ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.07942
  4. Cited By
Duplicity Games for Deception Design with an Application to Insider
  Threat Mitigation

Duplicity Games for Deception Design with an Application to Insider Threat Mitigation

14 June 2020
Linan Huang
Quanyan Zhu
ArXivPDFHTML

Papers citing "Duplicity Games for Deception Design with an Application to Insider Threat Mitigation"

12 / 12 papers shown
Title
HoneyGPT: Breaking the Trilemma in Terminal Honeypots with Large Language Model
HoneyGPT: Breaking the Trilemma in Terminal Honeypots with Large Language Model
Ziyang Wang
Jianzhou You
Haining Wang
Tianwei Yuan
Shichao Lv
Yang Wang
Limin Sun
36
2
0
04 Jun 2024
A Game-Theoretic Analysis of Auditing Differentially Private Algorithms
  with Epistemically Disparate Herd
A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd
Ya-Ting Yang
Tao Zhang
Quanyan Zhu
15
2
0
24 Apr 2024
Foundations of Cyber Resilience: The Confluence of Game, Control, and
  Learning Theories
Foundations of Cyber Resilience: The Confluence of Game, Control, and Learning Theories
Quanyan Zhu
AI4CE
37
3
0
01 Apr 2024
Symbiotic Game and Foundation Models for Cyber Deception Operations in
  Strategic Cyber Warfare
Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare
Tao Li
Quanyan Zhu
AAML
40
5
0
14 Mar 2024
Zero Trust for Cyber Resilience
Zero Trust for Cyber Resilience
Yunfei Ge
Quanyan Zhu
13
2
0
05 Dec 2023
Game of Travesty: Decoy-based Psychological Cyber Deception for
  Proactive Human Agents
Game of Travesty: Decoy-based Psychological Cyber Deception for Proactive Human Agents
Yinan Hu
Quanyan Zhu
17
1
0
23 Sep 2023
The Doctrine of Cyber Effect: An Ethics Framework for Defensive Cyber
  Deception
The Doctrine of Cyber Effect: An Ethics Framework for Defensive Cyber Deception
Quanyan Zhu
20
4
0
26 Feb 2023
ZETAR: Modeling and Computational Design of Strategic and Adaptive
  Compliance Policies
ZETAR: Modeling and Computational Design of Strategic and Adaptive Compliance Policies
Linan Huang
Quanyan Zhu
31
6
0
05 Apr 2022
RADAMS: Resilient and Adaptive Alert and Attention Management Strategy
  against Informational Denial-of-Service (IDoS) Attacks
RADAMS: Resilient and Adaptive Alert and Attention Management Strategy against Informational Denial-of-Service (IDoS) Attacks
Linan Huang
Quanyan Zhu
AAML
13
13
0
01 Nov 2021
Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and
  Mitigation of Attentional Human Vulnerability
Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability
Linan Huang
Quanyan Zhu
AAML
23
5
0
04 Aug 2021
Reinforcement Learning for Feedback-Enabled Cyber Resilience
Reinforcement Learning for Feedback-Enabled Cyber Resilience
Yunhan Huang
Linan Huang
Quanyan Zhu
16
66
0
02 Jul 2021
ADVERT: An Adaptive and Data-Driven Attention Enhancement Mechanism for
  Phishing Prevention
ADVERT: An Adaptive and Data-Driven Attention Enhancement Mechanism for Phishing Prevention
Linan Huang
Shumeng Jia
E. Balcetis
Quanyan Zhu
AAML
16
19
0
13 Jun 2021
1