41 results on '"Chen, Juntao"'
Search Results
2. A System-of-Systems Approach to Strategic Cyber-Defense and Robust Switching Control Design for Cyber-Physical Wind Energy Systems
3. Interdependent Decision-Making on Complex Networks
4. Optimal Secure Interdependent Infrastructure Network Design
5. Meta-Network Modeling and Resilience Analysis
6. Background of Game Theory and Network Science
7. MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation
8. Conclusion and Future Work
9. Introduction
10. Factored Markov Game Theory for Secure Interdependent Infrastructure Networks
11. Seismic Response of Segmental Lining Tunnel by Using Shaking Table Test and Numerical Simulation
12. A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks
13. Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things
14. Game Theory on Attack Graph for Cyber Deception
15. Hardware Security and Trust: A New Battlefield of Information
16. Attacking Machine Learning Models for Social Good
17. Security Games over Lexicographic Orders
18. Blocking Adversarial Influence in Social Networks
19. Securing Next-Generation Wireless Networks: Challenges and Opportunities (Extended Abstract)
20. A Review of Multi Agent Perimeter Defense Games
21. Security Games with Insider Threats
22. A Game Theoretic Framework for Software Diversity for Network Security
23. Normalizing Flow Policies for Multi-agent Systems
24. Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks
25. A Data-Driven Distributionally Robust Game Using Wasserstein Distance
26. On the Characterization of Saddle Point Equilibrium for Security Games with Additive Utility
27. Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber Supply Chain Ecosystem
28. Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic
29. Moving Target Defense for Robust Monitoring of Electric Grid Transformers in Adversarial Environments
30. Detection of Dynamically Changing Leaders in Complex Swarms from Observed Dynamic Data
31. Secure Discrete-Time Linear-Quadratic Mean-Field Games
32. Harnessing the Power of Deception in Attack Graph-Based Security Games
33. Learning and Planning in the Feature Deception Problem
34. Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games
35. A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine Learning
36. Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots
37. Decoy Allocation Games on Graphs with Temporal Logic Objectives
38. Popular Imperceptibility Measures in Visual Adversarial Attacks are Far from Human Perception
39. Distributed Generative Adversarial Networks for Anomaly Detection
40. Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense
41. Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception Game of Questionable Veracity
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.