- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Information and Cyber Security
- Game Theory and Applications
- Opinion Dynamics and Social Influence
- Infrastructure Resilience and Vulnerability Analysis
- Complex Network Analysis Techniques
- Adversarial Robustness in Machine Learning
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- Distributed Control Multi-Agent Systems
- Auction Theory and Applications
- Reinforcement Learning in Robotics
- Privacy-Preserving Technologies in Data
- Smart Grid Energy Management
- IoT and Edge/Fog Computing
- Mathematical and Theoretical Epidemiology and Ecology Models
- Spam and Phishing Detection
- Security in Wireless Sensor Networks
- Advanced Control Systems Optimization
- Advanced Bandit Algorithms Research
- Simulation Techniques and Applications
- Opportunistic and Delay-Tolerant Networks
- COVID-19 epidemiological studies
- Supply Chain Resilience and Risk Management
New York University
2016-2025
Tsinghua University
2022
Fordham University
2021
University of Illinois Urbana-Champaign
2008-2020
Idaho National Laboratory
2020
Natural Sciences and Engineering Research Council
2020
American Society For Engineering Education
2020
University of Toronto
2007-2020
Brooklyn Technical High School
2018-2019
Faculty of 1000 (United States)
2019
Demand Response Management (DRM) is a key component in the smart grid to effectively reduce power generation costs and user bills. However, it has been an open issue address DRM problem network of multiple utility companies consumers where every entity concerned about maximizing its own benefit. In this paper, we propose Stackelberg game between end-users maximize revenue each company payoff user. We derive analytical results for equilibrium prove that unique solution exists. develop...
Critical infrastructures, such as power grids and transportation systems, are increasingly using open networks for operation. The use of poses many challenges control systems. classical design systems takes into account modeling uncertainties well physical disturbances, providing a multitude methods robust control, adaptive stochastic control. With the growing level integration with new information technologies, modern face not only from world but also cybercomponents system. vulnerabilities...
Data centers have recently gained significant popularity as a cost-effective platform for hosting large-scale service applications. While large data enjoy economies of scale by amortizing initial capital investment over number machines, they also incur tremendous energy cost in terms power distribution and cooling. An effective approach saving is to adjust dynamically the center capacity turning off unused machines. However, this dynamic provisioning problem known be challenging it requires...
In this paper, we introduce a hierarchical system model that captures the decision making processes involved in network of multiple providers and large number consumers smart grid, incorporating from power generation to market activities consumption. We establish Stackelberg game between end users, where behave as leaders maximizing their profit users act followers individual welfare. obtain closed-form expressions for equilibrium prove unique solution exists. population regime, show higher...
This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design sequence sensors and actuators that pass state estimator statistical fault detector, based on knowledge system parameters. To stay undetected, injected should increase estimation errors while keep residues small. We employ matrix change original under is low-cost compared with encryption schemes over all measurements communication networks....
Privacy-preserving distributed machine learning becomes increasingly important due to the recent rapid growth of data. This paper focuses on a class regularized empirical risk minimization problems, and develops two methods provide differential privacy algorithms over network. We first decentralize algorithm using alternating direction method multipliers, propose dual variable perturbation primal dynamic privacy. The mechanisms lead that can guarantees under mild conditions convexity...
The tradeoff between robustness and resilience is a pivotal design issue for modern industrial control systems. trend of integrating information technologies into system infrastructure has made an important dimension the critical protection mission. It desirable that systems support state awareness threats anomalies, maintain acceptable levels operation or service in face unanticipated unprecedented incidents. In this paper, we propose hybrid theoretical framework robust resilient which...
The advent of cloud computing promises to provide computational resources customers like public utilities such as water and electricity. To deal with dynamically fluctuating resource demands, market-driven allocation has been proposed recently implemented by Infrastructure-as-a-Service (IaaS) providers Amazon EC2. In this environment, are offered in distinct types virtual machines (VMs) the provider runs an auction-based market for each VM type goal achieving maximum revenue over time....
In this paper, we study a class of risk-sensitive mean-field stochastic differential games. We show that under appropriate regularity conditions, the value game with exponentiated integral cost functional coincides function satisfying Hamilton -Jacobi- Bellman (HJB) equation an additional quadratic term. provide explicit solution best response when instantaneous functions are log-quadratic and state dynamics affine in control. An equivalent risk-neutral problem is formulated corresponding...
Vehicular ad hoc network (VANET) is an enabling technology in modern transportation systems for providing safety and valuable information, yet vulnerable to a number of attacks from passive eavesdropping active interfering. Intrusion detection (IDSs) are important devices that can mitigate the threats by detecting malicious behaviors. Furthermore, collaborations among vehicles VANETs improve accuracy communicating their experiences between nodes. To this end, distributed machine learning...
Large-scale online service providers have been increasingly relying on geographically distributed cloud infrastructures for hosting and delivery. In this context, a key challenge faced by is to determine the locations where applications should be placed such that cost minimized while performance requirements (e.g., response time) are ensured. Furthermore, dynamic nature of both demand pattern infrastructure favors solution problem. Currently most existing solutions placement either ignored...
The integration of microgrids that depend on the renewable distributed energy resources with current power systems is a critical issue in smart grid. In this paper, we propose non-cooperative game-theoretic framework to study strategic behavior generate energies and characterize generation solutions by using Nash equilibrium concept. Our not only incorporates economic factors but also takes into account stability efficiency microgrids, including flow constraints voltage angle regulations. We...
In this paper, we aim to establish a holistic framework that integrates the cyber-physical layers of cloud-enabled Internet Controlled Things (IoCT) through lens contract theory. At physical layer, device uses cloud services operate system. The quality is unknown device, and hence designs menu contracts enable reliable incentive-compatible service. Based on received contracts, service provider (SP) serves by determining its optimal cyber defense strategy. A contract-based FlipCloud game used...
Advanced Persistent Threats (APTs) have created new security challenges for critical infrastructures due to their stealthy, dynamic, and adaptive natures. In this work, we aim lay a game-theoretic foundation by establishing multi-stage Bayesian game framework capture incomplete information of deceptive APTs multistage multi-phase movement. The analysis the perfect Nash equilibrium (PBNE) enables prediction attacker's behaviors design defensive strategies that can deter adversaries mitigate...
The integration of control systems with modern information technologies has posed potential security threats for critical infrastructures. communication channels the system are vulnerable to malicious jamming and Denial-of-Service (DoS) attacks, which lead severe time-delays degradation performances. In this paper, we design resilient controllers cyber-physical under DoS attacks. We establish a coupled framework incorporates cyber configuration policy Intrusion Detection Systems (IDSs)...
The efficient design of next-generation wireless systems faces multifaceted problems involving a variety node types such as users, relay stations, base eavesdroppers, and jammers. In this paper, the complex decision making processes between network users that perform uplink transmission via stations an active malicious node, is able to act eavesdropper jammer, studied. A noncooperative game in which are players formulated. On one hand, seek choose station maximizes their utilities reflect...
Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt hierarchical viewpoint to these security issues, addressing concerns at each level emphasizing holistic cross-layer philosophy for developing solutions. We propose bottom-up framework that establishes model from physical levels supervisory level, incorporating network communication levels. show game-theoretical approach can yield...
Large-scale online service providers have been increasingly relying on geographically distributed cloud infrastructures for hosting and delivery. In this context, a key challenge faced by is to determine the locations where applications should be placed such that cost minimized while performance requirements (e.g. response time) are assured. Furthermore, dynamic nature of both demand pattern infrastructure favors solution problem. Currently most existing solutions placement either ignored...