {Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles, SCAV@CPSWeek 2017, Pittsburgh, PA, USA, April 21, 2017}, pages = {27--34}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055378.3055381}, doi = {10.1145/3055378.3055381}, timestamp = {Tue, 06 Nov 2018 16:59:05 +0100}, biburl = {https://dblp.org/rec/conf/cpsweek/XuZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpsweek/KurianCZ17, author = {Varghese Kurian and Juntao Chen and Quanyan Zhu}, editor = {Panagiotis Tsakalides and Baltasar Beferull{-}Lozano}, title = {Electric power dependent dynamic tariffs for water distribution systems}, booktitle = {Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, CySWATER@CPSWeek 2017, Pittsburgh, Pennsylvania, USA, April 21, 2017}, pages = {35--38}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055366.3055373}, doi = {10.1145/3055366.3055373}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpsweek/KurianCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamenets/GubarZT17, author = {Elena A. Gubar and Quanyan Zhu and Vladislav Taynitskiy}, editor = {Lingjie Duan and Anibal Sanjab and Husheng Li and Xu Chen and Donatello Materassi and Rachid El Azouzi}, title = {Optimal Control of Multi-strain Epidemic Processes in Complex Networks}, booktitle = {Game Theory for Networks - 7th International {EAI} Conference, GameNets 2017 Knoxville, TN, USA, May 9, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {212}, pages = {108--117}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67540-4\_10}, doi = {10.1007/978-3-319-67540-4\_10}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamenets/GubarZT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhangZ17, author = {Tao Zhang and Quanyan Zhu}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Strategic Defense Against Deceptive Civilian {GPS} Spoofing of Unmanned Aerial Vehicles}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {213--233}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_12}, doi = {10.1007/978-3-319-68711-7\_12}, timestamp = {Wed, 07 Feb 2024 17:23:12 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/ZhangZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HorakZB17, author = {Karel Hor{\'{a}}k and Quanyan Zhu and Branislav Bosansk{\'{y}}}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Manipulating Adversary's Belief: {A} Dynamic Game Approach to Deception by Design for Proactive Network Security}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {273--294}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_15}, doi = {10.1007/978-3-319-68711-7\_15}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HorakZB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PawlickZ17, author = {Jeffrey Pawlick and Quanyan Zhu}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling Games}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {336--356}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_18}, doi = {10.1007/978-3-319-68711-7\_18}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PawlickZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangCZ17, author = {Linan Huang and Juntao Chen and Quanyan Zhu}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {357--376}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_19}, doi = {10.1007/978-3-319-68711-7\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HuangCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HayelZ17, author = {Yezekael Hayel and Quanyan Zhu}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous Complex Networks}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {506--518}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_27}, doi = {10.1007/978-3-319-68711-7\_27}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HayelZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globalsip/PawlickZ17, author = {Jeffrey Pawlick and Quanyan Zhu}, title = {A mean-field stackelberg game approach for obfuscation adoption in empirical risk minimization}, booktitle = {2017 {IEEE} Global Conference on Signal and Information Processing, GlobalSIP 2017, Montreal, QC, Canada, November 14-16, 2017}, pages = {518--522}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GlobalSIP.2017.8308697}, doi = {10.1109/GLOBALSIP.2017.8308697}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globalsip/PawlickZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globalsip/AnwarZ17, author = {Hamza Anwar and Quanyan Zhu}, title = {Minimax game-theoretic approach to multiscale H-infinity optimal filtering}, booktitle = {2017 {IEEE} Global Conference on Signal and Information Processing, GlobalSIP 2017, Montreal, QC, Canada, November 14-16, 2017}, pages = {853--857}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GlobalSIP.2017.8309081}, doi = {10.1109/GLOBALSIP.2017.8309081}, timestamp = {Tue, 13 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globalsip/AnwarZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ChenTZ17, author = {Juntao Chen and Corinne Touati and Quanyan Zhu}, title = {Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8254620}, doi = {10.1109/GLOCOM.2017.8254620}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ChenTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/FarooqZ17, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {Cognitive Connectivity Resilience in Multi-Layer Remotely Deployed Mobile Internet of Things}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8254106}, doi = {10.1109/GLOCOM.2017.8254106}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/FarooqZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/TrikiAHZX17, author = {Imen Triki and Rachid El Azouzi and Majed Haddad and Quanyan Zhu and Zhiheng Xu}, title = {Learning from experience: {A} dynamic closed-loop QoE optimization for video adaptation and delivery}, booktitle = {28th {IEEE} Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October 8-13, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/PIMRC.2017.8292500}, doi = {10.1109/PIMRC.2017.8292500}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/TrikiAHZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/WangZ17, author = {Weiyu Wang and Quanyan Zhu}, editor = {Nicholas J. Multari and Anoop Singhal and Erin Miller}, title = {On the Detection of Adversarial Attacks against Deep Neural Networks}, booktitle = {Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {27--30}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140368.3140373}, doi = {10.1145/3140368.3140373}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/WangZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wiopt/FarooqEZA17, author = {Muhammad Junaid Farooq and Hesham ElSawy and Quanyan Zhu and Mohamed{-}Slim Alouini}, title = {Optimizing mission critical data dissemination in massive IoT networks}, booktitle = {15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2017, Paris, France, May 15-19, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://dl.ifip.org/db/conf/wiopt/wiopt2017/1570343226.pdf}, doi = {10.23919/WIOPT.2017.7959930}, timestamp = {Thu, 09 Dec 2021 12:24:09 +0100}, biburl = {https://dblp.org/rec/conf/wiopt/FarooqEZA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wiopt/FarooqZ17, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {Secure and reconfigurable network design for critical information dissemination in the Internet of battlefield things (IoBT)}, booktitle = {15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2017, Paris, France, May 15-19, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://dl.ifip.org/db/conf/wiopt/wiopt2017/1570329860.pdf}, doi = {10.23919/WIOPT.2017.7959892}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wiopt/FarooqZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wiopt/HanawalHZ17, author = {Manjesh Kumar Hanawal and Yezekael Hayel and Quanyan Zhu}, title = {Throughput maximization of large-scale secondary networks over licensed and unlicensed spectra}, booktitle = {15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2017, Paris, France, May 15-19, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://dl.ifip.org/db/conf/wiopt/wiopt2017/1570346707.pdf}, doi = {10.23919/WIOPT.2017.7959879}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wiopt/HanawalHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FarooqZ17, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)}, journal = {CoRR}, volume = {abs/1703.01224}, year = {2017}, url = {http://arxiv.org/abs/1703.01224}, eprinttype = {arXiv}, eprint = {1703.01224}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FarooqZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TrikiZAHX17, author = {Imen Triki and Quanyan Zhu and Rachid El Azouzi and Majed Haddad and Zhiheng Xu}, title = {Learning from Experience: {A} Dynamic Closed-Loop QoE Optimization for Video Adaptation and Delivery}, journal = {CoRR}, volume = {abs/1703.01986}, year = {2017}, url = {http://arxiv.org/abs/1703.01986}, eprinttype = {arXiv}, eprint = {1703.01986}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TrikiZAHX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FarooqZ17a, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {Optimizing Mission Critical Data Dissemination in Massive IoT Networks}, journal = {CoRR}, volume = {abs/1704.05954}, year = {2017}, url = {http://arxiv.org/abs/1704.05954}, eprinttype = {arXiv}, eprint = {1704.05954}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/FarooqZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PawlickZ17b, author = {Jeffrey Pawlick and Quanyan Zhu}, title = {A Mean-Field Stackelberg Game Approach for Obfuscation Adoption in Empirical Risk Minimization}, journal = {CoRR}, volume = {abs/1706.02693}, year = {2017}, url = {http://arxiv.org/abs/1706.02693}, eprinttype = {arXiv}, eprint = {1706.02693}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PawlickZ17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhangZ17d, author = {Rui Zhang and Quanyan Zhu}, title = {Distributed Transfer Linear Support Vector Machines}, journal = {CoRR}, volume = {abs/1706.05039}, year = {2017}, url = {http://arxiv.org/abs/1706.05039}, eprinttype = {arXiv}, eprint = {1706.05039}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhangZ17d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PawlickZ17aa, author = {Jeffrey Pawlick and Quanyan Zhu}, title = {Proactive Defense Against Physical Denial of Service Attacks using Poisson Signaling Games}, journal = {CoRR}, volume = {abs/1707.03708}, year = {2017}, url = {http://arxiv.org/abs/1707.03708}, eprinttype = {arXiv}, eprint = {1707.03708}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PawlickZ17aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenTZ17, author = {Juntao Chen and Corinne Touati and Quanyan Zhu}, title = {Optimal Secure Multi-Layer IoT Network Design}, journal = {CoRR}, volume = {abs/1707.07046}, year = {2017}, url = {http://arxiv.org/abs/1707.07046}, eprinttype = {arXiv}, eprint = {1707.07046}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenTZ17a, author = {Juntao Chen and Corinne Touati and Quanyan Zhu}, title = {A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery}, journal = {CoRR}, volume = {abs/1707.07054}, year = {2017}, url = {http://arxiv.org/abs/1707.07054}, eprinttype = {arXiv}, eprint = {1707.07054}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenTZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AnwarZ17, author = {Hamza Anwar and Quanyan Zhu}, title = {Minimax Game-Theoretic Approach to Multiscale {\textdollar}H{\_}\{{\textbackslash}infty\}{\textdollar} Optimal Filtering}, journal = {CoRR}, volume = {abs/1707.07642}, year = {2017}, url = {http://arxiv.org/abs/1707.07642}, eprinttype = {arXiv}, eprint = {1707.07642}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AnwarZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PawlickNZ17, author = {Jeffrey Pawlick and Thi Thu Hang Nguyen and Quanyan Zhu}, title = {Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats}, journal = {CoRR}, volume = {abs/1707.08031}, year = {2017}, url = {http://arxiv.org/abs/1707.08031}, eprinttype = {arXiv}, eprint = {1707.08031}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PawlickNZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PawlickZ17ab, author = {Jeffrey Pawlick and Quanyan Zhu}, title = {Quantitative Models of Imperfect Deception in Network Security using Signaling Games with Evidence}, journal = {CoRR}, volume = {abs/1707.08035}, year = {2017}, url = {http://arxiv.org/abs/1707.08035}, eprinttype = {arXiv}, eprint = {1707.08035}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PawlickZ17ab.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FarooqZ17aa, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {Adaptive and Resilient Revenue Maximizing Resource Allocation and Pricing in Cloud Computing Environments}, journal = {CoRR}, volume = {abs/1707.08691}, year = {2017}, url = {http://arxiv.org/abs/1707.08691}, eprinttype = {arXiv}, eprint = {1707.08691}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FarooqZ17aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-00621, author = {Muhammad Junaid Farooq and Quanyan Zhu}, title = {Cognitive Connectivity Resilience in Multi-layer Remotely Deployed Mobile Internet of Things}, journal = {CoRR}, volume = {abs/1709.00621}, year = {2017}, url = {http://arxiv.org/abs/1709.00621}, eprinttype = {arXiv}, eprint = {1709.00621}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-00621.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-00288, author = {Fei Miao and Quanyan Zhu and Miroslav Pajic and George J. Pappas}, title = {A Moving-Horizon Hybrid Stochastic Game for Secure Control of Cyber-Physical Systems}, journal = {CoRR}, volume = {abs/1710.00288}, year = {2017}, url = {http://arxiv.org/abs/1710.00288}, eprinttype = {arXiv}, eprint = {1710.00288}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-00288.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-04677, author = {Rui Zhang and Quanyan Zhu}, title = {Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries}, journal = {CoRR}, volume = {abs/1710.04677}, year = {2017}, url = {http://arxiv.org/abs/1710.04677}, eprinttype = {arXiv}, eprint = {1710.04677}, timestamp = {Sun, 22 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-04677.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-06454, author = {Juntao Chen and Rui Zhang and Quanyan Zhu}, title = {Optimal Control of Interdependent Epidemics in Complex Networks}, journal = {CoRR}, volume = {abs/1710.06454}, year = {2017}, url = {http://arxiv.org/abs/1710.06454}, eprinttype = {arXiv}, eprint = {1710.06454}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-06454.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-05441, author = {Jeffrey Pawlick and Edward Colbert and Quanyan Zhu}, title = {A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy}, journal = {CoRR}, volume = {abs/1712.05441}, year = {2017}, url = {http://arxiv.org/abs/1712.05441}, eprinttype = {arXiv}, eprint = {1712.05441}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-05441.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/FungZ16, author = {Carol J. Fung and Quanyan Zhu}, title = {{FACID:} {A} trust-based collaborative decision framework for intrusion detection networks}, journal = {Ad Hoc Networks}, volume = {53}, pages = {17--31}, year = {2016}, url = {https://doi.org/10.1016/j.adhoc.2016.08.014}, doi = {10.1016/J.ADHOC.2016.08.014}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/FungZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cmot/CaseyMWZM16, author = {William Casey and Jose Andre Morales and Evan Wright and Quanyan Zhu and Bud Mishra}, title = {Compliance signaling games: toward modeling the deterrence of insider threats}, journal = {Comput. Math. Organ. Theory}, volume = {22}, number = {3}, pages = {318--349}, year = {2016}, url = {https://doi.org/10.1007/s10588-016-9221-5}, doi = {10.1007/S10588-016-9221-5}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cmot/CaseyMWZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jota/BausoZB16, author = {Dario Bauso and Quanyan Zhu and Tamer Basar}, title = {Decomposition and Mean-Field Approach to Mixed Integer Optimal Compensation Problems}, journal = {J. Optim. Theory Appl.}, volume = {169}, number = {2}, pages = {606--630}, year = {2016}, url = {https://doi.org/10.1007/s10957-016-0881-6}, doi = {10.1007/S10957-016-0881-6}, timestamp = {Tue, 07 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jota/BausoZB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/orl/SimhonHSZ16, author = {Eran Simhon and Yezekael Hayel and David Starobinski and Quanyan Zhu}, title = {Optimal information disclosure policies in strategic queueing games}, journal = {Oper. Res. Lett.}, volume = {44}, number = {1}, pages = {109--113}, year = {2016}, url = {https://doi.org/10.1016/j.orl.2015.12.005}, doi = {10.1016/J.ORL.2015.12.005}, timestamp = {Thu, 28 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/orl/SimhonHSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/MaharjanZZGB16, author = {Sabita Maharjan and Quanyan Zhu and Yan Zhang and Stein Gjessing and Tamer Basar}, title = {Demand Response Management in the Smart Grid in a Large Population Regime}, journal = {{IEEE} Trans. Smart Grid}, volume = {7}, number = {1}, pages = {189--199}, year = {2016}, url = {https://doi.org/10.1109/TSG.2015.2431324}, doi = {10.1109/TSG.2015.2431324}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/MaharjanZZGB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/XuZ16, author = {Zhiheng Xu and Quanyan Zhu}, title = {Cross-layer secure cyber-physical control system design for networked 3D printers}, booktitle = {2016 American Control Conference, {ACC} 2016, Boston, MA, USA, July 6-8, 2016}, pages = {1191--1196}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACC.2016.7525079}, doi = {10.1109/ACC.2016.7525079}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/amcc/XuZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/ChenZ16, author = {Juntao Chen and Quanyan Zhu}, title = {Interdependent network formation games with an application to critical infrastructures}, booktitle = {2016 American Control Conference, {ACC} 2016, Boston, MA, USA, July 6-8, 2016}, pages = {2870--2875}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ACC.2016.7525354}, doi = {10.1109/ACC.2016.7525354}, timestamp = {Wed, 05 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/ChenZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangZ16, author = {Tao Zhang and Quanyan Zhu}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {A Dual Perturbation Approach for Differential Private ADMM-Based Distributed Empirical Risk Minimization}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {129--137}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996762}, doi = {10.1145/2996758.2996762}, timestamp = {Mon, 26 Jun 2023 20:41:47 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/ChenZ16, author = {Juntao Chen and Quanyan Zhu}, title = {Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment}, booktitle = {55th {IEEE} Conference on Decision and Control, {CDC} 2016, Las Vegas, NV, USA, December 12-14, 2016}, pages = {5183--5188}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CDC.2016.7799062}, doi = {10.1109/CDC.2016.7799062}, timestamp = {Fri, 04 Mar 2022 13:29:43 +0100}, biburl = {https://dblp.org/rec/conf/cdc/ChenZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassZ16, author = {Stefan Rass and Quanyan Zhu}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {{GADAPT:} {A} Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {314--326}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_18}, doi = {10.1007/978-3-319-47413-7\_18}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/RassZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ChenZ16, author = {Juntao Chen and Quanyan Zhu}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {329--348}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_19}, doi = {10.1007/978-3-319-47413-7\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ChenZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MohammadiMMZ16, author = {Amin Mohammadi and Mohammad Hossein Manshaei and Monireh Mohebbi Moghaddam and Quanyan Zhu}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {382--394}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_22}, doi = {10.1007/978-3-319-47413-7\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MohammadiMMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MongaZ16, author = {Amnol Monga and Quanyan Zhu}, title = {On solving large-scale low-rank zero-sum security games of incomplete information}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WIFS.2016.7823923}, doi = {10.1109/WIFS.2016.7823923}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MongaZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/PawlickZ16, author = {Jeffrey Pawlick and Quanyan Zhu}, title = {A Stackelberg game perspective on the conflict between machine learning and data obfuscation}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WIFS.2016.7823893}, doi = {10.1109/WIFS.2016.7823893}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/PawlickZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2016, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7}, doi = {10.1007/978-3-319-47413-7}, isbn = {978-3-319-47412-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhangZ16, author = {Tao Zhang and Quanyan Zhu}, title = {Dynamic Privacy For Distributed Machine Learning Over Network}, journal = {CoRR}, volume = {abs/1601.03466}, year = {2016}, url = {http://arxiv.org/abs/1601.03466}, eprinttype = {arXiv}, eprint = {1601.03466}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhangZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenZ16, author = {Juntao Chen and Quanyan Zhu}, title = {A Game-Theoretic Framework for Resilient and Distributed Generation Control of Renewable Energies in Microgrids}, journal = {CoRR}, volume = {abs/1601.04583}, year = {2016}, url = {http://arxiv.org/abs/1601.04583}, eprinttype = {arXiv}, eprint = {1601.04583}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenZ16b, author = {Juntao Chen and Quanyan Zhu}, title = {Interdependent Network Formation Games}, journal = {CoRR}, volume = {abs/1602.07745}, year = {2016}, url = {http://arxiv.org/abs/1602.07745}, eprinttype = {arXiv}, eprint = {1602.07745}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenZ16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MiaoZPP16, author = {Fei Miao and Quanyan Zhu and Miroslav Pajic and George J. Pappas}, title = {Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks}, journal = {CoRR}, volume = {abs/1605.08962}, year = {2016}, url = {http://arxiv.org/abs/1605.08962}, eprinttype = {arXiv}, eprint = {1605.08962}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MiaoZPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PawlickZ16b, author = {Jeffrey Pawlick and Quanyan Zhu}, title = {A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation}, journal = {CoRR}, volume = {abs/1608.02546}, year = {2016}, url = {http://arxiv.org/abs/1608.02546}, eprinttype = {arXiv}, eprint = {1608.02546}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PawlickZ16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenZ16d, author = {Juntao Chen and Quanyan Zhu}, title = {A Stackelberg Game Approach for Two-Level Distributed Energy Management in Smart Grids}, journal = {CoRR}, volume = {abs/1608.08253}, year = {2016}, url = {http://arxiv.org/abs/1608.08253}, eprinttype = {arXiv}, eprint = {1608.08253}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenZ16d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuZ15, author = {Zhiheng Xu and Quanyan Zhu}, editor = {Indrajit Ray and Roshan K. Thomas and Alvaro A. C{\'{a}}rdenas}, title = {Secure and Resilient Control Design for Cloud Enabled Networked Control Systems}, booktitle = {Proceedings of the First {ACM} Workshop on Cyber-Physical Systems-Security and/or PrivaCy, {CPS-SPC} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {31--42}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808705.2808708}, doi = {10.1145/2808705.2808708}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaseyZMM15, author = {William Austin Casey and Quanyan Zhu and Jose Andre Morales and Bud Mishra}, editor = {Elisa Bertino and Ilsun You}, title = {Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {53--62}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808788}, doi = {10.1145/2808783.2808788}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaseyZMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/HayelZ15, author = {Yezekael Hayel and Quanyan Zhu}, title = {Evolutionary Poisson games for controlling large population behaviors}, booktitle = {54th {IEEE} Conference on Decision and Control, {CDC} 2015, Osaka, Japan, December 15-18, 2015}, pages = {300--305}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CDC.2015.7402217}, doi = {10.1109/CDC.2015.7402217}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/cdc/HayelZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/XuZ15, author = {Zhiheng Xu and Quanyan Zhu}, title = {A cyber-physical game framework for secure and resilient multi-agent autonomous systems}, booktitle = {54th {IEEE} Conference on Decision and Control, {CDC} 2015, Osaka, Japan, December 15-18, 2015}, pages = {5156--5161}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CDC.2015.7403026}, doi = {10.1109/CDC.2015.7403026}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdc/XuZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/HayelSSZ15, author = {Yezekael Hayel and Eran Simhon and David Starobinski and Quanyan Zhu}, title = {Distributed strategic mode selection for large-scale {D2D} communications based on Queue State Information}, booktitle = {49th Annual Conference on Information Sciences and Systems, {CISS} 2015, Baltimore, MD, USA, March 18-20, 2015}, pages = {1--3}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISS.2015.7086844}, doi = {10.1109/CISS.2015.7086844}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ciss/HayelSSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/HayelZ15, author = {Yezekael Hayel and Quanyan Zhu}, title = {Resilient and secure network design for cyber attack-induced cascading link failures in critical infrastructures}, booktitle = {49th Annual Conference on Information Sciences and Systems, {CISS} 2015, Baltimore, MD, USA, March 18-20, 2015}, pages = {1--3}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISS.2015.7086855}, doi = {10.1109/CISS.2015.7086855}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/HayelZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FarhangHZ15, author = {Sadegh Farhang and Yezekael Hayel and Quanyan Zhu}, title = {PHY-layer location privacy-preserving access point selection mechanism in next-generation wireless networks}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {263--271}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346836}, doi = {10.1109/CNS.2015.7346836}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/FarhangHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fusion/ZhangZ15, author = {Rui Zhang and Quanyan Zhu}, title = {Secure and resilient distributed machine learning under adversarial environments}, booktitle = {18th International Conference on Information Fusion, {FUSION} 2015, Washington, DC, USA, July 6-9, 2015}, pages = {644--651}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/document/7266621/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fusion/ZhangZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HayelZ15, author = {Yezekael Hayel and Quanyan Zhu}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {22--34}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_2}, doi = {10.1007/978-3-319-25594-1\_2}, timestamp = {Thu, 17 Sep 2020 10:44:10 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HayelZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PawlickFZ15, author = {Jeffrey Pawlick and Sadegh Farhang and Quanyan Zhu}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {289--308}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_16}, doi = {10.1007/978-3-319-25594-1\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PawlickFZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MoghaddamMZ15, author = {Monireh Mohebbi Moghaddam and Mohammad Hossein Manshaei and Quanyan Zhu}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {To Trust or Not: {A} Security Signaling Game Between Service Provider and Client}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {322--333}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_18}, doi = {10.1007/978-3-319-25594-1\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MoghaddamMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/XuZ15, author = {Zhiheng Xu and Quanyan Zhu}, title = {Environment-aware power generation scheduling in smart grids}, booktitle = {2015 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2015, Miami, FL, USA, November 2-5, 2015}, pages = {253--258}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/SmartGridComm.2015.7436309}, doi = {10.1109/SMARTGRIDCOMM.2015.7436309}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/XuZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/ChenZZ15, author = {Juntao Chen and Liuwei Zhou and Quanyan Zhu}, title = {Resilient control design for wind turbines using Markov jump linear system model with l{\'{e}}vy noise}, booktitle = {2015 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2015, Miami, FL, USA, November 2-5, 2015}, pages = {828--833}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/SmartGridComm.2015.7436404}, doi = {10.1109/SMARTGRIDCOMM.2015.7436404}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/ChenZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/PawlickZ15, author = {Jeffrey Pawlick and Quanyan Zhu}, title = {Deception by Design: Evidence-Based Signaling Games for Network Defense}, booktitle = {14th Annual Workshop on the Economics of Information Security, {WEIS} 2015, Delft, The Netherlands, 22-23 June, 2015}, year = {2015}, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_pawlick.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/PawlickZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FarhangHZ15, author = {Sadegh Farhang and Yezekael Hayel and Quanyan Zhu}, title = {Physical layer location privacy issue in wireless small cell networks}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {32:1--32:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774990}, doi = {10.1145/2766498.2774990}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FarhangHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PawlickZ15, author = {Jeffrey Pawlick and Quanyan Zhu}, title = {Deception by Design: Evidence-Based Signaling Games for Network Defense}, journal = {CoRR}, volume = {abs/1503.05458}, year = {2015}, url = {http://arxiv.org/abs/1503.05458}, eprinttype = {arXiv}, eprint = {1503.05458}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PawlickZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HayelZ15, author = {Yezekael Hayel and Quanyan Zhu}, title = {Evolutionary Poisson Games for Controlling Large Population Behaviors}, journal = {CoRR}, volume = {abs/1503.08085}, year = {2015}, url = {http://arxiv.org/abs/1503.08085}, eprinttype = {arXiv}, eprint = {1503.08085}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HayelZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZahirPSPZ15, author = {Saboor Zahir and John Pak and Jatinder Singh and Jeffrey Pawlick and Quanyan Zhu}, title = {Protection and Deception: Discovering Game Theory and Cyber Literacy through a Novel Board Game Experience}, journal = {CoRR}, volume = {abs/1505.05570}, year = {2015}, url = {http://arxiv.org/abs/1505.05570}, eprinttype = {arXiv}, eprint = {1505.05570}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZahirPSPZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenZ15a, author = {Juntao Chen and Quanyan Zhu}, title = {Resilient and Decentralized Control of Multi-level Cooperative Robotic Networks to Maintain Connectivity under Adversarial Attacks}, journal = {CoRR}, volume = {abs/1505.07158}, year = {2015}, url = {http://arxiv.org/abs/1505.07158}, eprinttype = {arXiv}, eprint = {1505.07158}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenZ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PawlickFZ15, author = {Jeffrey Pawlick and Sadegh Farhang and Quanyan Zhu}, title = {Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats}, journal = {CoRR}, volume = {abs/1507.00576}, year = {2015}, url = {http://arxiv.org/abs/1507.00576}, eprinttype = {arXiv}, eprint = {1507.00576}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PawlickFZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/HouWZL14, author = {Ronghui Hou and Chuqing Wang and Quanyan Zhu and Jiandong Li}, title = {Interference-aware QoS multicast routing for smart grid}, journal = {Ad Hoc Networks}, volume = {22}, pages = {13--26}, year = {2014}, url = {https://doi.org/10.1016/j.adhoc.2014.05.008}, doi = {10.1016/J.ADHOC.2014.05.008}, timestamp = {Mon, 12 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/HouWZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tac/TembineZB14, author = {Hamidou Tembine and Quanyan Zhu and Tamer Basar}, title = {Risk-Sensitive Mean-Field Games}, journal = {{IEEE} Trans. Autom. Control.}, volume = {59}, number = {4}, pages = {835--850}, year = {2014}, url = {https://doi.org/10.1109/TAC.2013.2289711}, doi = {10.1109/TAC.2013.2289711}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tac/TembineZB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/MiaoZ14, author = {Fei Miao and Quanyan Zhu}, title = {A moving-horizon hybrid stochastic game for secure control of cyber-physical systems}, booktitle = {53rd {IEEE} Conference on Decision and Control, {CDC} 2014, Los Angeles, CA, USA, December 15-17, 2014}, pages = {517--522}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CDC.2014.7039433}, doi = {10.1109/CDC.2014.7039433}, timestamp = {Fri, 04 Mar 2022 13:29:15 +0100}, biburl = {https://dblp.org/rec/conf/cdc/MiaoZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/MiaoZPP14, author = {Fei Miao and Quanyan Zhu and Miroslav Pajic and George J. Pappas}, title = {Coding sensor outputs for injection attacks detection}, booktitle = {53rd {IEEE} Conference on Decision and Control, {CDC} 2014, Los Angeles, CA, USA, December 15-17, 2014}, pages = {5776--5781}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CDC.2014.7040293}, doi = {10.1109/CDC.2014.7040293}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cdc/MiaoZPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AliYAKZ14, author = {Muhammad Qasim Ali and Reza Yousefian and Ehab Al{-}Shaer and Sukumar Kamalasadan and Quanyan Zhu}, title = {Two-tier data-driven intrusion detection for automatic generation control in smart grid}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {292--300}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997497}, doi = {10.1109/CNS.2014.6997497}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AliYAKZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/FarhangMEZ14, author = {Sadegh Farhang and Mohammad Hossein Manshaei and Milad Nasr Esfahani and Quanyan Zhu}, editor = {Radha Poovendran and Walid Saad}, title = {A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {319--328}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_18}, doi = {10.1007/978-3-319-12601-2\_18}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/FarhangMEZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Zhu13a, author = {Quanyan Zhu}, title = {Game-theoretic methods for security and resilience in cyber-physical systems}, school = {University of Illinois Urbana-Champaign, {USA}}, year = {2013}, url = {https://hdl.handle.net/2142/45479}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Zhu13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ManshaeiZABH13, author = {Mohammad Hossein Manshaei and Quanyan Zhu and Tansu Alpcan and Tamer Basar and Jean{-}Pierre Hubaux}, title = {Game theory meets network security and privacy}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {3}, pages = {25:1--25:39}, year = {2013}, url = {https://doi.org/10.1145/2480741.2480742}, doi = {10.1145/2480741.2480742}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/ManshaeiZABH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dga/ZhuB13, author = {Quanyan Zhu and Tamer Basar}, title = {Multi-Resolution Large Population Stochastic Differential Games and Their Application to Demand Response Management in the Smart Grid}, journal = {Dyn. Games Appl.}, volume = {3}, number = {1}, pages = {68--88}, year = {2013}, url = {https://doi.org/10.1007/s13235-013-0072-0}, doi = {10.1007/S13235-013-0072-0}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dga/ZhuB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ZhangZZBH13, author = {Qi Zhang and Quanyan Zhu and Mohamed Faten Zhani and Raouf Boutaba and Joseph L. Hellerstein}, title = {Dynamic Service Placement in Geographically Distributed Clouds}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {31}, number = {12-Supplement}, pages = {762--772}, year = {2013}, url = {https://doi.org/10.1109/JSAC.2013.SUP2.1213008}, doi = {10.1109/JSAC.2013.SUP2.1213008}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsac/ZhangZZBH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/MaharjanZZGB13, author = {Sabita Maharjan and Quanyan Zhu and Yan Zhang and Stein Gjessing and Tamer Basar}, title = {Dependable Demand Response Management in the Smart Grid: {A} Stackelberg Game Approach}, journal = {{IEEE} Trans. Smart Grid}, volume = {4}, number = {1}, pages = {120--132}, year = {2013}, url = {https://doi.org/10.1109/TSG.2012.2223766}, doi = {10.1109/TSG.2012.2223766}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/MaharjanZZGB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/allerton/ZhuB13, author = {Quanyan Zhu and Linda Bushnell}, title = {Networked cyber-physical systems: Interdependence, resilience and information exchange}, booktitle = {51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013, Allerton Park {\&} Retreat Center, Monticello, IL, USA, October 2-4, 2013}, pages = {763--769}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/Allerton.2013.6736601}, doi = {10.1109/ALLERTON.2013.6736601}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/allerton/ZhuB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/ClarkZPB13, author = {Andrew Clark and Quanyan Zhu and Radha Poovendran and Tamer Basar}, title = {An impact-aware defense against Stuxnet}, booktitle = {American Control Conference, {ACC} 2013, Washington, DC, USA, June 17-19, 2013}, pages = {4140--4147}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ACC.2013.6580475}, doi = {10.1109/ACC.2013.6580475}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/ClarkZPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/ZhuCPB13, author = {Quanyan Zhu and Andrew Clark and Radha Poovendran and Tamer Basar}, title = {Deployment and exploitation of deceptive honeybots in social networks}, booktitle = {Proceedings of the 52nd {IEEE} Conference on Decision and Control, {CDC} 2013, Florence, Italy, December 10-13, 2013}, pages = {212--219}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CDC.2013.6759884}, doi = {10.1109/CDC.2013.6759884}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdc/ZhuCPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/ZyskowskiZ13, author = {Matthew Zyskowski and Quanyan Zhu}, title = {Price and variance of anarchy in mean-variance cost density-shaping stochastic differential games}, booktitle = {Proceedings of the 52nd {IEEE} Conference on Decision and Control, {CDC} 2013, Florence, Italy, December 10-13, 2013}, pages = {1720--1725}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CDC.2013.6760130}, doi = {10.1109/CDC.2013.6760130}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdc/ZyskowskiZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/ZhuBB13, author = {Quanyan Zhu and Linda Bushnell and Tamer Basar}, editor = {Danielle C. Tarraf}, title = {Resilient Distributed Control of Multi-agent Cyber-Physical Systems}, booktitle = {Control of Cyber-Physical Systems, Workshop Held at The Johns Hopkins University, Baltimore, MD, USA, March 2013}, series = {Lecture Notes in Control and Information Sciences}, volume = {449}, pages = {301--316}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-01159-2\_16}, doi = {10.1007/978-3-319-01159-2\_16}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/ZhuBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucc/GubarZ13, author = {Elena A. Gubar and Quanyan Zhu}, title = {Optimal control of influenza epidemic model with virus mutations}, booktitle = {12th European Control Conference, {ECC} 2013, Zurich, Switzerland, July 17-19, 2013}, pages = {3125--3130}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.23919/ECC.2013.6669732}, doi = {10.23919/ECC.2013.6669732}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eucc/GubarZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhuB13, author = {Quanyan Zhu and Tamer Basar}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {246--263}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_15}, doi = {10.1007/978-3-319-02786-9\_15}, timestamp = {Tue, 10 Sep 2019 13:47:28 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhuB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/DanLTZN13, author = {Gy{\"{o}}rgy D{\'{a}}n and King{-}Shan Lui and Rehana Tabassum and Quanyan Zhu and Klara Nahrstedt}, title = {{SELINDA:} {A} secure, scalable and light-weight data collection protocol for smart grids}, booktitle = {{IEEE} Fourth International Conference on Smart Grid Communications, SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013}, pages = {480--485}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SmartGridComm.2013.6688004}, doi = {10.1109/SMARTGRIDCOMM.2013.6688004}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/DanLTZN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/0020HKUZMMW13, author = {Wei Chen and Dayu Huang and Ankur A. Kulkarni and Jayakrishnan Unnikrishnan and Quanyan Zhu and Prashant G. Mehta and Sean P. Meyn and Adam Wierman}, title = {Approximate dynamic programming using fluid and diffusion approximations with applications to power management}, journal = {CoRR}, volume = {abs/1307.1759}, year = {2013}, url = {http://arxiv.org/abs/1307.1759}, eprinttype = {arXiv}, eprint = {1307.1759}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/0020HKUZMMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ZhuYSHB12, author = {Quanyan Zhu and Zhou Yuan and Ju Bin Song and Zhu Han and Tamer Basar}, title = {Interference Aware Routing Game for Cognitive Radio Multi-Hop Networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {30}, number = {10}, pages = {2006--2015}, year = {2012}, url = {https://doi.org/10.1109/JSAC.2012.121115}, doi = {10.1109/JSAC.2012.121115}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsac/ZhuYSHB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ZhuFBB12, author = {Quanyan Zhu and Carol J. Fung and Raouf Boutaba and Tamer Basar}, title = {{GUIDEX:} {A} Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {30}, number = {11}, pages = {2220--2230}, year = {2012}, url = {https://doi.org/10.1109/JSAC.2012.121214}, doi = {10.1109/JSAC.2012.121214}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ZhuFBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/BausoZB12, author = {Dario Bauso and Quanyan Zhu and Tamer Basar}, title = {Mixed integer optimal compensation: Decompositions and mean-field approximations}, booktitle = {American Control Conference, {ACC} 2012, Montreal, QC, Canada, June 27-29, 2012}, pages = {2663--2668}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ACC.2012.6315277}, doi = {10.1109/ACC.2012.6315277}, timestamp = {Sun, 08 Aug 2021 01:40:54 +0200}, biburl = {https://dblp.org/rec/conf/amcc/BausoZB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/ZhuZSDB12, author = {Quanyan Zhu and Jiangmeng Zhang and Peter W. Sauer and Alejandro D. Dom{\'{\i}}nguez{-}Garc{\'{\i}}a and Tamer Basar}, title = {A game-theoretic framework for control of distributed renewable-based energy resources in smart grids}, booktitle = {American Control Conference, {ACC} 2012, Montreal, QC, Canada, June 27-29, 2012}, pages = {3623--3628}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ACC.2012.6315275}, doi = {10.1109/ACC.2012.6315275}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/ZhuZSDB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/ZhuCPB12, author = {Quanyan Zhu and Andrew Clark and Radha Poovendran and Tamer Basar}, title = {Deceptive routing games}, booktitle = {Proceedings of the 51th {IEEE} Conference on Decision and Control, {CDC} 2012, December 10-13, 2012, Maui, HI, {USA}}, pages = {2704--2711}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CDC.2012.6426515}, doi = {10.1109/CDC.2012.6426515}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdc/ZhuCPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/ZhuBB12, author = {Quanyan Zhu and Linda Bushnell and Tamer Basar}, title = {Game-theoretic analysis of node capture and cloning attack with multiple attackers in wireless sensor networks}, booktitle = {Proceedings of the 51th {IEEE} Conference on Decision and Control, {CDC} 2012, December 10-13, 2012, Maui, HI, {USA}}, pages = {3404--3411}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CDC.2012.6426481}, doi = {10.1109/CDC.2012.6426481}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdc/ZhuBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ClarkZPB12, author = {Andrew Clark and Quanyan Zhu and Radha Poovendran and Tamer Basar}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Deceptive Routing in Relay Networks}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {171--185}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_10}, doi = {10.1007/978-3-642-34266-0\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ClarkZPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicons/ZhuB12, author = {Quanyan Zhu and Tamer Basar}, editor = {S. Shankar Sastry and Tamer Basar and Saurabh Amin and Gabor Karsai}, title = {A dynamic game-theoretic approach to resilient control system design for cascading failures}, booktitle = {1st International Conference on High Confidence Networked Systems (HiCoNS - at {CPS} Week 2012), HiCoNS '12, Beijing, China, April 17-18, 2012}, pages = {41--46}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185505.2185512}, doi = {10.1145/2185505.2185512}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicons/ZhuB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icac/ZhangZZZBH12, author = {Qi Zhang and Mohamed Faten Zhani and Shuo Zhang and Quanyan Zhu and Raouf Boutaba and Joseph L. Hellerstein}, editor = {Dejan S. Milojicic and Dongyan Xu and Vanish Talwar}, title = {Dynamic energy-aware capacity provisioning for cloud computing environments}, booktitle = {9th International Conference on Autonomic Computing, ICAC'12, San Jose, CA, USA, September 16 - 20, 2012}, pages = {145--154}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2371536.2371562}, doi = {10.1145/2371536.2371562}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icac/ZhangZZZBH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhuHB12, author = {Quanyan Zhu and Zhu Han and Tamer Basar}, title = {A differential game approach to distributed demand side management in smart grid}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {3345--3350}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6364562}, doi = {10.1109/ICC.2012.6364562}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/ZhuHB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ZhangZZB12, author = {Qi Zhang and Quanyan Zhu and Mohamed Faten Zhani and Raouf Boutaba}, title = {Dynamic Service Placement in Geographically Distributed Clouds}, booktitle = {2012 {IEEE} 32nd International Conference on Distributed Computing Systems, Macau, China, June 18-21, 2012}, pages = {526--535}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDCS.2012.74}, doi = {10.1109/ICDCS.2012.74}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ZhangZZB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhuGB12, author = {Quanyan Zhu and Carl A. Gunter and Tamer Basar}, editor = {Carl A. Gunter and Zachary N. J. Peterson}, title = {Tragedy of Anticommons in Digital Right Management of Medical Records}, booktitle = {3rd {USENIX} Workshop on Health Security and Privacy, HealthSec'12, Bellevue, WA, USA, August 6-7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/healthsec12/workshop-program/presentation/zhu}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhuGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-5844, author = {Quanyan Zhu and Andrew Clark and Radha Poovendran and Tamer Basar}, title = {{SODEXO:} {A} System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks}, journal = {CoRR}, volume = {abs/1207.5844}, year = {2012}, url = {http://arxiv.org/abs/1207.5844}, eprinttype = {arXiv}, eprint = {1207.5844}, timestamp = {Sat, 01 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-5844.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-2806, author = {Hamidou Tembine and Quanyan Zhu and Tamer Basar}, title = {Risk-Sensitive Mean Field Games}, journal = {CoRR}, volume = {abs/1210.2806}, year = {2012}, url = {http://arxiv.org/abs/1210.2806}, eprinttype = {arXiv}, eprint = {1210.2806}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-2806.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dga/BasarZ11, author = {Tamer Basar and Quanyan Zhu}, title = {Prices of Anarchy, Information, and Cooperation in Differential Games}, journal = {Dyn. Games Appl.}, volume = {1}, number = {1}, pages = {50--73}, year = {2011}, url = {https://doi.org/10.1007/s13235-010-0002-3}, doi = {10.1007/S13235-010-0002-3}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dga/BasarZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/SunZHB11, author = {Hui Sun and Quanyan Zhu and Naira Hovakimyan and Tamer Basar}, title = {{\(\mathscr{L}\)}1 adaptive control for positive {LTI} systems}, booktitle = {American Control Conference, {ACC} 2011, San Francisco, CA, USA, June 29 - July 1, 2011}, pages = {13--18}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ACC.2011.5991472}, doi = {10.1109/ACC.2011.5991472}, timestamp = {Wed, 08 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/SunZHB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/ZhuTB11, author = {Quanyan Zhu and Hamidou Tembine and Tamer Basar}, title = {Distributed strategic learning with application to network security}, booktitle = {American Control Conference, {ACC} 2011, San Francisco, CA, USA, June 29 - July 1, 2011}, pages = {4057--4062}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ACC.2011.5991373}, doi = {10.1109/ACC.2011.5991373}, timestamp = {Wed, 08 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/ZhuTB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FungZBB11, author = {Carol J. Fung and Quanyan Zhu and Raouf Boutaba and Tamer Basar}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: {SMURFEN:} a rule sharing collaborative intrusion detection network}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {761--764}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093487}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FungZBB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/ZhuFBB11, author = {Quanyan Zhu and Carol J. Fung and Raouf Boutaba and Tamer Basar}, title = {A game-theoretic approach to rule sharing mechanism in networked intrusion detection systems: Robustness, incentives and security}, booktitle = {50th {IEEE} Conference on Decision and Control and European Control Conference, 11th European Control Conference, {CDC/ECC} 2011, Orlando, FL, USA, December 12-15, 2011}, pages = {243--248}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CDC.2011.6161171}, doi = {10.1109/CDC.2011.6161171}, timestamp = {Wed, 24 Feb 2021 08:49:08 +0100}, biburl = {https://dblp.org/rec/conf/cdc/ZhuFBB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/ZhuB11, author = {Quanyan Zhu and Tamer Basar}, title = {Robust and resilient control design for cyber-physical systems with an application to power systems}, booktitle = {50th {IEEE} Conference on Decision and Control and European Control Conference, 11th European Control Conference, {CDC/ECC} 2011, Orlando, FL, USA, December 12-15, 2011}, pages = {4066--4071}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CDC.2011.6161031}, doi = {10.1109/CDC.2011.6161031}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cdc/ZhuB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/ZhuTB11, author = {Quanyan Zhu and Hamidou Tembine and Tamer Basar}, title = {Hybrid risk-sensitive mean-field stochastic differential games with application to molecular biology}, booktitle = {50th {IEEE} Conference on Decision and Control and European Control Conference, 11th European Control Conference, {CDC/ECC} 2011, Orlando, FL, USA, December 12-15, 2011}, pages = {4491--4497}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CDC.2011.6161035}, doi = {10.1109/CDC.2011.6161035}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cdc/ZhuTB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/FungZBB11, author = {Carol J. Fung and Quanyan Zhu and Raouf Boutaba and Tamer Basar}, title = {{SMURFEN:} {A} system framework for rule sharing collaborative intrusion detection}, booktitle = {7th International Conference on Network and Service Management, {CNSM} 2011, Paris, France, October 24-28, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6104003/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsm/FungZBB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/Zhu11, author = {Quanyan Zhu}, title = {Nash meets Van Valkenburg: {A} game-theoretic approach to effective learning and teaching in engineering}, booktitle = {2011 Frontiers in Education Conference, {FIE} 2011, Rapid City, SD, USA, October 12-15, 2011}, pages = {S4}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FIE.2011.6142933}, doi = {10.1109/FIE.2011.6142933}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fie/Zhu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhuB11, author = {Quanyan Zhu and Tamer Basar}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Indices of Power in Optimal {IDS} Default Configuration: Theory and Examples}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {7--21}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_3}, doi = {10.1007/978-3-642-25280-8\_3}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhuB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhuSB11, author = {Quanyan Zhu and Ju Bin Song and Tamer Basar}, title = {Dynamic Secure Routing Game in Distributed Cognitive Radio Networks}, booktitle = {Proceedings of the Global Communications Conference, {GLOBECOM} 2011, 5-9 December 2011, Houston, Texas, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/GLOCOM.2011.6133879}, doi = {10.1109/GLOCOM.2011.6133879}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZhuSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/ZhuSHPB11, author = {Quanyan Zhu and Walid Saad and Zhu Han and H. Vincent Poor and Tamer Basar}, title = {Eavesdropping and jamming in next-generation wireless networks: {A} game-theoretic approach}, booktitle = {{MILCOM} 2011 - 2011 {IEEE} Military Communications Conference, Baltimore, MD, USA, November 7-10, 2011}, pages = {119--124}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/MILCOM.2011.6127463}, doi = {10.1109/MILCOM.2011.6127463}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/milcom/ZhuSHPB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netcoop/ZhuB11, author = {Quanyan Zhu and Tamer Basar}, title = {A multi-resolution large population game framework for smart grid demand response management}, booktitle = {5th International Conference on NETwork Games, COntrol and OPtimization, NetGCooP 2011, Paris, France, October 12-14, 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6103886/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netcoop/ZhuB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socinfo/LiuZZ11, author = {Yuan Liu and Jie Zhang and Quanyan Zhu}, editor = {Anwitaman Datta and Stuart W. Shulman and Baihua Zheng and Shou{-}De Lin and Aixin Sun and Ee{-}Peng Lim}, title = {Design of a Reputation System Based on Dynamic Coalition Formation}, booktitle = {Social Informatics - Third International Conference, SocInfo 2011, Singapore, October 6-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6984}, pages = {135--144}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24704-0\_18}, doi = {10.1007/978-3-642-24704-0\_18}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/socinfo/LiuZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/ZhangZB11, author = {Qi Zhang and Quanyan Zhu and Raouf Boutaba}, title = {Dynamic Resource Allocation for Spot Markets in Cloud Computing Environments}, booktitle = {{IEEE} 4th International Conference on Utility and Cloud Computing, {UCC} 2011, Melbourne, Australia, December 5-8, 2011}, pages = {178--185}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/UCC.2011.33}, doi = {10.1109/UCC.2011.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ucc/ZhangZB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-2490, author = {Quanyan Zhu and Lacra Pavel}, title = {Enabling Differentiated Services Using Generalized Power Control Model in Optical Networks}, journal = {CoRR}, volume = {abs/1103.2490}, year = {2011}, url = {http://arxiv.org/abs/1103.2490}, eprinttype = {arXiv}, eprint = {1103.2490}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-2490.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-2491, author = {Quanyan Zhu and Hamidou Tembine and Tamer Basar}, title = {Heterogeneous Learning in Zero-Sum Stochastic Games with Incomplete Information}, journal = {CoRR}, volume = {abs/1103.2491}, year = {2011}, url = {http://arxiv.org/abs/1103.2491}, eprinttype = {arXiv}, eprint = {1103.2491}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-2491.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-2493, author = {Quanyan Zhu and Hamidou Tembine and Tamer Basar}, title = {A Constrained Evolutionary Gaussian Multiple Access Channel Game}, journal = {CoRR}, volume = {abs/1103.2493}, year = {2011}, url = {http://arxiv.org/abs/1103.2493}, eprinttype = {arXiv}, eprint = {1103.2493}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-2493.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-2496, author = {Quanyan Zhu and Hamidou Tembine and Tamer Basar}, title = {Evolutionary Games for Multiple Access Control}, journal = {CoRR}, volume = {abs/1103.2496}, year = {2011}, url = {http://arxiv.org/abs/1103.2496}, eprinttype = {arXiv}, eprint = {1103.2496}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-2496.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-2579, author = {Tamer Basar and Quanyan Zhu}, title = {Prices of Anarchy, Information, and Cooperation in Differential Games}, journal = {CoRR}, volume = {abs/1103.2579}, year = {2011}, url = {http://arxiv.org/abs/1103.2579}, eprinttype = {arXiv}, eprint = {1103.2579}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-2579.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1110-1862, author = {Quanyan Zhu and Tamer Basar}, title = {Indices of Power in Optimal {IDS} Default Configuration: Theory and Examples}, journal = {CoRR}, volume = {abs/1110.1862}, year = {2011}, url = {http://arxiv.org/abs/1110.1862}, eprinttype = {arXiv}, eprint = {1110.1862}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1110-1862.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/ZhuB10, author = {Quanyan Zhu and Tamer Basar}, title = {Price of anarchy and price of information in N-person linear-quadratic differential games}, booktitle = {American Control Conference, {ACC} 2010, Baltimore, Maryland, USA, June 30 - July 2, 2010}, pages = {762--767}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ACC.2010.5530924}, doi = {10.1109/ACC.2010.5530924}, timestamp = {Sun, 08 Aug 2021 01:40:56 +0200}, biburl = {https://dblp.org/rec/conf/amcc/ZhuB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/ZhuTB10, author = {Quanyan Zhu and Hamidou Tembine and Tamer Basar}, title = {Network Security Configurations: {A} Nonzero-Sum Stochastic Game Approach}, booktitle = {American Control Conference, {ACC} 2010, Baltimore, Maryland, USA, June 30 - July 2, 2010}, pages = {1059--1064}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ACC.2010.5530765}, doi = {10.1109/ACC.2010.5530765}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcc/ZhuTB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/ZhuTB10, author = {Quanyan Zhu and Hamidou Tembine and Tamer Basar}, title = {Heterogeneous learning in zero-sum stochastic games with incomplete information}, booktitle = {Proceedings of the 49th {IEEE} Conference on Decision and Control, {CDC} 2010, December 15-17, 2010, Atlanta, Georgia, {USA}}, pages = {219--224}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CDC.2010.5718053}, doi = {10.1109/CDC.2010.5718053}, timestamp = {Fri, 04 Mar 2022 13:28:01 +0100}, biburl = {https://dblp.org/rec/conf/cdc/ZhuTB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhuYSHB10, author = {Quanyan Zhu and Zhou Yuan and Ju Bin Song and Zhu Han and Tamer Basar}, title = {Dynamic Interference Minimization Routing Game for On-Demand Cognitive Pilot Channel}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5683923}, doi = {10.1109/GLOCOM.2010.5683923}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/ZhuYSHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/HuangZKB10, author = {Jane W. Huang and Quanyan Zhu and Vikram Krishnamurthy and Tamer Basar}, title = {Distributed correlated Q-learning for dynamic transmission control of sensor networks}, booktitle = {Proceedings of the {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2010, 14-19 March 2010, Sheraton Dallas Hotel, Dallas, Texas, {USA}}, pages = {1982--1985}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICASSP.2010.5495265}, doi = {10.1109/ICASSP.2010.5495265}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/HuangZKB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhuFBB10, author = {Quanyan Zhu and Carol J. Fung and Raouf Boutaba and Tamer Basar}, title = {A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5501981}, doi = {10.1109/ICC.2010.5501981}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZhuFBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhuHB10, author = {Quanyan Zhu and Zhu Han and Tamer Basar}, title = {No-Regret Learning in Collaborative Spectrum Sensing with Malicious Nodes}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502580}, doi = {10.1109/ICC.2010.5502580}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/ZhuHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhuLHB10, author = {Quanyan Zhu and Husheng Li and Zhu Han and Tamer Basar}, title = {A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502451}, doi = {10.1109/ICC.2010.5502451}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/ZhuLHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/FungZBB10, author = {Carol J. Fung and Quanyan Zhu and Raouf Boutaba and Tamer Basar}, editor = {Yoshiaki Kiriha and Lisandro Zambenedetti Granville and Deep Medhi and Toshio Tonouchi and Myung{-}Sup Kim}, title = {Bayesian decision aggregation in collaborative intrusion detection networks}, booktitle = {{IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2010, 19-23 April 2010, Osaka, Japan}, pages = {349--356}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/NOMS.2010.5488489}, doi = {10.1109/NOMS.2010.5488489}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/FungZBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-3190, author = {Quanyan Zhu and Carol J. Fung and Raouf Boutaba and Tamer Basar}, title = {A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks}, journal = {CoRR}, volume = {abs/1002.3190}, year = {2010}, url = {http://arxiv.org/abs/1002.3190}, eprinttype = {arXiv}, eprint = {1002.3190}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-3190.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1008-5340, author = {Quanyan Zhu and Zhou Yuan and Ju Bin Song and Zhu Han and Tamer Basar}, title = {Dynamic Interference Minimization Routing Game for On-Demand Cognitive Pilot Channel}, journal = {CoRR}, volume = {abs/1008.5340}, year = {2010}, url = {http://arxiv.org/abs/1008.5340}, eprinttype = {arXiv}, eprint = {1008.5340}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1008-5340.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/ZhuP09, author = {Quanyan Zhu and Lacra Pavel}, title = {Enabling differentiated services using generalized power control model in optical networks}, journal = {{IEEE} Trans. Commun.}, volume = {57}, number = {9}, pages = {2570--2575}, year = {2009}, url = {https://doi.org/10.1109/TCOMM.2009.09.0701262}, doi = {10.1109/TCOMM.2009.09.0701262}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcom/ZhuP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/ChenHKUZMMW09, author = {Wei Chen and Dayu Huang and Ankur A. Kulkarni and Jayakrishnan Unnikrishnan and Quanyan Zhu and Prashant G. Mehta and Sean P. Meyn and Adam Wierman}, title = {Approximate dynamic programming using fluid and diffusion approximations with applications to power management}, booktitle = {Proceedings of the 48th {IEEE} Conference on Decision and Control, {CDC} 2009, combined withe the 28th Chinese Control Conference, December 16-18, 2009, Shanghai, China}, pages = {3575--3580}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CDC.2009.5399685}, doi = {10.1109/CDC.2009.5399685}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdc/ChenHKUZMMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/ZhuB09, author = {Quanyan Zhu and Tamer Basar}, title = {Dynamic policy-based {IDS} configuration}, booktitle = {Proceedings of the 48th {IEEE} Conference on Decision and Control, {CDC} 2009, combined withe the 28th Chinese Control Conference, December 16-18, 2009, Shanghai, China}, pages = {8600--8605}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CDC.2009.5399894}, doi = {10.1109/CDC.2009.5399894}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdc/ZhuB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamenets/ZhuFBB09, author = {Quanyan Zhu and Carol J. Fung and Raouf Boutaba and Tamer Basar}, editor = {Tamer Basar and Hitay {\"{O}}zbay}, title = {A game-theoretical approach to incentive design in collaborative intrusion detection networks}, booktitle = {1st International Conference on Game Theory for Networks, {GAMENETS} 2009, Istanbul, Turkey, May 13-15, 2009}, pages = {384--392}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GAMENETS.2009.5137424}, doi = {10.1109/GAMENETS.2009.5137424}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/gamenets/ZhuFBB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamenets/ZhuTB09, author = {Quanyan Zhu and Hamidou Tembine and Tamer Basar}, editor = {Tamer Basar and Hitay {\"{O}}zbay}, title = {A constrained evolutionary Gaussian multiple access channel game}, booktitle = {1st International Conference on Game Theory for Networks, {GAMENETS} 2009, Istanbul, Turkey, May 13-15, 2009}, pages = {403--410}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GAMENETS.2009.5137426}, doi = {10.1109/GAMENETS.2009.5137426}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamenets/ZhuTB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/SaadZBHH09, author = {Walid Saad and Quanyan Zhu and Tamer Basar and Zhu Han and Are Hj{\o}rungnes}, title = {Hierarchical Network Formation Games in the Uplink of Multi-Hop Wireless Networks}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5426293}, doi = {10.1109/GLOCOM.2009.5426293}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/SaadZBHH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhuTB09, author = {Quanyan Zhu and Hamidou Tembine and Tamer Basar}, title = {Evolutionary Games for Hybrid Additive White Gaussian Noise Multiple Access Control}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5425254}, doi = {10.1109/GLOCOM.2009.5425254}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZhuTB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ZhuP08, author = {Quanyan Zhu and Lacra Pavel}, title = {End-to-end {DWDM} optical link power-control via a Stackelberg revenue-maximizing model}, journal = {Int. J. Netw. Manag.}, volume = {18}, number = {6}, pages = {505--520}, year = {2008}, url = {https://doi.org/10.1002/nem.705}, doi = {10.1002/NEM.705}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/ZhuP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/ZhuP08, author = {Quanyan Zhu and Lacra Pavel}, title = {Stackelberg game approach to constrained {OSNR} nash game in {WDM} optical networks}, booktitle = {American Control Conference, {ACC} 2008, Seattle, WA, USA, 11-13 June 2008}, pages = {1967--1972}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ACC.2008.4586781}, doi = {10.1109/ACC.2008.4586781}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcc/ZhuP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/Zhu08, author = {Quanyan Zhu}, title = {A Lagrangian approach to constrained potential games: Theory and examples}, booktitle = {Proceedings of the 47th {IEEE} Conference on Decision and Control, {CDC} 2008, December 9-11, 2008, Canc{\'{u}}n, Mexico}, pages = {2420--2425}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/CDC.2008.4738596}, doi = {10.1109/CDC.2008.4738596}, timestamp = {Fri, 04 Mar 2022 13:27:23 +0100}, biburl = {https://dblp.org/rec/conf/cdc/Zhu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhuB08, author = {Quanyan Zhu and Raouf Boutaba}, title = {Nonlinear Quadratic Pricing for Concavifiable Utilities in Network Rate Control}, booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM} 2008, New Orleans, LA, USA, 30 November - 4 December 2008}, pages = {1593--1598}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/GLOCOM.2008.ECP.310}, doi = {10.1109/GLOCOM.2008.ECP.310}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZhuB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhuP08, author = {Quanyan Zhu and Lacra Pavel}, title = {Service Differentiation via Power Management in {WDM} Optical Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2008, Beijing, China, 19-23 May 2008}, pages = {5344--5348}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICC.2008.1002}, doi = {10.1109/ICC.2008.1002}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/ZhuP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhuP08, author = {Quanyan Zhu and Lacra Pavel}, title = {Theory of Linear Games with Constraints and Its Application to Power Control of Optical Networks}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {1984--1992}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.263}, doi = {10.1109/INFOCOM.2008.263}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/ZhuP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/broadnets/ZhuP07, author = {Quanyan Zhu and Lacra Pavel}, title = {Solving constrained {OSNR} Nash game in {WDM} optical networks with a fictitious player}, booktitle = {Fourth International Conference on Broadband Communications, Networks and Systems, {(BROADNETS} 2007), 10-14 September 2007, Raleigh, North-Carolina, {USA}}, pages = {922--927}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/BROADNETS.2007.4550534}, doi = {10.1109/BROADNETS.2007.4550534}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/broadnets/ZhuP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/valuetools/ZhuP07, author = {Quanyan Zhu and Lacra Pavel}, editor = {Peter W. Glynn}, title = {End-to-end link power control in optical networks using Nash bargaining solution}, booktitle = {Proceedings of the 2nd International Conference on Performance Evaluation Methodolgies and Tools, {VALUETOOLS} 2007, Nantes, France, October 22-27, 2007}, series = {{ACM} International Conference Proceeding Series}, pages = {10}, publisher = {{ICST/ACM}}, year = {2007}, url = {https://doi.org/10.4108/gamecomm.2007.1921}, doi = {10.4108/GAMECOMM.2007.1921}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/valuetools/ZhuP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.