Search Results - "Li, Pengdeng"

Refine Results
  1. 1

    Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach by Yang, Lu-Xing, Li, Pengdeng, Zhang, Yushu, Yang, Xiaofan, Xiang, Yong, Zhou, Wanlei

    “…Advanced persistent threat (APT) is a new kind of cyberattack that poses a serious threat to modern society. When an APT campaign on an organization has been…”
    Get full text
    Journal Article
  2. 2

    On Dynamic Recovery of Cloud Storage System Under Advanced Persistent Threats by Li, Pengdeng, Yang, Xiaofan

    Published in IEEE access (2019)
    “…Advanced persistent threat (APT) for data theft poses a severe threat to cloud storage systems (CSSs). An APT actor may steal valuable data from the target CSS…”
    Get full text
    Journal Article
  3. 3

    A discount strategy in word-of-mouth marketing by Zhang, Tianrui, Li, Pengdeng, Yang, Lu-Xing, Yang, Xiaofan, Tang, Yuan Yan, Wu, Yingbo

    “…•We propose a novel discount strategy for WOM marketing (the IBD strategy).•We model the WOM spreading process as a dynamic model (the DPA model).•We…”
    Get full text
    Journal Article
  4. 4

    Security Evaluation of the Cyber Networks Under Advanced Persistent Threats by Yang, Lu-Xing, Li, Pengdeng, Yang, Xiaofan, Tang, Yuan Yan

    Published in IEEE access (01-01-2017)
    “…Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper…”
    Get full text
    Journal Article
  5. 5

    Energy-Efficient Patching Strategy for Wireless Sensor Networks by Li, Pengdeng, Yang, Lu-Xing, Yang, Xiaofan, Zhong, Xiang, Wen, Junhao, Xiong, Qingyu

    Published in Sensors (Basel, Switzerland) (10-01-2019)
    “…Wireless sensor networks (WSNs) are vulnerable to computer viruses. To protect WSNs from virus attack, the virus library associated with each sensor node must…”
    Get full text
    Journal Article
  6. 6

    Reducing the Spectral Radius of a Torus Network by Link Removal by Yang, Xiaofan, Li, Pengdeng, Yang, Lu-Xing, Wu, Yingbo

    Published in PloS one (12-05-2016)
    “…The optimal link removal (OLR) problem aims at removing a given number of links of a network so that the spectral radius of the residue network obtained by…”
    Get full text
    Journal Article
  7. 7

    A Differential Game Approach to Patch Injection by Yang, Lu-Xing, Li, Pengdeng, Yang, Xiaofan, Xiang, Yong, Zhou, Wanlei

    Published in IEEE access (2018)
    “…To fight against the evolving computer viruses, we must constantly inject new virus patches into the computer networks. This paper addresses the patch…”
    Get full text
    Journal Article
  8. 8

    A Risk Management Approach to Defending Against the Advanced Persistent Threat by Yang, Lu-Xing, Li, Pengdeng, Yang, Xiaofan, Tang, Yuan Yan

    “…The advanced persistent threat (APT) as a new kind of cyber attack has posed a severe threat to modern organizations. When the APT has been detected, the…”
    Get full text
    Journal Article
  9. 9

    Discount pricing in word-of-mouth marketing: An optimal control approach by Li, Pengdeng, Yang, Xiaofan, Wu, Yingbo, He, Weiyi, Zhao, Pengpeng

    Published in Physica A (01-09-2018)
    “…This paper addresses the discount pricing in word-of-mouth (WOM) marketing. First, a dynamic model capturing WOM spreading processes is suggested. Second, the…”
    Get full text
    Journal Article
  10. 10

    The modeling and analysis of the word-of-mouth marketing by Li, Pengdeng, Yang, Xiaofan, Yang, Lu-Xing, Xiong, Qingyu, Wu, Yingbo, Tang, Yuan Yan

    Published in Physica A (01-03-2018)
    “…As compared to the traditional advertising, word-of-mouth (WOM) communications have striking advantages such as significantly lower cost and much faster…”
    Get full text
    Journal Article
  11. 11

    Developing Cost-Effective Rumor-Refuting Strategy Through Game-Theoretic Approach by Huang, Da-Wen, Yang, Lu-Xing, Li, Pengdeng, Yang, Xiaofan, Tang, Yuan Yan

    Published in IEEE systems journal (01-12-2021)
    “…A rumor about an entity can spread rapidly through online social networks (OSNs), which may lead to serious consequences. This article focuses on developing a…”
    Get full text
    Journal Article
  12. 12

    On the competition of two conflicting messages by Yang, Lu-Xing, Li, Pengdeng, Yang, Xiaofan, Wu, Yingbo, Tang, Yuan Yan

    Published in Nonlinear dynamics (01-02-2018)
    “…There are plenty of conflicting messages in online social networks. This paper addresses the competition of two conflicting messages. Based on a novel…”
    Get full text
    Journal Article
  13. 13

    Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat by Yang, Lu-Xing, Li, Pengdeng, Yang, Xiaofan, Xiang, Yong, Jiang, Frank, Zhou, Wanlei

    “…Advanced persistent threat (APT) for cyber espionage poses a great threat to modern organizations. In order to mitigate the impact of APT on an organization,…”
    Get full text
    Journal Article
  14. 14

    Defending against the Advanced Persistent Threat: An Optimal Control Approach by Wen, Junhao, Xiong, Qingyu, Yang, Xiaofan, Li, Pengdeng, Tang, Yuan Yan

    Published in Security and communication networks (01-01-2018)
    “…The new cyberattack pattern of advanced persistent threat (APT) has posed a serious threat to modern society. This paper addresses the APT defense problem,…”
    Get full text
    Journal Article
  15. 15

    A theoretical method for assessing disruptive computer viruses by Wu, Yingbo, Li, Pengdeng, Yang, Lu-Xing, Yang, Xiaofan, Tang, Yuan Yan

    Published in Physica A (15-09-2017)
    “…To assess the prevalence of disruptive computer viruses in the situation that every node in a network has its own virus-related attributes, a heterogeneous…”
    Get full text
    Journal Article
  16. 16

    Simultaneous Benefit Maximization of Conflicting Opinions: Modeling and Analysis by Yang, Lu-Xing, Li, Pengdeng, Yang, Xiaofan, Xiang, Yong, Tang, Yuan Yan

    Published in IEEE systems journal (01-06-2020)
    “…There are a multitude of opinions that are popular in online social networks (OSNs). Typically, an opinion creator attempts to push his opinion to OSN users to…”
    Get full text
    Journal Article
  17. 17

    Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach by Yang, Xiaofan, Yang, Lu-Xing, Li, Pengdeng, Huang, Kaifan, Tang, Yuan Yan

    Published in Security and communication networks (01-01-2019)
    “…To restrain escalating computer viruses, new virus patches must be constantly injected into networks. In this scenario, the patch-developing cost should be…”
    Get full text
    Journal Article
  18. 18

    Population-size-Aware Policy Optimization for Mean-Field Games by Li, Pengdeng, Wang, Xinrun, Li, Shuxin, Chan, Hau, An, Bo

    Published 07-02-2023
    “…In this work, we attempt to bridge the two fields of finite-agent and infinite-agent games, by studying how the optimal policies of agents evolve with the…”
    Get full text
    Journal Article
  19. 19

    In-Context Exploiter for Extensive-Form Games by Li, Shuxin, Yang, Chang, Zhang, Youzhi, Li, Pengdeng, Wang, Xinrun, Huang, Xiao, Chan, Hau, An, Bo

    Published 10-08-2024
    “…Nash equilibrium (NE) is a widely adopted solution concept in game theory due to its stability property. However, we observe that the NE strategy might not…”
    Get full text
    Journal Article
  20. 20

    Configurable Mirror Descent: Towards a Unification of Decision Making by Li, Pengdeng, Li, Shuxin, Yang, Chang, Wang, Xinrun, Hu, Shuyue, Huang, Xiao, Chan, Hau, An, Bo

    Published 19-05-2024
    “…Decision-making problems, categorized as single-agent, e.g., Atari, cooperative multi-agent, e.g., Hanabi, competitive multi-agent, e.g., Hold'em poker, and…”
    Get full text
    Journal Article