Publications

Recent Books

See recent update at Google Scholar

2017

  •  Z. Xu and Q. Zhu, “Secure and Practical Output Feedback Control for Cloud-Enabled Cyber- Physical Systems,” International Workshop on Cyber-Physical Systems Security (CPS-Sec), IEEE Conference on Communications and Network Security (CNS), Las Vegas, 9-11 October 2017.
  • T. Zhang and Q. Zhu, “Strategic Defense Against Deceptive Civilian GPS Spoong of Un- manned Aerial Vehicles,” 8th Conference on Decision and Game Theory for Security (GameSec), Oct. 23-25, 2017, Vienna, Austria.
  • Y. Hayel and Q. Zhu, “Dynamics of Strategic Protection Against Virus Propagation in Het- erogeneous Complex Networks,” 8th Conference on Decision and Game Theory for Security (GameSec), Oct. 23-25, 2017, Vienna, Austria.
  • K. Horak, Q. Zhu and B. Bosansky, “Manipulating Adversary’s Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security, ” 8th Conference on Decision and Game Theory for Security (GameSec), Oct. 23-25, 2017, Vienna, Austria.
  • L. Huang, J. Chen and Q. Zhu, “A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks,” 8th Conference on Decision and Game Theory for Security (GameSec), Oct. 23-25, 2017, Vienna, Austria.
  • J. Pawlicky and Q. Zhu, “Proactive Defense Against Physical Denial of Service Attacks using Poisson Signaling Games,” 8th Conference on Decision and Game Theory for Security (GameSec), Oct. 23-25, 2017, Vienna, Austria.
  • I. Triki, R. El-Azouzi, M. Haddad, Q. Zhu, Z. Xu, “Learning from Experience: A Dynamic Closed-Loop QoE Optimization for Video Adaptation and Delivery”, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, October 8-13, 2017.
  • R. Zimmerman, Q. Zhu, and C. Dimitri, “A Network Framework for Dynamic Models of Urban Food, Energy and Water Systems (FEWS),” Environmental Progress & Sustainable Energy, to appear.
  • Y. Liu, J. Zhang, Q. Zhu, “CONGRESS: A Hybrid Reputation System in Coping with the Subjectivity Problem,” IEEE Transactions on Computational Social Systems, to appear.
  • J. Pawlick  and Q. Zhu, “Strategic Trust in Cloud-Enabled Cyber-Physical Systems with an Application to Glucose Control”, IEEE Transactions on Information Forensics and Security (TIFS), to appear.
  • R. Zhang  and Q. Zhu, “Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines,” IEEE Transactions on Neural Networks and Learning Systems, to appear.
  • J. Chen  and Q. Zhu, “A Stackelberg Game Approach for Two-Level Distributed Energy Management in Smart Grids,” IEEE Transactions on Smart Grid, to appear.
  • J. Chen  and Q. Zhu, “Security as a Service for Cloud-Enabled Internet of Controlled Things under Advanced Persistent Threats: A Contract Design Approach”, IEEE Transactions on Information Forensics and Security (TIFS), to appear.
  •  S. Rass, A. Alshawish, M. A. Abid, S. Schauer, Q. Zhu, H. de Meer, “Physical Intrusion Games — Optimizing Surveillance by Simulation and Game Theory,” IEEE Access, to appear.
  • R. Zimmerman, Q. Zhu, F. De Leon, and Z. Guo, “Conceptual Modeling Framework to Integrate Resilient and Interdependent Infrastructure in Extreme Weather, Journal of Infrastructure Systems, accepted and to appear.
  •  R. Zhang  ,Q. Zhu and Y. Hayel, “A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks,” IEEE Journal on Selected Areas in Communications (JSAC) Special Issue on Game Theory over Networks, to appear.
  • Y. Hayel and Q. Zhu, “Epidemic Protection over Heterogeneous Networks Using Evolutionary Poisson Games,” IEEE Transactions on Information Forensics and Security (TIFS), to appear.
  •  J. Chen  and Q. Zhu, “A Game-Theoretic Framework for Resilient and Distributed Generation Control of Renewable Energies in Microgrids,” IEEE Transactions on Smart Grid, to appear.
  •  T. Zhang  and Q. Zhu, “Dynamic Dierential Privacy for ADMM-Based Distributed Classification Learning,” IEEE Transactions on Information Forensics and Security, 2016, to appear.
  •  J. Chen, C. Touati and Q. Zhu, “Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures,” IEEE GLOBECOM, Singapore, Dec. 4-8, 2017.
  • J. Farooq and Q. Zhu, “Cognitive Connectivity Resilience in Multi-layer Remotely Deployed Mobile Internet of Things,” IEEE GLOBECOM, Singapore, Dec. 4-8, 2017.
  •  J. Pawlick and Q. Zhu, “A Mean-Field Stackelberg Game Approach for Obfuscation Adoption in Empirical Risk Minimization,” IEEE GlobalSIP Symposium on Control & Information Theoretic Approaches to Privacy and Security, Nov. 14-16, 2017, Montreal, Canada.
  • H. Anwar and Q. Zhu, “Minimax Game-Theoretic Approach to Multi-scale H1 Optimal Filtering,” IEEE GlobalSIP Symposium on Signal Processing for Smart Cities & Internet of Things, Nov. 14-16, 2017, Montreal, Canada.
  • R. Zhang and Q. Zhu, “A Game-Theoretic Defense Against Data Poisoning Attacks in Distributed Support Vector Machines,” in Proc. of 56th IEEE Conference on Decision and Control, Dec. 12-15, 2017, Melbourne, Australia.
  • C. Smidts, Y. Zhao, X. Diao, I. Ray, J. Hollern, Q. Zhu and T. McJunkin, “Support for Reactor Operators in Case of Cyber-Security Threats,” American Nuclear Society (ANS) winter meeting, Oct. 29-Nov. 2, 2017, Washington, DC.
  •  J. Chen, C. Touati and Q. Zhu, “A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery,” Workshop on Critical Infrastructure Network Security (CINS), in conjunction with ACM SIGMETRICS 2017 in Urbana-Champaign, Illinois, USA on June 5, 2017.
  • R. Zhang and Q. Zhu, “Attack-Aware Cyber Insurance of Interdependent Computer Net- works,”Workshop on the Economics of Information Security (WEIS), La Jolla, CA, June 26-27, 2017.
  • J. Chen and Q. Zhu , “Interdependent Strategic Cyber Defense and Robust Switching Control Design for Wind Energy Systems,” in Proc. of IEEE PES GM Conference, Chicago, IL, July 16-20, 2017.
  • E. Gubar and Q. Zhu, “Optimal Control of Multi-Strain Epidemic Processes in Complex Net- works,” in Proceedings of t7th EAI International Conference on Game Theory for Networks (GameNets), Knoxville, TN., MAY 9-10, 2017.
  • M. K. Hanawal, Y. Hayel and Q. Zhu, “Throughput Maximization of Large-Scale Secondary Networks over Licensed and Unlicensed Spectra,” in Proceedings of the International Work- shop on Resource Allocation, Cooperation and Competition in Wireless Networks (RAWNET), Paris, France, 15th May, 2017.
  • J. Farooq, H. ElSawy, Q. Zhu, and M.-S. Alouini, “Optimizing Mission Critical Data Dissem- ination in Massive IoT Networks,” in Proceedings of Workshop on Spatial Stochastic Models for Wireless Networks (SpaSWiN), Paris, France, 19th May, 2017.
  •  J. Farooq and Q. Zhu, “Secure and Recongurable Network Design for Critical Information Dissemination in the Internet of Battleeld Things (IoBT),” in Proceedings of 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Telecom ParisTech, Paris, France, 15th – 19th May, 2017.
  • L. Huang, J. Chen and Q. Zhu, “A Factored MDP Approach to Optimal Mechanism Design for Resilient Large-Scale Interdependent Critical Infrastructures,” in Proceedings of 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), CPS Week, April 18 – 21, 2017, Pittsburgh, PA, USA.
  •  V. Kurian, J. Chen and Q. Zhu, “Electric Power Dependent Dynamic Taris for Water Distribution Systems,” in Proceedings of 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater), CPS Week, April 18 – 21, 2017, Pittsburgh, PA, USA.
  •  Z. Xu and Q. Zhu, “A Game-Theoretic Approach to Secure Control of Communication- Based Train Control Systems Under Jamming Attacks,” in Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles, (SCAV 2017), CPS Week, April 18 – 21, 2017, Pittsburgh, PA, USA.
  • V. Taynitskiy, E. Gubar, Q. Zhu, “Optimal Impulsive Control of Epidemic Spreading of Het- erogeneous Malware,” In Proceedings of 20th IFAC World Congress, Toulouse, France, 9-14 July 2017.
  • Z. Xu and Q. Zhu, “A Secure Data Assimilation for Large-Scale Sensing Networks Using an Untrusted Cloud,” In Proceedings of 20th IFAC World Congress, Toulouse, France, 9-14 July 2017.
  • R. Zhang and Q. Zhu, “A Game-Theoretic Analysis of Label Flipping Attacks on Distributed Support Vector Machines,” In Proceedings of Conference on Information Sciences and Systems (CISS), Baltimore, Maryland, March 22-24, 2017.
  • H. Anwar and Q. Zhu, “Multiscale Minimax Robust Optimal Control,” In Proceedings of Conference on Information Sciences and Systems (CISS), Baltimore, Maryland, March 22-24, 2017.

2016

  •  C. Fung and Q. Zhu, “FACID: A Trust-based Collaborative Decision Framework for Intrusion Detection Networks,” Ad Hoc Networks, to appear.
  • L. Zhou, Q. Zhu, Z. Wang, W. Zhou, “Adaptive Exponential Synchronization of Multi-Slave Time-Delay Recurrent Neural Networks with Levy Noise and Regime Switching,” IEEE Transactions on Neural Networks and Learning Systems, to appear.
  • F. Miao, Q. Zhu, M. Pajic and G.J. Pappas, “Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks, IEEE Transactions on Control of Network Systems, to appear.
  •  R. Zhang  and Q. Zhu, “Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries,” Journal of Advances in Information Fusion, to appear.
  • D. Bauso, Q. Zhu, and T. Basar, “Decomposition and mean-eld approach to mixed integer optimal compensation problems,” Journal of Optimization Theory and Applications, to appear.
  • E. Simhon, Y. Hayel, Q. Zhu and D. Starobinski, \Optimal Information Disclosure Policies in Strategic Queueing Games,” Operations Research Letters, to appear.
  • T. Zhang and Q. Zhu, “A Dual Perturbation Approach for Dierential Private ADMM-based Distributed Empirical Risk Minimization,” In Proceedings of the 2016 ACM Workshop on Articial Intelligence and Security (AISec’16), pp. 129-137, New York, NY, USA, 2016.
  • A. Mongay, Q. Zhu, “On Solving Large-Scale Low-Rank Zero-Sum Security Games of Incomplete Information,” 8th IEEE International Workshop on Information Forensics and Security (WIFS) 2016, Abu Dhabi, UAE, Dec. 5-7, 2016.
  • J. Pawlick, Q. Zhu, “A Stackelberg Game Perspective on the Conict Between Machine Learning and Data Obfuscation,” 8th IEEE International Workshop on Information Forensics and Security (WIFS) 2016, Abu Dhabi, UAE, Dec. 5-7, 2016.
  •  J. Chen and Q. Zhu, “Resilient and Decentralized Control of Multi-level Cooperative Mobile Networks to Maintain Connectivity under Adversarial Environment,” 55th IEEE Conference on Decision and Control (CDC), Las Vegas, USA on December 12-14, 2016.
  •  J. Chen and Q. Zhu, “Optimal Contract Design under Asymmetric Information for Resilient Cloud-Enabled Internet of Controlled Things,” 7th Conference on Decision and Game Theory for Security (GameSec), NY, USA, on November 2-4, 2016.
  •  A. Mohammadi, M. H. Manshaei, M. M. Moghaddam, and Q. Zhu, “A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars,” 27th Conference on Decision and Game Theory for Security (GameSec), NY, USA, on November 2-4, 2016.
  • S. Rass and Q. Zhu, “GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies against Advanced Persistent Threats,” 27th Conference on Decision and Game Theory for Security (GameSec), NY, USA, on November 2-4, 2016.
  •  V. Taynitskiy, E. Gubar, Q. Zhu, “Optimal Security Policy for Protection against Heterogeneous Malware,” International conference on NETwork Games, COntrol and Optimization (NETGCOOP), Avignon, France, 2016.
  • J. Chen  and Q. Zhu, “Optimal Control of Interdependent Epidemics in Complex Networks,”SIAM Conference on Network Science, Boston, Massachusetts, July 15-16, 2016.
  • Z. Xu  and Q. Zhu, “Cross-Layer Secure Cyber-Physical Control System Design for Networked 3D Printers,” Proc. of 2016 American Control Conference, Boston, USA on July 6-8, 2016.
  • J. Chen  and Q. Zhu, “Interdependent Network Formation Games with an Application to Critical Infrastructures,” Proc. of 2016 American Control Conference, Boston, USA on July 6-8, 2016.
  • J. Chen  and Q. Zhu, “Optimal Control of Interdependent Epidemics in Complex Networks,” SIAM Conference on Network Science, Boston, Massachusetts, July 15-16, 2016.
  • Y. Hayel, B. Tounsi and Q. Zhu, “Computing mixed trac equilibrium with electric and gaso-line vehicles and application to emission reduction,” Le congres annuel de la societe Francaise de Recherche Operationnelle et d’Aide a la Decision (ROADEF 2016), Compienge France, Feb.10-12, 2016.

2015

  •  Q. Zhu, D. Wei and K. Ji, “Hierarchical Architectures of Resilient Control Systems: Concepts, Metrics and Design Principles,” In P. Cheng, H. Zhang, J. Chen (Eds.), Cyber Security for Industrial Control Systems: from the viewpoint of close-loop, CRC Press, 2015.
  • R. Zimmerman, Q. Zhu, C. Dimitri, “Promoting Resilience for Food, Energy, and Water Interdependencies, Special Issue on Food-Energy-Water Nexus,” Journal of Environmental Studies and Sciences, 2015.
  • Y. Yuan, F. Sun, and Q. Zhu, “Resilient control in the presence of DoS attack: Switched system approach,” International Journal of Control, Automation and Systems 13.6 (2015): 1423-1435.
  • R. Zhang  and Q. Zhu, “Student Research Highlight: Secure and Resilient Distributed Machine Learning Under Adversarial Environments,” IEEE Aerospace and Electronic Systems Magazine, to appear.
  • S. Maharjan, Q. Zhu, Y. Zhang, S. Gjessing, and T. Basar, \Demand response management in the smart grid in a large population regime,” IEEE Transactions on Smart Grid, vol. 7, no. 1, January 2016, pp. 189-199.
  •  J. Casey, A. Morales, E. Wright, Q. Zhu and B. Mishra, Compliance Signaling Games: Modeling Deterrence of Unintentional Insider Threats, Journal of Computational and Mathematical Organization Theory, pp. 1-32, to appear.
  • 24. Q. Zhu and T. Basar, “Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems,” IEEE Control Systems, 35(1), 46-65, 2015.
  • M. Moghaddam, M. H. Manshaei, and Q. Zhu, To Trust or Not: A Security Signaling Game between Service Provider and Client, 2015 Conference on Decision and Game Theory for Security (GameSec), Nov. 4-5, 2015, London, UK.
  • J. Pawlick, S. Farhagh, Q. Zhu, Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats, 2015 Conference on Decision and Game Theory for Security (GameSec), Nov. 4-5, 2015, London, UK. [PDF]
  • Y. Hayel, and Q. Zhu, Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks, 2015 Conference on Decision and Game Theory for Security (GameSec), Nov. 4-5, 2015, London, UK.
  • Q. Zhu, Meta-network models for resilient interdependent infrastructures, The Food-Energy-Water Nexus,” 16th National Conference and Global Forum on Science, Policy and the Environment,  Sponsored by the National Council for Science and the Environment (NCSE).
  • R. Zimmerman and Q. Zhu, Measures and Models for Electric Power Dependencies and Interdependencies with Other Critical Infrastructures, New York Scientific Data Summit (NYSDS), 2015.
  • Q. Zhu, D. Wei and K. Ji, “Hierarchical Architectures of Resilient Control Systems: Concepts, Metrics and Design Principles,” In P. Cheng, H. Zhang, J. Chen (Eds.), Cyber Security for Industrial Control Systems:from the viewpoint of close​loop, CRC Press, 2015.
  • Z. Xu and Q. Zhu, A Cyber-Physical Game Framework for Secure and Resilient Multi-Agent Autonomous Systems, in Proceedings of  54th IEEE Conference on Decision and Control (CDC), Dec. 15-18, 2015, Osaka, Japan.
  • Y. Hayel and Q. Zhu, Evolutionary Poisson Games for Controlling Large Population Behaviors, in Proceedings of  54th IEEE Conference on Decision and Control (CDC), Dec. 15-18, 2015, Osaka, Japan.
  • W. Casey, Q. Zhu, J. Morales, B. Mishra, Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signalng Games, in Proceedings of International Workshop on Managing Insider Security Threats (MIST 2015), 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, US, Oct. 12-16, 2015. (Best Paper Award)
  • Z. Xu and Q. Zhu, Secure and Resilient Control Design for Cloud Enabled Networked Control Systems, in Proceedings of Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC 2015), 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, US, Oct. 12-16, 2015.
  • Z. Xu and Q. Zhu, Environment-Aware Power Generation Scheduling in Smart Grids, in Proceedings of 6th IEEE International Conference on Smart Grid Communications (SmartGridComm 2015).
  • J. Chen and Q. Zhu, Resilient Control Design for Wind Turbines Using Markov Jump Linear System Model with Levy Noise, in Proceedings of 6th IEEE International Conference on Smart Grid Communications (SmartGridComm 2015).
  • F. Sadegh, Y. Hayel, Q. Zhu, PHY-Layer Location Privacy Preserving Access Point Selection Mechanism in Next-Generation Wireless Networks, in Proceedings of IEEE Conference on Communications and Network Security (CNS),  Florence, Italy, Sept. 28-30, 2015, to appear.
  • S. Maharjan, Q. Zhu, Y. Zhang, S. Gjessing, and T. Başar. Demand response management in the smart grid in a large population regime. IEEE Transactions on Smart Grid, to appear.
  • Q. Zhu and T. Basar. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems. IEEE Control Systems35(1), 46-65, 2015. [PDF]
  • J. Casey,  A. Morales, E. Wright, Q. Zhu and B. Mishra, Compliance Signaling Games: Modeling Deterrence of Unintentional Insider Threats, Journal of Computational and Mathematical Organization Theory, to appear.
  • J. Chen and Q. Zhu, “Interdependent network formation games,” SIAM Conference on Network Science, 2015. [PDF]
  • J. Chen and Q. Zhu, “Optimal Allocation of Robotic Wind Turbine Inspectors in a Wind Farm for Interdependent Resiliency,” in Proceedings of IEEE PES General Meeting, 2015.
  • Y. Hayel, E. Simhon, D. Starobinski, and Q. Zhu, “Distributed strategic mode selection for large-scale D2D communications based on Queue State Information,” In IEEE Information Sciences and Systems (CISS), 2015 49th Annual Conference on (pp. 1-3). [PDF]
  • R. Zhang and Q. Zhu, “Secure and Resilient Distributed Machine Learning Under Adversarial Environments,” International Conference on Information Fusion, Washington DC, 2015. [PDF] [Slides] (Runner-up Best Student Paper Award)
  • J. Pawlick and Q. Zhu, “Deception by Design: Evidence-Based Signaling Games for Network Defense,” Workshop on the Economics of Information Security (WEIS), 2015. [PDF]
  • Y. Hayel and Q. Zhu, “Resilient and secure network design for cyber attack-induced cascading link failures in critical infrastructures,” Proc. of Conference on Information Sciences and Systems (CISS), 2015. [PDF]

2014

  • R. Hou, C. Wang, Q. Zhu, and J. Li, Interference-aware QoS multicast routing for smart grid. Ad Hoc Networks22, 13-26, 2014.
  • A. Qasim, R. Yousefian, E. Al-Shaer, S. Kamalasadan, and Q. Zhu. “Two-tier data-driven intrusion detection for automatic generation control in smart grid.” In Communications and Network Security (CNS), 2014 IEEE Conference on, pp. 292-300. IEEE, 2014. [PDF]
  • F. Miao, Q. Zhu, M. Pajic and G.J. Pappas, “Coding sensor outputs for injection attacks detection,” 2014 IEEE 53rd Annual Conference on Decision and Control (CDC), pp. 5776-5781, Dec. 2014. [PDF]
  • F. Miao, Q. Zhu, “A moving-horizon hybrid stochastic game for secure control of cyber-physical systems,” 2014 IEEE 53rd Annual Conference on Decision and Control (CDC), pp. 5776-5781, Dec. 2014. [PDF]
  • S. Farhang, M. H. Manshaei, M. N. Esfahani, and Q. Zhu, A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design. In Decision and Game Theory for Security (GameSec)pp. 319-328, 2014 [PDF]

2013

  • M. H. Manshaei, Q. Zhu, T. Alpcan, T. Başar, J.-P. Hubaux, “Game theory meets network security and privacy,” ACM Computing Surveys, 45(3), September 2013
  • Q. Zhu and T. Başar, “Game-Theoretic Approach to Feedback-Driven Multi-Stage Moving Target Defense,” in Proc. of Conference on Decision and Game Theory for Security (GameSec), Fort Worth, TX, USA, Nov. 11-12. [PDF]
  • G. Dan, K.-S. Lui, T. Rehana, Q. Zhu and K. Nahrstedt, “SELINDA: A Secure, Scalable and Light-Weight Data Collection Protocol for Smart Grids,” in Proc. of IEEE SmartGridComm 2013, Vancouver, BC, Canada. [PDF]
  • Q. Zhu and L. Bushnell, “Interdependent Security and Robustness of Networked Multi-Agent Cyber-Physical System,” in Proc. of 51st Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, 2013. [PDF]
  • M. Zyskowski and Q. Zhu, “Price and Variance of Anarchy in Mean-Variance Cost Density- Shaping Stochastic Differential Games,” in Proc. of Conference on Decisions and Control Conference (CDC), Florence, Italy, 2013.  [Presentation] [PDF]
  • Q. Zhu, A. Clark, R. Poovendran and T. Başar, “Deployment and Exploitation of Deceptive Honeybots in Social Networks,” in Proc. of Conference on Decisions and Control Conference (CDC), Florence, Italy, 2013. [PDF]
  • Y. Yuan, Q. Zhu, F. Sun and T. Başar, “Resilient Control of Cyber-Physical Systems against Denial-of-Service Attacks,” in Proc. of the 6th Intl. Symposium on Resilient Control Systems (ISRCS), San Francisco, CA, Aug. 12 – 15, 2013. [PDF]
  • C. Rieger and Q. Zhu, “ A Hierarchical Multi-Agent Dynamical System Architecture for Resilient Control Systems,” in Proc. of the 6th Intl. Symposium on Resilient Control Systems (ISRCS), San Francisco, CA, Aug. 12 – 15, 2013. [PDF]
  • E. Gubar and Q. Zhu, “Optimal control of Influenza epidemic model with virus mutations,” in Proc. of European Control Conference (ECC), Zurich, Switzerland, 2013. [PDF]
  • Q. Zhu, L. Bushnell and T. Başar, “Resilient distributed control of multi-agent cyber-physical systems,” accepted and to appear in Proc. Annual Conference on Information Sciences and Systems (CISS), John Hopkins University, 2013. [PDF]
  • A. Clark, Q. Zhu, R. Poovendran and T. Başar, “An attack impact aware proactive defense against Stuxnet worms,” submitted to American Control Conference (ACC), June 17-19, 2013, Washington, DC. [PDF]
  • Q. Zhu, P. Sauer and T. Başar, “Value of demand response in the smart grid,” in Proc. IEEE Power and Energy Conference at Illinois (PECI), 2013. [PDF]

2012

  • Q. Zhu, H. Tembine and T. Başar, “Hybrid learning in stochastic games and its application in network security,” In F. L. Lewis and D. Liu (Eds.), Reinforcement Learning and Approximate Dynamic Programming for Feedback Control, IEEE Press Computational Intelligence Series, 2012.
  • Q. Zhu and T. Başar, “A hierarchical security architecture for smart grid,” In E. Hossain, Z. Han and H. V. Poor (Eds.), Smart Grid Communications and Networking, Cambridge University Press, 2012.
  • Q. Zhang, Q. Zhu, M. Zhani, R. Boutaba, J. L. Hellerstein, “Dynamic service placement in geographically distributed clouds ,” accepted and to appear IEEE Journal on Selected Areas in Communications (JSAC) – Special Issue on Autonomic Communications, 2012.
  • S. Maharjan, Q. Zhu, Y. Zhang, S. Gjessing, T. Başar, “Dependable demand response manage- ment in smart grid: A Stackelberg game approach,” IEEE Trans. on Smart Grid, Special Issue on Smart Grid Communication Systems: Reliability, Dependability & Performance, 2012.
  • Q. Zhu and T. Başar, “Multi-resolution large population stochastic differential games and their application to demand response management in the smart grid,” accepted and to appear in J. Dynamic Games and Applications, 2012.
  • Q. Zhu, Z. Yuan, J. B. Song, Z. Han, T. Başar, “Interference aware routing game for cogni- tive radio multihop networks,” accepted and to appear in IEEE Journal on Selected Areas in Communications (JSAC) – Cognitive Radio Series, November, 2012.
  • Q. Zhu, C. Fung, R. Boutaba, T. Basar, “GUIDEX: A game-theoretic Incentive-Based mech- anism for intrusion detection networks,” accepted and to appear in IEEE Journal on Selected Areas in Communications (JSAC) Special Issue on Economics of Communication Networks & Systems, December 2012.
  • H. Tembine, Q. Zhu, T. Basar, “Risk-sensitive mean-field games,” under review by IEEE Trans. on Automatic Control, 2012.
  • Q. Zhu, H. Tembine and T. Başar, “Evolutionary games for multiple access control,” In P. Cardaliaguet and R. Cressman (Eds.), Annals of Dynamic Games, 12:39-72, 2012.
  • A. Clark, Q. Zhu, R. Poovendran and T. Başar, “Deceptive routing in relay networks,” in Proc. of Conference on Decision and Game Theory for Security (GameSec), Nov. 5-6, 2012, Budapest, Hungary.
  • Q. Zhu, C. Gunter and T. Başar, “Tragedy of anticommons in digital right management of medical records,” in Proc. of 3rd USENIX Workshop on Health Security and Privacy (HealthSec ’12), Aug. 6 – 7, 2012, Bellevue, WA. [PDF]
  • Q. Zhang, M. F. Zhani, S. Zhang, Q. Zhu, R. Boutaba and J. L. Hellerstein, “Dynamic energy- aware capacity provisioning for cloud computing environments,” in Proc. of the 9th Interna- tional Conference on Autonomic Computing (ICAC), San Jose, California, USA September 17-21, 2012.
  • C. Rieger, Q. Zhu and T. Başar, “Agent-based cyber control strategy design for resilient control systems: Concepts, architecture and methodologies,” in Proc. of the 5th Intl. Symposium on Resilient Control Systems (ISRCS), Salt Lake City, UT, Aug. 14 – 16, 2012.
  • Q. Zhu, L. Bushnell and T. Başar, “Game-theoretic analysis of node capture and cloning attack with multiple attackers in wireless sensor networks”, in Proc. of 51st IEEE Conference on Decision and Control (CDC), Maui, Hawaii, Dec. 10 – 13, 2012.
  • Q. Zhu, A. Clark, R. Poovendran and T. Başar, “Deceptive routing games”, in Proc. of 51st IEEE Conference on Decision and Control (CDC), Maui, Hawaii, Dec. 10 – 13, 2012.
  • J. Sebestik and Q. Zhu, “An interactive K-12 engineering curriculum on renewable sources and energy storage in power systems,” in Proc. of 2012 Annual Conference of American Society of Engineering Education (ASEE), San Antonio. June 10 – 13, 2012.
  • Q. Zhang, Q. Zhu, F. Zhani and R. Boutaba, “Dynamic service placement in geographically distributed clouds,” in Proc. of the 32nd International Conference on Distributed Computing Systems (ICDCS), Macau, China, June 18 – 21, 2012.
  • Q. Zhu and T. Başar, “A dynamic game-theoretic approach to resilient control system design for cascading failures,” in Proc. of International Conference on High Confidence Networked Systems (HiCoNS) at CPSWeek 2012, in Beijing, China.

2011

  • T. Basar and Q. Zhu, “Prices of anarchy, information, and cooperation in differential games,” J. Dynamic Games and Applications, vol. 1, no. 1, pp. 50-73, March 2011.
  • Q. Zhu, J. Zhang, P. Sauer, A. Dominguez-Garcia and T. Başar, “A game-theoretic frame- work for control of distributed renewable-based energy resources in smart grids,” Proc. 2012 American Control Conference (ACC), Montreal, Canada. June 27 – 29, 2011.
  • Q. Zhu, C. Fung, R. Boutaba and T. Başar, “A game-theoretic approach to knowledge sharing in distributed collaborative intrusion detection networks: fairness, incentives and security,” in Proc. of 50th IEEE Conference on Decision and Control and European Control Conference (CDC/ECC), Orlando, Florida, Dec. 12 – 15, 2011.
  • Y. Liu, J. Zhang and Q. Zhu, “Design of a reputation system based on dynamic coalition formation,” in Proc. of 3rd Intl. Conf. on Social Informatics (SocInfo’11), Oct. 6 – 8, 2011, Singapore.
  • Q. Zhu, “Nash meets van Valkenburg: A game-theoretic approach to effective learning and teaching in engineering,” in Proc. of IEEE Conference on Frontier in Education (FIE), Rapid City, South Dakota, October 12 – 15, 2011.
  • Q. Zhu and T. Başar, “Towards a unifying security framework for cyber-physical systems,” in Proc. of Workshop on the Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS-11), CPSWeek 2011, Chicago.
  • Q. Zhu, D. Wei and T. Başar, “Secure routing in smart grids,” in Proc. of Workshop on the Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS-11), CPSWeek 2011, Chicago.
  • Q. Zhu, M. McQueen, C. Rieger and T. Başar, “Management of control system information security: control system patch management,” in Proc. of Workshop on the Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS-11), CPSWeek 2011, Chicago.
  • Q. Zhu, H. Tembine and T. Başar, “Distributed strategic learning with application to network security,” in Proc. of American Control Conference (ACC), 2011.
  • H. Sun, Q. Zhu, N. Hovakimyan and T. Başar, “L1 adaptive control for positive systems,” in Proc. of American Control Conference (ACC), 2011.
  • H. Tembine, Q. Zhu and T. Başar, “Risk-sensitive mean-field stochastic differential games,” in Proc. of IFAC World Congress 2011.
  • Q. Zhu and T. Başar, “Indices of power in optimal IDS default configuration: theory and examples,” in Proc. of GameSec 2011 (Conference on Decision and Game Theory for Security), November 14-15, 2011, University of Maryland, College Park, MD.
  • Q. Zhu, T. Hamidou and T. Başar, “Hybrid risk-sensitive mean-field stochastic differential games with application to molecular biology,” in Proc. of 50th IEEE Conference on Decision and Control and European Control Conference (CDC/ECC), Orlando, Florida, Dec. 12 – 15, 2011.
  • Q. Zhu, Z. Han, and T. Başar, “A differential game approach to distributed demand side management in smart grid,” Proc. IEEE International Conference on Communications (ICC) – Selected Areas in Communications Symposium (ICC’12 SAC), Ottawa, Canada, June 10 – 15, 2012.
  • D. Bauso, Q. Zhu and T. Başar, “Mixed integer optimal compensation: decompositions and mean-field approximations,” Proc. 2012 American Control Conference (ACC), Montreal, Canada. June 27 – 29, 2011.
  • Q. Zhu and T. Başar, “A multi-resolution large population game framework for smart grid demand response management,” in Proc. of Intl. Conference on Network Games, Control and Optimization (NETGCOOP 2011), Paris, France. Oct. 12 – 14, 2011.
  • Q. Zhang, Q. Zhu and R. Boutaba, “Dynamic resource allocation for spot markets in cloud computing environments,” in Proc. of 4th IEEE Intl. Conference on Utility and Cloud Com- puting (UCC 2011), Melbourne, Australia Dec. 5 – 8, 2011.
  • Q. Zhu, W. Saad, Z. Han, H. V. Poor and T. Başar, “Eavesdropping and jamming in next- generation wireless networks: A game-theoretic approach,” in Proc. of IEEE Military Com- munications Conference (MILCOM), Baltimore, MD, Nov. 7 – 10, 2011.
  • C. Fung, Q. Zhu, R. Boutaba and T. Başar, “SMURFEN: a framework of knowledge sharing for collaborative intrusion detection,” in Proc. of International Conference on Network and Service Management (CNSM 2011), Paris, France, Oct. 24 – 28, 2011.
  • Q. Zhu, C. Rieger and T. Başar, “A hierarchical security architecture for cyber-physical sys- tems,” in Proc. of the 4th Intl. Symposium on Resilient Control Systems (ISRCS), Boise, ID, Aug. 9 – 11, 2011. (Best Track Paper Award)
  • Q. Zhu, J. B. Song and T. Başar, “Dynamic secure routing game in distributed cognitive radio networks,” in Proc. of IEEE Global Communications Conference (GLOBECOM), Houston, Texas, Dec. 5 – 9, 2011.
  • Q. Zhu and T. Başar, “Robust and resilient control design for cyber-physical systems with an application to power systems,” in Proc. of 50th IEEE Conference on Decision and Control and European Control Conference (CDC/ECC), Orlando, Florida, Dec. 12 – 15, 2011.

2010

  • Q. Zhu and L. Pavel, “Enabling OSNR service differentiation using generalized model in optical networks,” IEEE Transactions on Communications, vol. 57, no. 9, Sept. 2009.
  • Q. Zhu, H. Tembine and T. Başar, “Heterogeneous learning in zero-sum stochastic games with incomplete information,” in Proc. of 49th IEEE Conference on Decision and Control (CDC), Atlanta, GA, 2010.
  • Q. Zhu, Z. Yuan, J. B. Song, Z. Han, and T. Başar, “Dynamic interference minimization routing game for on-demand cognitive pilot channel,” in Proc. of IEEE Global Communication Conference (GLOBECOM), Miami, FL, 2010.
  • Q. Zhu, C. Fung, R. Boutaba and T. Başar, “A distributed sequential algorithm for collab- orative intrusion detection networks,” in Proc. of 2010 IEEE International Communications Conference (ICC), Cape Town, South Africa.
  • Q. Zhu, H. Li, Z. Han and T. Başar, “A stochastic game model for jamming in multi-channel cognitive radio systems,” in Proc. of 2010 IEEE International Communications Conference (ICC), Cape Town, South Africa.
  • Q. Zhu, Z. Han and T. Başar, “No-regret learning in collaborative spectrum sensing with malicious nodes,” in Proc. of 2010 IEEE International Communications Conference (ICC), Cape Town, South Africa.
  • J. Huang, Q. Zhu, T. Başar and V. Krishnamurthy, “Distributed correlated Q-learning in dy- namic transmission control of sensor networks,” in Proc. of 2010 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, TX, 2010.
  • Q. Zhu and T. Başar, “Price of anarchy and price of information in linear quadratic differential games,” in Proc. of 2010 American Control Conference (ACC), Baltimore, MD, 2010.
  • Q. Zhu, H. Tembine and T. Başar, “Network security configuration: a nonzero-sum stochastic game approach,” in IEEE Proc. of 2010 American Control Conference (ACC), Baltimore, MD, 2010.
  • C. Fung, Q. Zhu, R. Boutaba and T. Başar, “Bayesian decision aggregation in collaborative intrusion detection networks,” in Proc. of 2010 IEEE/IFIP Network Operations and Manage- ment Symposium (NOMS), Osaka, Japan.

2009

  • W. Saad, Q. Zhu, T. Başar, Z. Han and A. Hjorungnes, “Hierarchical network formation games in the uplink of multi-hop wireless networks,” in Proc. of IEEE Global Communications Conference (GLOBECOM), Honolulu, Hawaii, Dec. 2009.
  • Q. Zhu, H. Tembine and T. Başar, “Evolutionary game for hybrid additive white gaussian noise multiple access control,” in Proc. of IEEE Global Communications Conference (GLOBECOM), Honolulu, Hawaii, Dec. 2009.
  • Q. Zhu and T. Başar, “Dynamic policy-based IDS configuration,” in Proc. of 48th IEEE Conference on Decision and Control (CDC), Shanghai, China, Dec. 2009.
  • W. Chen, D. Huang, A. Kulkarni, J. Unnikrishnan, Q. Zhu, P. G. Mehta, S. Meyn, A. Wierman, “Approximate dynamic programming using fluid and diffusion approximations with applications to power management,” in Proc. of 48th IEEE Conference on Decision and Control (CDC), Shanghai, China, Dec. 2009.
  • Q. Zhu, C. Fung, R. Boutaba, T. Başar, “A game-theoretical approach to incentive design in collaborative IDS networks,” in Proc. of International Conference on Game Theory for Networks (GameNets), Istanbul, Turkey, May 13-15, 2009, pp. 384–392.
  • Q. Zhu, H. Tembine, T. Başar, “A constrained evolutionary gaussian multiple access channel game,” in Proc. of International Conference on Game Theory for Networks (GameNets), Istanbul, Turkey, May 13 – 15, 2009, pp. 403–410.

2008

  • Q. Zhu and L. Pavel, “End-to-end DWDM optical link power control via Stackelberg revenue- maximizing model,” International Journal of Network Management (IJNM) Special Issue on Mathematical Methods in Network Management, vol. 18, pp. 505–520, 2008
  • Q. Zhu, “A Lagrangian approach to constrained potential games, part I: theory and example,” in Proc. of 47th IEEE Conference on Decision and Control (CDC), 9-11 Dec. 2008, pp. 2420–2425.
  • Q. Zhu and R. Boutaba, “Nonlinear quadratic pricing for concavifiable utilities in network rate control,” in Proc. of IEEE Global Communications Conference (GLOBECOM), New Orleans, LA, 30 Nov. – 4 Dec. 2008, pp. 1–6.
  • Q. Zhu and L. Pavel, “Differentiated services in power management of WDM optical networks,” in Proc. of IEEE International Conference on Communications (ICC), Beijing, China, May 19 – 23, 2008, pp. 5344–5348.
  • Q. Zhu and L. Pavel, “State-Space Approach to Pricing Design in OSNR Nash Game,” in Proc. of IFAC World Congress, Seoul, Korea, 2008
  • Q. Zhu and L. Pavel, “Stackelberg game approach to constrained OSNR Nash game,” in Proc. of American Control Conference (ACC), Seattle, Washington, June 11-13, 2008, pp. 1967–1972. [PDF]
  • Q. Zhu, “A trade-off study between efficiency and fairness in communication networks,” in Proc. of IEEE International Conference on Computer Communications (INFOCOM) Student Workshop, April 13 – 18, 2008, pp. 1–2. [PDF]
  • Q. Zhu and L. Pavel, “Theory of linear games with constraints and its application to power control of optical networks,” in Proc. of 27th IEEE International Conference on Computer Communications (INFOCOM) mini-conference, April 13 – 18, 2008, pp. 1984–1992. [PDF]

2007

  • Q. Zhu and L. Pavel, “Solving constrained OSNR Nash game in WDM optical networks with a fictitious player,” in Proc. of IEEE 4th International Conference on Broadband Communi- cations, Networks and Systems (Broadnets), Sept. 10-14, 2007, pp. 1984–1992.
  • Q. Zhu and L. Pavel, “Pricing design of power control game in WDM optical networks via state-space approach,” in Proc. of IEEE Global Communications Conference (GLOBECOM), Nov. 26 – 30, 2007, pp. 1–6. [PDF]
  • Q. Zhu and L. Pavel, “End-to-end link power control in optical networks using Nash bargaining solution,” in Proc. of the First International Workshop on Game Theory for Communication Networks (GameComm), 2007. [PDF]

2004

  • J. C.W. Ho, Q. Zhu, and R. Abhari, “Modeling of transmission lines with textured ground planes and investigation of data transmission by generating eye diagram,” in Proc. of IEEE 13th Topical Meeting on Electrical Performance of Electronic Packaging (EPEP), 2004, pp. 195–198. [PDF]