
EPROACH: A Population Vaccination Game for Strategic Information Design to Enable Responsible COVID Reopening
The COVID19 lockdowns have created a significant socioeconomic impact o...
read it

Combating Informational DenialofService (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability
This work proposes a new class of proactive attacks called the Informati...
read it

Efficient Episodic Learning of Nonstationary and Unknown ZeroSum Games Using Expert Game Ensembles
Game theory provides essential analysis in many applications of strategi...
read it

A Dynamic Game Approach to Designing Secure Interdependent IoTEnabled Infrastructure Network
The emerging Internet of Things (IoT) applications that leverage ubiquit...
read it

Reinforcement Learning for FeedbackEnabled Cyber Resilience
The rapid growth in the number of devices and their connectivity has enl...
read it

Herd Behaviors in Epidemics: A DynamicsCoupled Evolutionary Games Approach
The recent COVID19 pandemic has led to an increasing interest in the mo...
read it

INADVERT: An Interactive and Adaptive Counterdeception Platform for Attention Enhancement and Phishing Prevention
Deceptive attacks exploiting the innate and the acquired vulnerabilities...
read it

GameTheoretic Frameworks for Epidemic Spreading and Human Decision Making: A Review
This review presents and reviews various solved and open problems in dev...
read it

The Confluence of Networks, Games and Learning
Recent years have witnessed significant advances in technologies and ser...
read it

Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice
Robotics is becoming more and more ubiquitous, but the pressure to bring...
read it

Convergence of Bayesian Nash Equilibrium in Infinite Bayesian Games under Discretization
We prove the existence of Bayesian Nash Equilibrium (BNE) of generalsum...
read it

SelfTriggered Markov Decision Processes
In this paper, we study Markov Decision Processes (MDPs) with selftrigg...
read it

A PursuitEvasion Differential Game with Strategic Information Acquisition
In this paper, we study a twoperson linearquadraticGaussian pursuite...
read it

Feedback Capacity of Parallel ACGN Channels and Kalman Filter: Power Allocation with Feedback
In this paper, we relate the feedback capacity of parallel additive colo...
read it

Relativistic Rocket Control (Relativistic SpaceTravel Flight Control): Feedback Control of Relativistic Dynamics Propelled by Ejecting Mass
In this short note, we investigate the feedback control of relativistic ...
read it

Blackwell Online Learning for Markov Decision Processes
This work provides a novel interpretation of Markov Decision Processes (...
read it

Fundamental Limits on the Maximum Deviations in Control Systems: How Short Can Distribution Tails be Made by Feedback?
In this paper, we adopt an informationtheoretic approach to investigate...
read it

The SpectralDomain 𝒲_2 Wasserstein Distance for Elliptical Processes and the SpectralDomain Gelbrich Bound
In this short note, we introduce the spectraldomain 𝒲_2 Wasserstein dis...
read it

Independent Elliptical Distributions Minimize Their 𝒲_2 Wasserstein Distance from Independent Elliptical Distributions with the Same Density Generator
This short note is on a property of the 𝒲_2 Wasserstein distance which i...
read it

CrossLayer Coordinated Attacks on CyberPhysical Systems: A LQG Game Framework with Controlled Observations
In this work, we establish a gametheoretic framework to study crosslay...
read it

Fundamental StealthinessDistortion Tradeoffs in Dynamical (Control) Systems under Injection Attacks: A Power Spectral Analysis
In this paper, we analyze the fundamental stealthinessdistortion tradeo...
read it

LocallyAware Constrained Games on Networks
Network games have been instrumental in understanding strategic behavior...
read it

Independent Gaussian Distributions Minimize the KullbackLeibler (KL) Divergence from Independent Gaussian Distributions
This short note is on a property of the KullbackLeibler (KL) divergence...
read it

CommunicationEfficient Distributed Machine Learning over Strategic Networks: A TwoLayer Game Approach
This paper considers a gametheoretic framework for distributed learning...
read it

Fundamental Limits of Obfuscation for Linear Gaussian Dynamical Systems: An InformationTheoretic Approach
In this paper, we study the fundamental limits of obfuscation in terms o...
read it

Deceptive Kernel Function on Observations of Discrete POMDP
This paper studies the deception applied on agent in a partially observa...
read it

Channel Leakage, InformationTheoretic Limitations of Obfuscation, and Optimal Privacy Mask Design for Streaming Data
In this paper, we first introduce the notion of channel leakage as the m...
read it

Cognitive Honeypots against Lateral Movement for Mitigation of LongTerm Vulnerability
Lateral movement of advanced persistent threats (APTs) has posed a sever...
read it

Game of Duplicity: A Proactive Automated Defense Mechanism by Deception Design
We present a new game framework called the duplicity game to design defe...
read it

QoE Based Revenue Maximizing Dynamic Resource Allocation and Pricing for FogEnabled MissionCritical IoT Applications
Fog computing is becoming a vital component for Internet of things (IoT)...
read it

Differentially Private Collaborative Intrusion Detection Systems For VANETs
Vehicular ad hoc network (VANET) is an enabling technology in modern tra...
read it

Dynamic Resilient Network Games with Applications to MultiAgent Consensus
A cyber security problem in a networked system formulated as a resilient...
read it

Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties
Supply chain security threats pose new challenges to security risk model...
read it

Security of Distributed Machine Learning: A GameTheoretic Approach to Design Secure DSVM
Distributed machine learning algorithms play a significant role in proce...
read it

A RecedingHorizon MDP Approach for Performance Evaluation of Moving Target Defense in Networks
In this paper, we study the problem of assessing the effectiveness of a ...
read it

Manipulating Reinforcement Learning: Poisoning Attacks on Cost Signals
This chapter studies emerging cyberattacks on reinforcement learning (R...
read it

Fundamental Limits of Online Learning: An EntropicInnovations Viewpoint
In this paper, we examine the fundamental performance limitations of onl...
read it

A Connection between Feedback Capacity and Kalman Filter for Colored Gaussian Noises
In this paper, we establish a connection between the feedback capacity o...
read it

Control Challenges for Resilient Control Systems
In this chapter, we introduce methods to address resiliency issues for c...
read it

PhD Forum: Enabling Autonomic IoT for Smart Urban Services
The development of autonomous cyberphysical systems (CPS) and advances ...
read it

Optimal TwoSided Market Mechanism Design for LargeScale Data Sharing and Trading in Massive IoT Networks
The development of the Internet of Things (IoT) generates a significant ...
read it

Fundamental Entropic Laws and L_p Limitations of Feedback Systems: Implications for MachineLearningintheLoop Control
In this paper, we study the fundamental performance limitations for gene...
read it

Relativistic Control: Feedback Control of Relativistic Dynamics
Strictly speaking, Newton's second law of motion is only an approximatio...
read it

Fundamental Limitations in Sequential Prediction and Recursive Algorithms: L_p Bounds via an Entropic Analysis
In this paper, we obtain fundamental L_p bounds in sequential prediction...
read it

RIoTS: Risk Analysis of IoT Supply Chain Threats
Securing the supply chain of information and communications technology (...
read it

FlipIn: A GameTheoretic Cyber Insurance Framework for IncentiveCompatible Cyber Risk Management of Internet of Things
Internet of Things (IoT) is highly vulnerable to emerging Advanced Persi...
read it

Dynamic Games for Secure and Resilient Control System Design
Modern control systems are featured by their hierarchical structure comp...
read it

Generic Bounds on the Maximum Deviations in Sequential Prediction: An InformationTheoretic Analysis
In this paper, we derive generic bounds on the maximum deviations in pre...
read it

On Convergence Rate of Adaptive Multiscale Value Function Approximation For Reinforcement Learning
In this paper, we propose a generic framework for devising an adaptive a...
read it

IoT Supply Chain Security: Overview, Challenges, and the Road Ahead
Supply chain is emerging as the next frontier of threats in the rapidly ...
read it
Quanyan Zhu
is this you? claim profile
Assistant Professor at New York University since 2014, Postdoctoral Research Associate at Princeton University 2013, PhD at University of Illinois at UrbanaChampaign 20082013, Intern at Instrumentation and Control, National and Homeland Security at Idaho National Laboratory 2010, Visiting Researcher at University of Houston 2010, Visiting Researcher at INRIA 2008, Intern at Wolfram Research 2008, Instructor at University of Toronto 20062008, Intern at Paper and Pulp Research Canada 2006