Share This Author
Game theory meets network security and privacy
This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches and provides a discussion on the advantages, drawbacks, and future direction of using game theory in this field.
Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs
A privacy-preserving machine-learning-based collaborative IDS (PML-CIDS) for VANETs is proposed that employs the alternating direction method of multipliers to a class of empirical risk minimization problems and trains a classifier to detect the intrusions in the VANets.
Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach
- Sabita Maharjan, Quanyan Zhu, Yan Zhang, S. Gjessing, T. Başar
- EngineeringIEEE Transactions on Smart Grid
- 19 February 2013
This paper proposes a Stackelberg game between utility companies and end-users to maximize the revenue of each utility company and the payoff of each user and derive analytical results for the StACkelberg equilibrium of the game and proves that a unique solution exists.
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning
This paper develops two methods to provide differential privacy to distributed learning algorithms over a network by decentralizing the learning algorithm using the alternating direction method of multipliers, and proposing the methods of dual variable perturbation and primal variable perturgation to provide dynamic differential privacy.
Dynamic energy-aware capacity provisioning for cloud computing environments
- Qi Zhang, M. Zhani, Shuo Zhang, Quanyan Zhu, R. Boutaba, J. Hellerstein
- Computer ScienceInternational Conference on Automation and…
- 18 September 2012
This paper provides a control-theoretic solution to the dynamic capacity provisioning problem that minimizes the total energy cost while meeting the performance objective in terms of task scheduling delay, and uses Model Predictive Control (MPC) to find the optimal control policy.
Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems
This work states that a computer worm, Stuxnet, was spread to target Siemens supervisory control and data acquisition (SCADA) systems that are configured to control and monitor specific industrial processes.
A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy
A taxonomy is proposed that defines six types of deception: perturbation, moving target defense, obfuscation, mixing, honey-x, and attacker engagement and provides a systematic foundation for understanding different types of defensive deception commonly encountered in cybersecurity and privacy.
Dynamic Service Placement in Geographically Distributed Clouds
- Qi Zhang, Quanyan Zhu, M. Zhani, R. Boutaba, J. Hellerstein
- Computer ScienceIEEE Journal on Selected Areas in Communications
- 18 June 2012
This paper presents a framework for dynamic service placement problems based on control- and game-theoretic models, and presents a solution that optimizes the hosting cost dynamically over time according to both demand and resource price fluctuations.
Dynamic Resource Allocation for Spot Markets in Cloud Computing Environments
- Qi Zhang, Quanyan Zhu, R. Boutaba
- Computer ScienceFourth IEEE International Conference on Utility…
- 5 December 2011
This paper considers the case of a single cloud provider and addresses the question how to best match customer demand in terms of both supply and price in order to maximize the providers revenue and customer satisfactions while minimizing energy cost.
Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
- Fei Miao, Quanyan Zhu, M. Pajic, George J. Pappas
- Computer Science, EngineeringIEEE Transactions on Control of Network Systems
- 29 May 2016
A coding matrix is employed to change the original sensor outputs to increase the estimation residues under intelligent data injection attacks, which is a low-cost method compared with encryption schemes over all sensor measurements in communication networks.