A game model for analyzing wireless sensor networks of 5G environment based on adaptive equilibrium optimizer algorithm

W Zheng, F Meng, N Liu, S Huang - Sensors, 2023 - mdpi.com
Wireless sensors networks (WSNs) play an important role in life. With the development of
5G, its security issues have also raised concerns. Therefore, it is an important topic to study …

[HTML][HTML] Mitigating adversarial cascades in large graph environments

JD Cunningham, CS Tucker - Expert Systems with Applications, 2024 - Elsevier
A significant amount of society's infrastructure can be modeled using graph structures, from
electric and communication grids, to traffic networks, to social networks. Each of these …

A multi-strategy surrogate-assisted social learning particle swarm optimization for expensive optimization and applications

SC Chu, X Yuan, JS Pan, BS Lin, ZJ Lee - Applied Soft Computing, 2024 - Elsevier
Evolutionary algorithms (EAs) require extensive fitness evaluations, which constitutes a
barrier to solving computationally complex problems. In contrast, surrogate-assisted …

Optimization of valve switch control for contamination detection in water distribution network

JS Pan, H Shu, Q Yang, YC Huang, SC Chu - npj Clean Water, 2024 - nature.com
As the urban population increases, the consumption of water resources is also increasing.
Safely and effectively supplying water to cities has become an issue that urgently needs to …

Evolutionary game and LGPSO for attack-defense confrontation analysis in WSN from macro perspective

N Liu, S Liu, WM Zheng - Expert Systems with Applications, 2025 - Elsevier
Wireless sensor network node security requires effective security mechanisms to protect the
security and reliability, so as to ensure that sensor nodes can operate normally and provide …

Attack-defense game modeling framework from a vulnerability perspective to protect critical infrastructure systems

Y Wu, P Guo, Y Wang, E Zio - Reliability Engineering & System Safety, 2025 - Elsevier
Critical infrastructure systems (CISs) are increasingly vulnerable to attacks due to their
complex interdependencies. To enhance the resilience of CISs against deliberate attacks …

Signal Game and Compact Particle Swarm Optimization Based on Pareto Distribution for Attack-Defense Eavesdrop** Confrontation Analysis in Internet of Things

N Liu, S Liu, QW Chai… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The information transmission in Internet of Things (IoT) communication brings
eavesdrop** attacks to people. How to take defense strategy to defend eavesdrop** …

PPSO and Bayesian game for intrusion detection in WSN from a macro perspective

N Liu, S Liu, WM Zheng - Complex & Intelligent Systems, 2024 - Springer
The security of wireless sensor networks is a hot topic in current research. Game theory can
provide the optimal selection strategy for attackers and defenders in the attack-defense …

A Tumor Segmentation Method Based on Mean-Teacher Reusing Pseudo-Labels

C Jiang, S Liu, J Wang, S Guo, W Zheng - IEEE Access, 2024 - ieeexplore.ieee.org
Breast tumor is a common female physiological disease, and the malignant tumor is one of
the main fatal diseases of women. Accurate examination and assessment of tumor shape …

[HTML][HTML] Applying the Stackelberg game to assess critical infrastructure vulnerability: Based on a general multi-layer network model

H Li, L Ji, K Wang, S Liu, S Liu - Chaos: An Interdisciplinary Journal of …, 2024 - pubs.aip.org
Critical infrastructure systems (CIS) are closely related to human life. Attacks against CIS
occur frequently, making accurate and effective protection of CIS essential. Vulnerability …