A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems

L Huang, Q Zhu - Computers & Security, 2020 - Elsevier
Abstract Advanced Persistent Threats (APTs) have recently emerged as a significant security
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …

Auctions between regret-minimizing agents

Y Kolumbus, N Nisan - Proceedings of the ACM Web Conference 2022, 2022 - dl.acm.org
We analyze a scenario in which software agents implemented as regret-minimizing
algorithms engage in a repeated auction on behalf of their users. We study first-price and …

How and why to manipulate your own agent: On the incentives of users of learning agents

Y Kolumbus, N Nisan - Advances in Neural Information …, 2022 - proceedings.neurips.cc
The usage of automated learning agents is becoming increasingly prevalent in many online
economic applications such as online auctions and automated trading. Motivated by such …

A differentially private game theoretic approach for deceiving cyber adversaries

D Ye, T Zhu, S Shen, W Zhou - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber deception is one of the key approaches used to mislead attackers by hiding or
providing inaccurate system information. There are two main factors limiting the real-world …

[KNYGA][B] Adversarial machine learning: attack surfaces, defence mechanisms, learning theories in artificial intelligence

AS Chivukula, X Yang, B Liu, W Liu, W Zhou - 2023 - Springer
A significant robustness gap exists between machine intelligence and human perception
despite recent advances in deep learning. Deep learning is not provably secure. A critical …

[PDF][PDF] Imitative Attacker Deception in Stackelberg Security Games.

T Nguyen, H Xu - IJCAI, 2019 - haifeng-xu.com
To address the challenge of uncertainty regarding the attacker's payoffs, capabilities and
other characteristics, recent work in security games has focused on learning the optimal …

Partial adversarial behavior deception in security games

TH Nguyen, A Sinha, H He - 2021 - ink.library.smu.edu.sg
Learning attacker behavior is an important research topic in security games as security
agencies are often uncertain about attackers' decision making. Previous work has focused …

A behavioral approach to repeated Bayesian security games

W Caballero, J Cooley, D Banks… - The Annals of Applied …, 2024 - projecteuclid.org
The prevalence of security threats to organizational defense demands models that support
real-world policymaking. Security games are a potent tool in this regard; however, although …

Deceptive planning for resource allocation

S Chen, Y Savas, MO Karabag… - 2024 American …, 2024 - ieeexplore.ieee.org
We consider a team of autonomous agents that navigate in an adversarial environment and
aim to achieve a task by allocating their resources over a set of target locations. An …

Deceptive decision-making under uncertainty

Y Savas, CK Verginis, U Topcu - … of the AAAI Conference on Artificial …, 2022 - ojs.aaai.org
We study the design of autonomous agents that are capable of deceiving outside observers
about their intentions while carrying out tasks in stochastic, complex environments. By …