Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems
Abstract Advanced Persistent Threats (APTs) have recently emerged as a significant security
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …
Auctions between regret-minimizing agents
We analyze a scenario in which software agents implemented as regret-minimizing
algorithms engage in a repeated auction on behalf of their users. We study first-price and …
algorithms engage in a repeated auction on behalf of their users. We study first-price and …
How and why to manipulate your own agent: On the incentives of users of learning agents
The usage of automated learning agents is becoming increasingly prevalent in many online
economic applications such as online auctions and automated trading. Motivated by such …
economic applications such as online auctions and automated trading. Motivated by such …
A differentially private game theoretic approach for deceiving cyber adversaries
Cyber deception is one of the key approaches used to mislead attackers by hiding or
providing inaccurate system information. There are two main factors limiting the real-world …
providing inaccurate system information. There are two main factors limiting the real-world …
[KNYGA][B] Adversarial machine learning: attack surfaces, defence mechanisms, learning theories in artificial intelligence
A significant robustness gap exists between machine intelligence and human perception
despite recent advances in deep learning. Deep learning is not provably secure. A critical …
despite recent advances in deep learning. Deep learning is not provably secure. A critical …
[PDF][PDF] Imitative Attacker Deception in Stackelberg Security Games.
To address the challenge of uncertainty regarding the attacker's payoffs, capabilities and
other characteristics, recent work in security games has focused on learning the optimal …
other characteristics, recent work in security games has focused on learning the optimal …
Partial adversarial behavior deception in security games
Learning attacker behavior is an important research topic in security games as security
agencies are often uncertain about attackers' decision making. Previous work has focused …
agencies are often uncertain about attackers' decision making. Previous work has focused …
A behavioral approach to repeated Bayesian security games
The prevalence of security threats to organizational defense demands models that support
real-world policymaking. Security games are a potent tool in this regard; however, although …
real-world policymaking. Security games are a potent tool in this regard; however, although …
Deceptive planning for resource allocation
We consider a team of autonomous agents that navigate in an adversarial environment and
aim to achieve a task by allocating their resources over a set of target locations. An …
aim to achieve a task by allocating their resources over a set of target locations. An …
Deceptive decision-making under uncertainty
We study the design of autonomous agents that are capable of deceiving outside observers
about their intentions while carrying out tasks in stochastic, complex environments. By …
about their intentions while carrying out tasks in stochastic, complex environments. By …