Follow
Pengdeng Li
Pengdeng Li
School of Computer Science and Engineering, Nanyang Technological University
Verified email at ntu.edu.sg
Title
Cited by
Cited by
Year
Effective repair strategy against advanced persistent threat: A differential game approach
LX Yang, P Li, Y Zhang, X Yang, Y Xiang, W Zhou
IEEE Transactions on Information Forensics and Security 14 (7), 1713-1728, 2018
972018
A risk management approach to defending against the advanced persistent threat
LX Yang, P Li, X Yang, YY Tang
IEEE Transactions on Dependable and Secure Computing 17 (6), 1163-1172, 2018
702018
The modeling and analysis of the word-of-mouth marketing
P Li, X Yang, LX Yang, Q Xiong, Y Wu, YY Tang
Physica A: Statistical Mechanics and its Applications 493, 1-16, 2018
662018
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats
LX Yang, P Li, X Yang, YY Tang
IEEE Access 5, 20111-20123, 2017
542017
On the competition of two conflicting messages
LX Yang, P Li, X Yang, Y Wu, YY Tang
Nonlinear Dynamics 91, 1853-1869, 2018
482018
Defending against the advanced persistent threat: An optimal control approach
P Li, X Yang, Q Xiong, J Wen, YY Tang
Security and Communication Networks 2018, 2018
402018
A discount strategy in word-of-mouth marketing
T Zhang, P Li, LX Yang, X Yang, YY Tang, Y Wu
Communications in Nonlinear Science and Numerical Simulation 74, 167-179, 2019
362019
Effective quarantine and recovery scheme against advanced persistent threat
LX Yang, P Li, X Yang, Y Xiang, F Jiang, W Zhou
IEEE Transactions on Systems, Man, and Cybernetics: Systems 51 (10), 5977-5991, 2019
302019
Developing cost-effective rumor-refuting strategy through game-theoretic approach
DW Huang, LX Yang, P Li, X Yang, YY Tang
IEEE Systems Journal 15 (4), 5034-5045, 2020
242020
Simultaneous benefit maximization of conflicting opinions: Modeling and analysis
LX Yang, P Li, X Yang, Y Xiang, YY Tang
IEEE Systems Journal 14 (2), 1623-1634, 2020
192020
Discount pricing in word-of-mouth marketing: An optimal control approach
P Li, X Yang, Y Wu, W He, P Zhao
Physica A: Statistical Mechanics and its Applications 505, 512-522, 2018
192018
On dynamic recovery of cloud storage system under advanced persistent threats
P Li, X Yang
IEEE Access 7, 103556-103569, 2019
162019
A theoretical method for assessing disruptive computer viruses
Y Wu, P Li, LX Yang, X Yang, YY Tang
Physica A: Statistical Mechanics and its Applications 482, 325-336, 2017
162017
A Differential Game Approach to Patch Injection
LX Yang, P Li, X Yang, Y Xiang, W Zhou
IEEE Access 6, 58924-58938, 2018
112018
Distributed interaction between computer virus and patch: A modeling study
LX Yang, X Yang, Q Zhu, C Gan
arXiv preprint arXiv:1705.04818, 2017
102017
Energy-efficient patching strategy for wireless sensor networks
P Li, LX Yang, X Yang, X Zhong, J Wen, Q Xiong
Sensors 19 (2), 262, 2019
72019
Offline Equilibrium Finding
S Li, X Wang, Y Zhang, J Cerny, P Li, H Chan, B An
arXiv preprint arXiv:2207.05285v2, 2023
42023
Seeking best-balanced patch-injecting strategies through optimal control approach
K Huang, P Li, LX Yang, X Yang, YY Tang
Security and Communication Networks 2019, 1-12, 2019
42019
Reducing the spectral radius of a torus network by link removal
X Yang, P Li, LX Yang, Y Wu
PloS ONE 11 (5), e0155580, 2016
32016
Population-size-aware policy optimization for mean-field games
P Li, X Wang, S Li, H Chan, B An
arXiv preprint arXiv:2302.03364, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20