A survey on game theoretic models for community detection in social networks

A Jonnalagadda, L Kuppusamy - Social Network Analysis and Mining, 2016 - Springer
Community detection in social networks has received much attention from the researchers of
multiple disciplines due to its impactful applications such as recommendation systems, link …

Asynchronous advantage actor-critic (a3c) learning for cognitive network security

E Muhati, DB Rawat - … on Trust, Privacy and Security in …, 2021 - ieeexplore.ieee.org
Undoubtedly, the recent implacable, widespread, and intricate cyber-attacks demand
cognitive cyber-defense techniques. Although machine learning (ML) and artificial intel …

Cooperative Q-learning for rejection of persistent adversarial inputs in networked linear quadratic systems

KG Vamvoudakis, JP Hespanha - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, a cooperative Q-learning approach is proposed to enable the agents in large
networks to synchronize to the behavior of an unknown leader by each optimizing a …

Autonomy and machine intelligence in complex systems: A tutorial

KG Vamvoudakis, PJ Antsaklis… - 2015 American …, 2015 - ieeexplore.ieee.org
This tutorial paper will discuss the development of novel state-of-the-art control approaches
and theory for complex systems based on machine intelligence in order to enable full …

Facial expression recognition using fuzzified Pseudo Zernike Moments and structural features

M Ahmady, SS Mirkamali, B Pahlevanzadeh… - Fuzzy Sets and …, 2022 - Elsevier
Facial expression recognition (FER) is an important part of emotional computing that can be
useful in many applications for people's behavior analysis. Recently, some methods have …

Energy-efficient two-layer cooperative defense scheme to secure sensor-clouds

J Liu, J Yu, S Shen - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Sensor-cloud computing is envisioned as a promising technology that can integrate various
services by extending the computational capabilities of physical sensor nodes. It is prone to …

A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion

S Shen, H Ma, E Fan, K Hu, S Yu, J Liu… - Journal of Network and …, 2017 - Elsevier
Abstract We consider Heterogeneous Wireless Sensor Networks (HWSNs) with malware
diffusion and find a solution to assess their dependability in order to guarantee dependable …

Incorporating unsupervised learning into intrusion detection for wireless sensor networks with structural co-evolvability

H Qu, Z Qiu, X Tang, M Xiang, P Wang - Applied Soft Computing, 2018 - Elsevier
Wireless sensor networks (WSNs) are vulnerable to many security threats because of the
open and unreliable communication channels, the highly dynamic network structure as well …

Adversarial deep reinforcement learning based adaptive moving target defense

T Eghtesad, Y Vorobeychik, A Laszka - … Park, MD, USA, October 28–30 …, 2020 - Springer
Moving target defense (MTD) is a proactive defense approach that aims to thwart attacks by
continuously changing the attack surface of a system (eg, changing host or network …

Extracting commercialization opportunities of the Internet of Things: Measuring text similarity between papers and patents

Y Takano, Y Kajikawa - Technological Forecasting and Social Change, 2019 - Elsevier
In the field of technology management, methods have been developed to detect
technologies that are important in industry by analyzing massive numbers of documents …