Gazeta: Game-theoretic zero-trust authentication for defense against lateral movement in 5g iot networks

Y Ge, Q Zhu - IEEE Transactions on Information Forensics and …, 2023 - ieeexplore.ieee.org
The increasing connectivity in the 5G Internet of Things networks has enlarged the attack
surface and made the traditional security defense inadequate for sophisticated attackers …

A first order meta stackelberg method for robust federated learning

Y Pan, T Li, H Li, T Xu, Z Zheng, Q Zhu - arxiv preprint arxiv:2306.13800, 2023 - arxiv.org
Previous research has shown that federated learning (FL) systems are exposed to an array
of security risks. Despite the proposal of several defensive strategies, they tend to be non …

Explainable AI for Industry 5.0: Vision, Architecture, and Potential Directions

C Trivedi, P Bhattacharya, VK Prasad… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
The Industrial Revolution has shifted toward Industry 5.0, reinventing the Industry 4.0
operational process by introducing human elements into critical decision processes. Industry …

Meta stackelberg game: Robust federated learning against adaptive and mixed poisoning attacks

T Li, H Li, Y Pan, T Xu, Z Zheng, Q Zhu - arxiv preprint arxiv:2410.17431, 2024 - arxiv.org
Federated learning (FL) is susceptible to a range of security threats. Although various
defense mechanisms have been proposed, they are typically non-adaptive and tailored to …

[HTML][HTML] Dissecting zero trust: research landscape and its implementation in IoT

C Liu, R Tan, Y Wu, Y Feng, Z **, F Zhang, Y Liu, Q Liu - Cybersecurity, 2024 - Springer
As a progressive security strategy, the zero trust model has attracted notable attention and
importance within the realm of network security, especially in the context of the Internet of …

Decision-dominant strategic defense against lateral movement for 5g zero-trust multi-domain networks

T Li, Y Pan, Q Zhu - Network Security Empowered by Artificial Intelligence, 2024 - Springer
Multi-domain warfare is a military doctrine that leverages capabilities from different domains,
including air, land, sea, space, and cyberspace, to create a highly interconnected battle …

Foundations of cyber resilience: The confluence of game, control, and learning theories

Q Zhu - arxiv preprint arxiv:2404.01205, 2024 - arxiv.org
Cyber resilience is a complementary concept to cybersecurity, focusing on the preparation,
response, and recovery from cyber threats that are challenging to prevent. Organizations …

On the Price of Transparency: A Comparison between Overt Persuasion and Covert Signaling

T Li, Q Zhu - 2023 62nd IEEE Conference on Decision and …, 2023 - ieeexplore.ieee.org
Transparency of information disclosure has always been considered an instrumental
component of effective governance, accountability, and ethical behavior in any organization …

Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare

T Li, Q Zhu - arxiv preprint arxiv:2403.10570, 2024 - arxiv.org
We are currently facing unprecedented cyber warfare with the rapid evolution of tactics,
increasing asymmetry of intelligence, and the growing accessibility of hacking tools. In this …

Commitment with signaling under double-sided information asymmetry

T Li, Q Zhu - arxiv preprint arxiv:2212.11446, 2022 - arxiv.org
Information asymmetry in games enables players with the information advantage to
manipulate others' beliefs by strategically revealing information to other players. This work …