追蹤
Pengdeng Li
Pengdeng Li
School of Computer Science and Engineering, Nanyang Technological University
在 ntu.edu.sg 的電子郵件地址已通過驗證
標題
引用次數
引用次數
年份
Effective repair strategy against advanced persistent threat: A differential game approach
LX Yang, P Li, Y Zhang, X Yang, Y Xiang, W Zhou
IEEE Transactions on Information Forensics and Security 14 (7), 1713-1728, 2018
952018
A risk management approach to defending against the advanced persistent threat
LX Yang, P Li, X Yang, YY Tang
IEEE Transactions on Dependable and Secure Computing 17 (6), 1163-1172, 2018
692018
The modeling and analysis of the word-of-mouth marketing
P Li, X Yang, LX Yang, Q Xiong, Y Wu, YY Tang
Physica A: Statistical Mechanics and its Applications 493, 1-16, 2018
642018
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats
LX Yang, P Li, X Yang, YY Tang
IEEE Access 5, 20111-20123, 2017
532017
On the competition of two conflicting messages
LX Yang, P Li, X Yang, Y Wu, YY Tang
Nonlinear Dynamics 91, 1853-1869, 2018
452018
Defending against the advanced persistent threat: An optimal control approach
P Li, X Yang, Q Xiong, J Wen, YY Tang
Security and Communication Networks 2018, 2018
402018
A discount strategy in word-of-mouth marketing
T Zhang, P Li, LX Yang, X Yang, YY Tang, Y Wu
Communications in Nonlinear Science and Numerical Simulation 74, 167-179, 2019
342019
Effective quarantine and recovery scheme against advanced persistent threat
LX Yang, P Li, X Yang, Y Xiang, F Jiang, W Zhou
IEEE Transactions on Systems, Man, and Cybernetics: Systems 51 (10), 5977-5991, 2019
292019
Developing cost-effective rumor-refuting strategy through game-theoretic approach
DW Huang, LX Yang, P Li, X Yang, YY Tang
IEEE Systems Journal 15 (4), 5034-5045, 2020
232020
Simultaneous benefit maximization of conflicting opinions: Modeling and analysis
LX Yang, P Li, X Yang, Y Xiang, YY Tang
IEEE Systems Journal 14 (2), 1623-1634, 2020
192020
Discount pricing in word-of-mouth marketing: An optimal control approach
P Li, X Yang, Y Wu, W He, P Zhao
Physica A: Statistical Mechanics and its Applications 505, 512-522, 2018
192018
On dynamic recovery of cloud storage system under advanced persistent threats
P Li, X Yang
IEEE Access 7, 103556-103569, 2019
162019
A theoretical method for assessing disruptive computer viruses
Y Wu, P Li, LX Yang, X Yang, YY Tang
Physica A: Statistical Mechanics and its Applications 482, 325-336, 2017
162017
A Differential Game Approach to Patch Injection
LX Yang, P Li, X Yang, Y Xiang, W Zhou
IEEE Access 6, 58924-58938, 2018
102018
Distributed interaction between computer virus and patch: A modeling study
LX Yang, X Yang, Q Zhu, C Gan
arXiv preprint arXiv:1705.04818, 2017
102017
Energy-efficient patching strategy for wireless sensor networks
P Li, LX Yang, X Yang, X Zhong, J Wen, Q Xiong
Sensors 19 (2), 262, 2019
72019
Offline Equilibrium Finding
S Li, X Wang, Y Zhang, J Cerny, P Li, H Chan, B An
arXiv preprint arXiv:2207.05285v2, 2023
42023
Seeking best-balanced patch-injecting strategies through optimal control approach
K Huang, P Li, LX Yang, X Yang, YY Tang
Security and Communication Networks 2019, 1-12, 2019
42019
Reducing the spectral radius of a torus network by link removal
X Yang, P Li, LX Yang, Y Wu
PloS ONE 11 (5), e0155580, 2016
32016
Population-size-aware policy optimization for mean-field games
P Li, X Wang, S Li, H Chan, B An
arXiv preprint arXiv:2302.03364, 2023
22023
系統目前無法執行作業,請稍後再試。
文章 1–20