Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Serkan Saritas"'
Publikováno v:
Game Theory and Machine Learning for Cyber Security
Publikováno v:
IEEE Transactions on Information Theory
We investigate the equilibrium behavior for the decentralized cheap talk problem for real random variables and quadratic cost criteria in which an encoder and a decoder have misaligned objective functions. In prior work, it has been shown that the nu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4a5df7b23538fccfd0e4c1a442cea091
https://hdl.handle.net/11693/76896
https://hdl.handle.net/11693/76896
Publikováno v:
ICC
5G and beyond 5G low power wireless networks make Internet of Things (IoT) and Cyber-Physical Systems (CPS) applications capable of serving massive amounts of devices and machines. Due to the broadcast nature of wireless networks, it is crucial to se
Publikováno v:
ISIT
In this study, Nash and Stackelberg equilibria of single-stage and multi-stage quadratic signaling games between an encoder and a decoder are investigated. In the considered setup, the objective functions of the encoder and the decoder are misaligned
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::01c1ac33f50ff63c88adabd7be0db889
http://arxiv.org/abs/2102.02099
http://arxiv.org/abs/2102.02099
Publikováno v:
IEEE Transactions on Automatic Control
We consider communications through a Gaussian noise channel between an encoder and a decoder which have subjective probabilistic models on the source distribution. Although they consider the same cost function, the induced expected costs are misalign
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::040456f9778a17a724a0a1ebe8bc07d1
http://arxiv.org/abs/2101.00799
http://arxiv.org/abs/2101.00799
Publikováno v:
CDC
This paper investigates a moving target defense strategy based on detector threshold switching against stealthy sensor attacks. We model the interactions between the attacker and the defender as a game. While the attacker wants to remain stealthy and
Publikováno v:
ACC
This paper is concerned with the problem of fault-tolerant estimation in cyber-physical systems. In cyber-physical systems, such as critical infrastructures, networked embedded sensors are widely used for monitoring and can be exploited by an adversa
Publikováno v:
Automatica
This paper considers dynamic (multi-stage) signaling games involving an encoder and a decoder who have subjective models on the cost functions. We consider both Nash (simultaneous-move) and Stackelberg (leader-follower) equilibria of dynamic signalin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9d075489fe79e60da00db2c4c586e56e
https://hdl.handle.net/11693/75520
https://hdl.handle.net/11693/75520
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030324292
GameSec
GameSec
Identity theft through phishing and session hijacking attacks has become a major attack vector in recent years, and is expected to become more frequent due to the pervasive use of mobile devices. Continuous authentication based on the characterizatio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bc793cd1ab523cc1ffdefbea2d90c537
https://doi.org/10.1007/978-3-030-32430-8_26
https://doi.org/10.1007/978-3-030-32430-8_26
Publikováno v:
Proceedings of the 57th IEEE Conference on Decision and Control, CDC 2018
CDC
CDC
Many decentralized and networked control problems involve decision makers which have either misaligned criteria or subjective priors. In the context of such a setup, in this paper we consider binary signaling problems in which the decision makers (th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f99e17927f5233d6404392c19ae01dfb
https://aperta.ulakbim.gov.tr/record/33095
https://aperta.ulakbim.gov.tr/record/33095