Privacy vulnerability of published anonymous mobility traces CYT Ma, DKY Yau, NK Yip, NSV Rao Proceedings of the sixteenth annual international conference on Mobile …, 2010 | 319 | 2010 |
Markov game analysis for attack-defense of power networks under possible misinformation CYT Ma, DKY Yau, X Lou, NSV Rao IEEE Transactions on Power Systems 28 (2), 1676-1686, 2012 | 133 | 2012 |
Accurate localization of low-level radioactive source under noise and measurement errors JC Chin, DKY Yau, NSV Rao, Y Yang, CYT Ma, M Shankar Proceedings of the 6th ACM conference on Embedded network sensor systems …, 2008 | 92 | 2008 |
Defense of cyber infrastructures against cyber‐physical attacks using game‐theoretic models NSV Rao, SW Poole, CYT Ma, F He, J Zhuang, DKY Yau Risk Analysis 36 (4), 694-710, 2016 | 79 | 2016 |
A game theoretic study of attack and defense in cyber-physical systems CYT Ma, NSV Rao, DKY Yau 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011 | 56 | 2011 |
Scalable solutions of Markov games for smart-grid infrastructure protection CYT Ma, DKY Yau, NSV Rao IEEE Transactions on Smart Grid 4 (1), 47-55, 2013 | 53 | 2013 |
Proactive fault-tolerant aggregation protocol for privacy-assured smart metering J Won, CYT Ma, DKY Yau, NSV Rao IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2804-2812, 2014 | 50 | 2014 |
Localization under random measurements with application to radiation sources NSV Rao, M Shankar, JC Chin, DKY Yau, CYT Ma, Y Yang, JC Hou, X Xu, ... 2008 11th International Conference on Information Fusion, 1-8, 2008 | 48 | 2008 |
Quality of monitoring of stochastic events by periodic and proportional-share scheduling of sensor coverage DKY Yau, NK Yip, CYT Ma, NSV Rao, M Shankar ACM Transactions on Sensor Networks (TOSN) 7 (2), 1-49, 2010 | 47 | 2010 |
Detection of intelligent mobile target in a mobile sensor network JC Chin, Y Dong, WK Hon, CYT Ma, DKY Yau IEEE/ACM transactions on networking 18 (1), 41-52, 2009 | 41 | 2009 |
Privacy-assured aggregation protocol for smart metering: A proactive fault-tolerant approach J Won, CYT Ma, DKY Yau, NSV Rao IEEE/ACM Transactions on Networking 24 (3), 1661-1674, 2015 | 35 | 2015 |
An experimental low-cost, low-data-rate rapid structural assessment network JC Chin, JM Rautenberg, CYT Ma, S Pujol, DKY Yau IEEE Sensors Journal 9 (11), 1361-1369, 2009 | 35 | 2009 |
Cloud computing infrastructure robustness: A game theory approach NSV Rao, SW Poole, F He, J Zhuang, CYT Ma, DKY Yau 2012 International Conference on Computing, Networking and Communications …, 2012 | 27 | 2012 |
Matching and fairness in threat-based mobile sensor coverage CYT Ma, DKY Yau, J Chin, NSV Rao, M Shankar IEEE transactions on mobile computing 8 (12), 1649-1662, 2009 | 26 | 2009 |
Improved SPRT detection using localization with application to radiation sources NSV Rao, CW Glover, M Shankar, Y Yang, JC Chin, DKY Yau, CYT Ma, ... 2009 12th International Conference on Information Fusion, 633-640, 2009 | 23 | 2009 |
On resilience of cyber-physical infrastructures using discrete product-form games NSV Rao, CYT Ma, U Shah, J Zhuang, F He, DKY Yau 2015 18th International Conference on Information Fusion (Fusion), 1451-1458, 2015 | 20 | 2015 |
On information-theoretic measures for quantifying privacy protection of time-series data CYT Ma, DKY Yau Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 20 | 2015 |
Game-theoretic resilience analysis of cyber-physical systems F He, J Zhuang, NSV Rao, CYT Ma, DKY Yau 2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks …, 2013 | 20 | 2013 |
Stochastic steepest descent optimization of multiple-objective mobile sensor coverage CYT Ma, DKY Yau, NK Yip, NSV Rao, J Chen IEEE Transactions on Vehicular Technology 61 (4), 1810-1822, 2012 | 18 | 2012 |
Coverage in wireless sensor networks JC Hou, DKY Yau, CYT Ma, Y Yang, H Zhang, IH Hou, NSV Rao, ... Guide to Wireless Sensor Networks, 47-79, 2009 | 17 | 2009 |