Quanyan Zhu

ORCID: 0000-0002-0008-2953
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Game Theory and Applications
  • Opinion Dynamics and Social Influence
  • Infrastructure Resilience and Vulnerability Analysis
  • Complex Network Analysis Techniques
  • Adversarial Robustness in Machine Learning
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Distributed Control Multi-Agent Systems
  • Auction Theory and Applications
  • Reinforcement Learning in Robotics
  • Privacy-Preserving Technologies in Data
  • Smart Grid Energy Management
  • IoT and Edge/Fog Computing
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Spam and Phishing Detection
  • Security in Wireless Sensor Networks
  • Advanced Control Systems Optimization
  • Advanced Bandit Algorithms Research
  • Simulation Techniques and Applications
  • Opportunistic and Delay-Tolerant Networks
  • COVID-19 epidemiological studies
  • Supply Chain Resilience and Risk Management

New York University
2016-2025

Tsinghua University
2022

Fordham University
2021

University of Illinois Urbana-Champaign
2008-2020

Idaho National Laboratory
2020

Natural Sciences and Engineering Research Council
2020

American Society For Engineering Education
2020

University of Toronto
2007-2020

Brooklyn Technical High School
2018-2019

Faculty of 1000 (United States)
2019

Demand Response Management (DRM) is a key component in the smart grid to effectively reduce power generation costs and user bills. However, it has been an open issue address DRM problem network of multiple utility companies consumers where every entity concerned about maximizing its own benefit. In this paper, we propose Stackelberg game between end-users maximize revenue each company payoff user. We derive analytical results for equilibrium prove that unique solution exists. develop...

10.1109/tsg.2012.2223766 article EN IEEE Transactions on Smart Grid 2013-02-19

Critical infrastructures, such as power grids and transportation systems, are increasingly using open networks for operation. The use of poses many challenges control systems. classical design systems takes into account modeling uncertainties well physical disturbances, providing a multitude methods robust control, adaptive stochastic control. With the growing level integration with new information technologies, modern face not only from world but also cybercomponents system. vulnerabilities...

10.1109/mcs.2014.2364710 article EN IEEE Control Systems 2015-01-16

Data centers have recently gained significant popularity as a cost-effective platform for hosting large-scale service applications. While large data enjoy economies of scale by amortizing initial capital investment over number machines, they also incur tremendous energy cost in terms power distribution and cooling. An effective approach saving is to adjust dynamically the center capacity turning off unused machines. However, this dynamic provisioning problem known be challenging it requires...

10.1145/2371536.2371562 article EN 2012-09-18

In this paper, we introduce a hierarchical system model that captures the decision making processes involved in network of multiple providers and large number consumers smart grid, incorporating from power generation to market activities consumption. We establish Stackelberg game between end users, where behave as leaders maximizing their profit users act followers individual welfare. obtain closed-form expressions for equilibrium prove unique solution exists. population regime, show higher...

10.1109/tsg.2015.2431324 article EN IEEE Transactions on Smart Grid 2015-06-02

This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design sequence sensors and actuators that pass state estimator statistical fault detector, based on knowledge system parameters. To stay undetected, injected should increase estimation errors while keep residues small. We employ matrix change original under is low-cost compared with encryption schemes over all measurements communication networks....

10.1109/tcns.2016.2573039 article EN publisher-specific-oa IEEE Transactions on Control of Network Systems 2016-05-25

Privacy-preserving distributed machine learning becomes increasingly important due to the recent rapid growth of data. This paper focuses on a class regularized empirical risk minimization problems, and develops two methods provide differential privacy algorithms over network. We first decentralize algorithm using alternating direction method multipliers, propose dual variable perturbation primal dynamic privacy. The mechanisms lead that can guarantees under mild conditions convexity...

10.1109/tifs.2016.2607691 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2016-09-08

The tradeoff between robustness and resilience is a pivotal design issue for modern industrial control systems. trend of integrating information technologies into system infrastructure has made an important dimension the critical protection mission. It desirable that systems support state awareness threats anomalies, maintain acceptable levels operation or service in face unanticipated unprecedented incidents. In this paper, we propose hybrid theoretical framework robust resilient which...

10.1109/cdc.2011.6161031 article EN 2011-12-01

The advent of cloud computing promises to provide computational resources customers like public utilities such as water and electricity. To deal with dynamically fluctuating resource demands, market-driven allocation has been proposed recently implemented by Infrastructure-as-a-Service (IaaS) providers Amazon EC2. In this environment, are offered in distinct types virtual machines (VMs) the provider runs an auction-based market for each VM type goal achieving maximum revenue over time....

10.1109/ucc.2011.33 article EN 2011-12-01

In this paper, we study a class of risk-sensitive mean-field stochastic differential games. We show that under appropriate regularity conditions, the value game with exponentiated integral cost functional coincides function satisfying Hamilton -Jacobi- Bellman (HJB) equation an additional quadratic term. provide explicit solution best response when instantaneous functions are log-quadratic and state dynamics affine in control. An equivalent risk-neutral problem is formulated corresponding...

10.1109/tac.2013.2289711 article EN IEEE Transactions on Automatic Control 2013-11-19

Vehicular ad hoc network (VANET) is an enabling technology in modern transportation systems for providing safety and valuable information, yet vulnerable to a number of attacks from passive eavesdropping active interfering. Intrusion detection (IDSs) are important devices that can mitigate the threats by detecting malicious behaviors. Furthermore, collaborations among vehicles VANETs improve accuracy communicating their experiences between nodes. To this end, distributed machine learning...

10.1109/tsipn.2018.2801622 article EN publisher-specific-oa IEEE Transactions on Signal and Information Processing over Networks 2018-02-02

Large-scale online service providers have been increasingly relying on geographically distributed cloud infrastructures for hosting and delivery. In this context, a key challenge faced by is to determine the locations where applications should be placed such that cost minimized while performance requirements (e.g., response time) are ensured. Furthermore, dynamic nature of both demand pattern infrastructure favors solution problem. Currently most existing solutions placement either ignored...

10.1109/jsac.2013.sup2.1213008 article EN IEEE Journal on Selected Areas in Communications 2013-12-01

The integration of microgrids that depend on the renewable distributed energy resources with current power systems is a critical issue in smart grid. In this paper, we propose non-cooperative game-theoretic framework to study strategic behavior generate energies and characterize generation solutions by using Nash equilibrium concept. Our not only incorporates economic factors but also takes into account stability efficiency microgrids, including flow constraints voltage angle regulations. We...

10.1109/tsg.2016.2598771 article EN publisher-specific-oa IEEE Transactions on Smart Grid 2016-08-10

In this paper, we aim to establish a holistic framework that integrates the cyber-physical layers of cloud-enabled Internet Controlled Things (IoCT) through lens contract theory. At physical layer, device uses cloud services operate system. The quality is unknown device, and hence designs menu contracts enable reliable incentive-compatible service. Based on received contracts, service provider (SP) serves by determining its optimal cyber defense strategy. A contract-based FlipCloud game used...

10.1109/tifs.2017.2718489 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2017-06-21

Advanced Persistent Threats (APTs) have created new security challenges for critical infrastructures due to their stealthy, dynamic, and adaptive natures. In this work, we aim lay a game-theoretic foundation by establishing multi-stage Bayesian game framework capture incomplete information of deceptive APTs multistage multi-phase movement. The analysis the perfect Nash equilibrium (PBNE) enables prediction attacker's behaviors design defensive strategies that can deter adversaries mitigate...

10.1145/3305218.3305239 article EN ACM SIGMETRICS Performance Evaluation Review 2019-01-17

10.1016/j.arcontrol.2022.01.001 article EN publisher-specific-oa Annual Reviews in Control 2022-01-01

The integration of control systems with modern information technologies has posed potential security threats for critical infrastructures. communication channels the system are vulnerable to malicious jamming and Denial-of-Service (DoS) attacks, which lead severe time-delays degradation performances. In this paper, we design resilient controllers cyber-physical under DoS attacks. We establish a coupled framework incorporates cyber configuration policy Intrusion Detection Systems (IDSs)...

10.1109/isrcs.2013.6623750 article EN 2013-08-01

The efficient design of next-generation wireless systems faces multifaceted problems involving a variety node types such as users, relay stations, base eavesdroppers, and jammers. In this paper, the complex decision making processes between network users that perform uplink transmission via stations an active malicious node, is able to act eavesdropper jammer, studied. A noncooperative game in which are players formulated. On one hand, seek choose station maximizes their utilities reflect...

10.1109/milcom.2011.6127463 article EN 2011-11-01

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt hierarchical viewpoint to these security issues, addressing concerns at each level emphasizing holistic cross-layer philosophy for developing solutions. We propose bottom-up framework that establishes model from physical levels supervisory level, incorporating network communication levels. show game-theoretical approach can yield...

10.1109/isrcs.2011.6016081 article EN 2011-08-01

Large-scale online service providers have been increasingly relying on geographically distributed cloud infrastructures for hosting and delivery. In this context, a key challenge faced by is to determine the locations where applications should be placed such that cost minimized while performance requirements (e.g. response time) are assured. Furthermore, dynamic nature of both demand pattern infrastructure favors solution problem. Currently most existing solutions placement either ignored...

10.1109/icdcs.2012.74 article EN 2012-06-01
Coming Soon ...