Publications

Publications

2019

  • J. Chen, C. Touati, and Q. Zhu, A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network, IEEE Transactions on Information Forensics and Security, to appear, 2019.

  • J. Chen and Q. Zhu, Interdependent strategic security risk management with bounded rationality in the internet of things, IEEE Transactions on Information Forensics and Security 14 (11),  2958 - 2971, 2019.

  • Y. Huang, Q. Zhu, A Differential Game Approach to Decentralized Virus-Resistant Weight Adaptation Policy over Complex Networks, IEEE Transactions on Control of Network Systems, to appear, 2019.

  • R. Zhang and Q. Zhu, Consensus-based Distributed Discrete Optimal Transport for Decentralized Resource Matching, IEEE Transactions on Signal and Information Processing over Networks, to appear, 2019.

  • GK Befekadu and Q. Zhu, Optimal control of diffusion processes pertaining to an opioid epidemic dynamical model with random perturbations, Journal of mathematical biology 78 (5), 1425-1438, 2019.

  • J. Chen, C. Touati, and Q. Zhu, Optimal secure two-layer IoT network design, IEEE Transactions on Control of Network Systems, to appear, 2019.

  • MJ Farooq and Q. Zhu, Modeling, analysis, and mitigation of dynamic botnet formation in wireless IoT networks, IEEE Transactions on Information Forensics and Security 14 (9), 2412-2426, 2019.

  • L. Huang and Q. Zhu, Adaptive strategic cyber defense for advanced persistent threats in critical infrastructure networks, ACM SIGMETRICS Performance Evaluation Review 46 (2), 52-56, 2019.

  • Q. Zhu, Multilayer Cyber-Physical Security and Resilience for Smart Grid, Smart Grid Control, 225-239, 2019.

  • L. Huang and Q. Zhu, Dynamic bayesian games for adversarial and defensive cyber deception, Autonomous Cyber Deception, 75-97, 2019.

  • JB Song and Q. Zhu, Performance of Dynamic Secure Routing Game, Game Theory for Networking Applications, 37-56, 2019.

  • V. Taynitskiy, E. Gubar, and Q. Zhu, Optimal Impulse Control of SIR Epidemics Over Scale-Free Networks, Game Theory for Networking Applications, 119-129, 2019.

  • J. Pawlick, J. Chen, and Q. Zhu, "iSTRICT: An interdependent strategic trust mechanism for the cloud-enabled internet of controlled things," IEEE Transactions on Information Forensics and Security 14 (6), 1654-1669, 2019.

  • J. Pawlick, E. Colbert, and Q. Zhu, "Modeling and analysis of leaky deception using signaling games with evidence," IEEE Transactions on Information Forensics and Security 14 (7), 1871-1886, 2019.

2018

  • A. Tanwani, and Q. Zhu, "Feedback Nash Equilibrium for Markov Jump Games under Differential-Algebraic Constraints with Application to Robust Control", IEEE Conference on Decision and Control (CDC), 1124-1129, 2018.
  • J. Pawlick, E. Colbert, and Q. Zhu, "Modeling and analysis of leaky deception using signaling games with evidence," IEEE Transactions on Information Forensics and Security 14 (7), 1871-1886, 2018.

  • J. Chen and Q. Zhu, "A linear quadratic differential game approach to dynamic contract design for systemic cyber risk management under asymmetric information," 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2018.

  • L. Huang, J. Chen, and Q. Zhu, "Distributed and optimal resilient planning of large-scale interdependent critical infrastructures," Winter Simulation Conference (WSC), 1096-1107, 2018.

  • E. Gubar, V. Taynitskiy, and Q. Zhu, "Optimal control of heterogeneous mutating viruses," Games 9 (4), 103, 2018.

  • T. Zhang and Q. Zhu, "Hypothesis testing game for cyber deception," International Conference on Decision and Game Theory for Security, 540-555, 2018.

  • L. Huang and Q. Zhu, "Analysis and computation of adaptive defense strategies against advanced persistent threats for cyber-physical systems," International Conference on Decision and Game Theory for Security, 205-226, 2018.

  • Q. Zhu and S. Rass, "Game theory meets network security: A tutorial," Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2018.

  • SF Noorani, MH Manshaei, MA Montazeri, and Q. Zhu, "Game-Theoretic Approach to Group Learning Enhancement Through Peer-to-Peer Explanation and Competition," IEEE Access 6, 53684-53697, 2018.

  • Z. Xu and Q. Zhu, "Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems" IEEE Conference on Control Technology and Applications (CCTA), 1712-1717, 2018.

  • F. Miao, Q. Zhu, M. Pajic, and GJ Pappas, "A hybrid stochastic game for secure control of cyber-physical systems," Automatica 93, 55-63, 2018.

  • MJ Farooq and Q. Zhu, "Adaptive and resilient revenue maximizing dynamic resource allocation and pricing for cloud-enabled IoT systems" Annual American Control Conference (ACC), 5292-5297, 2018.

  • MJ Farooq and Q. Zhu, "A multi-layer feedback system approach to resilient connectivity of remotely deployed mobile Internet of Things," IEEE Transactions on Cognitive Communications and Networking 4 (2), 422-432, 2018.

  • MJ Farooq and Q. Zhu, "Optimal dynamic contract for spectrum reservation in mission-critical UNB-IoT systems," 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2018.

  • A. Dunyak and Q. Zhu, "Understanding mean-field effects of large-population user data obfuscation in machine learning," 52nd Annual Conference on Information Sciences and Systems (CISS), 1-6, 2018.

  • J. Chen and Q. Zhu, "Security investment under cognitive constraints: A gestalt nash equilibrium approach," 52nd Annual Conference on Information Sciences and Systems (CISS), 1-6.

  • R. Zhang and Q. Zhu, "Consensus-based transfer linear support vector machines for decentralized multi-task multi-agent learning,"52nd Annual Conference on Information Sciences and Systems (CISS), 1-6, 2018.

  • Q. Zhu and S. Rass, "On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats," IEEE Access 6, 13958-13971, 2018.

  • R. Zhang and Q. Zhu, "A game-theoretic approach to design secure and resilient distributed support vector machines" IEEE transactions on neural networks and learning systems 29 (11), 5512-5527, 2018.

  • T. Zhang and Q. Zhu, "Distributed privacy-preserving collaborative intrusion detection systems for VANETs," IEEE Transactions on Signal and Information Processing over Networks 4 (1), 148-161, 2018.

  • MJ Farooq and Q. Zhu, "On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (IoBT),"
    IEEE Transactions on Wireless Communications 17 (4), 2618-2632, 2018.

  • T. Hong, F. De Leon, and Q. Zhu, "Optimal dispatch of electrical transmission systems considering interdependencies with natural gas systems," Game Theory for Security and Risk Management, 203-222, 2018.

  • L. Huang, J. Chen, and Q. Zhu, Factored Markov game theory for secure interdependent infrastructure networks, Game Theory for Security and Risk Management, 99-126, 2018.

2017

  • W. Wang and Q. Zhu, "On the detection of adversarial attacks against deep neural networks," Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, ACM.

  • J. Chen, C. Touati and Q. Zhu, "A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery," ACM SIGMETRICS Performance Evaluation Review 45 (2), 128, 2017.

  • Khazaei, B., Sartakhti, J.S., Manshaei, M.H., Zhu, Q., Sadeghi, M. and Mousavi, S.R. HIV-1-infected T-cells dynamics and prognosis: An evolutionary game model. Computer methods and programs in biomedicine, 152, pp.1-14, 2017.

  • Z. Xu and Q. Zhu, “Secure and Practical Output Feedback Control for Cloud-Enabled Cyber-Physical Systems,” International Workshop on Cyber-Physical Systems Security (CPS-Sec), IEEE Conference on Communications and Network Security (CNS), Las Vegas, 9-11 October 2017.

  • T. Zhang and Q. Zhu, “Strategic Defense Against Deceptive Civilian GPS Spoong of Unmanned Aerial Vehicles,” 8th Conference on Decision and Game Theory for Security (GameSec), Oct. 23-25, 2017, Vienna, Austria.

  • Y. Hayel and Q. Zhu, “Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous Complex Networks,” 8th Conference on Decision and Game Theory for Security (GameSec), Oct. 23-25, 2017, Vienna, Austria.

  • K. Horak, Q. Zhu and B. Bosansky, “Manipulating Adversary’s Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security, ” 8th Conference on Decision and Game Theory for Security (GameSec), Oct. 23-25, 2017, Vienna, Austria.

  • L. Huang, J. Chen and Q. Zhu, “A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks,” 8th Conference on Decision and Game Theory for Security (GameSec), Oct. 23-25, 2017, Vienna, Austria.

  • J. Pawlicky and Q. Zhu, “Proactive Defense Against Physical Denial of Service Attacks using Poisson Signaling Games,” 8th Conference on Decision and Game Theory for Security (GameSec), Oct. 23-25, 2017, Vienna, Austria.

  • I. Triki, R. El-Azouzi, M. Haddad, Q. Zhu, and Z. Xu, “Learning from Experience: A Dynamic Closed-Loop QoE Optimization for Video Adaptation and Delivery”, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, October 8-13, 2017.

  • R. Zimmerman, Q. Zhu, and C. Dimitri, “A Network Framework for Dynamic Models of Urban Food, Energy and Water Systems (FEWS),” Environmental Progress & Sustainable Energy, to appear.

  • Y. Liu, J. Zhang, Q. Zhu, “CONGRESS: A Hybrid Reputation System in Coping with the Subjectivity Problem,” IEEE Transactions on Computational Social Systems, to appear.

  • J. Pawlick and Q. Zhu, “Strategic Trust in Cloud-Enabled Cyber-Physical Systems with an Application to Glucose Control”, IEEE Transactions on Information Forensics and Security (TIFS), to appear.

  • R. Zhang and Q. Zhu, “Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines,” IEEE Transactions on Neural Networks and Learning Systems, to appear.

  • J. Chen and Q. Zhu, “A Stackelberg Game Approach for Two-Level Distributed Energy Management in Smart Grids,” IEEE Transactions on Smart Grid, to appear.

  • J. Chen and Q. Zhu, “Security as a Service for Cloud-Enabled Internet of Controlled Things under Advanced Persistent Threats: A Contract Design Approach”, IEEE Transactions on Information Forensics and Security (TIFS), to appear.

  • S. Rass, A. Alshawish, M. A. Abid, S. Schauer, Q. Zhu, and H. de Meer, “Physical Intrusion Games — Optimizing Surveillance by Simulation and Game Theory,” IEEE Access, to appear.

  • R. Zimmerman, Q. Zhu, F. De Leon, and Z. Guo, “Conceptual Modeling Framework to Integrate Resilient and Interdependent Infrastructure in Extreme Weather, Journal of Infrastructure Systems, accepted and to appear.

  • R. Zhang, Q. Zhu, and Y. Hayel, “A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks,” IEEE Journal on Selected Areas in Communications (JSAC) Special Issue on Game Theory over Networks, to appear.

  • Y. Hayel and Q. Zhu, “Epidemic Protection over Heterogeneous Networks Using Evolutionary Poisson Games,” IEEE Transactions on Information Forensics and Security (TIFS), to appear.

  • J. Chen and Q. Zhu, “A Game-Theoretic Framework for Resilient and Distributed Generation Control of Renewable Energies in Microgrids,” IEEE Transactions on Smart Grid, to appear.

  • T. Zhang and Q. Zhu, “Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning,” IEEE Transactions on Information Forensics and Security, 2016, to appear.

  • J. Chen, C. Touati and Q. Zhu, “Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures,” IEEE GLOBECOM, Singapore, Dec. 4-8, 2017.

  • J. Farooq and Q. Zhu, “Cognitive Connectivity Resilience in Multi-layer Remotely Deployed Mobile Internet of Things,” IEEE GLOBECOM, Singapore, Dec. 4-8, 2017.

  • J. Pawlick and Q. Zhu, “A Mean-Field Stackelberg Game Approach for Obfuscation Adoption in Empirical Risk Minimization,” IEEE GlobalSIP Symposium on Control & Information-Theoretic Approaches to Privacy and Security, Nov. 14-16, 2017, Montreal, Canada.

  • H. Anwar and Q. Zhu, “Minimax Game-Theoretic Approach to Multi-scale H1 Optimal Filtering,” IEEE GlobalSIP Symposium on Signal Processing for Smart Cities & Internet of Things, Nov. 14-16, 2017, Montreal, Canada.

  • R. Zhang and Q. Zhu, “A Game-Theoretic Defense Against Data Poisoning Attacks in Distributed Support Vector Machines,” in Proc. of 56th IEEE Conference on Decision and Control, Dec. 12-15, 2017, Melbourne, Australia.

  • C. Smidts, Y. Zhao, X. Diao, I. Ray, J. Hollern, Q. Zhu and T. McJunkin, “Support for Reactor Operators in Case of Cyber-Security Threats,” American Nuclear Society (ANS) winter meeting, Oct. 29-Nov. 2, 2017, Washington, DC.

  • J. Chen, C. Touati and Q. Zhu, “A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery,” Workshop on Critical Infrastructure Network Security (CINS), in conjunction with ACM SIGMETRICS 2017 in Urbana-Champaign, Illinois, USA on June 5, 2017.

  • R. Zhang and Q. Zhu, “Attack-Aware Cyber Insurance of Interdependent Computer Networks,” Workshop on the Economics of Information Security (WEIS), La Jolla, CA, June 26-27, 2017.

  • J. Chen and Q. Zhu, “Interdependent Strategic Cyber Defense and Robust Switching Control Design for Wind Energy Systems,” in Proc. of IEEE PES GM Conference, Chicago, IL, July 16-20, 2017.

  • E. Gubar and Q. Zhu, “Optimal Control of Multi-Strain Epidemic Processes in Complex Networks,” in Proceedings of t7th EAI International Conference on Game Theory for Networks (GameNets), Knoxville, TN., MAY 9-10, 2017.

  • M. K. Hanawal, Y. Hayel and Q. Zhu, “Throughput Maximization of Large-Scale Secondary Networks over Licensed and Unlicensed Spectra,” in Proceedings of the International Workshop on Resource Allocation, Cooperation and Competition in Wireless Networks (RAWNET), Paris, France, 15th May, 2017.

  • J. Farooq, H. ElSawy, Q. Zhu, and M.-S. Alouini, “Optimizing Mission Critical Data Dissemination in Massive IoT Networks,” in Proceedings of Workshop on Spatial Stochastic Models for Wireless Networks (SpaSWiN), Paris, France, 19th May, 2017.

  • J. Farooq and Q. Zhu, “Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT),” in Proceedings of 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Telecom ParisTech, Paris, France, 15th – 19th May, 2017.

  • L. Huang, J. Chen and Q. Zhu, “A Factored MDP Approach to Optimal Mechanism Design for Resilient Large-Scale Interdependent Critical Infrastructures,” in Proceedings of 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), CPS Week, April 18 – 21, 2017, Pittsburgh, PA, USA.

  • V. Kurian, J. Chen and Q. Zhu, “Electric Power Dependent Dynamic Taris for Water Distribution Systems,” in Proceedings of 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater), CPS Week, April 18 – 21, 2017, Pittsburgh, PA, USA.

  • Z. Xu and Q. Zhu, “A Game-Theoretic Approach to Secure Control of Communication- Based Train Control Systems Under Jamming Attacks,” in Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles, (SCAV 2017), CPS Week, April 18 – 21, 2017, Pittsburgh, PA, USA.

  • V. Taynitskiy, E. Gubar, Q. Zhu, “Optimal Impulsive Control of Epidemic Spreading of Heterogeneous Malware,” In Proceedings of 20th IFAC World Congress, Toulouse, France, 9-14 July 2017.

  • Z. Xu and Q. Zhu, “A Secure Data Assimilation for Large-Scale Sensing Networks Using an Untrusted Cloud,” In Proceedings of 20th IFAC World Congress, Toulouse, France, 9-14 July 2017.

  • R. Zhang and Q. Zhu, “A Game-Theoretic Analysis of Label Flipping Attacks on Distributed Support Vector Machines,” In Proceedings of Conference on Information Sciences and Systems (CISS), Baltimore, Maryland, March 22-24, 2017.

  • H. Anwar and Q. Zhu, “Multiscale Minimax Robust Optimal Control,” In Proceedings of Conference on Information Sciences and Systems (CISS), Baltimore, Maryland, March 22-24, 2017.

2016

  • C. Fung and Q. Zhu, “FACID: A Trust-based Collaborative Decision Framework for Intrusion Detection Networks,” Ad Hoc Networks, to appear.

  • L. Zhou, Q. Zhu, Z. Wang, W. Zhou, “Adaptive Exponential Synchronization of Multi-Slave Time-Delay Recurrent Neural Networks with Levy Noise and Regime Switching,” IEEE Transactions on Neural Networks and Learning Systems, to appear.

  • F. Miao, Q. Zhu, M. Pajic and G.J. Pappas, “Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks, IEEE Transactions on Control of Network Systems, to appear.

  • R. Zhang and Q. Zhu, “Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries,” Journal of Advances in Information Fusion, to appear.

  • D. Bauso, Q. Zhu, and T. Basar, “Decomposition and mean-eld approach to mixed integer optimal compensation problems,” Journal of Optimization Theory and Applications, to appear.

  • E. Simhon, Y. Hayel, Q. Zhu and D. Starobinski, "Optimal Information Disclosure Policies in Strategic Queueing Games," Operations Research Letters, to appear.

  • T. Zhang and Q. Zhu, “A Dual Perturbation Approach for Differential Private ADMM-based Distributed Empirical Risk Minimization,” In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security (AISec’16), pp. 129-137, New York, NY, USA, 2016.

  • A. Mongay, Q. Zhu, “On Solving Large-Scale Low-Rank Zero-Sum Security Games of Incomplete Information,” 8th IEEE International Workshop on Information Forensics and Security (WIFS) 2016, Abu Dhabi, UAE, Dec. 5-7, 2016.

  • J. Pawlick, Q. Zhu, “A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation,” 8th IEEE International Workshop on Information Forensics and Security (WIFS) 2016, Abu Dhabi, UAE, Dec. 5-7, 2016

  • J. Chen and Q. Zhu, “Resilient and Decentralized Control of Multi-level Cooperative Mobile Networks to Maintain Connectivity under Adversarial Environment,” 55th IEEE Conference on Decision and Control (CDC), Las Vegas, USA on December 12-14, 2016.

  • J. Chen and Q. Zhu, “Optimal Contract Design under Asymmetric Information for Resilient Cloud-Enabled Internet of Controlled Things,” 7th Conference on Decision and Game Theory for Security (GameSec), NY, USA, on November 2-4, 2016.

  • A. Mohammadi, M. H. Manshaei, M. M. Moghaddam, and Q. Zhu, “A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars,” 27th Conference on Decision and Game Theory for Security (GameSec), NY, USA, on November 2-4, 2016.

  • S. Rass and Q. Zhu, “GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies against Advanced Persistent Threats,” 27th Conference on Decision and Game Theory for Security (GameSec), NY, USA, on November 2-4, 2016.

  • V. Taynitskiy, E. Gubar, Q. Zhu, “Optimal Security Policy for Protection against Heterogeneous Malware,” International conference on NETwork Games, COntrol and Optimization (NETGCOOP), Avignon, France, 2016.

  • J. Chen and Q. Zhu, “Optimal Control of Interdependent Epidemics in Complex Networks,” SIAM Conference on Network Science, Boston, Massachusetts, July 15-16, 2016.

  • Z. Xu and Q. Zhu, “Cross-Layer Secure Cyber-Physical Control System Design for Networked 3D Printers,” Proc. of 2016 American Control Conference, Boston, USA on July 6-8, 2016.

  • J. Chen and Q. Zhu, “Interdependent Network Formation Games with an Application to Critical Infrastructures,” Proc. of 2016 American Control Conference, Boston, USA on July 6-8, 2016.

  • J. Chen and Q. Zhu, “Optimal Control of Interdependent Epidemics in Complex Networks,” SIAM Conference on Network Science, Boston, Massachusetts, July 15-16, 2016.

  • Y. Hayel, B. Tounsi and Q. Zhu, “Computing mixed traffic equilibrium with electric and gaso-line vehicles and application to emission reduction,” Le congres annuel de la societe Francaise de Recherche Operationnelle et d’Aide a la Decision (ROADEF 2016), Compienge France, Feb.10-12, 2016.

2015

  • M. Moghaddam, M. H. Manshaei, and Q. Zhu, To Trust or Not: A Security Signaling Game between Service Provider and Client, 2015 Conference on Decision and Game Theory for Security (GameSec), Nov. 4-5, 2015, London, UK., to appear.

  • J. Pawlick, S. Farhagh, Q. Zhu, Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats, 2015 Conference on Decision and Game Theory for Security (GameSec), Nov. 4-5, 2015, London, UK., to appear.

  • R. Zimmerman and Q. Zhu, Measures and Models for Electric Power Dependencies and Interdependencies with Other Critical Infrastructures, New York Scientific Data Summit (NYSDS), 2015.

  • Y. Hayel, and Q. Zhu, Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks, 2015 Conference on Decision and Game Theory for Security (GameSec), Nov. 4-5, 2015, London, UK., to appear.

  • Q. Zhu, D. Wei and K. Ji, “Hierarchical Architectures of Resilient Control Systems: Concepts, Metrics and Design Principles,” In P. Cheng, H. Zhang, J. Chen (Eds.), Cyber Security for Industrial Control Systems:from the viewpoint of close​loop, CRC Press, 2015, to appear.

  • Z. Xu and Q. Zhu, A Cyber-Physical Game Framework for Secure and Resilient Multi-Agent Autonomous Systems, in Proceedings of  54th IEEE Conference on Decision and Control (CDC), Dec. 15-18, 2015, Osaka, Japan, to appear.

  • Y. Hayel and Q. Zhu, Evolutionary Poisson Games for Controlling Large Population Behaviors, in Proceedings of  54th IEEE Conference on Decision and Control (CDC), Dec. 15-18, 2015, Osaka, Japan, to appear.

  • W. Casey, Q. Zhu, J. Morales, B. Mishra, Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signalng Games, in Proceedings of International Workshop on Managing Insider Security Threats (MIST 2015), 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, US, Oct. 12-16, 2015, to appear.

  • Z. Xu and Q. Zhu, Secure and Resilient Control Design for Cloud Enabled Networked Control Systems, in Proceedings of Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC 2015), 22nd ACM Conference on Computer and Communications Security, Denver, Colorado, US, Oct. 12-16, 2015, to appear.

  • Z. Xu and Q. Zhu, Environment-Aware Power Generation Scheduling in Smart Grids, in Proceedings of 6th IEEE International Conference on Smart Grid Communications (SmartGridComm 2015), to appear.

  • J. Chen, L. Zhou and Q. Zhu, Resilient Control Design for Wind Turbines Using Markov Jump Linear System Model with Levy Noise, in Proceedings of 6th IEEE International Conference on Smart Grid Communications (SmartGridComm 2015), to appear.

  • F. Sadegh, Y. Hayel, Q. Zhu, PHY-Layer Location Privacy Preserving Access Point Selection Mechanism in Next-Generation Wireless Networks, in Proceedings of IEEE Conference on Communications and Network Security (CNS),  Florence, Italy, Sept. 28-30, 2015, to appear.

  • S. Maharjan, Q. Zhu, Y. Zhang, S. Gjessing, and T. Başar. Demand response management in the smart grid in a large population regime. IEEE Transactions on Smart Grid, to appear.

  • J. Casey,  A. Morales, E. Wright, Q. Zhu and B. Mishra, Compliance Signaling Games: Modeling Deterrence of Unintentional Insider Threats, Journal of Computational and Mathematical Organization Theory, to appear.

  • R. Zhang and Q. Zhu, “Secure and Resilient Distributed Machine Learning Under Adversarial Environments,” International Conference on Information Fusion, Washington DC, 2015. (Runner-up Best Student Paper Award).

  • Q. Zhu and T. Basar. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems. IEEE Control Systems, 35(1), 46-65, 2015. 

  • J. Pawlick and Q. Zhu, “Deception by Design: Evidence-Based Signaling Games for Network Defense,” Workshop on the Economics of Information Security (WEIS), 2015.

  • J. Chen and Q. Zhu, “Optimal Allocation of Robotic Wind Turbine Inspectors in a Wind Farm for Interdependent Resiliency,” in Proceedings of IEEE PES General Meeting, 2015.

  • Y. Hayel, E. Simhon, D. Starobinski, and Q. Zhu, “Distributed strategic mode selection for large-scale D2D communications based on Queue State Information,” In IEEE Information Sciences and Systems (CISS), 2015 49th Annual Conference on (pp. 1-3).

  • J. Chen and Q. Zhu, “Interdependent network formation games,” SIAM Conference on Network Science, 2015. 

  • Y. Hayel and Q. Zhu, “Resilient and secure network design for cyber attack-induced cascading link failures in critical infrastructures,” Proc. of Conference on Information Sciences and Systems (CISS), 2015.

2014

  • S. Farhang, M. H. Manshaei, M. N. Esfahani, and Q. Zhu, A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design. In Decision and Game Theory for Security (GameSec), pp. 319-328, 2014 
  • F. Miao, Q. Zhu, “A moving-horizon hybrid stochastic game for secure control of cyber-physical systems,” 2014 IEEE 53rd Annual Conference on Decision and Control (CDC), pp. 5776-5781, Dec. 2014.

  • R. Hou, C. Wang, Q. Zhu, and J. Li, Interference-aware QoS multicast routing for smart grid. Ad Hoc Networks, 22, 13-26, 2014.

  • F. Miao, Q. Zhu, M. Pajic and G.J. Pappas, “Coding sensor outputs for injection attacks detection,” 2014 IEEE 53rd Annual Conference on Decision and Control (CDC), pp. 5776-5781, Dec. 2014. 

  • A. Qasim, R. Yousefian, E. Al-Shaer, S. Kamalasadan, and Q. Zhu. “Two-tier data-driven intrusion detection for automatic generation control in smart grid.” In Communications and Network Security (CNS), 2014 IEEE Conference on, pp. 292-300. IEEE, 2014.