Search Results - "Ma, Chris Y. T."

Refine Results
  1. 1

    Integrating internet of things in service parts operations for sustainability by Ma, Chris Y T, Mo, Daniel Y W

    “…Businesses are expected by the society to operate sustainably nowadays. However, companies are having a hard time to make business decisions to achieve both…”
    Get full text
    Journal Article
  2. 2

    Defense Strategies for Asymmetric Networked Systems with Discrete Components by Rao, Nageswara S V, Ma, Chris Y T, Hausken, Kjell, He, Fei, Yau, David K Y, Zhuang, Jun

    Published in Sensors (Basel, Switzerland) (03-05-2018)
    “…We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the…”
    Get full text
    Journal Article
  3. 3

    Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models by Rao, Nageswara S. V., Poole, Stephen W., Ma, Chris Y. T., He, Fei, Zhuang, Jun, Yau, David K. Y.

    Published in Risk analysis (01-04-2016)
    “…The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different…”
    Get full text
    Journal Article
  4. 4

    Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach by Jongho Won, Ma, Chris Y. T., Yau, David K. Y., Rao, Nageswara S. V.

    Published in IEEE/ACM transactions on networking (01-06-2016)
    “…Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But…”
    Get full text
    Journal Article
  5. 5

    Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation by Ma, Chris Y. T., Yau, David K. Y., Xin Lou, Rao, Nageswara S. V.

    Published in IEEE transactions on power systems (01-05-2013)
    “…Electricity grids are critical infrastructures. They are credible targets of active (e.g., terrorist) attacks since their disruption may lead to sizable losses…”
    Get full text
    Journal Article
  6. 6

    Cyber-physical correlation effects in defense games for large discrete infrastructures by Rao, Nageswara S. V, Ma, Chris Y. T, He, Fei, Yau, David K. Y, Zhuang, Jun

    Published in Games (01-09-2018)
    “…In certain critical infrastructures, correlations between cyber and physical components can be exploited to launch strategic attacks, so that disruptions to…”
    Get full text
    Journal Article
  7. 7

    Game-Theoretic Strategies for Cyber-Physical Infrastructures Under Component Disruptions by Rao, Nageswara S. V., Ma, Chris Y. T., He, Fei

    Published in IEEE transactions on reliability (01-06-2023)
    “…Networked infrastructures of recursively defined systems composed of discrete cyber and physical components are considered. The components of basic systems at…”
    Get full text
    Journal Article
  8. 8

    Privacy Vulnerability of Published Anonymous Mobility Traces by Ma, C. Y. T., Yau, D. K. Y., Yip, N. K., Rao, N. S. V.

    Published in IEEE/ACM transactions on networking (01-06-2013)
    “…Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban…”
    Get full text
    Journal Article
  9. 9

    Stochastic Steepest Descent Optimization of Multiple-Objective Mobile Sensor Coverage by Ma, C. Y. T., Yau, D. K. Y., Nung Kwan Yip, Rao, N. S. V., Jiming Chen

    Published in IEEE transactions on vehicular technology (01-05-2012)
    “…We propose a steepest descent method to compute optimal control parameters for balancing between multiple performance objectives in stateless stochastic…”
    Get full text
    Journal Article
  10. 10

    Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection by Ma, C. Y. T., Yau, D. K. Y., Rao, N. S. V.

    Published in IEEE transactions on smart grid (01-03-2013)
    “…The anticipated proliferation of cyber components for collecting information and controlling operations of smart grids increases their vulnerability to a…”
    Get full text
    Journal Article
  11. 11

    Game-Theoretic Strategies for Quantum-Conventional Network Infrastructures by Rao, Nageswara S. V., Ma, Chris Y. T., He, Fei

    “…Fundamentally and practically, quantum networks and conventional networks are inextricably tied, since the basic quantum protocols such as teleportation…”
    Get full text
    Conference Proceeding
  12. 12

    Game-Theoretic Strategies for Cyber-Physical Infrastructures Under Component Disruptions by Rao, Nageswara S. V., Ma, Chris Y. T., He, Fei

    Published in IEEE transactions on reliability (05-09-2022)
    “…In this work, networked infrastructures of recursively defined systems composed of discrete cyber and physical components are considered. The components of…”
    Get full text
    Journal Article
  13. 13

    Game Strategies for Data Transfer Infrastructures Against ML-Profile Exploits by Rao, Nageswara S. V., Ma, Chris Y. T., He, Fei

    “…Data transfer infrastructures composed of Data Transfer Nodes (DTN) are critical to meeting distributed computing and storage demands of clouds, data…”
    Get full text
    Journal Article
  14. 14

    Stochastic Steepest-Descent Optimization of Multiple-Objective Mobile Sensor Coverage by Ma, Chris Y T, Yau, David K Y, Nung Kwan Yip, Rao, Nageswara S V, Jiming Chen

    “…We propose a steepest descent method to compute optimal control parameters for balancing between multiple performance objectives in stateless stochastic…”
    Get full text
    Conference Proceeding
  15. 15

    Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models by Rao, Nageswara S. V., Poole, Stephen W., Ma, Chris Y. T., He, Fei, Zhuang, Jun, Yau, David K. Y.

    Published in Risk analysis (06-04-2015)
    “…The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different…”
    Get full text
    Journal Article
  16. 16

    Proactive fault-tolerant aggregation protocol for privacy-assured smart metering by Jongho Won, Ma, Chris Y. T., Yau, David K. Y., Rao, Nageswara S. V.

    “…Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But…”
    Get full text
    Conference Proceeding
  17. 17

    ML Classifier Fusion for Three Data Streams with Quality Inversely Proportional to Time Resolution by Rao, Nageswara S. V., Ma, Chris Y. T., He, Fei

    “…We consider a monitoring scenario of phenomenon using three different streams of measurements whose quality is proportional to their constant inter-arrival…”
    Get full text
    Conference Proceeding
  18. 18

    Classification and Fusion of Two Disparate Data Streams and Nuclear Dissolutions Application by Rao, Nageswara S.V., Ma, Chris Y. T., He, Fei

    “…We consider two streams of data or measurements with disparate qualities and time resolutions that need to be classified. The first stream consists of higher…”
    Get full text
    Conference Proceeding
  19. 19

    An Experimental Low-Cost, Low-Data-Rate Rapid Structural Assessment Network by Jren-Chit Chin, Rautenberg, J.M., Ma, C.Y.T., Pujol, S., Yau, D.K.Y.

    Published in IEEE sensors journal (01-11-2009)
    “…In this paper, we present the design, implementation, and experimental evaluation of a wireless sensor network for real-time structural ldquohealthrdquo…”
    Get full text
    Journal Article
  20. 20

    Game-Theoretic Approach for Grace-Period Policy in Supercomputers by He, Fei, Rao, Nageswara S. V., Ma, Chris Y. T.

    “…Job scheduling at supercomputing facilities is important for achieving high utilization of these valuable resources while ensuring effective execution of jobs…”
    Get full text
    Conference Proceeding