Search

Your search keyword '"Chen, Juntao"' showing total 41 results

Search Constraints

Start Over You searched for: Author "Chen, Juntao" Remove constraint Author: "Chen, Juntao" Publication Type eBooks Remove constraint Publication Type: eBooks
41 results on '"Chen, Juntao"'

Search Results

2. A System-of-Systems Approach to Strategic Cyber-Defense and Robust Switching Control Design for Cyber-Physical Wind Energy Systems

7. MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation

8. Conclusion and Future Work

9. Introduction

10. Factored Markov Game Theory for Secure Interdependent Infrastructure Networks

12. A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks

13. Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things

14. Game Theory on Attack Graph for Cyber Deception

15. Hardware Security and Trust: A New Battlefield of Information

16. Attacking Machine Learning Models for Social Good

17. Security Games over Lexicographic Orders

18. Blocking Adversarial Influence in Social Networks

19. Securing Next-Generation Wireless Networks: Challenges and Opportunities (Extended Abstract)

20. A Review of Multi Agent Perimeter Defense Games

21. Security Games with Insider Threats

22. A Game Theoretic Framework for Software Diversity for Network Security

23. Normalizing Flow Policies for Multi-agent Systems

24. Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks

25. A Data-Driven Distributionally Robust Game Using Wasserstein Distance

26. On the Characterization of Saddle Point Equilibrium for Security Games with Additive Utility

27. Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber Supply Chain Ecosystem

28. Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic

29. Moving Target Defense for Robust Monitoring of Electric Grid Transformers in Adversarial Environments

30. Detection of Dynamically Changing Leaders in Complex Swarms from Observed Dynamic Data

31. Secure Discrete-Time Linear-Quadratic Mean-Field Games

32. Harnessing the Power of Deception in Attack Graph-Based Security Games

33. Learning and Planning in the Feature Deception Problem

34. Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games

35. A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine Learning

36. Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots

37. Decoy Allocation Games on Graphs with Temporal Logic Objectives

38. Popular Imperceptibility Measures in Visual Adversarial Attacks are Far from Human Perception

39. Distributed Generative Adversarial Networks for Anomaly Detection

40. Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense

41. Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception Game of Questionable Veracity

Catalog

Books, media, physical & digital resources