Search Results - "Ma, Chris Y. T."
-
1
Integrating internet of things in service parts operations for sustainability
Published in International journal of engineering business management (01-03-2023)“…Businesses are expected by the society to operate sustainably nowadays. However, companies are having a hard time to make business decisions to achieve both…”
Get full text
Journal Article -
2
Defense Strategies for Asymmetric Networked Systems with Discrete Components
Published in Sensors (Basel, Switzerland) (03-05-2018)“…We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the…”
Get full text
Journal Article -
3
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
Published in Risk analysis (01-04-2016)“…The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different…”
Get full text
Journal Article -
4
Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach
Published in IEEE/ACM transactions on networking (01-06-2016)“…Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But…”
Get full text
Journal Article -
5
Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation
Published in IEEE transactions on power systems (01-05-2013)“…Electricity grids are critical infrastructures. They are credible targets of active (e.g., terrorist) attacks since their disruption may lead to sizable losses…”
Get full text
Journal Article -
6
Cyber-physical correlation effects in defense games for large discrete infrastructures
Published in Games (01-09-2018)“…In certain critical infrastructures, correlations between cyber and physical components can be exploited to launch strategic attacks, so that disruptions to…”
Get full text
Journal Article -
7
Game-Theoretic Strategies for Cyber-Physical Infrastructures Under Component Disruptions
Published in IEEE transactions on reliability (01-06-2023)“…Networked infrastructures of recursively defined systems composed of discrete cyber and physical components are considered. The components of basic systems at…”
Get full text
Journal Article -
8
Privacy Vulnerability of Published Anonymous Mobility Traces
Published in IEEE/ACM transactions on networking (01-06-2013)“…Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban…”
Get full text
Journal Article -
9
Stochastic Steepest Descent Optimization of Multiple-Objective Mobile Sensor Coverage
Published in IEEE transactions on vehicular technology (01-05-2012)“…We propose a steepest descent method to compute optimal control parameters for balancing between multiple performance objectives in stateless stochastic…”
Get full text
Journal Article -
10
Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection
Published in IEEE transactions on smart grid (01-03-2013)“…The anticipated proliferation of cyber components for collecting information and controlling operations of smart grids increases their vulnerability to a…”
Get full text
Journal Article -
11
Game-Theoretic Strategies for Quantum-Conventional Network Infrastructures
Published in 2023 26th International Conference on Information Fusion (FUSION) (28-06-2023)“…Fundamentally and practically, quantum networks and conventional networks are inextricably tied, since the basic quantum protocols such as teleportation…”
Get full text
Conference Proceeding -
12
Game-Theoretic Strategies for Cyber-Physical Infrastructures Under Component Disruptions
Published in IEEE transactions on reliability (05-09-2022)“…In this work, networked infrastructures of recursively defined systems composed of discrete cyber and physical components are considered. The components of…”
Get full text
Journal Article -
13
Game Strategies for Data Transfer Infrastructures Against ML-Profile Exploits
Published in IEEE Transactions on Machine Learning in Communications and Networking (2024)“…Data transfer infrastructures composed of Data Transfer Nodes (DTN) are critical to meeting distributed computing and storage demands of clouds, data…”
Get full text
Journal Article -
14
Stochastic Steepest-Descent Optimization of Multiple-Objective Mobile Sensor Coverage
Published in 2010 IEEE 30th International Conference on Distributed Computing Systems (01-06-2010)“…We propose a steepest descent method to compute optimal control parameters for balancing between multiple performance objectives in stateless stochastic…”
Get full text
Conference Proceeding -
15
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
Published in Risk analysis (06-04-2015)“…The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different…”
Get full text
Journal Article -
16
Proactive fault-tolerant aggregation protocol for privacy-assured smart metering
Published in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications (01-04-2014)“…Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But…”
Get full text
Conference Proceeding -
17
ML Classifier Fusion for Three Data Streams with Quality Inversely Proportional to Time Resolution
Published in 2024 27th International Conference on Information Fusion (FUSION) (08-07-2024)“…We consider a monitoring scenario of phenomenon using three different streams of measurements whose quality is proportional to their constant inter-arrival…”
Get full text
Conference Proceeding -
18
Classification and Fusion of Two Disparate Data Streams and Nuclear Dissolutions Application
Published in 2022 25th International Conference on Information Fusion (FUSION) (04-07-2022)“…We consider two streams of data or measurements with disparate qualities and time resolutions that need to be classified. The first stream consists of higher…”
Get full text
Conference Proceeding -
19
An Experimental Low-Cost, Low-Data-Rate Rapid Structural Assessment Network
Published in IEEE sensors journal (01-11-2009)“…In this paper, we present the design, implementation, and experimental evaluation of a wireless sensor network for real-time structural ldquohealthrdquo…”
Get full text
Journal Article -
20
Game-Theoretic Approach for Grace-Period Policy in Supercomputers
Published in 2021 IEEE 24th International Conference on Information Fusion (FUSION) (01-11-2021)“…Job scheduling at supercomputing facilities is important for achieving high utilization of these valuable resources while ensuring effective execution of jobs…”
Get full text
Conference Proceeding