Effective repair strategy against advanced persistent threat: A differential game approach LX Yang, P Li, Y Zhang, X Yang, Y Xiang, W Zhou IEEE Transactions on Information Forensics and Security 14 (7), 1713-1728, 2018 | 112 | 2018 |
A risk management approach to defending against the advanced persistent threat LX Yang, P Li, X Yang, YY Tang IEEE Transactions on Dependable and Secure Computing 17 (6), 1163-1172, 2018 | 80 | 2018 |
The modeling and analysis of the word-of-mouth marketing P Li, X Yang, LX Yang, Q Xiong, Y Wu, YY Tang Physica A: Statistical Mechanics and its Applications 493, 1-16, 2018 | 70 | 2018 |
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats LX Yang, P Li, X Yang, YY Tang IEEE Access 5, 20111-20123, 2017 | 64 | 2017 |
On the competition of two conflicting messages LX Yang, P Li, X Yang, Y Wu, YY Tang Nonlinear Dynamics 91, 1853-1869, 2018 | 51 | 2018 |
Defending against the advanced persistent threat: An optimal control approach P Li, X Yang, Q Xiong, J Wen, YY Tang Security and Communication Networks 2018, 2018 | 42 | 2018 |
A discount strategy in word-of-mouth marketing T Zhang, P Li, LX Yang, X Yang, YY Tang, Y Wu Communications in Nonlinear Science and Numerical Simulation 74, 167-179, 2019 | 39 | 2019 |
Effective quarantine and recovery scheme against advanced persistent threat LX Yang, P Li, X Yang, Y Xiang, F Jiang, W Zhou IEEE Transactions on Systems, Man, and Cybernetics: Systems 51 (10), 5977-5991, 2019 | 38 | 2019 |
Developing cost-effective rumor-refuting strategy through game-theoretic approach DW Huang, LX Yang, P Li, X Yang, YY Tang IEEE Systems Journal 15 (4), 5034-5045, 2020 | 33 | 2020 |
Discount pricing in word-of-mouth marketing: An optimal control approach P Li, X Yang, Y Wu, W He, P Zhao Physica a: statistical mechanics and its applications 505, 512-522, 2018 | 24 | 2018 |
Simultaneous benefit maximization of conflicting opinions: Modeling and analysis LX Yang, P Li, X Yang, Y Xiang, YY Tang IEEE Systems Journal 14 (2), 1623-1634, 2020 | 21 | 2020 |
On dynamic recovery of cloud storage system under advanced persistent threats P Li, X Yang IEEE Access 7, 103556-103569, 2019 | 18 | 2019 |
A theoretical method for assessing disruptive computer viruses Y Wu, P Li, LX Yang, X Yang, YY Tang Physica A: Statistical Mechanics and its Applications 482, 325-336, 2017 | 16 | 2017 |
A Differential Game Approach to Patch Injection LX Yang, P Li, X Yang, Y Xiang, W Zhou IEEE Access 6, 58924-58938, 2018 | 13 | 2018 |
Distributed interaction between computer virus and patch: A modeling study LX Yang, X Yang, Q Zhu, C Gan arXiv preprint arXiv:1705.04818, 2017 | 11 | 2017 |
Seeking Best‐Balanced Patch‐Injecting Strategies through Optimal Control Approach K Huang, P Li, LX Yang, X Yang, YY Tang Security and Communication Networks 2019 (1), 2315627, 2019 | 9 | 2019 |
Energy-efficient patching strategy for wireless sensor networks P Li, LX Yang, X Yang, X Zhong, J Wen, Q Xiong Sensors 19 (2), 262, 2019 | 8 | 2019 |
Offline Equilibrium Finding S Li, X Wang, Y Zhang, J Cerny, P Li, H Chan, B An arXiv preprint arXiv:2207.05285v2, 2023 | 6 | 2023 |
Population-size-aware policy optimization for mean-field games P Li, X Wang, S Li, H Chan, B An ICLR 2023, 2023 | 6 | 2023 |
Grasper: A Generalist Pursuer for Pursuit-Evasion Problems P Li, S Li, X Wang, J Černý, Y Zhang, S McAleer, H Chan, B An AAMAS 2024, 2024 | 4 | 2024 |