Search Results - "Li, Pengdeng"
-
1
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach
Published in IEEE transactions on information forensics and security (01-07-2019)“…Advanced persistent threat (APT) is a new kind of cyberattack that poses a serious threat to modern society. When an APT campaign on an organization has been…”
Get full text
Journal Article -
2
On Dynamic Recovery of Cloud Storage System Under Advanced Persistent Threats
Published in IEEE access (2019)“…Advanced persistent threat (APT) for data theft poses a severe threat to cloud storage systems (CSSs). An APT actor may steal valuable data from the target CSS…”
Get full text
Journal Article -
3
A discount strategy in word-of-mouth marketing
Published in Communications in nonlinear science & numerical simulation (30-07-2019)“…•We propose a novel discount strategy for WOM marketing (the IBD strategy).•We model the WOM spreading process as a dynamic model (the DPA model).•We…”
Get full text
Journal Article -
4
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats
Published in IEEE access (01-01-2017)“…Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper…”
Get full text
Journal Article -
5
Energy-Efficient Patching Strategy for Wireless Sensor Networks
Published in Sensors (Basel, Switzerland) (10-01-2019)“…Wireless sensor networks (WSNs) are vulnerable to computer viruses. To protect WSNs from virus attack, the virus library associated with each sensor node must…”
Get full text
Journal Article -
6
Reducing the Spectral Radius of a Torus Network by Link Removal
Published in PloS one (12-05-2016)“…The optimal link removal (OLR) problem aims at removing a given number of links of a network so that the spectral radius of the residue network obtained by…”
Get full text
Journal Article -
7
A Differential Game Approach to Patch Injection
Published in IEEE access (2018)“…To fight against the evolving computer viruses, we must constantly inject new virus patches into the computer networks. This paper addresses the patch…”
Get full text
Journal Article -
8
A Risk Management Approach to Defending Against the Advanced Persistent Threat
Published in IEEE transactions on dependable and secure computing (01-11-2020)“…The advanced persistent threat (APT) as a new kind of cyber attack has posed a severe threat to modern organizations. When the APT has been detected, the…”
Get full text
Journal Article -
9
Discount pricing in word-of-mouth marketing: An optimal control approach
Published in Physica A (01-09-2018)“…This paper addresses the discount pricing in word-of-mouth (WOM) marketing. First, a dynamic model capturing WOM spreading processes is suggested. Second, the…”
Get full text
Journal Article -
10
The modeling and analysis of the word-of-mouth marketing
Published in Physica A (01-03-2018)“…As compared to the traditional advertising, word-of-mouth (WOM) communications have striking advantages such as significantly lower cost and much faster…”
Get full text
Journal Article -
11
Developing Cost-Effective Rumor-Refuting Strategy Through Game-Theoretic Approach
Published in IEEE systems journal (01-12-2021)“…A rumor about an entity can spread rapidly through online social networks (OSNs), which may lead to serious consequences. This article focuses on developing a…”
Get full text
Journal Article -
12
On the competition of two conflicting messages
Published in Nonlinear dynamics (01-02-2018)“…There are plenty of conflicting messages in online social networks. This paper addresses the competition of two conflicting messages. Based on a novel…”
Get full text
Journal Article -
13
Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat
Published in IEEE transactions on systems, man, and cybernetics. Systems (01-10-2021)“…Advanced persistent threat (APT) for cyber espionage poses a great threat to modern organizations. In order to mitigate the impact of APT on an organization,…”
Get full text
Journal Article -
14
Defending against the Advanced Persistent Threat: An Optimal Control Approach
Published in Security and communication networks (01-01-2018)“…The new cyberattack pattern of advanced persistent threat (APT) has posed a serious threat to modern society. This paper addresses the APT defense problem,…”
Get full text
Journal Article -
15
A theoretical method for assessing disruptive computer viruses
Published in Physica A (15-09-2017)“…To assess the prevalence of disruptive computer viruses in the situation that every node in a network has its own virus-related attributes, a heterogeneous…”
Get full text
Journal Article -
16
Simultaneous Benefit Maximization of Conflicting Opinions: Modeling and Analysis
Published in IEEE systems journal (01-06-2020)“…There are a multitude of opinions that are popular in online social networks (OSNs). Typically, an opinion creator attempts to push his opinion to OSN users to…”
Get full text
Journal Article -
17
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach
Published in Security and communication networks (01-01-2019)“…To restrain escalating computer viruses, new virus patches must be constantly injected into networks. In this scenario, the patch-developing cost should be…”
Get full text
Journal Article -
18
Population-size-Aware Policy Optimization for Mean-Field Games
Published 07-02-2023“…In this work, we attempt to bridge the two fields of finite-agent and infinite-agent games, by studying how the optimal policies of agents evolve with the…”
Get full text
Journal Article -
19
In-Context Exploiter for Extensive-Form Games
Published 10-08-2024“…Nash equilibrium (NE) is a widely adopted solution concept in game theory due to its stability property. However, we observe that the NE strategy might not…”
Get full text
Journal Article -
20
Configurable Mirror Descent: Towards a Unification of Decision Making
Published 19-05-2024“…Decision-making problems, categorized as single-agent, e.g., Atari, cooperative multi-agent, e.g., Hanabi, competitive multi-agent, e.g., Hold'em poker, and…”
Get full text
Journal Article