2025
An innovative practical roadmap for optimal control strategies in malware propagation through the integration of RL with MPC.
Comput. Secur., 2025
2024
Simulating Bluetooth virus propagation on the real map via infectious attenuation algorithm and discrete dynamical system.
Iran J. Comput. Sci., December, 2024
Cost-Effective Company Response Policy for Product Co-Creation in Company-Sponsored Online Community.
IEEE Trans. Syst. Man Cybern. Syst., July, 2024
A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks.
Sensors, March, 2024
Game-theoretic modeling and analysis of cyberbullying spreading on OSNs.
Inf. Sci., February, 2024
Mitigating the Impact of a False Message Through Sequential Release of Clarifying Messages.
IEEE Trans. Netw. Sci. Eng., 2024
Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach.
IEEE Trans. Inf. Forensics Secur., 2024
Cost-Effective Hybrid Control Strategies for Dynamical Propaganda War Game.
IEEE Trans. Inf. Forensics Secur., 2024
The evolution of the flip-it game in cybersecurity: Insights from the past to the future.
J. King Saud Univ. Comput. Inf. Sci., 2024
Detecting Change Intervals with Isolation Distributional Kernel.
J. Artif. Intell. Res., 2024
Robust Zero Trust Architecture: Joint Blockchain based Federated learning and Anomaly Detection based Framework.
CoRR, 2024
Optimal Control of Malware Propagation in IoT Networks.
CoRR, 2024
Modeling and study of defense outsourcing against advanced persistent threat through impulsive differential game approach.
Comput. Secur., 2024
Impact of cybersecurity awareness on mobile malware propagation: A dynamical model.
Comput. Commun., 2024
Detecting Change Intervalswith Isolation Distributional Kernel (Abstract Reprint).
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Blockchain-based reliable image copyright protection.
IET Blockchain, December, 2023
A Novel Diagnosis Scheme against Collusive False Data Injection Attack.
Sensors, July, 2023
Impulsive Artificial Defense Against Advanced Persistent Threat.
IEEE Trans. Inf. Forensics Secur., 2023
2022
Effective Multiplatform Advertising Policy.
IEEE Trans. Syst. Man Cybern. Syst., 2022
MGC-GAN: Multi-Graph Convolutional Generative Adversarial Networks for Accurate Citywide Traffic Flow Prediction.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022
2021
Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat.
IEEE Trans. Syst. Man Cybern. Syst., 2021
Defense Against Advanced Persistent Threat Through Data Backup and Recovery.
IEEE Trans. Netw. Sci. Eng., 2021
Developing Cost-Effective Rumor-Refuting Strategy Through Game-Theoretic Approach.
IEEE Syst. J., 2021
2020
Secure and Efficient Outsourcing of PCA-Based Face Recognition.
IEEE Trans. Inf. Forensics Secur., 2020
A Risk Management Approach to Defending Against the Advanced Persistent Threat.
IEEE Trans. Dependable Secur. Comput., 2020
Simultaneous Benefit Maximization of Conflicting Opinions: Modeling and Analysis.
IEEE Syst. J., 2020
Evaluating the Performance of a Static Patching Strategy against Computer Viruses.
Complex., 2020
Dynamic Maintenance Strategy for Word-of-Mouth Marketing.
IEEE Access, 2020
A Low-Cost Distributed Denial-of-Service Attack Architecture.
IEEE Access, 2020
2019
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach.
IEEE Trans. Inf. Forensics Secur., 2019
Energy-Efficient Patching Strategy for Wireless Sensor Networks.
Sensors, 2019
Mathematical Models for Malware Propagation.
Secur. Commun. Networks, 2019
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach.
Secur. Commun. Networks, 2019
Serious Challenges and Potential Solutions for the Industrial Internet of Things with Edge Intelligence.
IEEE Netw., 2019
Efficiently and securely outsourcing compressed sensing reconstruction to a cloud.
Inf. Sci., 2019
Enhanced Smart Meter Privacy Protection Using Rechargeable Batteries.
IEEE Internet Things J., 2019
A discount strategy in word-of-mouth marketing.
Commun. Nonlinear Sci. Numer. Simul., 2019
Dynamic Discount Pricing in Competitive Marketing.
IEEE Access, 2019
Maximum Profit of Viral Marketing: An Optimal Control Approach.
Proceedings of the 4th International Conference on Mathematics and Artificial Intelligence, 2019
2018
A Bi-Virus Competing Spreading Model with Generic Infection Rates.
IEEE Trans. Netw. Sci. Eng., 2018
Effectiveness analysis of a mixed rumor-quelling strategy.
J. Frankl. Inst., 2018
A Differential Game Approach to Patch Injection.
IEEE Access, 2018
Defending Against Advanced Persistent Threat: A Risk Management Perspective.
Proceedings of the Science of Cyber Security - First International Conference, 2018
2017
The effect of network topology on the spread of computer viruses: a modelling study.
Int. J. Comput. Math., 2017
Defend against advanced persistent threats: An optimal control approach.
CoRR, 2017
A cost-effective rumor-containing strategy.
CoRR, 2017
A discount strategy in word-of-mouth marketing and its assessment.
CoRR, 2017
Maximizing the effectiveness of an advanced persistent threat.
CoRR, 2017
On the effectiveness of the truth-spreading/rumor-blocking strategy for restraining rumors.
CoRR, 2017
Security evaluation of cyber networks under advanced persistent threats.
CoRR, 2017
Analysis of the effectiveness of the truth-spreading strategy for inhibiting rumors.
CoRR, 2017
Distributed interaction between computer virus and patch: A modeling study.
CoRR, 2017
Maximizing the overall profit of a word-of-mouth marketing campaign: A modeling study.
CoRR, 2017
The damage inflicted by a computer virus: A new estimation method.
CoRR, 2017
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats.
IEEE Access, 2017
2014
A new epidemic model of computer viruses.
Commun. Nonlinear Sci. Numer. Simul., 2014
2013
Epidemics of computer viruses: A complex-network approach.
Appl. Math. Comput., 2013
2012
Routing and wavelength assignment for 3-ary n-cube in array-based optical network.
Inf. Process. Lett., 2012
Optimal broadcasting for locally twisted cubes.
Inf. Process. Lett., 2012
A novel computer virus propagation model and its dynamics.
Int. J. Comput. Math., 2012
Optimal control of computer virus under a delayed model.
Appl. Math. Comput., 2012
The spread of computer viruses under the influence of removable storage devices.
Appl. Math. Comput., 2012