Search Results for author: Yunhan Huang

Found 11 papers, 0 papers with code

Reinforcement Learning for Linear Quadratic Control is Vulnerable Under Cost Manipulation

no code implementations11 Mar 2022 Yunhan Huang, Quanyan Zhu

The attacker can also gradually trick the ADP learner into learning the same `nefarious' policy by consistently feeding the learner a falsified cost signal that stays close to the actual cost signal.

reinforcement-learning Reinforcement Learning (RL)

Reinforcement Learning for Feedback-Enabled Cyber Resilience

no code implementations2 Jul 2021 Yunhan Huang, Linan Huang, Quanyan Zhu

In this work, we review the literature on RL for cyber resilience and discuss cyber resilience against three major types of vulnerabilities, i. e., posture-related, information-related, and human-related vulnerabilities.

Intrusion Detection reinforcement-learning +1

Game-Theoretic Frameworks for Epidemic Spreading and Human Decision Making: A Review

no code implementations1 Jun 2021 Yunhan Huang, Quanyan Zhu

In this review, we motivate the game-theoretic approach to human decision-making amid epidemics.

Decision Making

Assets Defending Differential Games with Partial Information and Selected Observations

no code implementations24 Mar 2021 Yunhan Huang, Juntao Chen, Quanyan Zhu

Moreover, we show that the observation choices of the defender and the attacker can be decoupled and the Nash observation strategies can be found by solving two independent optimization problems.

Self-Triggered Markov Decision Processes

no code implementations17 Feb 2021 Yunhan Huang, Quanyan Zhu

We study the co-design problems of the control policy and the triggering policy to optimize two pre-specified cost criteria.

A Pursuit-Evasion Differential Game with Strategic Information Acquisition

no code implementations10 Feb 2021 Yunhan Huang, Quanyan Zhu

We also show that when the game's horizon goes to infinity, the Nash observation strategy is to observe periodically, and the expected distance between the pursuer and the evader goes to zero with a bounded second moment.

Cross-Layer Coordinated Attacks on Cyber-Physical Systems: A LQG Game Framework with Controlled Observations

no code implementations4 Dec 2020 Yunhan Huang, Zehui Xiong, Quanyan Zhu

On the other hand, the interactions between the attacker and the defender in the physical layer significantly impact the observation and jamming strategies.

Optimal Curing Strategy for Competing Epidemics Spreading over Complex Networks

no code implementations29 Nov 2020 Juntao Chen, Yunhan Huang, Rui Zhang, Quanyan Zhu

The designed curing strategy globally optimizes the trade-off between the curing cost and the severity of epidemics in the network.

Manipulating Reinforcement Learning: Poisoning Attacks on Cost Signals

no code implementations7 Feb 2020 Yunhan Huang, Quanyan Zhu

Focusing on adversarial manipulation on the cost signals, we analyze the performance degradation of TD($\lambda$) and $Q$-learning algorithms under the manipulation.

Q-Learning reinforcement-learning +1

Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals

no code implementations24 Jun 2019 Yunhan Huang, Quanyan Zhu

This paper studies reinforcement learning (RL) under malicious falsification on cost signals and introduces a quantitative framework of attack models to understand the vulnerabilities of RL.

Q-Learning reinforcement-learning +1

Cannot find the paper you are looking for? You can Submit a new open access paper.