Mu Zhu

College of Engineering

Works (5)

Updated: April 5th, 2024 14:43

2023 article

Deception in Drone Surveillance Missions: Strategic vs. Learning Approaches

PROCEEDINGS OF THE 2023 INTERNATIONAL SYMPOSIUM ON THEORY, ALGORITHMIC FOUNDATIONS, AND PROTOCOL DESIGN FOR MOBILE NETWORKS AND MOBILE COMPUTING, MOBIHOC 2023, pp. 382–387.

author keywords: Honey drone; defensive deception; unmanned aerial vehicle; mission effectiveness; game theory; deep reinforcement learning
Sources: Web Of Science, ORCID
Added: December 11, 2023

2023 journal article

Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive Deception

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 20(3), 3816–3830.

author keywords: Defensive deception; hypergame theory; expected utility; beliefs; advanced persistent threat; Hyper Nash Equilibrium
Sources: Web Of Science, ORCID
Added: February 8, 2023

2022 journal article

Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 19(1), 112–129.

By: Z. Wan*, J. Cho*, M. Zhu n, A. Anwar*, C. Kamhoua* & M. Singh n

author keywords: Games; Uncertainty; Nash equilibrium; Analytical models; Stochastic processes; Reconnaissance; Predictive models; Defensive deception; hypergame theory; uncertainty; attacker; defender; advanced persistent threat
Sources: Web Of Science, ORCID
Added: March 11, 2022

2022 article

Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory

2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), pp. 3393–3398.

By: A. Anwar*, M. Zhu n, Z. Wan*, J. Cho*, C. Kamhoua* & M. Singh n

Sources: Web Of Science, ORCID
Added: May 1, 2023

2021 journal article

A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 23(4), 2460–2493.

By: M. Zhu n, A. Anwar*, Z. Wan*, J. Cho*, C. Kamhoua* & M. Singh n

author keywords: Games; Tutorials; Taxonomy; Computer security; Planning; Monitoring; Measurement; Defensive deception; cybersecurity; game theory; machine learning
Sources: Web Of Science, ORCID
Added: November 20, 2021

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.