Effective repair strategy against advanced persistent threat: A differential game approach LX Yang, P Li, Y Zhang, X Yang, Y Xiang, W Zhou IEEE Transactions on Information Forensics and Security 14 (7), 1713-1728, 2018 | 99 | 2018 |
A risk management approach to defending against the advanced persistent threat LX Yang, P Li, X Yang, YY Tang IEEE Transactions on Dependable and Secure Computing 17 (6), 1163-1172, 2018 | 71 | 2018 |
The modeling and analysis of the word-of-mouth marketing P Li, X Yang, LX Yang, Q Xiong, Y Wu, YY Tang Physica A: Statistical Mechanics and its Applications 493, 1-16, 2018 | 64 | 2018 |
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats LX Yang, P Li, X Yang, YY Tang IEEE Access 5, 20111-20123, 2017 | 54 | 2017 |
On the competition of two conflicting messages LX Yang, P Li, X Yang, Y Wu, YY Tang Nonlinear Dynamics 91, 1853-1869, 2018 | 47 | 2018 |
Defending against the advanced persistent threat: An optimal control approach P Li, X Yang, Q Xiong, J Wen, YY Tang Security and Communication Networks 2018, 2018 | 40 | 2018 |
A discount strategy in word-of-mouth marketing T Zhang, P Li, LX Yang, X Yang, YY Tang, Y Wu Communications in Nonlinear Science and Numerical Simulation 74, 167-179, 2019 | 36 | 2019 |
Effective quarantine and recovery scheme against advanced persistent threat LX Yang, P Li, X Yang, Y Xiang, F Jiang, W Zhou IEEE Transactions on Systems, Man, and Cybernetics: Systems 51 (10), 5977-5991, 2019 | 30 | 2019 |
Developing cost-effective rumor-refuting strategy through game-theoretic approach DW Huang, LX Yang, P Li, X Yang, YY Tang IEEE Systems Journal 15 (4), 5034-5045, 2020 | 26 | 2020 |
Simultaneous benefit maximization of conflicting opinions: Modeling and analysis LX Yang, P Li, X Yang, Y Xiang, YY Tang IEEE Systems Journal 14 (2), 1623-1634, 2020 | 19 | 2020 |
Discount pricing in word-of-mouth marketing: An optimal control approach P Li, X Yang, Y Wu, W He, P Zhao Physica A: Statistical Mechanics and its Applications 505, 512-522, 2018 | 19 | 2018 |
On dynamic recovery of cloud storage system under advanced persistent threats P Li, X Yang IEEE Access 7, 103556-103569, 2019 | 16 | 2019 |
A theoretical method for assessing disruptive computer viruses Y Wu, P Li, LX Yang, X Yang, YY Tang Physica A: Statistical Mechanics and its Applications 482, 325-336, 2017 | 16 | 2017 |
A Differential Game Approach to Patch Injection LX Yang, P Li, X Yang, Y Xiang, W Zhou IEEE Access 6, 58924-58938, 2018 | 11 | 2018 |
Distributed interaction between computer virus and patch: A modeling study LX Yang, X Yang, Q Zhu, C Gan arXiv preprint arXiv:1705.04818, 2017 | 10 | 2017 |
Energy-efficient patching strategy for wireless sensor networks P Li, LX Yang, X Yang, X Zhong, J Wen, Q Xiong Sensors 19 (2), 262, 2019 | 7 | 2019 |
Offline Equilibrium Finding S Li, X Wang, Y Zhang, J Cerny, P Li, H Chan, B An arXiv preprint arXiv:2207.05285v2, 2023 | 4 | 2023 |
Seeking best-balanced patch-injecting strategies through optimal control approach K Huang, P Li, LX Yang, X Yang, YY Tang Security and Communication Networks 2019, 1-12, 2019 | 4 | 2019 |
Reducing the spectral radius of a torus network by link removal X Yang, P Li, LX Yang, Y Wu PloS ONE 11 (5), e0155580, 2016 | 3 | 2016 |
Population-size-aware policy optimization for mean-field games P Li, X Wang, S Li, H Chan, B An ICLR 2023, 2023 | 2 | 2023 |