Alert button
Picture for Linan Huang

Linan Huang

Alert button

ZETAR: Modeling and Computational Design of Strategic and Adaptive Compliance Policies

Add code
Bookmark button
Alert button
Apr 05, 2022
Linan Huang, Quanyan Zhu

Figure 1 for ZETAR: Modeling and Computational Design of Strategic and Adaptive Compliance Policies
Figure 2 for ZETAR: Modeling and Computational Design of Strategic and Adaptive Compliance Policies
Figure 3 for ZETAR: Modeling and Computational Design of Strategic and Adaptive Compliance Policies
Figure 4 for ZETAR: Modeling and Computational Design of Strategic and Adaptive Compliance Policies
Viaarxiv icon

RADAMS: Resilient and Adaptive Alert and Attention Management Strategy against Informational Denial-of-Service (IDoS) Attacks

Add code
Bookmark button
Alert button
Nov 01, 2021
Linan Huang, Quanyan Zhu

Figure 1 for RADAMS: Resilient and Adaptive Alert and Attention Management Strategy against Informational Denial-of-Service (IDoS) Attacks
Figure 2 for RADAMS: Resilient and Adaptive Alert and Attention Management Strategy against Informational Denial-of-Service (IDoS) Attacks
Figure 3 for RADAMS: Resilient and Adaptive Alert and Attention Management Strategy against Informational Denial-of-Service (IDoS) Attacks
Figure 4 for RADAMS: Resilient and Adaptive Alert and Attention Management Strategy against Informational Denial-of-Service (IDoS) Attacks
Viaarxiv icon

Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability

Add code
Bookmark button
Alert button
Aug 04, 2021
Linan Huang, Quanyan Zhu

Figure 1 for Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability
Figure 2 for Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability
Figure 3 for Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability
Figure 4 for Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability
Viaarxiv icon

Reinforcement Learning for Feedback-Enabled Cyber Resilience

Add code
Bookmark button
Alert button
Jul 02, 2021
Yunhan Huang, Linan Huang, Quanyan Zhu

Figure 1 for Reinforcement Learning for Feedback-Enabled Cyber Resilience
Figure 2 for Reinforcement Learning for Feedback-Enabled Cyber Resilience
Figure 3 for Reinforcement Learning for Feedback-Enabled Cyber Resilience
Figure 4 for Reinforcement Learning for Feedback-Enabled Cyber Resilience
Viaarxiv icon

INADVERT: An Interactive and Adaptive Counterdeception Platform for Attention Enhancement and Phishing Prevention

Add code
Bookmark button
Alert button
Jun 13, 2021
Linan Huang, Quanyan Zhu

Figure 1 for INADVERT: An Interactive and Adaptive Counterdeception Platform for Attention Enhancement and Phishing Prevention
Figure 2 for INADVERT: An Interactive and Adaptive Counterdeception Platform for Attention Enhancement and Phishing Prevention
Figure 3 for INADVERT: An Interactive and Adaptive Counterdeception Platform for Attention Enhancement and Phishing Prevention
Figure 4 for INADVERT: An Interactive and Adaptive Counterdeception Platform for Attention Enhancement and Phishing Prevention
Viaarxiv icon

Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes

Add code
Bookmark button
Alert button
Jun 27, 2019
Linan Huang, Quanyan Zhu

Figure 1 for Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes
Figure 2 for Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes
Figure 3 for Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes
Figure 4 for Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes
Viaarxiv icon