What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Quanyan Zhu
Google Scholar
35
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Herd Accountability of Privacy-Preserving Algorithms: A Stackelberg Game Approach.
Ya-Ting Yang
Tao Zhang
Quanyan Zhu
2025
journals/tifs
Adaptive Security Response Strategies Through Conjectural Online Learning.
Kim Hammar
Tao Li
Rolf Stadler
Quanyan Zhu
2025
journals/tifs
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion.
Yinan Hu
Juntao Chen
Quanyan Zhu
2025
journals/tifs
PRADA: Proactive Risk Assessment and Mitigation of Misinformed Demand Attacks on Navigational Route Recommendations.
Ya-Ting Yang
Haozhe Lei
Quanyan Zhu
2024
journals/tifs
Human-in-the-Loop Cyber Intrusion Detection Using Active Learning.
Yeongwoo Kim
György Dán
Quanyan Zhu
2024
journals/tifs
GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks.
Yunfei Ge
Quanyan Zhu
2022
journals/compsec
RADAMS: Resilient and adaptive alert and attention management strategy against Informational Denial-of-Service (IDoS) attacks.
Linan Huang
Quanyan Zhu
2022
journals/tifs
ADVERT: An Adaptive and Data-Driven Attention Enhancement Mechanism for Phishing Prevention.
Linan Huang
Shumeng Jia
Emily Balcetis
Quanyan Zhu
2022
conf/cns
Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks.
Yunfei Ge
Quanyan Zhu
2022
conf/cns
On the Role of Risk Perceptions in Cyber Insurance Contracts.
Shutian Liu
Quanyan Zhu
2021
journals/tifs
Duplicity Games for Deception Design With an Application to Insider Threat Mitigation.
Linan Huang
Quanyan Zhu
2020
journals/compsec
Computer & security special issue editorial.
Stefan Rass
Quanyan Zhu
2020
journals/compsec
A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems.
Linan Huang
Quanyan Zhu
2020
journals/tifs
A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network.
Juntao Chen
Corinne Touati
Quanyan Zhu
2020
journals/tifs
<tt>FlipIn</tt>: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things.
Rui Zhang
Quanyan Zhu
2020
conf/sp
Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties.
Timothy Kieras
Muhammad Junaid Farooq
Quanyan Zhu
2019
journals/tifs
Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence.
Jeffrey Pawlick
Edward Colbert
Quanyan Zhu
2019
journals/tifs
Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things.
Juntao Chen
Quanyan Zhu
2019
journals/tifs
Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks.
Muhammad Junaid Farooq
Quanyan Zhu
2019
journals/tifs
iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things.
Jeffrey Pawlick
Juntao Chen
Quanyan Zhu
2018
conf/ccs
Game Theory Meets Network Security: A Tutorial.
Quanyan Zhu
Stefan Rass
2017
journals/tifs
Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach.
Juntao Chen
Quanyan Zhu
2017
journals/tifs
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning.
Tao Zhang
Quanyan Zhu
2017
journals/tifs
Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games.
Yezekael Hayel
Quanyan Zhu
2017
journals/tifs
Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control.
Jeffrey Pawlick
Quanyan Zhu
2017
conf/cns
Secure and practical output feedback control for cloud-enabled cyber-physical systems.
Zhiheng Xu
Quanyan Zhu
2017
conf/cns
Quantitative models of imperfect deception in network security using signaling games with evidence [IEEE CNS 17 Poster].
Jeffrey Pawlick
Quanyan Zhu
2016
conf/ccs
A Dual Perturbation Approach for Differential Private ADMM-Based Distributed Empirical Risk Minimization.
Tao Zhang
Quanyan Zhu
2015
conf/ccs
Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games.
William Austin Casey
Quanyan Zhu
Jose Andre Morales
Bud Mishra
2015
conf/ccs
Secure and Resilient Control Design for Cloud Enabled Networked Control Systems.
Zhiheng Xu
Quanyan Zhu
2015
conf/cns
PHY-layer location privacy-preserving access point selection mechanism in next-generation wireless networks.
Sadegh Farhang
Yezekael Hayel
Quanyan Zhu
2015
conf/wisec
Physical layer location privacy issue in wireless small cell networks.
Sadegh Farhang
Yezekael Hayel
Quanyan Zhu
2014
conf/cns
Two-tier data-driven intrusion detection for automatic generation control in smart grid.
Muhammad Qasim Ali
Reza Yousefian
Ehab Al-Shaer
Sukumar Kamalasadan
Quanyan Zhu
2012
conf/uss
Tragedy of Anticommons in Digital Right Management of Medical Records.
Quanyan Zhu
Carl A. Gunter
Tamer Basar
2011
conf/ccs
Poster: SMURFEN: a rule sharing collaborative intrusion detection network.
Carol J. Fung
Quanyan Zhu
Raouf Boutaba
Tamer Basar
Coauthors
Bud Mishra
(1)
Carl A. Gunter
(1)
Carol J. Fung
(1)
Corinne Touati
(1)
Edward Colbert
(1)
Ehab Al-Shaer
(1)
Emily Balcetis
(1)
György Dán
(1)
Haozhe Lei
(1)
Jeffrey Pawlick
(4)
Jose Andre Morales
(1)
Juntao Chen
(5)
Kim Hammar
(1)
Linan Huang
(4)
Muhammad Junaid Farooq
(2)
Muhammad Qasim Ali
(1)
Quanyan Zhu
(35)
Raouf Boutaba
(1)
Reza Yousefian
(1)
Rolf Stadler
(1)
Rui Zhang
(1)
Sadegh Farhang
(2)
Shumeng Jia
(1)
Shutian Liu
(1)
Stefan Rass
(2)
Sukumar Kamalasadan
(1)
Tamer Basar
(2)
Tao Li
(1)
Tao Zhang
(3)
Timothy Kieras
(1)
William Austin Casey
(1)
Ya-Ting Yang
(2)
Yeongwoo Kim
(1)
Yezekael Hayel
(3)
Yinan Hu
(1)
Yunfei Ge
(2)
Zhiheng Xu
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to