daigai

Well-Known Member
Hardware Security and Trust: A New Battlefield of Information
Contents
Distributed Generative Adversarial Networks for Anomaly Detection. . .. ... 3
Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, and Justin Kopacz
Learning and Planning in the Feature Deception Problem. . . . . . . . . . .. ... 23
Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles Kamhoua, and Fei Fang
A Realistic Approach for Network Traffic Obfuscation Using Adversarial MachineLearning....................................... ... 45
Alonso Granados, Mohammad Sujan Miah, Anthony Ortiz, and Christopher Kiekintveld
Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense.............................................. ... 58
Taha Eghtesad, Yevgeniy Vorobeychik, and Aron Laszka
Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception GameofQuestionableVeracity.............................. ... 80
Mark Bilinski, Joe diVita, Kimberly Ferguson-Walter, Sunny Fugate, Ryan Gabrys, Justin Mauger, and Brian Souza
Cyber Deception
Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games ... 103
Omkar Thakoor, Shahin Jabbari, Palvi Aggarwal, Cleotilde Gonzalez, Milind Tambe, and Phebe Vayanos
Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots.................................. ............. 125
Linan Huang and Quanyan Zhu
Harnessing the Power of Deception in Attack Graph-Based SecurityGames............................... ............. 147
Stephanie Milani, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan, Nandi O. Leslie, Charles Kamhoua, and Fei Fang
Machine Learning and Security

x Contents
Decoy Allocation Games on Graphs with Temporal Logic Objectives . . .... 168
Abhishek N. Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, and Nandi O. Leslie
Popular Imperceptibility Measures in Visual Adversarial Attacks are Far fromHumanPerception.................................. .... 188
Ayon Sen, Xiaojin Zhu, Erin Marshall, and Robert Nowak
Cyber-Physical System Security
Secure Discrete-Time Linear-Quadratic Mean-Field Games. . . . . . . . . . .... 203
Muhammad Aneeq uz Zaman, Sujay Bhatt, and Tamer Başar
Detection of Dynamically Changing Leaders in Complex Swarms fromObservedDynamicData.............................. .... 223
Christos N. Mavridis, Nilesh Suriyarachchi, and John S. Baras
Moving Target Defense for Robust Monitoring of Electric Grid
Transformers in Adversarial Environments. . . . . . . . . . . . . . . ...... .... 241
Sailik Sengupta, Kaustav Basu, Arunabha Sen, and Subbarao Kambhampati
Security of Network Systems
Blocking Adversarial Influence in Social Networks . . . . . . . . . ...... .... 257
Feiran Jia, Kai Zhou, Charles Kamhoua, and Yevgeniy Vorobeychik
Normalizing Flow Policies for Multi-agent Systems. . . . . . . . . . . . . . . .... 277
Xiaobai Ma, Jayesh K. Gupta, and Mykel J. Kochenderfer
A Game Theoretic Framework for Software Diversity forNetworkSecurity.................................... .... 297
Ahmed H. Anwar, Nandi O. Leslie, Charles Kamhoua, and Christopher Kiekintveld
Partially Observable Stochastic Games for Cyber Deception Against NetworkEpidemic ......................................... 312
Olivier Tsemogne, Yezekael Hayel, Charles Kamhoua, and Gabriel Deugoue
Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber SupplyChainEcosystem..................................... 326
Yuhan Zhao and Quanyan Zhu

Theoretic Foundations of Security Games
On the Characterization of Saddle Point Equilibrium for Security Games withAdditiveUtility....................................... . 349
Hamid Emadi and Sourabh Bhattacharya
MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation . . . . . 365
Yunian Pan, Guanze Peng, Juntao Chen, and Quanyan Zhu
Using One-Sided Partially Observable Stochastic Games
for Solving Zero-Sum Security Games with Sequential Attacks. . . . . . . . . . . 385
Petr Tomášek, Branislav Bošanský, and Thanh H. Nguyen
A Data-Driven Distributionally Robust Game Using Wasserstein Distance . . . 405
Guanze Peng, Tao Zhang, and Quanyan Zhu
SecurityGamesoverLexicographicOrders ........................ 422
Stefan Rass, Angelika Wiegele, and Sandra König Emerging Topics
GameTheoryonAttackGraphforCyberDeception.................. 445
Ahmed H. Anwar and Charles Kamhoua
AttackingMachineLearningModelsforSocialGood................. 457
Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, and Bhavani Thuriasingham
AReviewofMultiAgentPerimeterDefenseGames.................. 472
Daigo Shishika and Vijay Kumar
Hardware Security and Trust: A New Battlefield of Information . . . . . . . . . . 486
Gang Qu
SecurityGameswithInsiderThreats............... .............. 502
Derya Cansever
Securing Next-Generation Wireless Networks: Challenges andOpportunities(ExtendedAbstract).............. .............. 506
Alex Sprintson
Short Paper
A Data Mining Friendly Anonymization Scheme for System Logs Using DistanceMapping.......................................... 513
Gabriela Limonta and Yoan Miche
AuthorIndex ............................................ 517
Contents xi

link
 

Các chủ đề có liên quan khác

Top