Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

BibTeX records: Quanyan Zhu

download as .bib file

@article{DBLP:journals/tifs/GeZ24,
  author       = {Yunfei Ge and
                  Quanyan Zhu},
  title        = {{GAZETA:} GAme-Theoretic ZEro-Trust Authentication for Defense Against
                  Lateral Movement in 5G IoT Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {540--554},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326975},
  doi          = {10.1109/TIFS.2023.3326975},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GeZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-01963,
  author       = {Yuhan Zhao and
                  Juntao Chen and
                  Quanyan Zhu},
  title        = {Integrated Cyber-Physical Resiliency for Power Grids under IoT-Enabled
                  Dynamic Botnet Attacks},
  journal      = {CoRR},
  volume       = {abs/2401.01963},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.01963},
  doi          = {10.48550/ARXIV.2401.01963},
  eprinttype    = {arXiv},
  eprint       = {2401.01963},
  timestamp    = {Tue, 23 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-01963.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-12499,
  author       = {Kim Hammar and
                  Tao Li and
                  Rolf Stadler and
                  Quanyan Zhu},
  title        = {Automated Security Response through Online Learning with Adaptive
                  Conjectures},
  journal      = {CoRR},
  volume       = {abs/2402.12499},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.12499},
  doi          = {10.48550/ARXIV.2402.12499},
  eprinttype    = {arXiv},
  eprint       = {2402.12499},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-12499.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-18781,
  author       = {Tao Li and
                  Kim Hammar and
                  Rolf Stadler and
                  Quanyan Zhu},
  title        = {Conjectural Online Learning with First-order Beliefs in Asymmetric
                  Information Stochastic Games},
  journal      = {CoRR},
  volume       = {abs/2402.18781},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.18781},
  doi          = {10.48550/ARXIV.2402.18781},
  eprinttype    = {arXiv},
  eprint       = {2402.18781},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-18781.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-00972,
  author       = {Yinan Hu and
                  Juntao Chen and
                  Quanyan Zhu},
  title        = {Understanding Police Force Resource Allocation using Adversarial Optimal
                  Transport with Incomplete Information},
  journal      = {CoRR},
  volume       = {abs/2403.00972},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.00972},
  doi          = {10.48550/ARXIV.2403.00972},
  eprinttype    = {arXiv},
  eprint       = {2403.00972},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-00972.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-06299,
  author       = {Quanyan Zhu and
                  Tamer Basar},
  title        = {Disentangling Resilience from Robustness: Contextual Dualism, Interactionism,
                  and Game-Theoretic Paradigms},
  journal      = {CoRR},
  volume       = {abs/2403.06299},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.06299},
  doi          = {10.48550/ARXIV.2403.06299},
  eprinttype    = {arXiv},
  eprint       = {2403.06299},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-06299.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-10570,
  author       = {Tao Li and
                  Quanyan Zhu},
  title        = {Symbiotic Game and Foundation Models for Cyber Deception Operations
                  in Strategic Cyber Warfare},
  journal      = {CoRR},
  volume       = {abs/2403.10570},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.10570},
  doi          = {10.48550/ARXIV.2403.10570},
  eprinttype    = {arXiv},
  eprint       = {2403.10570},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-10570.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-10733,
  author       = {Yuhan Zhao and
                  Quanyan Zhu},
  title        = {Incentive-Compatible and Distributed Allocation for Robotic Service
                  Provision Through Contract Theory},
  journal      = {CoRR},
  volume       = {abs/2403.10733},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.10733},
  doi          = {10.48550/ARXIV.2403.10733},
  eprinttype    = {arXiv},
  eprint       = {2403.10733},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-10733.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-10736,
  author       = {Yuhan Zhao and
                  Quanyan Zhu},
  title        = {Stackelberg Meta-Learning Based Shared Control for Assistive Driving},
  journal      = {CoRR},
  volume       = {abs/2403.10736},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.10736},
  doi          = {10.48550/ARXIV.2403.10736},
  eprinttype    = {arXiv},
  eprint       = {2403.10736},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-10736.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-15636,
  author       = {Yunian Pan and
                  Tao Li and
                  Quanyan Zhu},
  title        = {On the Variational Interpretation of Mirror Play in Monotone Games},
  journal      = {CoRR},
  volume       = {abs/2403.15636},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.15636},
  doi          = {10.48550/ARXIV.2403.15636},
  eprinttype    = {arXiv},
  eprint       = {2403.15636},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-15636.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-01205,
  author       = {Quanyan Zhu},
  title        = {Foundations of Cyber Resilience: The Confluence of Game, Control,
                  and Learning Theories},
  journal      = {CoRR},
  volume       = {abs/2404.01205},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.01205},
  doi          = {10.48550/ARXIV.2404.01205},
  eprinttype    = {arXiv},
  eprint       = {2404.01205},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-01205.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/HuangZ23,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {Cognitive Security - {A} System-Scientific Approach},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30709-6},
  doi          = {10.1007/978-3-031-30709-6},
  isbn         = {978-3-031-30708-9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/HuangZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChenFZ23,
  author       = {Juntao Chen and
                  Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {QoS-Based Contract Design for Profit Maximization in IoT-Enabled Data
                  Markets},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {11},
  pages        = {10080--10094},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3236795},
  doi          = {10.1109/JIOT.2023.3236795},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ChenFZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tase/ChenZ23,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {A Cross-Layer Design Approach to Strategic Cyber Defense and Robust
                  Switching Control of Cyber-Physical Wind Energy Systems},
  journal      = {{IEEE} Trans Autom. Sci. Eng.},
  volume       = {20},
  number       = {1},
  pages        = {624--635},
  year         = {2023},
  url          = {https://doi.org/10.1109/TASE.2022.3164860},
  doi          = {10.1109/TASE.2022.3164860},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tase/ChenZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsipn/LiuLZ23,
  author       = {Shutian Liu and
                  Tao Li and
                  Quanyan Zhu},
  title        = {Game-Theoretic Distributed Empirical Risk Minimization With Strategic
                  Network Design},
  journal      = {{IEEE} Trans. Signal Inf. Process. over Networks},
  volume       = {9},
  pages        = {542--556},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSIPN.2023.3306106},
  doi          = {10.1109/TSIPN.2023.3306106},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsipn/LiuLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/ZhangZ23,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Stochastic Game with Interactive Information Acquisition: {A} Fixed-Point
                  Alignment Principle},
  booktitle    = {59th Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2023, Monticello, IL, USA, September 26-29, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/Allerton58177.2023.10313448},
  doi          = {10.1109/ALLERTON58177.2023.10313448},
  timestamp    = {Wed, 29 Nov 2023 10:22:21 +0100},
  biburl       = {https://dblp.org/rec/conf/allerton/ZhangZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/DhimanPKZ23,
  author       = {Madhu Dhiman and
                  Chen Peng and
                  Veeraruna Kavitha and
                  Quanyan Zhu},
  title        = {Integrative Modeling and Analysis of the Interplay Between Epidemic
                  and News Propagation Processes},
  booktitle    = {American Control Conference, {ACC} 2023, San Diego, CA, USA, May 31
                  - June 2, 2023},
  pages        = {2436--2443},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/ACC55779.2023.10155976},
  doi          = {10.23919/ACC55779.2023.10155976},
  timestamp    = {Tue, 11 Jul 2023 16:44:02 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/DhimanPKZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/PanLZ23,
  author       = {Yunian Pan and
                  Tao Li and
                  Quanyan Zhu},
  title        = {On the Resilience of Traffic Networks under Non-Equilibrium Learning},
  booktitle    = {American Control Conference, {ACC} 2023, San Diego, CA, USA, May 31
                  - June 2, 2023},
  pages        = {3484--3489},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/ACC55779.2023.10156139},
  doi          = {10.23919/ACC55779.2023.10156139},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/PanLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/LiZ23,
  author       = {Tao Li and
                  Quanyan Zhu},
  title        = {On the Price of Transparency: {A} Comparison Between Overt Persuasion
                  and Covert Signaling},
  booktitle    = {62nd {IEEE} Conference on Decision and Control, {CDC} 2023, Singapore,
                  December 13-15, 2023},
  pages        = {4267--4272},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CDC49753.2023.10383897},
  doi          = {10.1109/CDC49753.2023.10383897},
  timestamp    = {Mon, 29 Jan 2024 17:30:32 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/LiZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/PanLZ23,
  author       = {Yunian Pan and
                  Tao Li and
                  Quanyan Zhu},
  title        = {Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks?
                  {A} Traffic Assignment Resilience Study},
  booktitle    = {62nd {IEEE} Conference on Decision and Control, {CDC} 2023, Singapore,
                  December 13-15, 2023},
  pages        = {8328--8333},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CDC49753.2023.10384003},
  doi          = {10.1109/CDC49753.2023.10384003},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/PanLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icra/LiLZ23,
  author       = {Tao Li and
                  Haozhe Lei and
                  Quanyan Zhu},
  title        = {Self-Adaptive Driving in Nonstationary Environments through Conjectural
                  Online Lookahead Adaptation},
  booktitle    = {{IEEE} International Conference on Robotics and Automation, {ICRA}
                  2023, London, UK, May 29 - June 2, 2023},
  pages        = {7205--7211},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICRA48891.2023.10161368},
  doi          = {10.1109/ICRA48891.2023.10161368},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icra/LiLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/GeLZ23,
  author       = {Yunfei Ge and
                  Tao Li and
                  Quanyan Zhu},
  title        = {Scenario-Agnostic Zero-Trust Defense with Explainable Threshold Policy:
                  {A} Meta-Learning Approach},
  booktitle    = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications
                  Workshop, Hoboken, NJ, USA, May 20, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225816},
  doi          = {10.1109/INFOCOMWKSHPS57453.2023.10225816},
  timestamp    = {Tue, 05 Sep 2023 20:33:23 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/GeLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/PengZ23,
  author       = {Chen Peng and
                  Quanyan Zhu},
  title        = {Trust-Aware Resource Management for Secure and Optimal Network Slicing
                  in 5G Mobile Edge Networks},
  booktitle    = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications
                  Workshop, Hoboken, NJ, USA, May 20, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225773},
  doi          = {10.1109/INFOCOMWKSHPS57453.2023.10225773},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/PengZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iros/ZhaoZ23,
  author       = {Yuhan Zhao and
                  Quanyan Zhu},
  title        = {Stackelberg Meta-Learning for Strategic Guidance in Multi-Robot Trajectory
                  Planning},
  booktitle    = {{IROS}},
  pages        = {11342--11347},
  year         = {2023},
  url          = {https://doi.org/10.1109/IROS55552.2023.10342202},
  doi          = {10.1109/IROS55552.2023.10342202},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iros/ZhaoZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssp/HuZ23,
  author       = {Yinan Hu and
                  Quanyan Zhu},
  title        = {Detection in Human-Sensor Systems Under Quantum Prospect Theory Using
                  Bayesian Persuasion Frameworks},
  booktitle    = {{IEEE} Statistical Signal Processing Workshop, {SSP} 2023, Hanoi,
                  Vietnam, July 2-5, 2023},
  pages        = {36--40},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SSP53291.2023.10208035},
  doi          = {10.1109/SSP53291.2023.10208035},
  timestamp    = {Thu, 17 Aug 2023 15:16:12 +0200},
  biburl       = {https://dblp.org/rec/conf/ssp/HuZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/YangLZ23,
  author       = {Ya{-}Ting Yang and
                  Tao Li and
                  Quanyan Zhu},
  title        = {Designing Policies for Truth: Combating Misinformation with Transparency
                  and Information Design},
  booktitle    = {21st International Symposium on Modeling and Optimization in Mobile,
                  Ad Hoc, and Wireless Networks, WiOpt 2023, Singapore, August 24-27,
                  2023},
  pages        = {127--134},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/WiOpt58741.2023.10349848},
  doi          = {10.23919/WIOPT58741.2023.10349848},
  timestamp    = {Thu, 25 Jan 2024 09:25:31 +0100},
  biburl       = {https://dblp.org/rec/conf/wiopt/YangLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-03302,
  author       = {Yurid Nugraha and
                  Ahmet Cetinkaya and
                  Tomohisa Hayakawa and
                  Hideaki Ishii and
                  Quanyan Zhu},
  title        = {A Rolling Horizon Game Considering Network Effect in Cluster Forming
                  for Dynamic Resilient Multiagent Systems},
  journal      = {CoRR},
  volume       = {abs/2301.03302},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.03302},
  doi          = {10.48550/ARXIV.2301.03302},
  eprinttype    = {arXiv},
  eprint       = {2301.03302},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-03302.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-04691,
  author       = {Juntao Chen and
                  Junaid Farooq and
                  Quanyan Zhu},
  title        = {QoS Based Contract Design for Profit Maximization in IoT-Enabled Data
                  Markets},
  journal      = {CoRR},
  volume       = {abs/2301.04691},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.04691},
  doi          = {10.48550/ARXIV.2301.04691},
  eprinttype    = {arXiv},
  eprint       = {2301.04691},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-04691.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-05920,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {An Introduction of System-Scientific Approaches to Cognitive Security},
  journal      = {CoRR},
  volume       = {abs/2301.05920},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.05920},
  doi          = {10.48550/ARXIV.2301.05920},
  eprinttype    = {arXiv},
  eprint       = {2301.05920},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-05920.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-11152,
  author       = {Yurid Nugraha and
                  Ahmet Cetinkaya and
                  Tomohisa Hayakawa and
                  Hideaki Ishii and
                  Quanyan Zhu},
  title        = {Cluster Forming of Multiagent Systems in Rolling Horizon Games with
                  Non-uniform Horizons},
  journal      = {CoRR},
  volume       = {abs/2301.11152},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.11152},
  doi          = {10.48550/ARXIV.2301.11152},
  eprinttype    = {arXiv},
  eprint       = {2301.11152},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-11152.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-13362,
  author       = {Quanyan Zhu},
  title        = {The Doctrine of Cyber Effect: An Ethics Framework for Defensive Cyber
                  Deception},
  journal      = {CoRR},
  volume       = {abs/2302.13362},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.13362},
  doi          = {10.48550/ARXIV.2302.13362},
  eprinttype    = {arXiv},
  eprint       = {2302.13362},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-13362.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-03349,
  author       = {Yunfei Ge and
                  Tao Li and
                  Quanyan Zhu},
  title        = {Scenario-Agnostic Zero-Trust Defense with Explainable Threshold Policy:
                  {A} Meta-Learning Approach},
  journal      = {CoRR},
  volume       = {abs/2303.03349},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.03349},
  doi          = {10.48550/ARXIV.2303.03349},
  eprinttype    = {arXiv},
  eprint       = {2303.03349},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-03349.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-00096,
  author       = {Tao Li and
                  Quanyan Zhu},
  title        = {On the Price of Transparency: {A} Comparison between Overt Persuasion
                  and Covert Signaling},
  journal      = {CoRR},
  volume       = {abs/2304.00096},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.00096},
  doi          = {10.48550/ARXIV.2304.00096},
  eprinttype    = {arXiv},
  eprint       = {2304.00096},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-00096.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-01161,
  author       = {Yunian Pan and
                  Tao Li and
                  Quanyan Zhu},
  title        = {Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks?
                  {A} Traffic Assignment Resilience Study},
  journal      = {CoRR},
  volume       = {abs/2304.01161},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.01161},
  doi          = {10.48550/ARXIV.2304.01161},
  eprinttype    = {arXiv},
  eprint       = {2304.01161},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-01161.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-06842,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Multiagent Incentive Design for Dynamic Task Delegation with Off-Menu
                  Actions},
  journal      = {CoRR},
  volume       = {abs/2304.06842},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.06842},
  doi          = {10.48550/ARXIV.2304.06842},
  eprinttype    = {arXiv},
  eprint       = {2304.06842},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-06842.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-08588,
  author       = {Ya{-}Ting Yang and
                  Tao Li and
                  Quanyan Zhu},
  title        = {Designing Policies for Truth: Combating Misinformation with Transparency
                  and Information Design},
  journal      = {CoRR},
  volume       = {abs/2304.08588},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.08588},
  doi          = {10.48550/ARXIV.2304.08588},
  eprinttype    = {arXiv},
  eprint       = {2304.08588},
  timestamp    = {Fri, 21 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-08588.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-01149,
  author       = {Yunfei Ge and
                  Quanyan Zhu},
  title        = {{AI} Liability Insurance With an Example in AI-Powered E-diagnosis
                  System},
  journal      = {CoRR},
  volume       = {abs/2306.01149},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.01149},
  doi          = {10.48550/ARXIV.2306.01149},
  eprinttype    = {arXiv},
  eprint       = {2306.01149},
  timestamp    = {Mon, 12 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-01149.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-06766,
  author       = {Mingsheng Yin and
                  Tao Li and
                  Haozhe Lei and
                  Yaqi Hu and
                  Sundeep Rangan and
                  Quanyan Zhu},
  title        = {Generalizable Wireless Navigation through Physics-Informed Reinforcement
                  Learning in Wireless Digital Twin},
  journal      = {CoRR},
  volume       = {abs/2306.06766},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.06766},
  doi          = {10.48550/ARXIV.2306.06766},
  eprinttype    = {arXiv},
  eprint       = {2306.06766},
  timestamp    = {Fri, 16 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-06766.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-13273,
  author       = {Henger Li and
                  Tianyi Xu and
                  Tao Li and
                  Yunian Pan and
                  Quanyan Zhu and
                  Zizhan Zheng},
  title        = {A First Order Meta Stackelberg Method for Robust Federated Learning
                  (Technical Report)},
  journal      = {CoRR},
  volume       = {abs/2306.13273},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.13273},
  doi          = {10.48550/ARXIV.2306.13273},
  eprinttype    = {arXiv},
  eprint       = {2306.13273},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-13273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-13800,
  author       = {Yunian Pan and
                  Tao Li and
                  Henger Li and
                  Tianyi Xu and
                  Zizhan Zheng and
                  Quanyan Zhu},
  title        = {A First Order Meta Stackelberg Method for Robust Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2306.13800},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.13800},
  doi          = {10.48550/ARXIV.2306.13800},
  eprinttype    = {arXiv},
  eprint       = {2306.13800},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-13800.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-01281,
  author       = {Mustafa Abdallah and
                  Saurabh Bagchi and
                  Shaunak D. Bopardikar and
                  Kevin Chan and
                  Xing Gao and
                  Murat Kantarcioglu and
                  Congmiao Li and
                  Peng Liu and
                  Quanyan Zhu},
  title        = {Game Theory in Distributed Systems Security: Foundations, Challenges,
                  and Future Directions},
  journal      = {CoRR},
  volume       = {abs/2309.01281},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.01281},
  doi          = {10.48550/ARXIV.2309.01281},
  eprinttype    = {arXiv},
  eprint       = {2309.01281},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-01281.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-02328,
  author       = {Haozhe Lei and
                  Quanyan Zhu},
  title        = {Neurosymbolic Meta-Reinforcement Lookahead Learning Achieves Safe
                  Self-Driving in Non-Stationary Environments},
  journal      = {CoRR},
  volume       = {abs/2309.02328},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.02328},
  doi          = {10.48550/ARXIV.2309.02328},
  eprinttype    = {arXiv},
  eprint       = {2309.02328},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-02328.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-13403,
  author       = {Yinan Hu and
                  Quanyan Zhu},
  title        = {Game of Travesty: Decoy-based Psychological Cyber Deception for Proactive
                  Human Agents},
  journal      = {CoRR},
  volume       = {abs/2309.13403},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.13403},
  doi          = {10.48550/ARXIV.2309.13403},
  eprinttype    = {arXiv},
  eprint       = {2309.13403},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-13403.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-16098,
  author       = {Yuhan Zhao and
                  Quanyan Zhu},
  title        = {Stackelberg Game-Theoretic Trajectory Guidance for Multi-Robot Systems
                  with Koopman Operator},
  journal      = {CoRR},
  volume       = {abs/2309.16098},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.16098},
  doi          = {10.48550/ARXIV.2309.16098},
  eprinttype    = {arXiv},
  eprint       = {2309.16098},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-16098.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-01646,
  author       = {Ya{-}Ting Yang and
                  Haozhe Lei and
                  Quanyan Zhu},
  title        = {Strategic Information Attacks on Incentive-Compatible Navigational
                  Recommendations in Intelligent Transportation Systems},
  journal      = {CoRR},
  volume       = {abs/2310.01646},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.01646},
  doi          = {10.48550/ARXIV.2310.01646},
  eprinttype    = {arXiv},
  eprint       = {2310.01646},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-01646.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-01675,
  author       = {Tao Li and
                  Yunian Pan and
                  Quanyan Zhu},
  title        = {Decision-Dominant Strategic Defense Against Lateral Movement for 5G
                  Zero-Trust Multi-Domain Networks},
  journal      = {CoRR},
  volume       = {abs/2310.01675},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.01675},
  doi          = {10.48550/ARXIV.2310.01675},
  eprinttype    = {arXiv},
  eprint       = {2310.01675},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-01675.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-04579,
  author       = {Tao Li and
                  Juan Guevara and
                  Xinghong Xie and
                  Quanyan Zhu},
  title        = {Self-Confirming Transformer for Locally Consistent Online Adaptation
                  in Multi-Agent Reinforcement Learning},
  journal      = {CoRR},
  volume       = {abs/2310.04579},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.04579},
  doi          = {10.48550/ARXIV.2310.04579},
  eprinttype    = {arXiv},
  eprint       = {2310.04579},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-04579.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-02882,
  author       = {Yunfei Ge and
                  Quanyan Zhu},
  title        = {Zero Trust for Cyber Resilience},
  journal      = {CoRR},
  volume       = {abs/2312.02882},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.02882},
  doi          = {10.48550/ARXIV.2312.02882},
  eprinttype    = {arXiv},
  eprint       = {2312.02882},
  timestamp    = {Thu, 28 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-02882.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-02921,
  author       = {Shutian Liu and
                  Quanyan Zhu},
  title        = {Cyber Insurance for Cyber Resilience},
  journal      = {CoRR},
  volume       = {abs/2312.02921},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.02921},
  doi          = {10.48550/ARXIV.2312.02921},
  eprinttype    = {arXiv},
  eprint       = {2312.02921},
  timestamp    = {Thu, 28 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-02921.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/SmidtsRZVZHDTP22,
  author       = {Carol S. Smidts and
                  Indrajit Ray and
                  Quanyan Zhu and
                  Pavan Kumar Vaddi and
                  Yunfei Zhao and
                  Linan Huang and
                  Xiaoxu Diao and
                  Rakibul Talukdar and
                  Michael C. Pietrykowski},
  title        = {Cyber-Security Threats and Response Models in Nuclear Power Plants},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-12711-3},
  doi          = {10.1007/978-3-031-12711-3},
  isbn         = {978-3-031-12710-6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/SmidtsRZVZHDTP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/KierasFZ22,
  author       = {Timothy Kieras and
                  Junaid Farooq and
                  Quanyan Zhu},
  title        = {IoT Supply Chain Security Risk Analysis and Mitigation - Modeling,
                  Computations, and Software Tools},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-08480-5},
  doi          = {10.1007/978-3-031-08480-5},
  isbn         = {978-3-031-08479-9},
  timestamp    = {Sat, 17 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/KierasFZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/arc/ZhuI22,
  author       = {Quanyan Zhu and
                  Hideaki Ishii},
  title        = {Introduction to the special section on learning and security for multi-agent
                  systems},
  journal      = {Annu. Rev. Control.},
  volume       = {53},
  pages        = {249--251},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.arcontrol.2022.03.002},
  doi          = {10.1016/J.ARCONTROL.2022.03.002},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/arc/ZhuI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/arc/HuangHZ22,
  author       = {Yunhan Huang and
                  Linan Huang and
                  Quanyan Zhu},
  title        = {Reinforcement Learning for feedback-enabled cyber resilience},
  journal      = {Annu. Rev. Control.},
  volume       = {53},
  pages        = {273--295},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.arcontrol.2022.01.001},
  doi          = {10.1016/J.ARCONTROL.2022.01.001},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/arc/HuangHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/arc/LiZZ22,
  author       = {Tao Li and
                  Yuhan Zhao and
                  Quanyan Zhu},
  title        = {The role of information structures in game-theoretic multi-agent learning},
  journal      = {Annu. Rev. Control.},
  volume       = {53},
  pages        = {296--314},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.arcontrol.2022.03.003},
  doi          = {10.1016/J.ARCONTROL.2022.03.003},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/arc/LiZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangZ22,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {{RADAMS:} Resilient and adaptive alert and attention management strategy
                  against Informational Denial-of-Service (IDoS) attacks},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102844},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102844},
  doi          = {10.1016/J.COSE.2022.102844},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csysl/Barreiro-GomezZ22,
  author       = {Julian Barreiro{-}Gomez and
                  Quanyan Zhu},
  title        = {Coalitional Stochastic Differential Games for Networks},
  journal      = {{IEEE} Control. Syst. Lett.},
  volume       = {6},
  pages        = {2707--2712},
  year         = {2022},
  url          = {https://doi.org/10.1109/LCSYS.2022.3175333},
  doi          = {10.1109/LCSYS.2022.3175333},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csysl/Barreiro-GomezZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dga/ZhuGA22,
  author       = {Quanyan Zhu and
                  Elena A. Gubar and
                  Eitan Altman},
  title        = {Preface to Special Issue on Dynamic Games for Modeling and Control
                  of Epidemics},
  journal      = {Dyn. Games Appl.},
  volume       = {12},
  number       = {1},
  pages        = {1--6},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13235-022-00432-4},
  doi          = {10.1007/S13235-022-00432-4},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dga/ZhuGA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dga/HuangZ22,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  title        = {Game-Theoretic Frameworks for Epidemic Spreading and Human Decision-Making:
                  {A} Review},
  journal      = {Dyn. Games Appl.},
  volume       = {12},
  number       = {1},
  pages        = {7--48},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13235-022-00428-0},
  doi          = {10.1007/S13235-022-00428-0},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dga/HuangZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dga/LiuZZ22,
  author       = {Shutian Liu and
                  Yuhan Zhao and
                  Quanyan Zhu},
  title        = {Herd Behaviors in Epidemics: {A} Dynamics-Coupled Evolutionary Games
                  Approach},
  journal      = {Dyn. Games Appl.},
  volume       = {12},
  number       = {1},
  pages        = {183--213},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13235-022-00433-3},
  doi          = {10.1007/S13235-022-00433-3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dga/LiuZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dga/ZhangZ22,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {On Incentive Compatibility in Dynamic Mechanism Design With Exit Option
                  in a Markovian Environment},
  journal      = {Dyn. Games Appl.},
  volume       = {12},
  number       = {2},
  pages        = {701--745},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13235-021-00388-x},
  doi          = {10.1007/S13235-021-00388-X},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dga/ZhangZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejcon/NugrahaCHIZ22,
  author       = {Yurid Nugraha and
                  Ahmet Cetinkaya and
                  Tomohisa Hayakawa and
                  Hideaki Ishii and
                  Quanyan Zhu},
  title        = {Rolling horizon games of resilient networks with non-uniform horizons},
  journal      = {Eur. J. Control},
  volume       = {68},
  pages        = {100693},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ejcon.2022.100693},
  doi          = {10.1016/J.EJCON.2022.100693},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejcon/NugrahaCHIZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tase/HuangZ22,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {A Dynamic Game Framework for Rational and Persistent Robot Deception
                  With an Application to Deceptive Pursuit-Evasion},
  journal      = {{IEEE} Trans Autom. Sci. Eng.},
  volume       = {19},
  number       = {4},
  pages        = {2918--2932},
  year         = {2022},
  url          = {https://doi.org/10.1109/TASE.2021.3097286},
  doi          = {10.1109/TASE.2021.3097286},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tase/HuangZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/ZhangZ22,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {Optimal Cyber-Insurance Contract Design for Dynamic Risk Management
                  and Mitigation},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {9},
  number       = {4},
  pages        = {1087--1100},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSS.2021.3117905},
  doi          = {10.1109/TCSS.2021.3117905},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/ZhangZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangJBZ22,
  author       = {Linan Huang and
                  Shumeng Jia and
                  Emily Balcetis and
                  Quanyan Zhu},
  title        = {{ADVERT:} An Adaptive and Data-Driven Attention Enhancement Mechanism
                  for Phishing Prevention},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {2585--2597},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3189530},
  doi          = {10.1109/TIFS.2022.3189530},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangJBZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/HuangZZ22,
  author       = {Yunhan Huang and
                  Tao Zhang and
                  Quanyan Zhu},
  title        = {The Inverse Problem of Linear-Quadratic Differential Games: When is
                  a Control Strategies Profile Nash?},
  booktitle    = {58th Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2022, Monticello, IL, USA, September 27-30, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/Allerton49937.2022.9929408},
  doi          = {10.1109/ALLERTON49937.2022.9929408},
  timestamp    = {Fri, 11 Nov 2022 16:53:12 +0100},
  biburl       = {https://dblp.org/rec/conf/allerton/HuangZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/LiuZ22,
  author       = {Shutian Liu and
                  Quanyan Zhu},
  title        = {{EPROACH:} {A} Population Vaccination Game for Strategic Information
                  Design to Enable Responsible {COVID} Reopening},
  booktitle    = {American Control Conference, {ACC} 2022, Atlanta, GA, USA, June 8-10,
                  2022},
  pages        = {568--573},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/ACC53348.2022.9867229},
  doi          = {10.23919/ACC53348.2022.9867229},
  timestamp    = {Mon, 06 Nov 2023 12:57:51 +0100},
  biburl       = {https://dblp.org/rec/conf/amcc/LiuZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/LiuZZ22,
  author       = {Shutian Liu and
                  Yuhan Zhao and
                  Quanyan Zhu},
  title        = {Understanding the Interplay Between Herd Behaviors and Epidemic Spreading
                  Using Federated Evolutionary Games},
  booktitle    = {American Control Conference, {ACC} 2022, Atlanta, GA, USA, June 8-10,
                  2022},
  pages        = {593--598},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/ACC53348.2022.9867809},
  doi          = {10.23919/ACC53348.2022.9867809},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/LiuZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/ZhaoZ22,
  author       = {Yuhan Zhao and
                  Quanyan Zhu},
  title        = {Distributed and Resilient Planning-Control for Optimal {LEO} Satellite
                  Constellation Coverage},
  booktitle    = {American Control Conference, {ACC} 2022, Atlanta, GA, USA, June 8-10,
                  2022},
  pages        = {1841--1846},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/ACC53348.2022.9867536},
  doi          = {10.23919/ACC53348.2022.9867536},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/ZhaoZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/HuZ22,
  author       = {Yinan Hu and
                  Quanyan Zhu},
  title        = {Evasion-Aware Neyman-Pearson Detectors: {A} Game-Theoretic Approach},
  booktitle    = {61st {IEEE} Conference on Decision and Control, {CDC} 2022, Cancun,
                  Mexico, December 6-9, 2022},
  pages        = {6111--6117},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CDC51059.2022.9993423},
  doi          = {10.1109/CDC51059.2022.9993423},
  timestamp    = {Wed, 18 Jan 2023 15:37:37 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/HuZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/ChenHZ22,
  author       = {Juntao Chen and
                  Yunhan Huang and
                  Quanyan Zhu},
  title        = {Transactive Resilience in Renewable Microgrids: {A} Contract-Theoretic
                  Approach},
  booktitle    = {56th Annual Conference on Information Sciences and Systems, {CISS}
                  2022, Princeton, NJ, USA, March 9-11, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CISS53076.2022.9751195},
  doi          = {10.1109/CISS53076.2022.9751195},
  timestamp    = {Fri, 22 Apr 2022 19:18:39 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/ChenHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GeZ22,
  author       = {Yunfei Ge and
                  Quanyan Zhu},
  title        = {Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense
                  in Enterprise Networks},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {359--364},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947263},
  doi          = {10.1109/CNS56114.2022.9947263},
  timestamp    = {Fri, 25 Nov 2022 09:04:32 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GeZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuZ22,
  author       = {Shutian Liu and
                  Quanyan Zhu},
  title        = {On the Role of Risk Perceptions in Cyber Insurance Contracts},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {377--382},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947268},
  doi          = {10.1109/CNS56114.2022.9947268},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiuZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PanZ22,
  author       = {Yunian Pan and
                  Quanyan Zhu},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {On Poisoned Wardrop Equilibrium in Congestion Games},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {191--211},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_10},
  doi          = {10.1007/978-3-031-26369-9\_10},
  timestamp    = {Wed, 07 Feb 2024 17:23:12 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/PanZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icra/ZhaoHYZ22,
  author       = {Yuhan Zhao and
                  Baichuan Huang and
                  Jingjin Yu and
                  Quanyan Zhu},
  title        = {Stackelberg Strategic Guidance for Heterogeneous Robots Collaboration},
  booktitle    = {2022 International Conference on Robotics and Automation, {ICRA} 2022,
                  Philadelphia, PA, USA, May 23-27, 2022},
  pages        = {4922--4928},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICRA46639.2022.9811678},
  doi          = {10.1109/ICRA46639.2022.9811678},
  timestamp    = {Wed, 20 Jul 2022 18:22:23 +0200},
  biburl       = {https://dblp.org/rec/conf/icra/ZhaoHYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/GeZ22,
  author       = {Yunfei Ge and
                  Quanyan Zhu},
  title        = {{MUFAZA:} Multi-Source Fast and Autonomous Zero-Trust Authentication
                  for 5G Networks},
  booktitle    = {{IEEE} Military Communications Conference, {MILCOM} 2022, Rockville,
                  MD, USA, November 28 - December 2, 2022},
  pages        = {571--576},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/MILCOM55135.2022.10017839},
  doi          = {10.1109/MILCOM55135.2022.10017839},
  timestamp    = {Wed, 08 Feb 2023 17:46:14 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/GeZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-06081,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Bayesian Promised Persuasion: Dynamic Forward-Looking Multiagent Delegation
                  with Informational Burning},
  journal      = {CoRR},
  volume       = {abs/2201.06081},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.06081},
  eprinttype    = {arXiv},
  eprint       = {2201.06081},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-06081.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-11855,
  author       = {Yunfei Ge and
                  Quanyan Zhu},
  title        = {Accountability and Insurance in IoT Supply Chain},
  journal      = {CoRR},
  volume       = {abs/2201.11855},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.11855},
  eprinttype    = {arXiv},
  eprint       = {2201.11855},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-11855.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-01877,
  author       = {Yuhan Zhao and
                  Baichuan Huang and
                  Jingjin Yu and
                  Quanyan Zhu},
  title        = {Stackelberg Strategic Guidance for Heterogeneous Robots Collaboration},
  journal      = {CoRR},
  volume       = {abs/2202.01877},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.01877},
  eprinttype    = {arXiv},
  eprint       = {2202.01877},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-01877.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-02050,
  author       = {Yuhan Zhao and
                  Quanyan Zhu},
  title        = {Autonomous and Resilient Control for Optimal {LEO} Satellite Constellation
                  Coverage Against Space Threats},
  journal      = {CoRR},
  volume       = {abs/2203.02050},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.02050},
  doi          = {10.48550/ARXIV.2203.02050},
  eprinttype    = {arXiv},
  eprint       = {2203.02050},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-02050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-05774,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  title        = {Reinforcement Learning for Linear Quadratic Control is Vulnerable
                  Under Cost Manipulation},
  journal      = {CoRR},
  volume       = {abs/2203.05774},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.05774},
  doi          = {10.48550/ARXIV.2203.05774},
  eprinttype    = {arXiv},
  eprint       = {2203.05774},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-05774.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-09725,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Forward-Looking Dynamic Persuasion for Pipeline Stochastic Bayesian
                  Game: {A} Fixed-Point Alignment Principle},
  journal      = {CoRR},
  volume       = {abs/2203.09725},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.09725},
  doi          = {10.48550/ARXIV.2203.09725},
  eprinttype    = {arXiv},
  eprint       = {2203.09725},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-09725.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-12001,
  author       = {Shutian Liu and
                  Quanyan Zhu},
  title        = {Mitigating Moral Hazard in Cyber Insurance Using Risk Preference Design},
  journal      = {CoRR},
  volume       = {abs/2203.12001},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.12001},
  doi          = {10.48550/ARXIV.2203.12001},
  eprinttype    = {arXiv},
  eprint       = {2203.12001},
  timestamp    = {Tue, 29 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-12001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-02294,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {{ZETAR:} Modeling and Computational Design of Strategic and Adaptive
                  Compliance Policies},
  journal      = {CoRR},
  volume       = {abs/2204.02294},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.02294},
  doi          = {10.48550/ARXIV.2204.02294},
  eprinttype    = {arXiv},
  eprint       = {2204.02294},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-02294.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-05276,
  author       = {Yinan Hu and
                  Quanyan Zhu},
  title        = {Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion},
  journal      = {CoRR},
  volume       = {abs/2206.05276},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.05276},
  doi          = {10.48550/ARXIV.2206.05276},
  eprinttype    = {arXiv},
  eprint       = {2206.05276},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-05276.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-12938,
  author       = {Shutian Liu and
                  Quanyan Zhu},
  title        = {Stackelberg Risk Preference Design},
  journal      = {CoRR},
  volume       = {abs/2206.12938},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.12938},
  doi          = {10.48550/ARXIV.2206.12938},
  eprinttype    = {arXiv},
  eprint       = {2206.12938},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-12938.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-05303,
  author       = {Yunhan Huang and
                  Tao Zhang and
                  Quanyan Zhu},
  title        = {The Inverse Problem of Linear-Quadratic Differential Games: When is
                  a Control Strategies Profile Nash?},
  journal      = {CoRR},
  volume       = {abs/2207.05303},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.05303},
  doi          = {10.48550/ARXIV.2207.05303},
  eprinttype    = {arXiv},
  eprint       = {2207.05303},
  timestamp    = {Tue, 19 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-05303.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-00081,
  author       = {Tao Li and
                  Haozhe Lei and
                  Quanyan Zhu},
  title        = {Sampling Attacks on Meta Reinforcement Learning: {A} Minimax Formulation
                  and Complexity Analysis},
  journal      = {CoRR},
  volume       = {abs/2208.00081},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.00081},
  doi          = {10.48550/ARXIV.2208.00081},
  eprinttype    = {arXiv},
  eprint       = {2208.00081},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-00081.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-05060,
  author       = {Yuhan Zhao and
                  Craig Rieger and
                  Quanyan Zhu},
  title        = {Multi-Agent Learning for Resilient Distributed Control Systems},
  journal      = {CoRR},
  volume       = {abs/2208.05060},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.05060},
  doi          = {10.48550/ARXIV.2208.05060},
  eprinttype    = {arXiv},
  eprint       = {2208.05060},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-05060.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-00094,
  author       = {Yunian Pan and
                  Quanyan Zhu},
  title        = {On Poisoned Wardrop Equilibrium in Congestion Games},
  journal      = {CoRR},
  volume       = {abs/2209.00094},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.00094},
  doi          = {10.48550/ARXIV.2209.00094},
  eprinttype    = {arXiv},
  eprint       = {2209.00094},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-00094.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-03209,
  author       = {Tao Li and
                  Haozhe Lei and
                  Quanyan Zhu},
  title        = {Self-Adaptive Driving in Nonstationary Environments through Conjectural
                  Online Lookahead Adaptation},
  journal      = {CoRR},
  volume       = {abs/2210.03209},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.03209},
  doi          = {10.48550/ARXIV.2210.03209},
  eprinttype    = {arXiv},
  eprint       = {2210.03209},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-03209.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-03214,
  author       = {Yunian Pan and
                  Tao Li and
                  Quanyan Zhu},
  title        = {On the Resilience of Traffic Networks under Non-Equilibrium Learning},
  journal      = {CoRR},
  volume       = {abs/2210.03214},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.03214},
  doi          = {10.48550/ARXIV.2210.03214},
  eprinttype    = {arXiv},
  eprint       = {2210.03214},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-03214.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-15010,
  author       = {Shutian Liu and
                  Quanyan Zhu},
  title        = {On the Role of Risk Perceptions in Cyber Insurance Contracts},
  journal      = {CoRR},
  volume       = {abs/2210.15010},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.15010},
  doi          = {10.48550/ARXIV.2210.15010},
  eprinttype    = {arXiv},
  eprint       = {2210.15010},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-15010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-06512,
  author       = {Yuhan Zhao and
                  Quanyan Zhu},
  title        = {Stackelberg Meta-Learning Based Control for Guided Cooperative {LQG}
                  Systems},
  journal      = {CoRR},
  volume       = {abs/2211.06512},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.06512},
  doi          = {10.48550/ARXIV.2211.06512},
  eprinttype    = {arXiv},
  eprint       = {2211.06512},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-06512.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-13336,
  author       = {Yuhan Zhao and
                  Quanyan Zhu},
  title        = {Stackelberg Meta-Learning for Strategic Guidance in Multi-Robot Trajectory
                  Planning},
  journal      = {CoRR},
  volume       = {abs/2211.13336},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.13336},
  doi          = {10.48550/ARXIV.2211.13336},
  eprinttype    = {arXiv},
  eprint       = {2211.13336},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-13336.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-01570,
  author       = {Yurid Nugraha and
                  Tomohisa Hayakawa and
                  Hideaki Ishii and
                  Ahmet Cetinkaya and
                  Quanyan Zhu},
  title        = {Two-Player Incomplete Games of Resilient Multiagent Systems},
  journal      = {CoRR},
  volume       = {abs/2212.01570},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.01570},
  doi          = {10.48550/ARXIV.2212.01570},
  eprinttype    = {arXiv},
  eprint       = {2212.01570},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-01570.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-08800,
  author       = {Haozhe Lei and
                  Quanyan Zhu},
  title        = {Level-k Meta-Learning for Pedestrian-Aware Self-Driving},
  journal      = {CoRR},
  volume       = {abs/2212.08800},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.08800},
  doi          = {10.48550/ARXIV.2212.08800},
  eprinttype    = {arXiv},
  eprint       = {2212.08800},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-08800.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-11446,
  author       = {Tao Li and
                  Quanyan Zhu},
  title        = {Commitment with Signaling under Double-sided Information Asymmetry},
  journal      = {CoRR},
  volume       = {abs/2212.11446},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.11446},
  doi          = {10.48550/ARXIV.2212.11446},
  eprinttype    = {arXiv},
  eprint       = {2212.11446},
  timestamp    = {Wed, 04 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-11446.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KierasFZ21,
  author       = {Timothy Kieras and
                  Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {{I-SCRAM:} {A} Framework for IoT Supply Chain Risk Analysis and Mitigation
                  Decisions},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {29827--29840},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3058338},
  doi          = {10.1109/ACCESS.2021.3058338},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KierasFZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csysl/PengCZ21,
  author       = {Guanze Peng and
                  Juntao Chen and
                  Quanyan Zhu},
  title        = {Distributed Stabilization of Two Interdependent Markov Jump Linear
                  Systems With Partial Information},
  journal      = {{IEEE} Control. Syst. Lett.},
  volume       = {5},
  number       = {2},
  pages        = {713--718},
  year         = {2021},
  url          = {https://doi.org/10.1109/LCSYS.2020.3004649},
  doi          = {10.1109/LCSYS.2020.3004649},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csysl/PengCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csysl/LiuZ21,
  author       = {Shutian Liu and
                  Quanyan Zhu},
  title        = {Robust and Stochastic Optimization With a Hybrid Coherent Risk Measure
                  With an Application to Supervised Learning},
  journal      = {{IEEE} Control. Syst. Lett.},
  volume       = {5},
  number       = {3},
  pages        = {965--970},
  year         = {2021},
  url          = {https://doi.org/10.1109/LCSYS.2020.3007645},
  doi          = {10.1109/LCSYS.2020.3007645},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csysl/LiuZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csysl/KapsikarSAKZ21,
  author       = {Suyog Kapsikar and
                  Indrajit Saha and
                  Khushboo Agarwal and
                  Veeraruna Kavitha and
                  Quanyan Zhu},
  title        = {Controlling Fake News by Collective Tagging: {A} Branching Process
                  Analysis},
  journal      = {{IEEE} Control. Syst. Lett.},
  volume       = {5},
  number       = {6},
  pages        = {2108--2113},
  year         = {2021},
  url          = {https://doi.org/10.1109/LCSYS.2020.3045299},
  doi          = {10.1109/LCSYS.2020.3045299},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csysl/KapsikarSAKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dga/ChenZB21,
  author       = {Juntao Chen and
                  Quanyan Zhu and
                  Tamer Basar},
  title        = {Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent
                  Enterprise Networks},
  journal      = {Dyn. Games Appl.},
  volume       = {11},
  number       = {2},
  pages        = {294--325},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13235-020-00363-y},
  doi          = {10.1007/S13235-020-00363-Y},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dga/ChenZB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftrob/ZhuRDV21,
  author       = {Quanyan Zhu and
                  Stefan Rass and
                  Bernhard Dieber and
                  V{\'{\i}}ctor Mayoral Vilches},
  title        = {Cybersecurity in Robotics: Challenges, Quantitative Modeling, and
                  Practice},
  journal      = {Found. Trends Robotics},
  volume       = {9},
  number       = {1},
  pages        = {1--129},
  year         = {2021},
  url          = {https://doi.org/10.1561/2300000061},
  doi          = {10.1561/2300000061},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftrob/ZhuRDV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/NugrahaCHIZ21,
  author       = {Yurid Nugraha and
                  Ahmet Cetinkaya and
                  Tomohisa Hayakawa and
                  Hideaki Ishii and
                  Quanyan Zhu},
  title        = {Dynamic Resilient Network Games With Applications to Multiagent Consensus},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {8},
  number       = {1},
  pages        = {246--259},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCNS.2020.3016839},
  doi          = {10.1109/TCNS.2020.3016839},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcns/NugrahaCHIZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangZ21,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {Duplicity Games for Deception Design With an Application to Insider
                  Threat Mitigation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4843--4856},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3118886},
  doi          = {10.1109/TIFS.2021.3118886},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/FarooqZ21,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {QoE Based Revenue Maximizing Dynamic Resource Allocation and Pricing
                  for Fog-Enabled Mission-Critical IoT Applications},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {20},
  number       = {12},
  pages        = {3395--3408},
  year         = {2021},
  url          = {https://doi.org/10.1109/TMC.2020.2999895},
  doi          = {10.1109/TMC.2020.2999895},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/FarooqZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/ChenTZ21,
  author       = {Juntao Chen and
                  Corinne Touati and
                  Quanyan Zhu},
  title        = {A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled
                  Infrastructure Network},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {8},
  number       = {3},
  pages        = {2601--2612},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSE.2021.3100801},
  doi          = {10.1109/TNSE.2021.3100801},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/ChenTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsipn/ChenHZZ21,
  author       = {Juntao Chen and
                  Yunhan Huang and
                  Rui Zhang and
                  Quanyan Zhu},
  title        = {Optimal Curing Strategy for Competing Epidemics Spreading Over Complex
                  Networks},
  journal      = {{IEEE} Trans. Signal Inf. Process. over Networks},
  volume       = {7},
  pages        = {294--308},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSIPN.2021.3075338},
  doi          = {10.1109/TSIPN.2021.3075338},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsipn/ChenHZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/FangZ21,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Information-Theoretic Performance Limitations of Feedback Control:
                  Underlying Entropic Laws and Generic {\textdollar}{\textbackslash}mathcal\{L\}{\_}\{p\}{\textdollar}
                  Bounds},
  booktitle    = {2021 American Control Conference, {ACC} 2021, New Orleans, LA, USA,
                  May 25-28, 2021},
  pages        = {1281--1286},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/ACC50511.2021.9483083},
  doi          = {10.23919/ACC50511.2021.9483083},
  timestamp    = {Fri, 30 Jul 2021 11:11:12 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/FangZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/KapsikarSAKZ21,
  author       = {Suyog Kapsikar and
                  Indrajit Saha and
                  Khushboo Agarwal and
                  Veeraruna Kavitha and
                  Quanyan Zhu},
  title        = {Controlling Fake News by Collective Tagging: {A} Branching Process
                  Analysis},
  booktitle    = {2021 American Control Conference, {ACC} 2021, New Orleans, LA, USA,
                  May 25-28, 2021},
  pages        = {1332--1337},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/ACC50511.2021.9483257},
  doi          = {10.23919/ACC50511.2021.9483257},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/KapsikarSAKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/FangZ21a,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Fundamental Limits of Obfuscation for Linear Gaussian Dynamical Systems:
                  An Information-Theoretic Approach},
  booktitle    = {2021 American Control Conference, {ACC} 2021, New Orleans, LA, USA,
                  May 25-28, 2021},
  pages        = {4574--4579},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/ACC50511.2021.9483148},
  doi          = {10.23919/ACC50511.2021.9483148},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/FangZ21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/PengLLCZ21,
  author       = {Guanze Peng and
                  Tao Li and
                  Shutian Liu and
                  Juntao Chen and
                  Quanyan Zhu},
  title        = {Locally-Aware Constrained Games on Networks},
  booktitle    = {2021 American Control Conference, {ACC} 2021, New Orleans, LA, USA,
                  May 25-28, 2021},
  pages        = {4606--4611},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/ACC50511.2021.9482895},
  doi          = {10.23919/ACC50511.2021.9482895},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/PengLLCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccta/NugrahaCHIZ21,
  author       = {Yurid Nugraha and
                  Ahmet Cetinkaya and
                  Tomohisa Hayakawa and
                  Hideaki Ishii and
                  Quanyan Zhu},
  title        = {Cluster Formation in Multiagent Consensus via Dynamic Resilient Graph
                  Games},
  booktitle    = {{IEEE} Conference on Control Technology and Applications, {CCTA} 2021,
                  San Diego, CA, USA, August 9-11, 2021},
  pages        = {735--740},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CCTA48906.2021.9659182},
  doi          = {10.1109/CCTA48906.2021.9659182},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccta/NugrahaCHIZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/PanZ21,
  author       = {Yunian Pan and
                  Quanyan Zhu},
  title        = {Efficient Episodic Learning of Nonstationary and Unknown Zero-Sum
                  Games Using Expert Game Ensembles},
  booktitle    = {2021 60th {IEEE} Conference on Decision and Control (CDC), Austin,
                  TX, USA, December 14-17, 2021},
  pages        = {1669--1676},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CDC45484.2021.9682998},
  doi          = {10.1109/CDC45484.2021.9682998},
  timestamp    = {Tue, 17 May 2022 15:53:17 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/PanZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/HuangCZ21,
  author       = {Yunhan Huang and
                  Juntao Chen and
                  Quanyan Zhu},
  title        = {Defending an Asset with Partial Information and Selected Observations:
                  {A} Differential Game Framework},
  booktitle    = {2021 60th {IEEE} Conference on Decision and Control (CDC), Austin,
                  TX, USA, December 14-17, 2021},
  pages        = {2366--2373},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CDC45484.2021.9683431},
  doi          = {10.1109/CDC45484.2021.9683431},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/HuangCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/HuangZ21,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  title        = {Self-Triggered Markov Decision Processes},
  booktitle    = {2021 60th {IEEE} Conference on Decision and Control (CDC), Austin,
                  TX, USA, December 14-17, 2021},
  pages        = {4507--4514},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CDC45484.2021.9682918},
  doi          = {10.1109/CDC45484.2021.9682918},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/HuangZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/NugrahaCHIZ21,
  author       = {Yurid Nugraha and
                  Ahmet Cetinkaya and
                  Tomohisa Hayakawa and
                  Hideaki Ishii and
                  Quanyan Zhu},
  title        = {Rolling Horizon Games for Cluster Formation of Resilient Multiagent
                  Systems},
  booktitle    = {2021 60th {IEEE} Conference on Decision and Control (CDC), Austin,
                  TX, USA, December 14-17, 2021},
  pages        = {4829--4934},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CDC45484.2021.9683409},
  doi          = {10.1109/CDC45484.2021.9683409},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/NugrahaCHIZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/LiPZ21,
  author       = {Tao Li and
                  Guanze Peng and
                  Quanyan Zhu},
  title        = {Blackwell Online Learning for Markov Decision Processes},
  booktitle    = {55th Annual Conference on Information Sciences and Systems, {CISS}
                  2021, Baltimore, MD, USA, March 24-26, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CISS50987.2021.9400319},
  doi          = {10.1109/CISS50987.2021.9400319},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/LiPZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucc/HuangXZ21,
  author       = {Yunhan Huang and
                  Zehui Xiong and
                  Quanyan Zhu},
  title        = {Cross-Layer Coordinated Attacks on Cyber-Physical Systems: {A} {LQG}
                  Game Framework with Controlled Observations},
  booktitle    = {2021 European Control Conference, {ECC} 2021, Virtual Event / Delft,
                  The Netherlands, June 29 - July 2, 2021},
  pages        = {521--528},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/ECC54610.2021.9654874},
  doi          = {10.23919/ECC54610.2021.9654874},
  timestamp    = {Thu, 31 Mar 2022 11:10:43 +0200},
  biburl       = {https://dblp.org/rec/conf/eucc/HuangXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucc/FangZ21,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Fundamental Stealthiness-Distortion Tradeoffs in Dynamical Systems
                  under Injection Attacks: {A} Power Spectral Analysis},
  booktitle    = {2021 European Control Conference, {ECC} 2021, Virtual Event / Delft,
                  The Netherlands, June 29 - July 2, 2021},
  pages        = {964--969},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/ECC54610.2021.9654871},
  doi          = {10.23919/ECC54610.2021.9654871},
  timestamp    = {Fri, 07 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eucc/FangZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhaoGZ21,
  author       = {Yuhan Zhao and
                  Yunfei Ge and
                  Quanyan Zhu},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Combating Ransomware in Internet of Things: {A} Games-in-Games Approach
                  for Cross-Layer Cyber Defense and Security Investment},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {208--228},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_12},
  doi          = {10.1007/978-3-030-90370-1\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhaoGZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangZ21,
  author       = {Linan Huang and
                  Quanyan Zhu},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Combating Informational Denial-of-Service (IDoS) Attacks: Modeling
                  and Mitigation of Attentional Human Vulnerability},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {314--333},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_17},
  doi          = {10.1007/978-3-030-90370-1\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-00957,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Relativistic Rocket Control (Relativistic Space-Travel Flight Control):
                  Feedback Control of Relativistic Dynamics Propelled by Ejecting Mass},
  journal      = {CoRR},
  volume       = {abs/2101.00957},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.00957},
  eprinttype    = {arXiv},
  eprint       = {2101.00957},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-00957.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-04357,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {On the Differential Private Data Market: Endogenous Evolution, Dynamic
                  Pricing, and Incentive Compatibility},
  journal      = {CoRR},
  volume       = {abs/2101.04357},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.04357},
  eprinttype    = {arXiv},
  eprint       = {2101.04357},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-04357.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-02730,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Feedback Capacity of Parallel {ACGN} Channels and Kalman Filter: Power
                  Allocation with Feedback},
  journal      = {CoRR},
  volume       = {abs/2102.02730},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.02730},
  eprinttype    = {arXiv},
  eprint       = {2102.02730},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-02730.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-05469,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  title        = {A Pursuit-Evasion Differential Game with Strategic Information Acquisition},
  journal      = {CoRR},
  volume       = {abs/2102.05469},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.05469},
  eprinttype    = {arXiv},
  eprint       = {2102.05469},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-05469.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-07152,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {On the Equilibrium Elicitation of Markov Games Through Information
                  Design},
  journal      = {CoRR},
  volume       = {abs/2102.07152},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.07152},
  eprinttype    = {arXiv},
  eprint       = {2102.07152},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-07152.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-08571,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  title        = {Self-Triggered Markov Decision Processes},
  journal      = {CoRR},
  volume       = {abs/2102.08571},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.08571},
  eprinttype    = {arXiv},
  eprint       = {2102.08571},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-08571.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-12059,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {Convergence of Bayesian Nash Equilibrium in Infinite Bayesian Games
                  under Discretization},
  journal      = {CoRR},
  volume       = {abs/2102.12059},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.12059},
  eprinttype    = {arXiv},
  eprint       = {2102.12059},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-12059.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-05789,
  author       = {Quanyan Zhu and
                  Stefan Rass and
                  Bernhard Dieber and
                  Victor Mayoral Vilches},
  title        = {Cybersecurity in Robotics: Challenges, Quantitative Modeling, and
                  Practice},
  journal      = {CoRR},
  volume       = {abs/2103.05789},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.05789},
  eprinttype    = {arXiv},
  eprint       = {2103.05789},
  timestamp    = {Tue, 16 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-05789.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-13230,
  author       = {Yunhan Huang and
                  Juntao Chen and
                  Quanyan Zhu},
  title        = {Assets Defending Differential Games with Partial Information and Selected
                  Observations},
  journal      = {CoRR},
  volume       = {abs/2103.13230},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.13230},
  eprinttype    = {arXiv},
  eprint       = {2103.13230},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-13230.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-17089,
  author       = {Juntao Chen and
                  Yunhan Huang and
                  Quanyan Zhu},
  title        = {Transactive Resilience in Renewable Microgrids: {A} Contract-Theoretic
                  Approach},
  journal      = {CoRR},
  volume       = {abs/2103.17089},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.17089},
  eprinttype    = {arXiv},
  eprint       = {2103.17089},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-17089.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-03052,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Informational Design of Dynamic Multi-Agent System},
  journal      = {CoRR},
  volume       = {abs/2105.03052},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.03052},
  eprinttype    = {arXiv},
  eprint       = {2105.03052},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-03052.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-08158,
  author       = {Tao Li and
                  Guanze Peng and
                  Quanyan Zhu and
                  Tamer Basar},
  title        = {The Confluence of Networks, Games and Learning},
  journal      = {CoRR},
  volume       = {abs/2105.08158},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.08158},
  eprinttype    = {arXiv},
  eprint       = {2105.08158},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-08158.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-00214,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  title        = {Game-Theoretic Frameworks for Epidemic Spreading and Human Decision
                  Making: {A} Review},
  journal      = {CoRR},
  volume       = {abs/2106.00214},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.00214},
  eprinttype    = {arXiv},
  eprint       = {2106.00214},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-00214.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-06907,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {{INADVERT:} An Interactive and Adaptive Counterdeception Platform
                  for Attention Enhancement and Phishing Prevention},
  journal      = {CoRR},
  volume       = {abs/2106.06907},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.06907},
  eprinttype    = {arXiv},
  eprint       = {2106.06907},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-06907.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-08998,
  author       = {Shutian Liu and
                  Yuhan Zhao and
                  Quanyan Zhu},
  title        = {Herd Behaviors in Epidemics: {A} Dynamics-Coupled Evolutionary Games
                  Approach},
  journal      = {CoRR},
  volume       = {abs/2106.08998},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.08998},
  eprinttype    = {arXiv},
  eprint       = {2106.08998},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-08998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-00783,
  author       = {Yunhan Huang and
                  Linan Huang and
                  Quanyan Zhu},
  title        = {Reinforcement Learning for Feedback-Enabled Cyber Resilience},
  journal      = {CoRR},
  volume       = {abs/2107.00783},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.00783},
  eprinttype    = {arXiv},
  eprint       = {2107.00783},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-00783.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-13632,
  author       = {Yunian Pan and
                  Quanyan Zhu},
  title        = {Efficient Episodic Learning of Nonstationary and Unknown Zero-Sum
                  Games Using Expert Game Ensembles},
  journal      = {CoRR},
  volume       = {abs/2107.13632},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.13632},
  eprinttype    = {arXiv},
  eprint       = {2107.13632},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-13632.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-08255,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {Combating Informational Denial-of-Service (IDoS) Attacks: Modeling
                  and Mitigation of Attentional Human Vulnerability},
  journal      = {CoRR},
  volume       = {abs/2108.08255},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.08255},
  eprinttype    = {arXiv},
  eprint       = {2108.08255},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-08255.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-13159,
  author       = {Juntao Chen and
                  Corinne Touati and
                  Quanyan Zhu},
  title        = {A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled
                  Infrastructure Network},
  journal      = {CoRR},
  volume       = {abs/2108.13159},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.13159},
  eprinttype    = {arXiv},
  eprint       = {2108.13159},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-13159.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-06881,
  author       = {Shutian Liu and
                  Quanyan Zhu},
  title        = {{EPROACH:} {A} Population Vaccination Game for Strategic Information
                  Design to Enable Responsible {COVID} Reopening},
  journal      = {CoRR},
  volume       = {abs/2110.06881},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.06881},
  eprinttype    = {arXiv},
  eprint       = {2110.06881},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-06881.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-03463,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {{RADAMS:} Resilient and Adaptive Alert and Attention Management Strategy
                  against Informational Denial-of-Service (IDoS) Attacks},
  journal      = {CoRR},
  volume       = {abs/2111.03463},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.03463},
  eprinttype    = {arXiv},
  eprint       = {2111.03463},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-03463.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/RassSKZ20,
  author       = {Stefan Rass and
                  Stefan Schauer and
                  Sandra K{\"{o}}nig and
                  Quanyan Zhu},
  title        = {Cyber-Security in Critical Infrastructures - {A} Game-Theoretic Approach},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-46908-5},
  doi          = {10.1007/978-3-030-46908-5},
  isbn         = {978-3-030-46907-8},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/RassSKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/ZhuX20,
  author       = {Quanyan Zhu and
                  Zhiheng Xu},
  title        = {Cross-Layer Design for Secure and Resilient Cyber-Physical Systems
                  - {A} Decision and Game Theoretic Approach, 3},
  series       = {Advances in Information Security},
  volume       = {81},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60251-2},
  doi          = {10.1007/978-3-030-60251-2},
  isbn         = {978-3-030-60250-5},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/ZhuX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangZ20,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {A dynamic games approach to proactive defense strategies against Advanced
                  Persistent Threats in cyber-physical systems},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101660},
  doi          = {10.1016/J.COSE.2019.101660},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RassZ20,
  author       = {Stefan Rass and
                  Quanyan Zhu},
  title        = {Computer {\&} security special issue editorial},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101678},
  doi          = {10.1016/J.COSE.2019.101678},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RassZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/ZhaoHSZ20,
  author       = {Yunfei Zhao and
                  Linan Huang and
                  Carol S. Smidts and
                  Quanyan Zhu},
  title        = {Finite-horizon semi-Markov game for time-sensitive attack response
                  and probabilistic risk assessment in nuclear power plants},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {201},
  pages        = {106878},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ress.2020.106878},
  doi          = {10.1016/J.RESS.2020.106878},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ress/ZhaoHSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/TanwaniZ20,
  author       = {Aneel Tanwani and
                  Quanyan Zhu},
  title        = {Feedback Nash Equilibrium for Randomly Switching Differential-Algebraic
                  Games},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {65},
  number       = {8},
  pages        = {3286--3301},
  year         = {2020},
  url          = {https://doi.org/10.1109/TAC.2019.2943577},
  doi          = {10.1109/TAC.2019.2943577},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/TanwaniZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tccn/HanawalHZ20,
  author       = {Manjesh Kumar Hanawal and
                  Yezekael Hayel and
                  Quanyan Zhu},
  title        = {Effective Utilization of Licensed and Unlicensed Spectrum in Large
                  Scale Ad Hoc Networks},
  journal      = {{IEEE} Trans. Cogn. Commun. Netw.},
  volume       = {6},
  number       = {2},
  pages        = {618--630},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCCN.2019.2950249},
  doi          = {10.1109/TCCN.2019.2950249},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tccn/HanawalHZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/ChenTZ20,
  author       = {Juntao Chen and
                  Corinne Touati and
                  Quanyan Zhu},
  title        = {Optimal Secure Two-Layer IoT Network Design},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {398--409},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCNS.2019.2906893},
  doi          = {10.1109/TCNS.2019.2906893},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcns/ChenTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/HuangZ20,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  title        = {A Differential Game Approach to Decentralized Virus-Resistant Weight
                  Adaptation Policy Over Complex Networks},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {944--955},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCNS.2019.2931862},
  doi          = {10.1109/TCNS.2019.2931862},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcns/HuangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/ChenZ20,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {Control of Multilayer Mobile Autonomous Systems in Adversarial Environments:
                  {A} Games-in-Games Approach},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {7},
  number       = {3},
  pages        = {1056--1068},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCNS.2019.2962316},
  doi          = {10.1109/TCNS.2019.2962316},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcns/ChenZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenTZ20,
  author       = {Juntao Chen and
                  Corinne Touati and
                  Quanyan Zhu},
  title        = {A Dynamic Game Approach to Strategic Design of Secure and Resilient
                  Infrastructure Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {462--474},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2924130},
  doi          = {10.1109/TIFS.2019.2924130},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZ20,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {\texttt{FlipIn}: {A} Game-Theoretic Cyber Insurance Framework for
                  Incentive-Compatible Cyber Risk Management of Internet of Things},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2026--2041},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2955891},
  doi          = {10.1109/TIFS.2019.2955891},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/LiZZ20,
  author       = {Yun Li and
                  Tao Zhang and
                  Quanyan Zhu},
  title        = {Distributed Multi-Battery Coordination for Cooperative Energy Management
                  via ADMM-based Iterative Learning},
  booktitle    = {2020 American Control Conference, {ACC} 2020, Denver, CO, USA, July
                  1-3, 2020},
  pages        = {2232--2237},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ACC45564.2020.9147988},
  doi          = {10.23919/ACC45564.2020.9147988},
  timestamp    = {Sun, 08 Aug 2021 01:40:57 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/LiZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccta/QianFZ20,
  author       = {Zhentian Qian and
                  Jie Fu and
                  Quanyan Zhu},
  title        = {A Receding-Horizon {MDP} Approach for Performance Evaluation of Moving
                  Target Defense in Networks},
  booktitle    = {2020 {IEEE} Conference on Control Technology and Applications, {CCTA}
                  2020, Montreal, QC, Canada, August 24-26, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CCTA41146.2020.9206360},
  doi          = {10.1109/CCTA41146.2020.9206360},
  timestamp    = {Wed, 07 Oct 2020 19:50:15 +0200},
  biburl       = {https://dblp.org/rec/conf/ccta/QianFZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/NugrahaCHIZ20,
  author       = {Yurid Nugraha and
                  Ahmet Cetinkaya and
                  Tomohisa Hayakawa and
                  Hideaki Ishii and
                  Quanyan Zhu},
  title        = {Dynamic Resilient Network Games Considering Connectivity},
  booktitle    = {59th {IEEE} Conference on Decision and Control, {CDC} 2020, Jeju Island,
                  South Korea, December 14-18, 2020},
  pages        = {3779--3784},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CDC42340.2020.9304479},
  doi          = {10.1109/CDC42340.2020.9304479},
  timestamp    = {Fri, 04 Mar 2022 13:31:02 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/NugrahaCHIZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/FangZ20,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Fundamental Limitations in Sequential Prediction and Recursive Algorithms:
                  Lp Bounds via an Entropic Analysis},
  booktitle    = {54th Annual Conference on Information Sciences and Systems, {CISS}
                  2020, Princeton, NJ, USA, March 18-20, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CISS48834.2020.1570617026},
  doi          = {10.1109/CISS48834.2020.1570617026},
  timestamp    = {Wed, 20 May 2020 12:05:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/FangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/PengZ20,
  author       = {Guanze Peng and
                  Quanyan Zhu},
  title        = {Sequential Hypothesis Testing Game},
  booktitle    = {54th Annual Conference on Information Sciences and Systems, {CISS}
                  2020, Princeton, NJ, USA, March 18-20, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CISS48834.2020.1570617162},
  doi          = {10.1109/CISS48834.2020.1570617162},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/PengZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangZ20,
  author       = {Linan Huang and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive
                  Honeypots},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {125--146},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_7},
  doi          = {10.1007/978-3-030-64793-3\_7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhaoZ20,
  author       = {Yuhan Zhao and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Combating Online Counterfeits: {A} Game-Theoretic Analysis of Cyber
                  Supply Chain Ecosystem},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {326--345},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_18},
  doi          = {10.1007/978-3-030-64793-3\_18},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhaoZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PanPCZ20,
  author       = {Yunian Pan and
                  Guanze Peng and
                  Juntao Chen and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {{MASAGE:} Model-Agnostic Sequential and Adaptive Game Estimation},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {365--384},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_20},
  doi          = {10.1007/978-3-030-64793-3\_20},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/PanPCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PengZZ20,
  author       = {Guanze Peng and
                  Tao Zhang and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {A Data-Driven Distributionally Robust Game Using Wasserstein Distance},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {405--421},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_22},
  doi          = {10.1007/978-3-030-64793-3\_22},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/PengZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/FangZ20,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {A Connection between Feedback Capacity and Kalman Filter for Colored
                  Gaussian Noises},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2020,
                  Los Angeles, CA, USA, June 21-26, 2020},
  pages        = {2055--2060},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISIT44484.2020.9174357},
  doi          = {10.1109/ISIT44484.2020.9174357},
  timestamp    = {Tue, 15 Sep 2020 10:18:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/FangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KierasFZ20,
  author       = {Timothy Kieras and
                  Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Modeling and Assessment of IoT Supply Chain Security Risks: The Role
                  of Structural and Parametric Uncertainties},
  booktitle    = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco,
                  CA, USA, May 21, 2020},
  pages        = {163--170},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SPW50608.2020.00043},
  doi          = {10.1109/SPW50608.2020.00043},
  timestamp    = {Thu, 21 Sep 2023 16:11:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KierasFZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wf-iot/FarooqZ20,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {PhD Forum: Enabling Autonomic IoT for Smart Urban Services},
  booktitle    = {6th {IEEE} World Forum on Internet of Things, WF-IoT 2020, New Orleans,
                  LA, USA, June 2-16, 2020},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WF-IoT48130.2020.9221230},
  doi          = {10.1109/WF-IOT48130.2020.9221230},
  timestamp    = {Mon, 19 Oct 2020 12:52:29 +0200},
  biburl       = {https://dblp.org/rec/conf/wf-iot/FarooqZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wf-iot/KierasFZ20,
  author       = {Timothy Kieras and
                  Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {RIoTS: Risk Analysis of IoT Supply Chain Threats},
  booktitle    = {6th {IEEE} World Forum on Internet of Things, WF-IoT 2020, New Orleans,
                  LA, USA, June 2-16, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WF-IoT48130.2020.9221323},
  doi          = {10.1109/WF-IOT48130.2020.9221323},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wf-iot/KierasFZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/HuangZ20,
  author       = {Linan Huang and
                  Quanyan Zhu},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {205--230},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_10},
  doi          = {10.1007/978-3-030-33432-1\_10},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/HuangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2020,
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3},
  doi          = {10.1007/978-3-030-64793-3},
  isbn         = {978-3-030-64792-6},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-00712,
  author       = {Quanyan Zhu},
  title        = {Control Challenges for Resilient Control Systems},
  journal      = {CoRR},
  volume       = {abs/2001.00712},
  year         = {2020},
  url          = {http://arxiv.org/abs/2001.00712},
  eprinttype    = {arXiv},
  eprint       = {2001.00712},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-00712.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-01561,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {PhD Forum: Enabling Autonomic IoT for Smart Urban Services},
  journal      = {CoRR},
  volume       = {abs/2001.01561},
  year         = {2020},
  url          = {http://arxiv.org/abs/2001.01561},
  eprinttype    = {arXiv},
  eprint       = {2001.01561},
  timestamp    = {Mon, 13 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-01561.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-03108,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {A Connection between Feedback Capacity and Kalman Filter for Colored
                  Gaussian Noises},
  journal      = {CoRR},
  volume       = {abs/2001.03108},
  year         = {2020},
  url          = {http://arxiv.org/abs/2001.03108},
  eprinttype    = {arXiv},
  eprint       = {2001.03108},
  timestamp    = {Mon, 13 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-03108.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-03813,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Fundamental Limits of Online Learning: An Entropic-Innovations Viewpoint},
  journal      = {CoRR},
  volume       = {abs/2001.03813},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.03813},
  eprinttype    = {arXiv},
  eprint       = {2001.03813},
  timestamp    = {Fri, 17 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-03813.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-03827,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  title        = {Manipulating Reinforcement Learning: Poisoning Attacks on Cost Signals},
  journal      = {CoRR},
  volume       = {abs/2002.03827},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.03827},
  eprinttype    = {arXiv},
  eprint       = {2002.03827},
  timestamp    = {Wed, 12 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-03827.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-05146,
  author       = {Zhentian Qian and
                  Jie Fu and
                  Quanyan Zhu},
  title        = {A Receding-Horizon {MDP} Approach for Performance Evaluation of Moving
                  Target Defense in Networks},
  journal      = {CoRR},
  volume       = {abs/2002.05146},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.05146},
  eprinttype    = {arXiv},
  eprint       = {2002.05146},
  timestamp    = {Fri, 14 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-05146.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-03173,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Implementability of Honest Multi-Agent Sequential Decision-Making
                  with Dynamic Population},
  journal      = {CoRR},
  volume       = {abs/2003.03173},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.03173},
  eprinttype    = {arXiv},
  eprint       = {2003.03173},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-03173.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-04735,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {Security of Distributed Machine Learning: {A} Game-Theoretic Approach
                  to Design Secure {DSVM}},
  journal      = {CoRR},
  volume       = {abs/2003.04735},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.04735},
  eprinttype    = {arXiv},
  eprint       = {2003.04735},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-04735.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-06493,
  author       = {Guanze Peng and
                  Juntao Chen and
                  Quanyan Zhu},
  title        = {Distributed Stabilization of State Interdependent Markov Jump LinearSystem-of-Systems
                  with Partial Information},
  journal      = {CoRR},
  volume       = {abs/2003.06493},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.06493},
  eprinttype    = {arXiv},
  eprint       = {2003.06493},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-06493.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-12363,
  author       = {Timothy Kieras and
                  Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Modeling and Assessment of IoT Supply Chain Security Risks: The Role
                  of Structural and Parametric Uncertainties},
  journal      = {CoRR},
  volume       = {abs/2003.12363},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.12363},
  eprinttype    = {arXiv},
  eprint       = {2003.12363},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-12363.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-13554,
  author       = {Yurid Nugraha and
                  Ahmet Cetinkaya and
                  Tomohisa Hayakawa and
                  Hideaki Ishii and
                  Quanyan Zhu},
  title        = {Dynamic Resilient Network Games with Applications to Multi-Agent Consensus},
  journal      = {CoRR},
  volume       = {abs/2003.13554},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.13554},
  eprinttype    = {arXiv},
  eprint       = {2003.13554},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-13554.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-00703,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Differentially Private Collaborative Intrusion Detection Systems For
                  VANETs},
  journal      = {CoRR},
  volume       = {abs/2005.00703},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.00703},
  eprinttype    = {arXiv},
  eprint       = {2005.00703},
  timestamp    = {Fri, 08 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-00703.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-03169,
  author       = {Guanze Peng and
                  Veeraruna Kavitha and
                  Quanyan Zhu},
  title        = {On Optimal Control of Discounted Cost Infinite-Horizon Markov Decision
                  Processes Under Local State Information Structures},
  journal      = {CoRR},
  volume       = {abs/2005.03169},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.03169},
  eprinttype    = {arXiv},
  eprint       = {2005.03169},
  timestamp    = {Sat, 09 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-03169.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-07942,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {Game of Duplicity: {A} Proactive Automated Defense Mechanism by Deception
                  Design},
  journal      = {CoRR},
  volume       = {abs/2006.07942},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.07942},
  eprinttype    = {arXiv},
  eprint       = {2006.07942},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-07942.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-16894,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {QoE Based Revenue Maximizing Dynamic Resource Allocation and Pricing
                  for Fog-Enabled Mission-Critical IoT Applications},
  journal      = {CoRR},
  volume       = {abs/2006.16894},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.16894},
  eprinttype    = {arXiv},
  eprint       = {2006.16894},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-16894.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-13981,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {Cognitive Honeypots against Lateral Movement for Mitigation of Long-Term
                  Vulnerability},
  journal      = {CoRR},
  volume       = {abs/2007.13981},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.13981},
  eprinttype    = {arXiv},
  eprint       = {2007.13981},
  timestamp    = {Mon, 03 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-13981.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-04893,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Channel Leakage and Fundamental Limits of Privacy Leakage for Streaming
                  Data},
  journal      = {CoRR},
  volume       = {abs/2008.04893},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.04893},
  eprinttype    = {arXiv},
  eprint       = {2008.04893},
  timestamp    = {Sun, 16 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-04893.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-05585,
  author       = {Zhili Zhang and
                  Quanyan Zhu},
  title        = {Deceptive Kernel Function on Observations of Discrete {POMDP}},
  journal      = {CoRR},
  volume       = {abs/2008.05585},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.05585},
  eprinttype    = {arXiv},
  eprint       = {2008.05585},
  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-05585.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-02275,
  author       = {Suyog Kapsikar and
                  Indrajit Saha and
                  Khushboo Agarwal and
                  Veeraruna Kavitha and
                  Quanyan Zhu},
  title        = {Controlling Fake News by Tagging: {A} Branching Process Analysis},
  journal      = {CoRR},
  volume       = {abs/2009.02275},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.02275},
  eprinttype    = {arXiv},
  eprint       = {2009.02275},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-02275.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-00718,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Fundamental Limits of Obfuscation for Linear Gaussian Dynamical Systems:
                  An Information-Theoretic Approach},
  journal      = {CoRR},
  volume       = {abs/2011.00718},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.00718},
  eprinttype    = {arXiv},
  eprint       = {2011.00718},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-00718.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-01455,
  author       = {Shutian Liu and
                  Tao Li and
                  Quanyan Zhu},
  title        = {Communication-Efficient Distributed Machine Learning over Strategic
                  Networks: {A} Two-Layer Game Approach},
  journal      = {CoRR},
  volume       = {abs/2011.01455},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.01455},
  eprinttype    = {arXiv},
  eprint       = {2011.01455},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-01455.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-02560,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Independent Gaussian Distributions Minimize the Kullback-Leibler {(KL)}
                  Divergence from Independent Gaussian Distributions},
  journal      = {CoRR},
  volume       = {abs/2011.02560},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.02560},
  eprinttype    = {arXiv},
  eprint       = {2011.02560},
  timestamp    = {Mon, 09 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-02560.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-10095,
  author       = {Guanze Peng and
                  Tao Li and
                  Shutian Liu and
                  Juntao Chen and
                  Quanyan Zhu},
  title        = {Locally-Aware Constrained Games on Networks},
  journal      = {CoRR},
  volume       = {abs/2011.10095},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.10095},
  eprinttype    = {arXiv},
  eprint       = {2011.10095},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-10095.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-14262,
  author       = {Juntao Chen and
                  Yunhan Huang and
                  Rui Zhang and
                  Quanyan Zhu},
  title        = {Optimal Quarantining Strategy for Interdependent Epidemics Spreading
                  over Complex Networks},
  journal      = {CoRR},
  volume       = {abs/2011.14262},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.14262},
  eprinttype    = {arXiv},
  eprint       = {2011.14262},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-14262.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-02009,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Fundamental Stealthiness-Distortion Tradeoffs in Dynamical (Control)
                  Systems under Injection Attacks: {A} Power Spectral Analysis},
  journal      = {CoRR},
  volume       = {abs/2012.02009},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.02009},
  eprinttype    = {arXiv},
  eprint       = {2012.02009},
  timestamp    = {Fri, 04 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-02009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-02384,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  title        = {Cross-Layer Coordinated Attacks on Cyber-Physical Systems: {A} {LQG}
                  Game Framework with Controlled Observations},
  journal      = {CoRR},
  volume       = {abs/2012.02384},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.02384},
  eprinttype    = {arXiv},
  eprint       = {2012.02384},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-02384.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-03809,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Independent Elliptical Distributions Minimize Their W\({}_{\mbox{2}}\)
                  Wasserstein Distance from Independent Elliptical Distributions with
                  the Same Density Generator},
  journal      = {CoRR},
  volume       = {abs/2012.03809},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.03809},
  eprinttype    = {arXiv},
  eprint       = {2012.03809},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-03809.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-04023,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {The Spectral-Domain W\({}_{\mbox{2}}\) Wasserstein Distance for Elliptical
                  Processes and the Spectral-Domain Gelbrich Bound},
  journal      = {CoRR},
  volume       = {abs/2012.04023},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.04023},
  eprinttype    = {arXiv},
  eprint       = {2012.04023},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-04023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-12174,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Fundamental Limits on the Maximum Deviations in Control Systems: How
                  Short Can Distribution Tails be Made by Feedback?},
  journal      = {CoRR},
  volume       = {abs/2012.12174},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.12174},
  eprinttype    = {arXiv},
  eprint       = {2012.12174},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-12174.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-14043,
  author       = {Tao Li and
                  Guanze Peng and
                  Quanyan Zhu},
  title        = {Blackwell Online Learning for Markov Decision Processes},
  journal      = {CoRR},
  volume       = {abs/2012.14043},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.14043},
  eprinttype    = {arXiv},
  eprint       = {2012.14043},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-14043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-14925,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  title        = {Infinite-Horizon Linear-Quadratic-Gaussian Control with Costly Measurements},
  journal      = {CoRR},
  volume       = {abs/2012.14925},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.14925},
  eprinttype    = {arXiv},
  eprint       = {2012.14925},
  timestamp    = {Fri, 08 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-14925.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/PawlickCZ19,
  author       = {Jeffrey Pawlick and
                  Edward Colbert and
                  Quanyan Zhu},
  title        = {A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity
                  and Privacy},
  journal      = {{ACM} Comput. Surv.},
  volume       = {52},
  number       = {4},
  pages        = {82:1--82:28},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337772},
  doi          = {10.1145/3337772},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/PawlickCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PawlickCZ19,
  author       = {Jeffrey Pawlick and
                  Juntao Chen and
                  Quanyan Zhu},
  title        = {iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled
                  Internet of Controlled Things},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {6},
  pages        = {1654--1669},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2883272},
  doi          = {10.1109/TIFS.2018.2883272},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PawlickCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PawlickCZ19a,
  author       = {Jeffrey Pawlick and
                  Edward Colbert and
                  Quanyan Zhu},
  title        = {Modeling and Analysis of Leaky Deception Using Signaling Games With
                  Evidence},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {7},
  pages        = {1871--1886},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2886472},
  doi          = {10.1109/TIFS.2018.2886472},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PawlickCZ19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FarooqZ19,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in
                  Wireless IoT Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {9},
  pages        = {2412--2426},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2898817},
  doi          = {10.1109/TIFS.2019.2898817},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FarooqZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenZ19,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {Interdependent Strategic Security Risk Management With Bounded Rationality
                  in the Internet of Things},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {11},
  pages        = {2958--2971},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2911112},
  doi          = {10.1109/TIFS.2019.2911112},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsipn/ZhangZ19,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {Consensus-Based Distributed Discrete Optimal Transport for Decentralized
                  Resource Matching},
  journal      = {{IEEE} Trans. Signal Inf. Process. over Networks},
  volume       = {5},
  number       = {3},
  pages        = {511--524},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSIPN.2019.2910476},
  doi          = {10.1109/TSIPN.2019.2910476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsipn/ZhangZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/HuangKZ19,
  author       = {Yunhan Huang and
                  Veeraruna Kavitha and
                  Quanyan Zhu},
  title        = {Continuous-Time Markov Decision Processes with Controlled Observations},
  booktitle    = {57th Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2019, Monticello, IL, USA, September 24-27, 2019},
  pages        = {32--39},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ALLERTON.2019.8919744},
  doi          = {10.1109/ALLERTON.2019.8919744},
  timestamp    = {Fri, 13 Dec 2019 14:46:22 +0100},
  biburl       = {https://dblp.org/rec/conf/allerton/HuangKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/PengZ19,
  author       = {Guanze Peng and
                  Quanyan Zhu},
  title        = {Game-Theoretic Analysis of Optimal Control and Sampling for Linear
                  Stochastic Systems},
  booktitle    = {57th Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2019, Monticello, IL, USA, September 24-27, 2019},
  pages        = {647--654},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ALLERTON.2019.8919794},
  doi          = {10.1109/ALLERTON.2019.8919794},
  timestamp    = {Fri, 13 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/allerton/PengZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/NugrahaHCIZ19,
  author       = {Yurid Nugraha and
                  Tomohisa Hayakawa and
                  Ahmet Cetinkaya and
                  Hideaki Ishii and
                  Quanyan Zhu},
  title        = {Subgame Perfect Equilibrium Analysis for Jamming Attacks on Resilient
                  Graphs},
  booktitle    = {2019 American Control Conference, {ACC} 2019, Philadelphia, PA, USA,
                  July 10-12, 2019},
  pages        = {2060--2065},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/ACC.2019.8814607},
  doi          = {10.23919/ACC.2019.8814607},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/NugrahaHCIZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangZ19,
  author       = {Linan Huang and
                  Quanyan Zhu},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Adaptive Honeypot Engagement Through Reinforcement Learning of Semi-Markov
                  Decision Processes},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {196--216},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_13},
  doi          = {10.1007/978-3-030-32430-8\_13},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangZ19a,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Deceptive Reinforcement Learning Under Adversarial Manipulations on
                  Cost Signals},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {217--237},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_14},
  doi          = {10.1007/978-3-030-32430-8\_14},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangZ19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/Zhu19,
  author       = {Quanyan Zhu},
  editor       = {Xenofon D. Koutsoukos and
                  Alvaro A. C{\'{a}}rdenas and
                  Ehab Al{-}Shaer},
  title        = {Game theory for cyber deception: a tutorial},
  booktitle    = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science
                  of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019},
  pages        = {8:1--8:3},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314058.3314067},
  doi          = {10.1145/3314058.3314067},
  timestamp    = {Sat, 22 Jun 2019 19:13:09 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/Zhu19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/FangSJIZ19,
  author       = {Song Fang and
                  Mikael Skoglund and
                  Karl Henrik Johansson and
                  Hideaki Ishii and
                  Quanyan Zhu},
  title        = {Generic Variance Bounds on Estimation and Prediction Errors in Time
                  Series Analysis: An Entropy Perspective},
  booktitle    = {2019 {IEEE} Information Theory Workshop, {ITW} 2019, Visby, Sweden,
                  August 25-28, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ITW44776.2019.8989240},
  doi          = {10.1109/ITW44776.2019.8989240},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/FangSJIZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlsp/FangZ19,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Generic Bounds On The Maximum Deviations In Sequential Prediction:
                  An Information-Theoretic Analysis},
  booktitle    = {29th {IEEE} International Workshop on Machine Learning for Signal
                  Processing, {MLSP} 2019, Pittsburgh, PA, USA, October 13-16, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/MLSP.2019.8918758},
  doi          = {10.1109/MLSP.2019.8918758},
  timestamp    = {Thu, 12 Dec 2019 12:15:35 +0100},
  biburl       = {https://dblp.org/rec/conf/mlsp/FangZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlsp/LiZ19,
  author       = {Tao Li and
                  Quanyan Zhu},
  title        = {On Convergence Rate of Adaptive Multiscale Value Function Approximation
                  for Reinforcement Learning},
  booktitle    = {29th {IEEE} International Workshop on Machine Learning for Signal
                  Processing, {MLSP} 2019, Pittsburgh, PA, USA, October 13-16, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/MLSP.2019.8918816},
  doi          = {10.1109/MLSP.2019.8918816},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mlsp/LiZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/PawlickNCZ19,
  author       = {Jeffrey Pawlick and
                  Thi Thu Hang Nguyen and
                  Edward Colbert and
                  Quanyan Zhu},
  title        = {Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced
                  Persistent Threats},
  booktitle    = {International Symposium on Modeling and Optimization in Mobile, Ad
                  Hoc, and Wireless Networks, WiOPT 2019, Avignon, France, June 3-7,
                  2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://dl.ifip.org/db/conf/wiopt/wiopt2019/1570517592.pdf},
  doi          = {10.23919/WIOPT47501.2019.9144123},
  timestamp    = {Thu, 09 Dec 2021 12:24:09 +0100},
  biburl       = {https://dblp.org/rec/conf/wiopt/PawlickNCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/ShettyRCMBZ19,
  author       = {Sachin Shetty and
                  Indrajit Ray and
                  Nurcin Celik and
                  Michael Mesham and
                  Nathaniel Bastian and
                  Quanyan Zhu},
  title        = {Simulation for Cyber Risk Management - Where are we, and Where do
                  we Want to Go?},
  booktitle    = {2019 Winter Simulation Conference, {WSC} 2019, National Harbor, MD,
                  USA, December 8-11, 2019},
  pages        = {726--737},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WSC40007.2019.9004688},
  doi          = {10.1109/WSC40007.2019.9004688},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wsc/ShettyRCMBZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-00741,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in
                  Wireless IoT Networks},
  journal      = {CoRR},
  volume       = {abs/1901.00741},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.00741},
  eprinttype    = {arXiv},
  eprint       = {1901.00741},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-00741.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-08331,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Dynamic Spatio-Temporal Resource Provisioning for On-Demand Urban
                  Services in Smart Cities},
  journal      = {CoRR},
  volume       = {abs/1901.08331},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.08331},
  eprinttype    = {arXiv},
  eprint       = {1901.08331},
  timestamp    = {Sat, 02 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-08331.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-03925,
  author       = {Tao Zhang and
                  Linan Huang and
                  Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies
                  and Dynamic Risk Mitigation},
  journal      = {CoRR},
  volume       = {abs/1902.03925},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.03925},
  eprinttype    = {arXiv},
  eprint       = {1902.03925},
  timestamp    = {Wed, 04 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-03925.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-01442,
  author       = {Quanyan Zhu},
  title        = {Game Theory for Cyber Deception: {A} Tutorial},
  journal      = {CoRR},
  volume       = {abs/1903.01442},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.01442},
  eprinttype    = {arXiv},
  eprint       = {1903.01442},
  timestamp    = {Sat, 30 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-01442.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-04318,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {Consensus-based Distributed Discrete Optimal Transport for Decentralized
                  Resource Matching},
  journal      = {CoRR},
  volume       = {abs/1904.04318},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.04318},
  eprinttype    = {arXiv},
  eprint       = {1904.04318},
  timestamp    = {Sun, 22 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-04318.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-04765,
  author       = {Song Fang and
                  Mikael Skoglund and
                  Karl Henrik Johansson and
                  Hideaki Ishii and
                  Quanyan Zhu},
  title        = {Generic Variance Bounds on Estimation and Prediction Errors in Time
                  Series Analysis: An Entropy Perspective},
  journal      = {CoRR},
  volume       = {abs/1904.04765},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.04765},
  eprinttype    = {arXiv},
  eprint       = {1904.04765},
  timestamp    = {Thu, 25 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-04765.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-09341,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {Interdependent Strategic Security Risk Management with Bounded Rationality
                  in the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/1905.09341},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.09341},
  eprinttype    = {arXiv},
  eprint       = {1905.09341},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-09341.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-02114,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {A Games-in-Games Approach to Mosaic Command and Control Design of
                  Dynamic Network-of-Networks for Secure and Resilient Multi-Domain
                  Operations},
  journal      = {CoRR},
  volume       = {abs/1906.02114},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.02114},
  eprinttype    = {arXiv},
  eprint       = {1906.02114},
  timestamp    = {Thu, 13 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-02114.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-07185,
  author       = {Juntao Chen and
                  Corinne Touati and
                  Quanyan Zhu},
  title        = {A Dynamic Game Approach to Strategic Design of Secure and Resilient
                  Infrastructure Network},
  journal      = {CoRR},
  volume       = {abs/1906.07185},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.07185},
  eprinttype    = {arXiv},
  eprint       = {1906.07185},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-07185.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-09687,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {A Dynamic Games Approach to Proactive Defense Strategies against Advanced
                  Persistent Threats in Cyber-Physical Systems},
  journal      = {CoRR},
  volume       = {abs/1906.09687},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.09687},
  eprinttype    = {arXiv},
  eprint       = {1906.09687},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-09687.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10571,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  title        = {Deceptive Reinforcement Learning Under Adversarial Manipulations on
                  Cost Signals},
  journal      = {CoRR},
  volume       = {abs/1906.10571},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10571},
  eprinttype    = {arXiv},
  eprint       = {1906.10571},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10571.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-12182,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov
                  Decision Processes},
  journal      = {CoRR},
  volume       = {abs/1906.12182},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.12182},
  eprinttype    = {arXiv},
  eprint       = {1906.12182},
  timestamp    = {Mon, 01 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-12182.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-00459,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {N-Person Discrete-Time Dynamic Games of Asymmetric Information},
  journal      = {CoRR},
  volume       = {abs/1907.00459},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.00459},
  eprinttype    = {arXiv},
  eprint       = {1907.00459},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-00459.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-00540,
  author       = {Mohammad Ashiqur Rahman and
                  Md Hasan Shahriar and
                  Ehab Al{-}Shaer and
                  Quanyan Zhu},
  title        = {A Formal Approach for Efficient Navigation Management of Hybrid Electric
                  Vehicles on Long Trips},
  journal      = {CoRR},
  volume       = {abs/1907.00540},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.00540},
  eprinttype    = {arXiv},
  eprint       = {1907.00540},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-00540.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-01396,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense},
  journal      = {CoRR},
  volume       = {abs/1907.01396},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.01396},
  eprinttype    = {arXiv},
  eprint       = {1907.01396},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-01396.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-06128,
  author       = {Yunhan Huang and
                  Veeraruna Kavitha and
                  Quanyan Zhu},
  title        = {Continuous-Time Markov Decision Processes with Controlled Observations},
  journal      = {CoRR},
  volume       = {abs/1907.06128},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.06128},
  eprinttype    = {arXiv},
  eprint       = {1907.06128},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-06128.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-04431,
  author       = {Juntao Chen and
                  Quanyan Zhu and
                  Tamer Basar},
  title        = {Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent
                  Enterprise Networks},
  journal      = {CoRR},
  volume       = {abs/1908.04431},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.04431},
  eprinttype    = {arXiv},
  eprint       = {1908.04431},
  timestamp    = {Mon, 19 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-04431.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-07828,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {IoT Supply Chain Security: Overview, Challenges, and the Road Ahead},
  journal      = {CoRR},
  volume       = {abs/1908.07828},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.07828},
  eprinttype    = {arXiv},
  eprint       = {1908.07828},
  timestamp    = {Mon, 26 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-07828.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-08578,
  author       = {Tao Li and
                  Quanyan Zhu},
  title        = {On Convergence Rate of Adaptive Multiscale Value Function Approximation
                  For Reinforcement Learning},
  journal      = {CoRR},
  volume       = {abs/1908.08578},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.08578},
  eprinttype    = {arXiv},
  eprint       = {1908.08578},
  timestamp    = {Mon, 26 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-08578.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-13720,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {On Incentive Compatibility in Dynamic Mechanism Design With Exit Option
                  in a Markovian Environment},
  journal      = {CoRR},
  volume       = {abs/1909.13720},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.13720},
  eprinttype    = {arXiv},
  eprint       = {1909.13720},
  timestamp    = {Wed, 02 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-13720.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-06742,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Generic Bounds on the Maximum Deviations in Sequential Prediction:
                  An Information-Theoretic Analysis},
  journal      = {CoRR},
  volume       = {abs/1910.06742},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.06742},
  eprinttype    = {arXiv},
  eprint       = {1910.06742},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-06742.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-07510,
  author       = {Yunhan Huang and
                  Juntao Chen and
                  Linan Huang and
                  Quanyan Zhu},
  title        = {Dynamic Games for Secure and Resilient Control System Design},
  journal      = {CoRR},
  volume       = {abs/1910.07510},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.07510},
  eprinttype    = {arXiv},
  eprint       = {1910.07510},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-07510.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-10100,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {FlipIn: {A} Game-Theoretic Cyber Insurance Framework for Incentive-Compatible
                  Cyber Risk Management of Internet of Things},
  journal      = {CoRR},
  volume       = {abs/1911.10100},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.10100},
  eprinttype    = {arXiv},
  eprint       = {1911.10100},
  timestamp    = {Wed, 04 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-10100.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-12862,
  author       = {Timothy Kieras and
                  Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {RIoTS: Risk Analysis of IoT Supply Chain Threats},
  journal      = {CoRR},
  volume       = {abs/1911.12862},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.12862},
  eprinttype    = {arXiv},
  eprint       = {1911.12862},
  timestamp    = {Wed, 08 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-12862.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-02628,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Fundamental Limitations in Sequential Prediction and Recursive Algorithms:
                  L\({}_{\mbox{p}}\) Bounds via an Entropic Analysis},
  journal      = {CoRR},
  volume       = {abs/1912.02628},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.02628},
  eprinttype    = {arXiv},
  eprint       = {1912.02628},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-02628.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-03367,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Relativistic Control: Feedback Control of Relativistic Dynamics},
  journal      = {CoRR},
  volume       = {abs/1912.03367},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.03367},
  eprinttype    = {arXiv},
  eprint       = {1912.03367},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-03367.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-04082,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {Control of Multi-Layer Mobile Autonomous Systems in Adversarial Environments:
                  {A} Games-in-Games Approach},
  journal      = {CoRR},
  volume       = {abs/1912.04082},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.04082},
  eprinttype    = {arXiv},
  eprint       = {1912.04082},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-04082.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-05541,
  author       = {Song Fang and
                  Quanyan Zhu},
  title        = {Fundamental Entropic Laws and L\({}_{\mbox{p}}\) Limitations of Feedback
                  Systems: Implications for Machine-Learning-in-the-Loop Control},
  journal      = {CoRR},
  volume       = {abs/1912.05541},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.05541},
  eprinttype    = {arXiv},
  eprint       = {1912.05541},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-05541.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-06229,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Optimal Two-Sided Market Mechanism Design for Large-Scale Data Sharing
                  and Trading in Massive IoT Networks},
  journal      = {CoRR},
  volume       = {abs/1912.06229},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.06229},
  eprinttype    = {arXiv},
  eprint       = {1912.06229},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-06229.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhuR18,
  author       = {Quanyan Zhu and
                  Stefan Rass},
  title        = {On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced
                  Persistent Threats},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {13958--13971},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2814481},
  doi          = {10.1109/ACCESS.2018.2814481},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhuR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NooraniMMZ18,
  author       = {Seyede Fatemeh Noorani and
                  Mohammad Hossein Manshaei and
                  Mohammad Ali Montazeri and
                  Quanyan Zhu},
  title        = {Game-Theoretic Approach to Group Learning Enhancement Through Peer-to-Peer
                  Explanation and Competition},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {53684--53697},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2871155},
  doi          = {10.1109/ACCESS.2018.2871155},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/NooraniMMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/MiaoZPP18,
  author       = {Fei Miao and
                  Quanyan Zhu and
                  Miroslav Pajic and
                  George J. Pappas},
  title        = {A hybrid stochastic game for secure control of cyber-physical systems},
  journal      = {Autom.},
  volume       = {93},
  pages        = {55--63},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.automatica.2018.03.012},
  doi          = {10.1016/J.AUTOMATICA.2018.03.012},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/automatica/MiaoZPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/games/GubarTZ18,
  author       = {Elena A. Gubar and
                  Vladislav Taynitskiy and
                  Quanyan Zhu},
  title        = {Optimal Control of Heterogeneous Mutating Viruses},
  journal      = {Games},
  volume       = {9},
  number       = {4},
  pages        = {103},
  year         = {2018},
  url          = {https://doi.org/10.3390/g9040103},
  doi          = {10.3390/G9040103},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/games/GubarTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/HuangZ18,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {Adaptive Strategic Cyber Defense for Advanced Persistent Threats in
                  Critical Infrastructure Networks},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {46},
  number       = {2},
  pages        = {52--56},
  year         = {2018},
  url          = {https://doi.org/10.1145/3305218.3305239},
  doi          = {10.1145/3305218.3305239},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/HuangZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tccn/FarooqZ18,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {A Multi-Layer Feedback System Approach to Resilient Connectivity of
                  Remotely Deployed Mobile Internet of Things},
  journal      = {{IEEE} Trans. Cogn. Commun. Netw.},
  volume       = {4},
  number       = {2},
  pages        = {422--432},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCCN.2018.2837907},
  doi          = {10.1109/TCCN.2018.2837907},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tccn/FarooqZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ZhangZ18a,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {A Game-Theoretic Approach to Design Secure and Resilient Distributed
                  Support Vector Machines},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {29},
  number       = {11},
  pages        = {5512--5527},
  year         = {2018},
  url          = {https://doi.org/10.1109/TNNLS.2018.2802721},
  doi          = {10.1109/TNNLS.2018.2802721},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/ZhangZ18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/ChenZ18,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {A Stackelberg Game Approach for Two-Level Distributed Energy Management
                  in Smart Grids},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {9},
  number       = {6},
  pages        = {6554--6565},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSG.2017.2715663},
  doi          = {10.1109/TSG.2017.2715663},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/ChenZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsipn/0011Z18,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Distributed Privacy-Preserving Collaborative Intrusion Detection Systems
                  for VANETs},
  journal      = {{IEEE} Trans. Signal Inf. Process. over Networks},
  volume       = {4},
  number       = {1},
  pages        = {148--161},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSIPN.2018.2801622},
  doi          = {10.1109/TSIPN.2018.2801622},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsipn/0011Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/FarooqZ18,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {On the Secure and Reconfigurable Multi-Layer Network Design for Critical
                  Information Dissemination in the Internet of Battlefield Things (IoBT)},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {17},
  number       = {4},
  pages        = {2618--2632},
  year         = {2018},
  url          = {https://doi.org/10.1109/TWC.2018.2799860},
  doi          = {10.1109/TWC.2018.2799860},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/FarooqZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/ChenZ18,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {A Linear Quadratic Differential Game Approach to Dynamic Contract
                  Design for Systemic Cyber Risk Management under Asymmetric Information},
  booktitle    = {56th Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2018, Monticello, IL, USA, October 2-5, 2018},
  pages        = {575--582},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ALLERTON.2018.8636007},
  doi          = {10.1109/ALLERTON.2018.8636007},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/allerton/ChenZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/FarooqZ18,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Adaptive and Resilient Revenue Maximizing Dynamic Resource Allocation
                  and Pricing for Cloud-Enabled IoT Systems},
  booktitle    = {2018 Annual American Control Conference, {ACC} 2018, Milwaukee, WI,
                  USA, June 27-29, 2018},
  pages        = {5292--5297},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ACC.2018.8430776},
  doi          = {10.23919/ACC.2018.8430776},
  timestamp    = {Sun, 08 Aug 2021 01:40:57 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/FarooqZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuR18,
  author       = {Quanyan Zhu and
                  Stefan Rass},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Game Theory Meets Network Security: {A} Tutorial},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2163--2165},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3264421},
  doi          = {10.1145/3243734.3264421},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccta/XuZ18,
  author       = {Zhiheng Xu and
                  Quanyan Zhu},
  title        = {Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked
                  Robot Operating Systems},
  booktitle    = {{IEEE} Conference on Control Technology and Applications, {CCTA} 2018,
                  Copenhagen, Denmark, August 21-24, 2018},
  pages        = {1712--1717},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CCTA.2018.8511500},
  doi          = {10.1109/CCTA.2018.8511500},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ccta/XuZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/TanwaniZ18,
  author       = {Aneel Tanwani and
                  Quanyan Zhu},
  title        = {Feedback Nash Equilibrium for Markov Jump Games under Differential-Algebraic
                  Constraints with Application to Robust Control},
  booktitle    = {57th {IEEE} Conference on Decision and Control, {CDC} 2018, Miami,
                  FL, USA, December 17-19, 2018},
  pages        = {1124--1129},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CDC.2018.8619628},
  doi          = {10.1109/CDC.2018.8619628},
  timestamp    = {Fri, 04 Mar 2022 13:30:11 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/TanwaniZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/ChenZ18,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {Security investment under cognitive constraints: {A} Gestalt Nash
                  equilibrium approach},
  booktitle    = {52nd Annual Conference on Information Sciences and Systems, {CISS}
                  2018, Princeton, NJ, USA, March 21-23, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CISS.2018.8362263},
  doi          = {10.1109/CISS.2018.8362263},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/ChenZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/DunyakZ18,
  author       = {Alex Dunyak and
                  Quanyan Zhu},
  title        = {Understanding mean-field effects of large-population user data obfuscation
                  in machine learning},
  booktitle    = {52nd Annual Conference on Information Sciences and Systems, {CISS}
                  2018, Princeton, NJ, USA, March 21-23, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CISS.2018.8362267},
  doi          = {10.1109/CISS.2018.8362267},
  timestamp    = {Wed, 30 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/DunyakZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/ZhangZ18,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {Consensus-based transfer linear support vector machines for decentralized
                  multi-task multi-agent learning},
  booktitle    = {52nd Annual Conference on Information Sciences and Systems, {CISS}
                  2018, Princeton, NJ, USA, March 21-23, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CISS.2018.8362195},
  doi          = {10.1109/CISS.2018.8362195},
  timestamp    = {Sun, 22 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/ZhangZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangZ18,
  author       = {Linan Huang and
                  Quanyan Zhu},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Analysis and Computation of Adaptive Defense Strategies Against Advanced
                  Persistent Threats for Cyber-Physical Systems},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {205--226},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_12},
  doi          = {10.1007/978-3-030-01554-1\_12},
  timestamp    = {Tue, 07 May 2024 20:08:32 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/0011Z18,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Hypothesis Testing Game for Cyber Deception},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {540--555},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_31},
  doi          = {10.1007/978-3-030-01554-1\_31},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/0011Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/FarooqZ18,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Optimal dynamic contract for spectrum reservation in mission-critical
                  UNB-IoT systems},
  booktitle    = {16th International Symposium on Modeling and Optimization in Mobile,
                  Ad Hoc, and Wireless Networks, WiOpt 2018, Shanghai, China, May 7-11,
                  2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://dl.ifip.org/db/conf/wiopt/wiopt2018/1570423849.pdf},
  doi          = {10.23919/WIOPT.2018.8362861},
  timestamp    = {Mon, 28 Aug 2023 21:17:48 +0200},
  biburl       = {https://dblp.org/rec/conf/wiopt/FarooqZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/HuangCZ18,
  author       = {Linan Huang and
                  Juntao Chen and
                  Quanyan Zhu},
  editor       = {Bj{\"{o}}rn Johansson and
                  Sanjay Jain},
  title        = {Distributed and Optimal Resilient Planning of Large-Scale Interdependent
                  Critical Infrastructures},
  booktitle    = {2018 Winter Simulation Conference, {WSC} 2018, Gothenburg, Sweden,
                  December 9-12, 2018},
  pages        = {1096--1107},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WSC.2018.8632399},
  doi          = {10.1109/WSC.2018.8632399},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/wsc/HuangCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-09986,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {On the Secure and Reconfigurable Multi-Layer Network Design for Critical
                  Information Dissemination in the Internet of Battlefield Things (IoBT)},
  journal      = {CoRR},
  volume       = {abs/1801.09986},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.09986},
  eprinttype    = {arXiv},
  eprint       = {1801.09986},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-09986.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-02907,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {A Game-Theoretic Approach to Design Secure and Resilient Distributed
                  Support Vector Machines},
  journal      = {CoRR},
  volume       = {abs/1802.02907},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.02907},
  eprinttype    = {arXiv},
  eprint       = {1802.02907},
  timestamp    = {Sun, 22 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-02907.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-10168,
  author       = {Hamza Anwar and
                  Quanyan Zhu},
  title        = {ADMM-based Networked Stochastic Variational Inference},
  journal      = {CoRR},
  volume       = {abs/1802.10168},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.10168},
  eprinttype    = {arXiv},
  eprint       = {1802.10168},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-10168.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-07842,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Optimal Dynamic Contract for Spectrum Reservation in Mission-Critical
                  UNB-IoT Systems},
  journal      = {CoRR},
  volume       = {abs/1803.07842},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.07842},
  eprinttype    = {arXiv},
  eprint       = {1803.07842},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-07842.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-00998,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {Optimal Cyber Insurance Policy Design for Dynamic Risk Management
                  and Mitigation},
  journal      = {CoRR},
  volume       = {abs/1804.00998},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.00998},
  eprinttype    = {arXiv},
  eprint       = {1804.00998},
  timestamp    = {Sun, 22 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-00998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-06831,
  author       = {Jeffrey Pawlick and
                  Edward Colbert and
                  Quanyan Zhu},
  title        = {Modeling and Analysis of Leaky Deception using Signaling Games with
                  Evidence},
  journal      = {CoRR},
  volume       = {abs/1804.06831},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.06831},
  eprinttype    = {arXiv},
  eprint       = {1804.06831},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-06831.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-00403,
  author       = {Jeffrey Pawlick and
                  Juntao Chen and
                  Quanyan Zhu},
  title        = {iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled
                  Internet of Controlled Things},
  journal      = {CoRR},
  volume       = {abs/1805.00403},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.00403},
  eprinttype    = {arXiv},
  eprint       = {1805.00403},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-00403.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-05824,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {A Multi-Layer Feedback System Approach to Resilient Connectivity of
                  Remotely Deployed Mobile Internet of Things},
  journal      = {CoRR},
  volume       = {abs/1805.05824},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.05824},
  eprinttype    = {arXiv},
  eprint       = {1805.05824},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-05824.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-08066,
  author       = {Quanyan Zhu and
                  Stefan Rass},
  title        = {Game Theory Meets Network Security: {A} Tutorial at {ACM} {CCS}},
  journal      = {CoRR},
  volume       = {abs/1808.08066},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.08066},
  eprinttype    = {arXiv},
  eprint       = {1808.08066},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-08066.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-02013,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception},
  journal      = {CoRR},
  volume       = {abs/1809.02013},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.02013},
  eprinttype    = {arXiv},
  eprint       = {1809.02013},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-02013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-02227,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {Adaptive Strategic Cyber Defense for Advanced Persistent Threats in
                  Critical Infrastructure Networks},
  journal      = {CoRR},
  volume       = {abs/1809.02227},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.02227},
  eprinttype    = {arXiv},
  eprint       = {1809.02227},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-02227.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-02231,
  author       = {Linan Huang and
                  Juntao Chen and
                  Quanyan Zhu},
  title        = {Distributed and Optimal Resilient Planning of Large-Scale Interdependent
                  Critical Infrastructures},
  journal      = {CoRR},
  volume       = {abs/1809.02231},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.02231},
  eprinttype    = {arXiv},
  eprint       = {1809.02231},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-02231.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-00281,
  author       = {Quanyan Zhu and
                  Stefan Rass and
                  Peter Schartner},
  title        = {Community-Based Security for the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/1810.00281},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.00281},
  eprinttype    = {arXiv},
  eprint       = {1810.00281},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-00281.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-00282,
  author       = {Quanyan Zhu},
  title        = {Multi-Layer Cyber-Physical Security and Resilience for Smart Grid},
  journal      = {CoRR},
  volume       = {abs/1810.00282},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.00282},
  eprinttype    = {arXiv},
  eprint       = {1810.00282},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-00282.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-00290,
  author       = {Quanyan Zhu},
  title        = {Cyber Insurance},
  journal      = {CoRR},
  volume       = {abs/1810.00290},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.00290},
  eprinttype    = {arXiv},
  eprint       = {1810.00290},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-00290.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-00752,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {A Game-Theoretic Foundation of Deception: Knowledge Acquisition and
                  Fundamental Limits},
  journal      = {CoRR},
  volume       = {abs/1810.00752},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.00752},
  eprinttype    = {arXiv},
  eprint       = {1810.00752},
  timestamp    = {Wed, 04 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-00752.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-04797,
  author       = {Vladislav Taynitskiy and
                  Elena A. Gubar and
                  Quanyan Zhu},
  title        = {Optimal Impulse Control of {SIR} Epidemics over Scale-Free Networks},
  journal      = {CoRR},
  volume       = {abs/1810.04797},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.04797},
  eprinttype    = {arXiv},
  eprint       = {1810.04797},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-04797.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-02615,
  author       = {Jin Shang and
                  Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Real-Time Transmission Mechanism Design for Wireless IoT Sensors with
                  Energy Harvesting under Power Saving Mode},
  journal      = {CoRR},
  volume       = {abs/1812.02615},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.02615},
  eprinttype    = {arXiv},
  eprint       = {1812.02615},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-02615.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RassAASZM17,
  author       = {Stefan Rass and
                  Ali Alshawish and
                  Mohamed Amine Abid and
                  Stefan Schauer and
                  Quanyan Zhu and
                  Hermann de Meer},
  title        = {Physical Intrusion Games - Optimizing Surveillance by Simulation and
                  Game Theory},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {8394--8407},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2693425},
  doi          = {10.1109/ACCESS.2017.2693425},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/RassAASZM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmpb/KhazaeiSMZSM17,
  author       = {Bahareh Khazaei and
                  Javad Salimi Sartakhti and
                  Mohammad Hossein Manshaei and
                  Quanyan Zhu and
                  Mehdi Sadeghi and
                  Seyed Rasoul Mousavi},
  title        = {HIV-1-infected T-cells dynamics and prognosis: An evolutionary game
                  model},
  journal      = {Comput. Methods Programs Biomed.},
  volume       = {152},
  pages        = {1--14},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cmpb.2017.08.021},
  doi          = {10.1016/J.CMPB.2017.08.021},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cmpb/KhazaeiSMZSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ZhangZH17,
  author       = {Rui Zhang and
                  Quanyan Zhu and
                  Yezekael Hayel},
  title        = {A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer
                  Networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {35},
  number       = {3},
  pages        = {779--794},
  year         = {2017},
  url          = {https://doi.org/10.1109/JSAC.2017.2672378},
  doi          = {10.1109/JSAC.2017.2672378},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/ZhangZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/ChenTZ17,
  author       = {Juntao Chen and
                  Corinne Touati and
                  Quanyan Zhu},
  title        = {A Dynamic Game Analysis and Design of Infrastructure Network Protection
                  and Recovery: 125},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {45},
  number       = {2},
  pages        = {128},
  year         = {2017},
  url          = {https://doi.org/10.1145/3152042.3152079},
  doi          = {10.1145/3152042.3152079},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/ChenTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/MiaoZPP17,
  author       = {Fei Miao and
                  Quanyan Zhu and
                  Miroslav Pajic and
                  George J. Pappas},
  title        = {Coding Schemes for Securing Cyber-Physical Systems Against Stealthy
                  Data Injection Attacks},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {4},
  number       = {1},
  pages        = {106--117},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCNS.2016.2573039},
  doi          = {10.1109/TCNS.2016.2573039},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcns/MiaoZPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/LiuZZW17,
  author       = {Yuan Liu and
                  Jie Zhang and
                  Quanyan Zhu and
                  Xingwei Wang},
  title        = {{CONGRESS:} {A} Hybrid Reputation System for Coping with Rating Subjectivity},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {4},
  number       = {3},
  pages        = {163--178},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCSS.2017.2724503},
  doi          = {10.1109/TCSS.2017.2724503},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/LiuZZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZ17,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Dynamic Differential Privacy for ADMM-Based Distributed Classification
                  Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {172--187},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2607691},
  doi          = {10.1109/TIFS.2016.2607691},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HayelZ17,
  author       = {Yezekael Hayel and
                  Quanyan Zhu},
  title        = {Epidemic Protection Over Heterogeneous Networks Using Evolutionary
                  Poisson Games},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1786--1800},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2687883},
  doi          = {10.1109/TIFS.2017.2687883},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HayelZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenZ17,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {Security as a Service for Cloud-Enabled Internet of Controlled Things
                  Under Advanced Persistent Threats: {A} Contract Design Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2736--2750},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2718489},
  doi          = {10.1109/TIFS.2017.2718489},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PawlickZ17,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application
                  to Glucose Control},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2906--2919},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2725224},
  doi          = {10.1109/TIFS.2017.2725224},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PawlickZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ZhouZWZS17,
  author       = {Liuwei Zhou and
                  Quanyan Zhu and
                  Zhijie Wang and
                  Wuneng Zhou and
                  Hongye Su},
  title        = {Adaptive Exponential Synchronization of Multislave Time-Delayed Recurrent
                  Neural Networks With L{\'{e}}vy Noise and Regime Switching},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {28},
  number       = {12},
  pages        = {2885--2898},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNNLS.2016.2609439},
  doi          = {10.1109/TNNLS.2016.2609439},
  timestamp    = {Mon, 09 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/ZhouZWZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/ChenZ17,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {A Game-Theoretic Framework for Resilient and Distributed Generation
                  Control of Renewable Energies in Microgrids},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {8},
  number       = {1},
  pages        = {285--295},
  year         = {2017},
  url          = {https://doi.org/10.1109/TSG.2016.2598771},
  doi          = {10.1109/TSG.2016.2598771},
  timestamp    = {Thu, 27 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/ChenZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ZhangZ17a,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {A game-theoretic defense against data poisoning attacks in distributed
                  support vector machines},
  booktitle    = {56th {IEEE} Annual Conference on Decision and Control, {CDC} 2017,
                  Melbourne, Australia, December 12-15, 2017},
  pages        = {4582--4587},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CDC.2017.8264336},
  doi          = {10.1109/CDC.2017.8264336},
  timestamp    = {Fri, 04 Mar 2022 13:29:55 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/ZhangZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/AnwarZ17,
  author       = {Hamza Anwar and
                  Quanyan Zhu},
  title        = {Minimax robust optimal control of multiscale linear-quadratic systems},
  booktitle    = {51st Annual Conference on Information Sciences and Systems, {CISS}
                  2017, Baltimore, MD, USA, March 22-24, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CISS.2017.7926155},
  doi          = {10.1109/CISS.2017.7926155},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/AnwarZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/ZhangZ17,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {A game-theoretic analysis of label flipping attacks on distributed
                  support vector machines},
  booktitle    = {51st Annual Conference on Information Sciences and Systems, {CISS}
                  2017, Baltimore, MD, USA, March 22-24, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CISS.2017.7926118},
  doi          = {10.1109/CISS.2017.7926118},
  timestamp    = {Fri, 18 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/ZhangZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PawlickZ17,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {Quantitative models of imperfect deception in network security using
                  signaling games with evidence {[IEEE} {CNS} 17 Poster]},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {394--395},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228694},
  doi          = {10.1109/CNS.2017.8228694},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PawlickZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XuZ17,
  author       = {Zhiheng Xu and
                  Quanyan Zhu},
  title        = {Secure and practical output feedback control for cloud-enabled cyber-physical
                  systems},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {416--420},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228703},
  doi          = {10.1109/CNS.2017.8228703},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/XuZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpsweek/XuZ17,
  author       = {Zhiheng Xu and
                  Quanyan Zhu},
  title        = {A Game-Theoretic Approach to Secure Control of Communication-Based
                  Train Control Systems Under Jamming Attacks},
  booktitle    = {Proceedings of the 1st International Workshop on Safe Control of Connected
                  and Autonomous Vehicles, SCAV@CPSWeek 2017, Pittsburgh, PA, USA, April
                  21, 2017},
  pages        = {27--34},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055378.3055381},
  doi          = {10.1145/3055378.3055381},
  timestamp    = {Tue, 06 Nov 2018 16:59:05 +0100},
  biburl       = {https://dblp.org/rec/conf/cpsweek/XuZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpsweek/KurianCZ17,
  author       = {Varghese Kurian and
                  Juntao Chen and
                  Quanyan Zhu},
  editor       = {Panagiotis Tsakalides and
                  Baltasar Beferull{-}Lozano},
  title        = {Electric power dependent dynamic tariffs for water distribution systems},
  booktitle    = {Proceedings of the 3rd International Workshop on Cyber-Physical Systems
                  for Smart Water Networks, CySWATER@CPSWeek 2017, Pittsburgh, Pennsylvania,
                  USA, April 21, 2017},
  pages        = {35--38},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055366.3055373},
  doi          = {10.1145/3055366.3055373},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cpsweek/KurianCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamenets/GubarZT17,
  author       = {Elena A. Gubar and
                  Quanyan Zhu and
                  Vladislav Taynitskiy},
  editor       = {Lingjie Duan and
                  Anibal Sanjab and
                  Husheng Li and
                  Xu Chen and
                  Donatello Materassi and
                  Rachid El Azouzi},
  title        = {Optimal Control of Multi-strain Epidemic Processes in Complex Networks},
  booktitle    = {Game Theory for Networks - 7th International {EAI} Conference, GameNets
                  2017 Knoxville, TN, USA, May 9, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {212},
  pages        = {108--117},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67540-4\_10},
  doi          = {10.1007/978-3-319-67540-4\_10},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamenets/GubarZT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhangZ17,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Strategic Defense Against Deceptive Civilian {GPS} Spoofing of Unmanned
                  Aerial Vehicles},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {213--233},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_12},
  doi          = {10.1007/978-3-319-68711-7\_12},
  timestamp    = {Wed, 07 Feb 2024 17:23:12 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhangZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HorakZB17,
  author       = {Karel Hor{\'{a}}k and
                  Quanyan Zhu and
                  Branislav Bosansk{\'{y}}},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Manipulating Adversary's Belief: {A} Dynamic Game Approach to Deception
                  by Design for Proactive Network Security},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {273--294},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_15},
  doi          = {10.1007/978-3-319-68711-7\_15},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HorakZB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PawlickZ17,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Proactive Defense Against Physical Denial of Service Attacks Using
                  Poisson Signaling Games},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {336--356},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_18},
  doi          = {10.1007/978-3-319-68711-7\_18},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PawlickZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangCZ17,
  author       = {Linan Huang and
                  Juntao Chen and
                  Quanyan Zhu},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent
                  Infrastructure Networks},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {357--376},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_19},
  doi          = {10.1007/978-3-319-68711-7\_19},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HayelZ17,
  author       = {Yezekael Hayel and
                  Quanyan Zhu},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous
                  Complex Networks},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {506--518},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_27},
  doi          = {10.1007/978-3-319-68711-7\_27},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HayelZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globalsip/PawlickZ17,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {A mean-field stackelberg game approach for obfuscation adoption in
                  empirical risk minimization},
  booktitle    = {2017 {IEEE} Global Conference on Signal and Information Processing,
                  GlobalSIP 2017, Montreal, QC, Canada, November 14-16, 2017},
  pages        = {518--522},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GlobalSIP.2017.8308697},
  doi          = {10.1109/GLOBALSIP.2017.8308697},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globalsip/PawlickZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globalsip/AnwarZ17,
  author       = {Hamza Anwar and
                  Quanyan Zhu},
  title        = {Minimax game-theoretic approach to multiscale H-infinity optimal filtering},
  booktitle    = {2017 {IEEE} Global Conference on Signal and Information Processing,
                  GlobalSIP 2017, Montreal, QC, Canada, November 14-16, 2017},
  pages        = {853--857},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GlobalSIP.2017.8309081},
  doi          = {10.1109/GLOBALSIP.2017.8309081},
  timestamp    = {Tue, 13 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globalsip/AnwarZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ChenTZ17,
  author       = {Juntao Chen and
                  Corinne Touati and
                  Quanyan Zhu},
  title        = {Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled
                  Infrastructures},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8254620},
  doi          = {10.1109/GLOCOM.2017.8254620},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ChenTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/FarooqZ17,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Cognitive Connectivity Resilience in Multi-Layer Remotely Deployed
                  Mobile Internet of Things},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8254106},
  doi          = {10.1109/GLOCOM.2017.8254106},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/FarooqZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/TrikiAHZX17,
  author       = {Imen Triki and
                  Rachid El Azouzi and
                  Majed Haddad and
                  Quanyan Zhu and
                  Zhiheng Xu},
  title        = {Learning from experience: {A} dynamic closed-loop QoE optimization
                  for video adaptation and delivery},
  booktitle    = {28th {IEEE} Annual International Symposium on Personal, Indoor, and
                  Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October
                  8-13, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/PIMRC.2017.8292500},
  doi          = {10.1109/PIMRC.2017.8292500},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/TrikiAHZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/WangZ17,
  author       = {Weiyu Wang and
                  Quanyan Zhu},
  editor       = {Nicholas J. Multari and
                  Anoop Singhal and
                  Erin Miller},
  title        = {On the Detection of Adversarial Attacks against Deep Neural Networks},
  booktitle    = {Proceedings of the 2017 Workshop on Automated Decision Making for
                  Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October
                  30 - November 03, 2017},
  pages        = {27--30},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140368.3140373},
  doi          = {10.1145/3140368.3140373},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/WangZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/FarooqEZA17,
  author       = {Muhammad Junaid Farooq and
                  Hesham ElSawy and
                  Quanyan Zhu and
                  Mohamed{-}Slim Alouini},
  title        = {Optimizing mission critical data dissemination in massive IoT networks},
  booktitle    = {15th International Symposium on Modeling and Optimization in Mobile,
                  Ad Hoc, and Wireless Networks, WiOpt 2017, Paris, France, May 15-19,
                  2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://dl.ifip.org/db/conf/wiopt/wiopt2017/1570343226.pdf},
  doi          = {10.23919/WIOPT.2017.7959930},
  timestamp    = {Thu, 09 Dec 2021 12:24:09 +0100},
  biburl       = {https://dblp.org/rec/conf/wiopt/FarooqEZA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/FarooqZ17,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Secure and reconfigurable network design for critical information
                  dissemination in the Internet of battlefield things (IoBT)},
  booktitle    = {15th International Symposium on Modeling and Optimization in Mobile,
                  Ad Hoc, and Wireless Networks, WiOpt 2017, Paris, France, May 15-19,
                  2017},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://dl.ifip.org/db/conf/wiopt/wiopt2017/1570329860.pdf},
  doi          = {10.23919/WIOPT.2017.7959892},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wiopt/FarooqZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/HanawalHZ17,
  author       = {Manjesh Kumar Hanawal and
                  Yezekael Hayel and
                  Quanyan Zhu},
  title        = {Throughput maximization of large-scale secondary networks over licensed
                  and unlicensed spectra},
  booktitle    = {15th International Symposium on Modeling and Optimization in Mobile,
                  Ad Hoc, and Wireless Networks, WiOpt 2017, Paris, France, May 15-19,
                  2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://dl.ifip.org/db/conf/wiopt/wiopt2017/1570346707.pdf},
  doi          = {10.23919/WIOPT.2017.7959879},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wiopt/HanawalHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FarooqZ17,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Secure and Reconfigurable Network Design for Critical Information
                  Dissemination in the Internet of Battlefield Things (IoBT)},
  journal      = {CoRR},
  volume       = {abs/1703.01224},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.01224},
  eprinttype    = {arXiv},
  eprint       = {1703.01224},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FarooqZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TrikiZAHX17,
  author       = {Imen Triki and
                  Quanyan Zhu and
                  Rachid El Azouzi and
                  Majed Haddad and
                  Zhiheng Xu},
  title        = {Learning from Experience: {A} Dynamic Closed-Loop QoE Optimization
                  for Video Adaptation and Delivery},
  journal      = {CoRR},
  volume       = {abs/1703.01986},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.01986},
  eprinttype    = {arXiv},
  eprint       = {1703.01986},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TrikiZAHX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FarooqZ17a,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Optimizing Mission Critical Data Dissemination in Massive IoT Networks},
  journal      = {CoRR},
  volume       = {abs/1704.05954},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.05954},
  eprinttype    = {arXiv},
  eprint       = {1704.05954},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/FarooqZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PawlickZ17b,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {A Mean-Field Stackelberg Game Approach for Obfuscation Adoption in
                  Empirical Risk Minimization},
  journal      = {CoRR},
  volume       = {abs/1706.02693},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.02693},
  eprinttype    = {arXiv},
  eprint       = {1706.02693},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PawlickZ17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhangZ17d,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {Distributed Transfer Linear Support Vector Machines},
  journal      = {CoRR},
  volume       = {abs/1706.05039},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.05039},
  eprinttype    = {arXiv},
  eprint       = {1706.05039},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhangZ17d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PawlickZ17aa,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {Proactive Defense Against Physical Denial of Service Attacks using
                  Poisson Signaling Games},
  journal      = {CoRR},
  volume       = {abs/1707.03708},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.03708},
  eprinttype    = {arXiv},
  eprint       = {1707.03708},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PawlickZ17aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenTZ17,
  author       = {Juntao Chen and
                  Corinne Touati and
                  Quanyan Zhu},
  title        = {Optimal Secure Multi-Layer IoT Network Design},
  journal      = {CoRR},
  volume       = {abs/1707.07046},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.07046},
  eprinttype    = {arXiv},
  eprint       = {1707.07046},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenTZ17a,
  author       = {Juntao Chen and
                  Corinne Touati and
                  Quanyan Zhu},
  title        = {A Dynamic Game Analysis and Design of Infrastructure Network Protection
                  and Recovery},
  journal      = {CoRR},
  volume       = {abs/1707.07054},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.07054},
  eprinttype    = {arXiv},
  eprint       = {1707.07054},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenTZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AnwarZ17,
  author       = {Hamza Anwar and
                  Quanyan Zhu},
  title        = {Minimax Game-Theoretic Approach to Multiscale {\textdollar}H{\_}\{{\textbackslash}infty\}{\textdollar}
                  Optimal Filtering},
  journal      = {CoRR},
  volume       = {abs/1707.07642},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.07642},
  eprinttype    = {arXiv},
  eprint       = {1707.07642},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AnwarZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PawlickNZ17,
  author       = {Jeffrey Pawlick and
                  Thi Thu Hang Nguyen and
                  Quanyan Zhu},
  title        = {Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced
                  Persistent Threats},
  journal      = {CoRR},
  volume       = {abs/1707.08031},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.08031},
  eprinttype    = {arXiv},
  eprint       = {1707.08031},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PawlickNZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PawlickZ17ab,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {Quantitative Models of Imperfect Deception in Network Security using
                  Signaling Games with Evidence},
  journal      = {CoRR},
  volume       = {abs/1707.08035},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.08035},
  eprinttype    = {arXiv},
  eprint       = {1707.08035},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PawlickZ17ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FarooqZ17aa,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Adaptive and Resilient Revenue Maximizing Resource Allocation and
                  Pricing in Cloud Computing Environments},
  journal      = {CoRR},
  volume       = {abs/1707.08691},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.08691},
  eprinttype    = {arXiv},
  eprint       = {1707.08691},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FarooqZ17aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-00621,
  author       = {Muhammad Junaid Farooq and
                  Quanyan Zhu},
  title        = {Cognitive Connectivity Resilience in Multi-layer Remotely Deployed
                  Mobile Internet of Things},
  journal      = {CoRR},
  volume       = {abs/1709.00621},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.00621},
  eprinttype    = {arXiv},
  eprint       = {1709.00621},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-00621.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-00288,
  author       = {Fei Miao and
                  Quanyan Zhu and
                  Miroslav Pajic and
                  George J. Pappas},
  title        = {A Moving-Horizon Hybrid Stochastic Game for Secure Control of Cyber-Physical
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1710.00288},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.00288},
  eprinttype    = {arXiv},
  eprint       = {1710.00288},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-00288.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-04677,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {Game-Theoretic Design of Secure and Resilient Distributed Support
                  Vector Machines with Adversaries},
  journal      = {CoRR},
  volume       = {abs/1710.04677},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.04677},
  eprinttype    = {arXiv},
  eprint       = {1710.04677},
  timestamp    = {Sun, 22 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-04677.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-06454,
  author       = {Juntao Chen and
                  Rui Zhang and
                  Quanyan Zhu},
  title        = {Optimal Control of Interdependent Epidemics in Complex Networks},
  journal      = {CoRR},
  volume       = {abs/1710.06454},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.06454},
  eprinttype    = {arXiv},
  eprint       = {1710.06454},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-06454.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-05441,
  author       = {Jeffrey Pawlick and
                  Edward Colbert and
                  Quanyan Zhu},
  title        = {A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity
                  and Privacy},
  journal      = {CoRR},
  volume       = {abs/1712.05441},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.05441},
  eprinttype    = {arXiv},
  eprint       = {1712.05441},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-05441.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/FungZ16,
  author       = {Carol J. Fung and
                  Quanyan Zhu},
  title        = {{FACID:} {A} trust-based collaborative decision framework for intrusion
                  detection networks},
  journal      = {Ad Hoc Networks},
  volume       = {53},
  pages        = {17--31},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.adhoc.2016.08.014},
  doi          = {10.1016/J.ADHOC.2016.08.014},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/FungZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmot/CaseyMWZM16,
  author       = {William Casey and
                  Jose Andre Morales and
                  Evan Wright and
                  Quanyan Zhu and
                  Bud Mishra},
  title        = {Compliance signaling games: toward modeling the deterrence of insider
                  threats},
  journal      = {Comput. Math. Organ. Theory},
  volume       = {22},
  number       = {3},
  pages        = {318--349},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10588-016-9221-5},
  doi          = {10.1007/S10588-016-9221-5},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cmot/CaseyMWZM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jota/BausoZB16,
  author       = {Dario Bauso and
                  Quanyan Zhu and
                  Tamer Basar},
  title        = {Decomposition and Mean-Field Approach to Mixed Integer Optimal Compensation
                  Problems},
  journal      = {J. Optim. Theory Appl.},
  volume       = {169},
  number       = {2},
  pages        = {606--630},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10957-016-0881-6},
  doi          = {10.1007/S10957-016-0881-6},
  timestamp    = {Tue, 07 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jota/BausoZB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/orl/SimhonHSZ16,
  author       = {Eran Simhon and
                  Yezekael Hayel and
                  David Starobinski and
                  Quanyan Zhu},
  title        = {Optimal information disclosure policies in strategic queueing games},
  journal      = {Oper. Res. Lett.},
  volume       = {44},
  number       = {1},
  pages        = {109--113},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.orl.2015.12.005},
  doi          = {10.1016/J.ORL.2015.12.005},
  timestamp    = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/orl/SimhonHSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/MaharjanZZGB16,
  author       = {Sabita Maharjan and
                  Quanyan Zhu and
                  Yan Zhang and
                  Stein Gjessing and
                  Tamer Basar},
  title        = {Demand Response Management in the Smart Grid in a Large Population
                  Regime},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {7},
  number       = {1},
  pages        = {189--199},
  year         = {2016},
  url          = {https://doi.org/10.1109/TSG.2015.2431324},
  doi          = {10.1109/TSG.2015.2431324},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/MaharjanZZGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/XuZ16,
  author       = {Zhiheng Xu and
                  Quanyan Zhu},
  title        = {Cross-layer secure cyber-physical control system design for networked
                  3D printers},
  booktitle    = {2016 American Control Conference, {ACC} 2016, Boston, MA, USA, July
                  6-8, 2016},
  pages        = {1191--1196},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACC.2016.7525079},
  doi          = {10.1109/ACC.2016.7525079},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/XuZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/ChenZ16,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {Interdependent network formation games with an application to critical
                  infrastructures},
  booktitle    = {2016 American Control Conference, {ACC} 2016, Boston, MA, USA, July
                  6-8, 2016},
  pages        = {2870--2875},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACC.2016.7525354},
  doi          = {10.1109/ACC.2016.7525354},
  timestamp    = {Wed, 05 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/ChenZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangZ16,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {A Dual Perturbation Approach for Differential Private ADMM-Based Distributed
                  Empirical Risk Minimization},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {129--137},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996762},
  doi          = {10.1145/2996758.2996762},
  timestamp    = {Mon, 26 Jun 2023 20:41:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ChenZ16,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {Resilient and decentralized control of multi-level cooperative mobile
                  networks to maintain connectivity under adversarial environment},
  booktitle    = {55th {IEEE} Conference on Decision and Control, {CDC} 2016, Las Vegas,
                  NV, USA, December 12-14, 2016},
  pages        = {5183--5188},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CDC.2016.7799062},
  doi          = {10.1109/CDC.2016.7799062},
  timestamp    = {Fri, 04 Mar 2022 13:29:43 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/ChenZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassZ16,
  author       = {Stefan Rass and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {{GADAPT:} {A} Sequential Game-Theoretic Framework for Designing Defense-in-Depth
                  Strategies Against Advanced Persistent Threats},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {314--326},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_18},
  doi          = {10.1007/978-3-319-47413-7\_18},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ChenZ16,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Optimal Contract Design Under Asymmetric Information for Cloud-Enabled
                  Internet of Controlled Things},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {329--348},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_19},
  doi          = {10.1007/978-3-319-47413-7\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ChenZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MohammadiMMZ16,
  author       = {Amin Mohammadi and
                  Mohammad Hossein Manshaei and
                  Monireh Mohebbi Moghaddam and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {A Game-Theoretic Analysis of Deception over Social Networks Using
                  Fake Avatars},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {382--394},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_22},
  doi          = {10.1007/978-3-319-47413-7\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MohammadiMMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MongaZ16,
  author       = {Amnol Monga and
                  Quanyan Zhu},
  title        = {On solving large-scale low-rank zero-sum security games of incomplete
                  information},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823923},
  doi          = {10.1109/WIFS.2016.7823923},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MongaZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PawlickZ16,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {A Stackelberg game perspective on the conflict between machine learning
                  and data obfuscation},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823893},
  doi          = {10.1109/WIFS.2016.7823893},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/PawlickZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2016,
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7},
  doi          = {10.1007/978-3-319-47413-7},
  isbn         = {978-3-319-47412-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhangZ16,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Dynamic Privacy For Distributed Machine Learning Over Network},
  journal      = {CoRR},
  volume       = {abs/1601.03466},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.03466},
  eprinttype    = {arXiv},
  eprint       = {1601.03466},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhangZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenZ16,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {A Game-Theoretic Framework for Resilient and Distributed Generation
                  Control of Renewable Energies in Microgrids},
  journal      = {CoRR},
  volume       = {abs/1601.04583},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.04583},
  eprinttype    = {arXiv},
  eprint       = {1601.04583},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenZ16b,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {Interdependent Network Formation Games},
  journal      = {CoRR},
  volume       = {abs/1602.07745},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.07745},
  eprinttype    = {arXiv},
  eprint       = {1602.07745},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenZ16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MiaoZPP16,
  author       = {Fei Miao and
                  Quanyan Zhu and
                  Miroslav Pajic and
                  George J. Pappas},
  title        = {Coding Schemes for Securing Cyber-Physical Systems Against Stealthy
                  Data Injection Attacks},
  journal      = {CoRR},
  volume       = {abs/1605.08962},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.08962},
  eprinttype    = {arXiv},
  eprint       = {1605.08962},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MiaoZPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PawlickZ16b,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {A Stackelberg Game Perspective on the Conflict Between Machine Learning
                  and Data Obfuscation},
  journal      = {CoRR},
  volume       = {abs/1608.02546},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.02546},
  eprinttype    = {arXiv},
  eprint       = {1608.02546},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PawlickZ16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenZ16d,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {A Stackelberg Game Approach for Two-Level Distributed Energy Management
                  in Smart Grids},
  journal      = {CoRR},
  volume       = {abs/1608.08253},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.08253},
  eprinttype    = {arXiv},
  eprint       = {1608.08253},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenZ16d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuZ15,
  author       = {Zhiheng Xu and
                  Quanyan Zhu},
  editor       = {Indrajit Ray and
                  Roshan K. Thomas and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {Secure and Resilient Control Design for Cloud Enabled Networked Control
                  Systems},
  booktitle    = {Proceedings of the First {ACM} Workshop on Cyber-Physical Systems-Security
                  and/or PrivaCy, {CPS-SPC} 2015, Denver, Colorado, USA, October 16,
                  2015},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808705.2808708},
  doi          = {10.1145/2808705.2808708},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaseyZMM15,
  author       = {William Austin Casey and
                  Quanyan Zhu and
                  Jose Andre Morales and
                  Bud Mishra},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Compliance Control: Managed Vulnerability Surface in Social-Technological
                  Systems via Signaling Games},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {53--62},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808788},
  doi          = {10.1145/2808783.2808788},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaseyZMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/HayelZ15,
  author       = {Yezekael Hayel and
                  Quanyan Zhu},
  title        = {Evolutionary Poisson games for controlling large population behaviors},
  booktitle    = {54th {IEEE} Conference on Decision and Control, {CDC} 2015, Osaka,
                  Japan, December 15-18, 2015},
  pages        = {300--305},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CDC.2015.7402217},
  doi          = {10.1109/CDC.2015.7402217},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/HayelZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/XuZ15,
  author       = {Zhiheng Xu and
                  Quanyan Zhu},
  title        = {A cyber-physical game framework for secure and resilient multi-agent
                  autonomous systems},
  booktitle    = {54th {IEEE} Conference on Decision and Control, {CDC} 2015, Osaka,
                  Japan, December 15-18, 2015},
  pages        = {5156--5161},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CDC.2015.7403026},
  doi          = {10.1109/CDC.2015.7403026},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/XuZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/HayelSSZ15,
  author       = {Yezekael Hayel and
                  Eran Simhon and
                  David Starobinski and
                  Quanyan Zhu},
  title        = {Distributed strategic mode selection for large-scale {D2D} communications
                  based on Queue State Information},
  booktitle    = {49th Annual Conference on Information Sciences and Systems, {CISS}
                  2015, Baltimore, MD, USA, March 18-20, 2015},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISS.2015.7086844},
  doi          = {10.1109/CISS.2015.7086844},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/HayelSSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/HayelZ15,
  author       = {Yezekael Hayel and
                  Quanyan Zhu},
  title        = {Resilient and secure network design for cyber attack-induced cascading
                  link failures in critical infrastructures},
  booktitle    = {49th Annual Conference on Information Sciences and Systems, {CISS}
                  2015, Baltimore, MD, USA, March 18-20, 2015},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISS.2015.7086855},
  doi          = {10.1109/CISS.2015.7086855},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/HayelZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FarhangHZ15,
  author       = {Sadegh Farhang and
                  Yezekael Hayel and
                  Quanyan Zhu},
  title        = {PHY-layer location privacy-preserving access point selection mechanism
                  in next-generation wireless networks},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {263--271},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346836},
  doi          = {10.1109/CNS.2015.7346836},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FarhangHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fusion/ZhangZ15,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {Secure and resilient distributed machine learning under adversarial
                  environments},
  booktitle    = {18th International Conference on Information Fusion, {FUSION} 2015,
                  Washington, DC, USA, July 6-9, 2015},
  pages        = {644--651},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7266621/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fusion/ZhangZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HayelZ15,
  author       = {Yezekael Hayel and
                  Quanyan Zhu},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {22--34},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_2},
  doi          = {10.1007/978-3-319-25594-1\_2},
  timestamp    = {Thu, 17 Sep 2020 10:44:10 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HayelZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PawlickFZ15,
  author       = {Jeffrey Pawlick and
                  Sadegh Farhang and
                  Quanyan Zhu},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Flip the Cloud: Cyber-Physical Signaling Games in the Presence of
                  Advanced Persistent Threats},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {289--308},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_16},
  doi          = {10.1007/978-3-319-25594-1\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PawlickFZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MoghaddamMZ15,
  author       = {Monireh Mohebbi Moghaddam and
                  Mohammad Hossein Manshaei and
                  Quanyan Zhu},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {To Trust or Not: {A} Security Signaling Game Between Service Provider
                  and Client},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {322--333},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_18},
  doi          = {10.1007/978-3-319-25594-1\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MoghaddamMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/XuZ15,
  author       = {Zhiheng Xu and
                  Quanyan Zhu},
  title        = {Environment-aware power generation scheduling in smart grids},
  booktitle    = {2015 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2015, Miami, FL, USA, November 2-5, 2015},
  pages        = {253--258},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/SmartGridComm.2015.7436309},
  doi          = {10.1109/SMARTGRIDCOMM.2015.7436309},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/XuZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/ChenZZ15,
  author       = {Juntao Chen and
                  Liuwei Zhou and
                  Quanyan Zhu},
  title        = {Resilient control design for wind turbines using Markov jump linear
                  system model with l{\'{e}}vy noise},
  booktitle    = {2015 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2015, Miami, FL, USA, November 2-5, 2015},
  pages        = {828--833},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/SmartGridComm.2015.7436404},
  doi          = {10.1109/SMARTGRIDCOMM.2015.7436404},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/ChenZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/PawlickZ15,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {Deception by Design: Evidence-Based Signaling Games for Network Defense},
  booktitle    = {14th Annual Workshop on the Economics of Information Security, {WEIS}
                  2015, Delft, The Netherlands, 22-23 June, 2015},
  year         = {2015},
  url          = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_pawlick.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/PawlickZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FarhangHZ15,
  author       = {Sadegh Farhang and
                  Yezekael Hayel and
                  Quanyan Zhu},
  title        = {Physical layer location privacy issue in wireless small cell networks},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {32:1--32:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774990},
  doi          = {10.1145/2766498.2774990},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FarhangHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PawlickZ15,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {Deception by Design: Evidence-Based Signaling Games for Network Defense},
  journal      = {CoRR},
  volume       = {abs/1503.05458},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.05458},
  eprinttype    = {arXiv},
  eprint       = {1503.05458},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PawlickZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HayelZ15,
  author       = {Yezekael Hayel and
                  Quanyan Zhu},
  title        = {Evolutionary Poisson Games for Controlling Large Population Behaviors},
  journal      = {CoRR},
  volume       = {abs/1503.08085},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.08085},
  eprinttype    = {arXiv},
  eprint       = {1503.08085},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HayelZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZahirPSPZ15,
  author       = {Saboor Zahir and
                  John Pak and
                  Jatinder Singh and
                  Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {Protection and Deception: Discovering Game Theory and Cyber Literacy
                  through a Novel Board Game Experience},
  journal      = {CoRR},
  volume       = {abs/1505.05570},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.05570},
  eprinttype    = {arXiv},
  eprint       = {1505.05570},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZahirPSPZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenZ15a,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {Resilient and Decentralized Control of Multi-level Cooperative Robotic
                  Networks to Maintain Connectivity under Adversarial Attacks},
  journal      = {CoRR},
  volume       = {abs/1505.07158},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.07158},
  eprinttype    = {arXiv},
  eprint       = {1505.07158},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenZ15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PawlickFZ15,
  author       = {Jeffrey Pawlick and
                  Sadegh Farhang and
                  Quanyan Zhu},
  title        = {Flip the Cloud: Cyber-Physical Signaling Games in the Presence of
                  Advanced Persistent Threats},
  journal      = {CoRR},
  volume       = {abs/1507.00576},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.00576},
  eprinttype    = {arXiv},
  eprint       = {1507.00576},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PawlickFZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/HouWZL14,
  author       = {Ronghui Hou and
                  Chuqing Wang and
                  Quanyan Zhu and
                  Jiandong Li},
  title        = {Interference-aware QoS multicast routing for smart grid},
  journal      = {Ad Hoc Networks},
  volume       = {22},
  pages        = {13--26},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.adhoc.2014.05.008},
  doi          = {10.1016/J.ADHOC.2014.05.008},
  timestamp    = {Mon, 12 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/HouWZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/TembineZB14,
  author       = {Hamidou Tembine and
                  Quanyan Zhu and
                  Tamer Basar},
  title        = {Risk-Sensitive Mean-Field Games},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {59},
  number       = {4},
  pages        = {835--850},
  year         = {2014},
  url          = {https://doi.org/10.1109/TAC.2013.2289711},
  doi          = {10.1109/TAC.2013.2289711},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/TembineZB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/MiaoZ14,
  author       = {Fei Miao and
                  Quanyan Zhu},
  title        = {A moving-horizon hybrid stochastic game for secure control of cyber-physical
                  systems},
  booktitle    = {53rd {IEEE} Conference on Decision and Control, {CDC} 2014, Los Angeles,
                  CA, USA, December 15-17, 2014},
  pages        = {517--522},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CDC.2014.7039433},
  doi          = {10.1109/CDC.2014.7039433},
  timestamp    = {Fri, 04 Mar 2022 13:29:15 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/MiaoZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/MiaoZPP14,
  author       = {Fei Miao and
                  Quanyan Zhu and
                  Miroslav Pajic and
                  George J. Pappas},
  title        = {Coding sensor outputs for injection attacks detection},
  booktitle    = {53rd {IEEE} Conference on Decision and Control, {CDC} 2014, Los Angeles,
                  CA, USA, December 15-17, 2014},
  pages        = {5776--5781},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CDC.2014.7040293},
  doi          = {10.1109/CDC.2014.7040293},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/MiaoZPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AliYAKZ14,
  author       = {Muhammad Qasim Ali and
                  Reza Yousefian and
                  Ehab Al{-}Shaer and
                  Sukumar Kamalasadan and
                  Quanyan Zhu},
  title        = {Two-tier data-driven intrusion detection for automatic generation
                  control in smart grid},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {292--300},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997497},
  doi          = {10.1109/CNS.2014.6997497},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AliYAKZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/FarhangMEZ14,
  author       = {Sadegh Farhang and
                  Mohammad Hossein Manshaei and
                  Milad Nasr Esfahani and
                  Quanyan Zhu},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism
                  Design},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {319--328},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_18},
  doi          = {10.1007/978-3-319-12601-2\_18},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/FarhangMEZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Zhu13a,
  author       = {Quanyan Zhu},
  title        = {Game-theoretic methods for security and resilience in cyber-physical
                  systems},
  school       = {University of Illinois Urbana-Champaign, {USA}},
  year         = {2013},
  url          = {https://hdl.handle.net/2142/45479},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Zhu13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ManshaeiZABH13,
  author       = {Mohammad Hossein Manshaei and
                  Quanyan Zhu and
                  Tansu Alpcan and
                  Tamer Basar and
                  Jean{-}Pierre Hubaux},
  title        = {Game theory meets network security and privacy},
  journal      = {{ACM} Comput. Surv.},
  volume       = {45},
  number       = {3},
  pages        = {25:1--25:39},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480741.2480742},
  doi          = {10.1145/2480741.2480742},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/ManshaeiZABH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dga/ZhuB13,
  author       = {Quanyan Zhu and
                  Tamer Basar},
  title        = {Multi-Resolution Large Population Stochastic Differential Games and
                  Their Application to Demand Response Management in the Smart Grid},
  journal      = {Dyn. Games Appl.},
  volume       = {3},
  number       = {1},
  pages        = {68--88},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13235-013-0072-0},
  doi          = {10.1007/S13235-013-0072-0},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dga/ZhuB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ZhangZZBH13,
  author       = {Qi Zhang and
                  Quanyan Zhu and
                  Mohamed Faten Zhani and
                  Raouf Boutaba and
                  Joseph L. Hellerstein},
  title        = {Dynamic Service Placement in Geographically Distributed Clouds},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {31},
  number       = {12-Supplement},
  pages        = {762--772},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSAC.2013.SUP2.1213008},
  doi          = {10.1109/JSAC.2013.SUP2.1213008},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsac/ZhangZZBH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/MaharjanZZGB13,
  author       = {Sabita Maharjan and
                  Quanyan Zhu and
                  Yan Zhang and
                  Stein Gjessing and
                  Tamer Basar},
  title        = {Dependable Demand Response Management in the Smart Grid: {A} Stackelberg
                  Game Approach},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {4},
  number       = {1},
  pages        = {120--132},
  year         = {2013},
  url          = {https://doi.org/10.1109/TSG.2012.2223766},
  doi          = {10.1109/TSG.2012.2223766},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/MaharjanZZGB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/ZhuB13,
  author       = {Quanyan Zhu and
                  Linda Bushnell},
  title        = {Networked cyber-physical systems: Interdependence, resilience and
                  information exchange},
  booktitle    = {51st Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2013, Allerton Park {\&} Retreat Center, Monticello,
                  IL, USA, October 2-4, 2013},
  pages        = {763--769},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/Allerton.2013.6736601},
  doi          = {10.1109/ALLERTON.2013.6736601},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/allerton/ZhuB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/ClarkZPB13,
  author       = {Andrew Clark and
                  Quanyan Zhu and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {An impact-aware defense against Stuxnet},
  booktitle    = {American Control Conference, {ACC} 2013, Washington, DC, USA, June
                  17-19, 2013},
  pages        = {4140--4147},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ACC.2013.6580475},
  doi          = {10.1109/ACC.2013.6580475},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/ClarkZPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ZhuCPB13,
  author       = {Quanyan Zhu and
                  Andrew Clark and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Deployment and exploitation of deceptive honeybots in social networks},
  booktitle    = {Proceedings of the 52nd {IEEE} Conference on Decision and Control,
                  {CDC} 2013, Florence, Italy, December 10-13, 2013},
  pages        = {212--219},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CDC.2013.6759884},
  doi          = {10.1109/CDC.2013.6759884},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/ZhuCPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ZyskowskiZ13,
  author       = {Matthew Zyskowski and
                  Quanyan Zhu},
  title        = {Price and variance of anarchy in mean-variance cost density-shaping
                  stochastic differential games},
  booktitle    = {Proceedings of the 52nd {IEEE} Conference on Decision and Control,
                  {CDC} 2013, Florence, Italy, December 10-13, 2013},
  pages        = {1720--1725},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CDC.2013.6760130},
  doi          = {10.1109/CDC.2013.6760130},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/ZyskowskiZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/ZhuBB13,
  author       = {Quanyan Zhu and
                  Linda Bushnell and
                  Tamer Basar},
  editor       = {Danielle C. Tarraf},
  title        = {Resilient Distributed Control of Multi-agent Cyber-Physical Systems},
  booktitle    = {Control of Cyber-Physical Systems, Workshop Held at The Johns Hopkins
                  University, Baltimore, MD, USA, March 2013},
  series       = {Lecture Notes in Control and Information Sciences},
  volume       = {449},
  pages        = {301--316},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-01159-2\_16},
  doi          = {10.1007/978-3-319-01159-2\_16},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/ZhuBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucc/GubarZ13,
  author       = {Elena A. Gubar and
                  Quanyan Zhu},
  title        = {Optimal control of influenza epidemic model with virus mutations},
  booktitle    = {12th European Control Conference, {ECC} 2013, Zurich, Switzerland,
                  July 17-19, 2013},
  pages        = {3125--3130},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.23919/ECC.2013.6669732},
  doi          = {10.23919/ECC.2013.6669732},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eucc/GubarZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhuB13,
  author       = {Quanyan Zhu and
                  Tamer Basar},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target
                  Defense},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {246--263},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_15},
  doi          = {10.1007/978-3-319-02786-9\_15},
  timestamp    = {Tue, 10 Sep 2019 13:47:28 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhuB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/DanLTZN13,
  author       = {Gy{\"{o}}rgy D{\'{a}}n and
                  King{-}Shan Lui and
                  Rehana Tabassum and
                  Quanyan Zhu and
                  Klara Nahrstedt},
  title        = {{SELINDA:} {A} secure, scalable and light-weight data collection protocol
                  for smart grids},
  booktitle    = {{IEEE} Fourth International Conference on Smart Grid Communications,
                  SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013},
  pages        = {480--485},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SmartGridComm.2013.6688004},
  doi          = {10.1109/SMARTGRIDCOMM.2013.6688004},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/DanLTZN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/0020HKUZMMW13,
  author       = {Wei Chen and
                  Dayu Huang and
                  Ankur A. Kulkarni and
                  Jayakrishnan Unnikrishnan and
                  Quanyan Zhu and
                  Prashant G. Mehta and
                  Sean P. Meyn and
                  Adam Wierman},
  title        = {Approximate dynamic programming using fluid and diffusion approximations
                  with applications to power management},
  journal      = {CoRR},
  volume       = {abs/1307.1759},
  year         = {2013},
  url          = {http://arxiv.org/abs/1307.1759},
  eprinttype    = {arXiv},
  eprint       = {1307.1759},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/0020HKUZMMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ZhuYSHB12,
  author       = {Quanyan Zhu and
                  Zhou Yuan and
                  Ju Bin Song and
                  Zhu Han and
                  Tamer Basar},
  title        = {Interference Aware Routing Game for Cognitive Radio Multi-Hop Networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {30},
  number       = {10},
  pages        = {2006--2015},
  year         = {2012},
  url          = {https://doi.org/10.1109/JSAC.2012.121115},
  doi          = {10.1109/JSAC.2012.121115},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsac/ZhuYSHB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ZhuFBB12,
  author       = {Quanyan Zhu and
                  Carol J. Fung and
                  Raouf Boutaba and
                  Tamer Basar},
  title        = {{GUIDEX:} {A} Game-Theoretic Incentive-Based Mechanism for Intrusion
                  Detection Networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {30},
  number       = {11},
  pages        = {2220--2230},
  year         = {2012},
  url          = {https://doi.org/10.1109/JSAC.2012.121214},
  doi          = {10.1109/JSAC.2012.121214},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/ZhuFBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/BausoZB12,
  author       = {Dario Bauso and
                  Quanyan Zhu and
                  Tamer Basar},
  title        = {Mixed integer optimal compensation: Decompositions and mean-field
                  approximations},
  booktitle    = {American Control Conference, {ACC} 2012, Montreal, QC, Canada, June
                  27-29, 2012},
  pages        = {2663--2668},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ACC.2012.6315277},
  doi          = {10.1109/ACC.2012.6315277},
  timestamp    = {Sun, 08 Aug 2021 01:40:54 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/BausoZB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/ZhuZSDB12,
  author       = {Quanyan Zhu and
                  Jiangmeng Zhang and
                  Peter W. Sauer and
                  Alejandro D. Dom{\'{\i}}nguez{-}Garc{\'{\i}}a and
                  Tamer Basar},
  title        = {A game-theoretic framework for control of distributed renewable-based
                  energy resources in smart grids},
  booktitle    = {American Control Conference, {ACC} 2012, Montreal, QC, Canada, June
                  27-29, 2012},
  pages        = {3623--3628},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ACC.2012.6315275},
  doi          = {10.1109/ACC.2012.6315275},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/ZhuZSDB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ZhuCPB12,
  author       = {Quanyan Zhu and
                  Andrew Clark and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Deceptive routing games},
  booktitle    = {Proceedings of the 51th {IEEE} Conference on Decision and Control,
                  {CDC} 2012, December 10-13, 2012, Maui, HI, {USA}},
  pages        = {2704--2711},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CDC.2012.6426515},
  doi          = {10.1109/CDC.2012.6426515},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/ZhuCPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ZhuBB12,
  author       = {Quanyan Zhu and
                  Linda Bushnell and
                  Tamer Basar},
  title        = {Game-theoretic analysis of node capture and cloning attack with multiple
                  attackers in wireless sensor networks},
  booktitle    = {Proceedings of the 51th {IEEE} Conference on Decision and Control,
                  {CDC} 2012, December 10-13, 2012, Maui, HI, {USA}},
  pages        = {3404--3411},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CDC.2012.6426481},
  doi          = {10.1109/CDC.2012.6426481},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/ZhuBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ClarkZPB12,
  author       = {Andrew Clark and
                  Quanyan Zhu and
                  Radha Poovendran and
                  Tamer Basar},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Deceptive Routing in Relay Networks},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {171--185},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_10},
  doi          = {10.1007/978-3-642-34266-0\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ClarkZPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicons/ZhuB12,
  author       = {Quanyan Zhu and
                  Tamer Basar},
  editor       = {S. Shankar Sastry and
                  Tamer Basar and
                  Saurabh Amin and
                  Gabor Karsai},
  title        = {A dynamic game-theoretic approach to resilient control system design
                  for cascading failures},
  booktitle    = {1st International Conference on High Confidence Networked Systems
                  (HiCoNS - at {CPS} Week 2012), HiCoNS '12, Beijing, China, April 17-18,
                  2012},
  pages        = {41--46},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185505.2185512},
  doi          = {10.1145/2185505.2185512},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicons/ZhuB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icac/ZhangZZZBH12,
  author       = {Qi Zhang and
                  Mohamed Faten Zhani and
                  Shuo Zhang and
                  Quanyan Zhu and
                  Raouf Boutaba and
                  Joseph L. Hellerstein},
  editor       = {Dejan S. Milojicic and
                  Dongyan Xu and
                  Vanish Talwar},
  title        = {Dynamic energy-aware capacity provisioning for cloud computing environments},
  booktitle    = {9th International Conference on Autonomic Computing, ICAC'12, San
                  Jose, CA, USA, September 16 - 20, 2012},
  pages        = {145--154},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2371536.2371562},
  doi          = {10.1145/2371536.2371562},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icac/ZhangZZZBH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuHB12,
  author       = {Quanyan Zhu and
                  Zhu Han and
                  Tamer Basar},
  title        = {A differential game approach to distributed demand side management
                  in smart grid},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {3345--3350},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6364562},
  doi          = {10.1109/ICC.2012.6364562},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/ZhuHB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ZhangZZB12,
  author       = {Qi Zhang and
                  Quanyan Zhu and
                  Mohamed Faten Zhani and
                  Raouf Boutaba},
  title        = {Dynamic Service Placement in Geographically Distributed Clouds},
  booktitle    = {2012 {IEEE} 32nd International Conference on Distributed Computing
                  Systems, Macau, China, June 18-21, 2012},
  pages        = {526--535},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDCS.2012.74},
  doi          = {10.1109/ICDCS.2012.74},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ZhangZZB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhuGB12,
  author       = {Quanyan Zhu and
                  Carl A. Gunter and
                  Tamer Basar},
  editor       = {Carl A. Gunter and
                  Zachary N. J. Peterson},
  title        = {Tragedy of Anticommons in Digital Right Management of Medical Records},
  booktitle    = {3rd {USENIX} Workshop on Health Security and Privacy, HealthSec'12,
                  Bellevue, WA, USA, August 6-7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/healthsec12/workshop-program/presentation/zhu},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhuGB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-5844,
  author       = {Quanyan Zhu and
                  Andrew Clark and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {{SODEXO:} {A} System Framework for Deployment and Exploitation of
                  Deceptive Honeybots in Social Networks},
  journal      = {CoRR},
  volume       = {abs/1207.5844},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.5844},
  eprinttype    = {arXiv},
  eprint       = {1207.5844},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-5844.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-2806,
  author       = {Hamidou Tembine and
                  Quanyan Zhu and
                  Tamer Basar},
  title        = {Risk-Sensitive Mean Field Games},
  journal      = {CoRR},
  volume       = {abs/1210.2806},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.2806},
  eprinttype    = {arXiv},
  eprint       = {1210.2806},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-2806.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dga/BasarZ11,
  author       = {Tamer Basar and
                  Quanyan Zhu},
  title        = {Prices of Anarchy, Information, and Cooperation in Differential Games},
  journal      = {Dyn. Games Appl.},
  volume       = {1},
  number       = {1},
  pages        = {50--73},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13235-010-0002-3},
  doi          = {10.1007/S13235-010-0002-3},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dga/BasarZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/SunZHB11,
  author       = {Hui Sun and
                  Quanyan Zhu and
                  Naira Hovakimyan and
                  Tamer Basar},
  title        = {{\(\mathscr{L}\)}1 adaptive control for positive {LTI} systems},
  booktitle    = {American Control Conference, {ACC} 2011, San Francisco, CA, USA, June
                  29 - July 1, 2011},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ACC.2011.5991472},
  doi          = {10.1109/ACC.2011.5991472},
  timestamp    = {Wed, 08 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/SunZHB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/ZhuTB11,
  author       = {Quanyan Zhu and
                  Hamidou Tembine and
                  Tamer Basar},
  title        = {Distributed strategic learning with application to network security},
  booktitle    = {American Control Conference, {ACC} 2011, San Francisco, CA, USA, June
                  29 - July 1, 2011},
  pages        = {4057--4062},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ACC.2011.5991373},
  doi          = {10.1109/ACC.2011.5991373},
  timestamp    = {Wed, 08 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/ZhuTB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FungZBB11,
  author       = {Carol J. Fung and
                  Quanyan Zhu and
                  Raouf Boutaba and
                  Tamer Basar},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: {SMURFEN:} a rule sharing collaborative intrusion detection
                  network},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {761--764},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093487},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FungZBB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ZhuFBB11,
  author       = {Quanyan Zhu and
                  Carol J. Fung and
                  Raouf Boutaba and
                  Tamer Basar},
  title        = {A game-theoretic approach to rule sharing mechanism in networked intrusion
                  detection systems: Robustness, incentives and security},
  booktitle    = {50th {IEEE} Conference on Decision and Control and European Control
                  Conference, 11th European Control Conference, {CDC/ECC} 2011, Orlando,
                  FL, USA, December 12-15, 2011},
  pages        = {243--248},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CDC.2011.6161171},
  doi          = {10.1109/CDC.2011.6161171},
  timestamp    = {Wed, 24 Feb 2021 08:49:08 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/ZhuFBB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ZhuB11,
  author       = {Quanyan Zhu and
                  Tamer Basar},
  title        = {Robust and resilient control design for cyber-physical systems with
                  an application to power systems},
  booktitle    = {50th {IEEE} Conference on Decision and Control and European Control
                  Conference, 11th European Control Conference, {CDC/ECC} 2011, Orlando,
                  FL, USA, December 12-15, 2011},
  pages        = {4066--4071},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CDC.2011.6161031},
  doi          = {10.1109/CDC.2011.6161031},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/ZhuB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ZhuTB11,
  author       = {Quanyan Zhu and
                  Hamidou Tembine and
                  Tamer Basar},
  title        = {Hybrid risk-sensitive mean-field stochastic differential games with
                  application to molecular biology},
  booktitle    = {50th {IEEE} Conference on Decision and Control and European Control
                  Conference, 11th European Control Conference, {CDC/ECC} 2011, Orlando,
                  FL, USA, December 12-15, 2011},
  pages        = {4491--4497},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CDC.2011.6161035},
  doi          = {10.1109/CDC.2011.6161035},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/ZhuTB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/FungZBB11,
  author       = {Carol J. Fung and
                  Quanyan Zhu and
                  Raouf Boutaba and
                  Tamer Basar},
  title        = {{SMURFEN:} {A} system framework for rule sharing collaborative intrusion
                  detection},
  booktitle    = {7th International Conference on Network and Service Management, {CNSM}
                  2011, Paris, France, October 24-28, 2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6104003/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsm/FungZBB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/Zhu11,
  author       = {Quanyan Zhu},
  title        = {Nash meets Van Valkenburg: {A} game-theoretic approach to effective
                  learning and teaching in engineering},
  booktitle    = {2011 Frontiers in Education Conference, {FIE} 2011, Rapid City, SD,
                  USA, October 12-15, 2011},
  pages        = {S4},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/FIE.2011.6142933},
  doi          = {10.1109/FIE.2011.6142933},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/Zhu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhuB11,
  author       = {Quanyan Zhu and
                  Tamer Basar},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Indices of Power in Optimal {IDS} Default Configuration: Theory and
                  Examples},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {7--21},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_3},
  doi          = {10.1007/978-3-642-25280-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhuB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhuSB11,
  author       = {Quanyan Zhu and
                  Ju Bin Song and
                  Tamer Basar},
  title        = {Dynamic Secure Routing Game in Distributed Cognitive Radio Networks},
  booktitle    = {Proceedings of the Global Communications Conference, {GLOBECOM} 2011,
                  5-9 December 2011, Houston, Texas, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/GLOCOM.2011.6133879},
  doi          = {10.1109/GLOCOM.2011.6133879},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhuSB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/ZhuSHPB11,
  author       = {Quanyan Zhu and
                  Walid Saad and
                  Zhu Han and
                  H. Vincent Poor and
                  Tamer Basar},
  title        = {Eavesdropping and jamming in next-generation wireless networks: {A}
                  game-theoretic approach},
  booktitle    = {{MILCOM} 2011 - 2011 {IEEE} Military Communications Conference, Baltimore,
                  MD, USA, November 7-10, 2011},
  pages        = {119--124},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/MILCOM.2011.6127463},
  doi          = {10.1109/MILCOM.2011.6127463},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/ZhuSHPB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netcoop/ZhuB11,
  author       = {Quanyan Zhu and
                  Tamer Basar},
  title        = {A multi-resolution large population game framework for smart grid
                  demand response management},
  booktitle    = {5th International Conference on NETwork Games, COntrol and OPtimization,
                  NetGCooP 2011, Paris, France, October 12-14, 2011},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6103886/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netcoop/ZhuB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socinfo/LiuZZ11,
  author       = {Yuan Liu and
                  Jie Zhang and
                  Quanyan Zhu},
  editor       = {Anwitaman Datta and
                  Stuart W. Shulman and
                  Baihua Zheng and
                  Shou{-}De Lin and
                  Aixin Sun and
                  Ee{-}Peng Lim},
  title        = {Design of a Reputation System Based on Dynamic Coalition Formation},
  booktitle    = {Social Informatics - Third International Conference, SocInfo 2011,
                  Singapore, October 6-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6984},
  pages        = {135--144},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24704-0\_18},
  doi          = {10.1007/978-3-642-24704-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/socinfo/LiuZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/ZhangZB11,
  author       = {Qi Zhang and
                  Quanyan Zhu and
                  Raouf Boutaba},
  title        = {Dynamic Resource Allocation for Spot Markets in Cloud Computing Environments},
  booktitle    = {{IEEE} 4th International Conference on Utility and Cloud Computing,
                  {UCC} 2011, Melbourne, Australia, December 5-8, 2011},
  pages        = {178--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/UCC.2011.33},
  doi          = {10.1109/UCC.2011.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ucc/ZhangZB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-2490,
  author       = {Quanyan Zhu and
                  Lacra Pavel},
  title        = {Enabling Differentiated Services Using Generalized Power Control Model
                  in Optical Networks},
  journal      = {CoRR},
  volume       = {abs/1103.2490},
  year         = {2011},
  url          = {http://arxiv.org/abs/1103.2490},
  eprinttype    = {arXiv},
  eprint       = {1103.2490},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1103-2490.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-2491,
  author       = {Quanyan Zhu and
                  Hamidou Tembine and
                  Tamer Basar},
  title        = {Heterogeneous Learning in Zero-Sum Stochastic Games with Incomplete
                  Information},
  journal      = {CoRR},
  volume       = {abs/1103.2491},
  year         = {2011},
  url          = {http://arxiv.org/abs/1103.2491},
  eprinttype    = {arXiv},
  eprint       = {1103.2491},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1103-2491.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-2493,
  author       = {Quanyan Zhu and
                  Hamidou Tembine and
                  Tamer Basar},
  title        = {A Constrained Evolutionary Gaussian Multiple Access Channel Game},
  journal      = {CoRR},
  volume       = {abs/1103.2493},
  year         = {2011},
  url          = {http://arxiv.org/abs/1103.2493},
  eprinttype    = {arXiv},
  eprint       = {1103.2493},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1103-2493.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-2496,
  author       = {Quanyan Zhu and
                  Hamidou Tembine and
                  Tamer Basar},
  title        = {Evolutionary Games for Multiple Access Control},
  journal      = {CoRR},
  volume       = {abs/1103.2496},
  year         = {2011},
  url          = {http://arxiv.org/abs/1103.2496},
  eprinttype    = {arXiv},
  eprint       = {1103.2496},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1103-2496.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-2579,
  author       = {Tamer Basar and
                  Quanyan Zhu},
  title        = {Prices of Anarchy, Information, and Cooperation in Differential Games},
  journal      = {CoRR},
  volume       = {abs/1103.2579},
  year         = {2011},
  url          = {http://arxiv.org/abs/1103.2579},
  eprinttype    = {arXiv},
  eprint       = {1103.2579},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1103-2579.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1110-1862,
  author       = {Quanyan Zhu and
                  Tamer Basar},
  title        = {Indices of Power in Optimal {IDS} Default Configuration: Theory and
                  Examples},
  journal      = {CoRR},
  volume       = {abs/1110.1862},
  year         = {2011},
  url          = {http://arxiv.org/abs/1110.1862},
  eprinttype    = {arXiv},
  eprint       = {1110.1862},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1110-1862.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/ZhuB10,
  author       = {Quanyan Zhu and
                  Tamer Basar},
  title        = {Price of anarchy and price of information in N-person linear-quadratic
                  differential games},
  booktitle    = {American Control Conference, {ACC} 2010, Baltimore, Maryland, USA,
                  June 30 - July 2, 2010},
  pages        = {762--767},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ACC.2010.5530924},
  doi          = {10.1109/ACC.2010.5530924},
  timestamp    = {Sun, 08 Aug 2021 01:40:56 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/ZhuB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/ZhuTB10,
  author       = {Quanyan Zhu and
                  Hamidou Tembine and
                  Tamer Basar},
  title        = {Network Security Configurations: {A} Nonzero-Sum Stochastic Game Approach},
  booktitle    = {American Control Conference, {ACC} 2010, Baltimore, Maryland, USA,
                  June 30 - July 2, 2010},
  pages        = {1059--1064},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ACC.2010.5530765},
  doi          = {10.1109/ACC.2010.5530765},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/ZhuTB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ZhuTB10,
  author       = {Quanyan Zhu and
                  Hamidou Tembine and
                  Tamer Basar},
  title        = {Heterogeneous learning in zero-sum stochastic games with incomplete
                  information},
  booktitle    = {Proceedings of the 49th {IEEE} Conference on Decision and Control,
                  {CDC} 2010, December 15-17, 2010, Atlanta, Georgia, {USA}},
  pages        = {219--224},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CDC.2010.5718053},
  doi          = {10.1109/CDC.2010.5718053},
  timestamp    = {Fri, 04 Mar 2022 13:28:01 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/ZhuTB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhuYSHB10,
  author       = {Quanyan Zhu and
                  Zhou Yuan and
                  Ju Bin Song and
                  Zhu Han and
                  Tamer Basar},
  title        = {Dynamic Interference Minimization Routing Game for On-Demand Cognitive
                  Pilot Channel},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5683923},
  doi          = {10.1109/GLOCOM.2010.5683923},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhuYSHB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/HuangZKB10,
  author       = {Jane W. Huang and
                  Quanyan Zhu and
                  Vikram Krishnamurthy and
                  Tamer Basar},
  title        = {Distributed correlated Q-learning for dynamic transmission control
                  of sensor networks},
  booktitle    = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
                  and Signal Processing, {ICASSP} 2010, 14-19 March 2010, Sheraton Dallas
                  Hotel, Dallas, Texas, {USA}},
  pages        = {1982--1985},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICASSP.2010.5495265},
  doi          = {10.1109/ICASSP.2010.5495265},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/HuangZKB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuFBB10,
  author       = {Quanyan Zhu and
                  Carol J. Fung and
                  Raouf Boutaba and
                  Tamer Basar},
  title        = {A Distributed Sequential Algorithm for Collaborative Intrusion Detection
                  Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5501981},
  doi          = {10.1109/ICC.2010.5501981},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZhuFBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuHB10,
  author       = {Quanyan Zhu and
                  Zhu Han and
                  Tamer Basar},
  title        = {No-Regret Learning in Collaborative Spectrum Sensing with Malicious
                  Nodes},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5502580},
  doi          = {10.1109/ICC.2010.5502580},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/ZhuHB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuLHB10,
  author       = {Quanyan Zhu and
                  Husheng Li and
                  Zhu Han and
                  Tamer Basar},
  title        = {A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio
                  Systems},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5502451},
  doi          = {10.1109/ICC.2010.5502451},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/ZhuLHB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/FungZBB10,
  author       = {Carol J. Fung and
                  Quanyan Zhu and
                  Raouf Boutaba and
                  Tamer Basar},
  editor       = {Yoshiaki Kiriha and
                  Lisandro Zambenedetti Granville and
                  Deep Medhi and
                  Toshio Tonouchi and
                  Myung{-}Sup Kim},
  title        = {Bayesian decision aggregation in collaborative intrusion detection
                  networks},
  booktitle    = {{IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2010,
                  19-23 April 2010, Osaka, Japan},
  pages        = {349--356},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/NOMS.2010.5488489},
  doi          = {10.1109/NOMS.2010.5488489},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/FungZBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-3190,
  author       = {Quanyan Zhu and
                  Carol J. Fung and
                  Raouf Boutaba and
                  Tamer Basar},
  title        = {A Distributed Sequential Algorithm for Collaborative Intrusion Detection
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1002.3190},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.3190},
  eprinttype    = {arXiv},
  eprint       = {1002.3190},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-3190.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1008-5340,
  author       = {Quanyan Zhu and
                  Zhou Yuan and
                  Ju Bin Song and
                  Zhu Han and
                  Tamer Basar},
  title        = {Dynamic Interference Minimization Routing Game for On-Demand Cognitive
                  Pilot Channel},
  journal      = {CoRR},
  volume       = {abs/1008.5340},
  year         = {2010},
  url          = {http://arxiv.org/abs/1008.5340},
  eprinttype    = {arXiv},
  eprint       = {1008.5340},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1008-5340.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/ZhuP09,
  author       = {Quanyan Zhu and
                  Lacra Pavel},
  title        = {Enabling differentiated services using generalized power control model
                  in optical networks},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {57},
  number       = {9},
  pages        = {2570--2575},
  year         = {2009},
  url          = {https://doi.org/10.1109/TCOMM.2009.09.0701262},
  doi          = {10.1109/TCOMM.2009.09.0701262},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcom/ZhuP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ChenHKUZMMW09,
  author       = {Wei Chen and
                  Dayu Huang and
                  Ankur A. Kulkarni and
                  Jayakrishnan Unnikrishnan and
                  Quanyan Zhu and
                  Prashant G. Mehta and
                  Sean P. Meyn and
                  Adam Wierman},
  title        = {Approximate dynamic programming using fluid and diffusion approximations
                  with applications to power management},
  booktitle    = {Proceedings of the 48th {IEEE} Conference on Decision and Control,
                  {CDC} 2009, combined withe the 28th Chinese Control Conference, December
                  16-18, 2009, Shanghai, China},
  pages        = {3575--3580},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CDC.2009.5399685},
  doi          = {10.1109/CDC.2009.5399685},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/ChenHKUZMMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ZhuB09,
  author       = {Quanyan Zhu and
                  Tamer Basar},
  title        = {Dynamic policy-based {IDS} configuration},
  booktitle    = {Proceedings of the 48th {IEEE} Conference on Decision and Control,
                  {CDC} 2009, combined withe the 28th Chinese Control Conference, December
                  16-18, 2009, Shanghai, China},
  pages        = {8600--8605},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CDC.2009.5399894},
  doi          = {10.1109/CDC.2009.5399894},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/ZhuB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamenets/ZhuFBB09,
  author       = {Quanyan Zhu and
                  Carol J. Fung and
                  Raouf Boutaba and
                  Tamer Basar},
  editor       = {Tamer Basar and
                  Hitay {\"{O}}zbay},
  title        = {A game-theoretical approach to incentive design in collaborative intrusion
                  detection networks},
  booktitle    = {1st International Conference on Game Theory for Networks, {GAMENETS}
                  2009, Istanbul, Turkey, May 13-15, 2009},
  pages        = {384--392},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GAMENETS.2009.5137424},
  doi          = {10.1109/GAMENETS.2009.5137424},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/gamenets/ZhuFBB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamenets/ZhuTB09,
  author       = {Quanyan Zhu and
                  Hamidou Tembine and
                  Tamer Basar},
  editor       = {Tamer Basar and
                  Hitay {\"{O}}zbay},
  title        = {A constrained evolutionary Gaussian multiple access channel game},
  booktitle    = {1st International Conference on Game Theory for Networks, {GAMENETS}
                  2009, Istanbul, Turkey, May 13-15, 2009},
  pages        = {403--410},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GAMENETS.2009.5137426},
  doi          = {10.1109/GAMENETS.2009.5137426},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamenets/ZhuTB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/SaadZBHH09,
  author       = {Walid Saad and
                  Quanyan Zhu and
                  Tamer Basar and
                  Zhu Han and
                  Are Hj{\o}rungnes},
  title        = {Hierarchical Network Formation Games in the Uplink of Multi-Hop Wireless
                  Networks},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5426293},
  doi          = {10.1109/GLOCOM.2009.5426293},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/SaadZBHH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhuTB09,
  author       = {Quanyan Zhu and
                  Hamidou Tembine and
                  Tamer Basar},
  title        = {Evolutionary Games for Hybrid Additive White Gaussian Noise Multiple
                  Access Control},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5425254},
  doi          = {10.1109/GLOCOM.2009.5425254},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhuTB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhuP08,
  author       = {Quanyan Zhu and
                  Lacra Pavel},
  title        = {End-to-end {DWDM} optical link power-control via a Stackelberg revenue-maximizing
                  model},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {6},
  pages        = {505--520},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.705},
  doi          = {10.1002/NEM.705},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhuP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/ZhuP08,
  author       = {Quanyan Zhu and
                  Lacra Pavel},
  title        = {Stackelberg game approach to constrained {OSNR} nash game in {WDM}
                  optical networks},
  booktitle    = {American Control Conference, {ACC} 2008, Seattle, WA, USA, 11-13 June
                  2008},
  pages        = {1967--1972},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACC.2008.4586781},
  doi          = {10.1109/ACC.2008.4586781},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcc/ZhuP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/Zhu08,
  author       = {Quanyan Zhu},
  title        = {A Lagrangian approach to constrained potential games: Theory and examples},
  booktitle    = {Proceedings of the 47th {IEEE} Conference on Decision and Control,
                  {CDC} 2008, December 9-11, 2008, Canc{\'{u}}n, Mexico},
  pages        = {2420--2425},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/CDC.2008.4738596},
  doi          = {10.1109/CDC.2008.4738596},
  timestamp    = {Fri, 04 Mar 2022 13:27:23 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/Zhu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhuB08,
  author       = {Quanyan Zhu and
                  Raouf Boutaba},
  title        = {Nonlinear Quadratic Pricing for Concavifiable Utilities in Network
                  Rate Control},
  booktitle    = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
                  2008, New Orleans, LA, USA, 30 November - 4 December 2008},
  pages        = {1593--1598},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/GLOCOM.2008.ECP.310},
  doi          = {10.1109/GLOCOM.2008.ECP.310},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhuB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuP08,
  author       = {Quanyan Zhu and
                  Lacra Pavel},
  title        = {Service Differentiation via Power Management in {WDM} Optical Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2008, Beijing, China, 19-23 May 2008},
  pages        = {5344--5348},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICC.2008.1002},
  doi          = {10.1109/ICC.2008.1002},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/ZhuP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhuP08,
  author       = {Quanyan Zhu and
                  Lacra Pavel},
  title        = {Theory of Linear Games with Constraints and Its Application to Power
                  Control of Optical Networks},
  booktitle    = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  13-18 April 2008, Phoenix, AZ, {USA}},
  pages        = {1984--1992},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/INFOCOM.2008.263},
  doi          = {10.1109/INFOCOM.2008.263},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhuP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/broadnets/ZhuP07,
  author       = {Quanyan Zhu and
                  Lacra Pavel},
  title        = {Solving constrained {OSNR} Nash game in {WDM} optical networks with
                  a fictitious player},
  booktitle    = {Fourth International Conference on Broadband Communications, Networks
                  and Systems, {(BROADNETS} 2007), 10-14 September 2007, Raleigh, North-Carolina,
                  {USA}},
  pages        = {922--927},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/BROADNETS.2007.4550534},
  doi          = {10.1109/BROADNETS.2007.4550534},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/broadnets/ZhuP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/valuetools/ZhuP07,
  author       = {Quanyan Zhu and
                  Lacra Pavel},
  editor       = {Peter W. Glynn},
  title        = {End-to-end link power control in optical networks using Nash bargaining
                  solution},
  booktitle    = {Proceedings of the 2nd International Conference on Performance Evaluation
                  Methodolgies and Tools, {VALUETOOLS} 2007, Nantes, France, October
                  22-27, 2007},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {10},
  publisher    = {{ICST/ACM}},
  year         = {2007},
  url          = {https://doi.org/10.4108/gamecomm.2007.1921},
  doi          = {10.4108/GAMECOMM.2007.1921},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/valuetools/ZhuP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}