no code implementations • 11 Mar 2022 • Yunhan Huang, Quanyan Zhu
The attacker can also gradually trick the ADP learner into learning the same `nefarious' policy by consistently feeding the learner a falsified cost signal that stays close to the actual cost signal.
no code implementations • 2 Jul 2021 • Yunhan Huang, Linan Huang, Quanyan Zhu
In this work, we review the literature on RL for cyber resilience and discuss cyber resilience against three major types of vulnerabilities, i. e., posture-related, information-related, and human-related vulnerabilities.
no code implementations • 1 Jun 2021 • Yunhan Huang, Quanyan Zhu
In this review, we motivate the game-theoretic approach to human decision-making amid epidemics.
no code implementations • 31 Mar 2021 • Juntao Chen, Yunhan Huang, Quanyan Zhu
Renewable energy-based microgrids play a critical role in future smart grids.
no code implementations • 24 Mar 2021 • Yunhan Huang, Juntao Chen, Quanyan Zhu
Moreover, we show that the observation choices of the defender and the attacker can be decoupled and the Nash observation strategies can be found by solving two independent optimization problems.
no code implementations • 17 Feb 2021 • Yunhan Huang, Quanyan Zhu
We study the co-design problems of the control policy and the triggering policy to optimize two pre-specified cost criteria.
no code implementations • 10 Feb 2021 • Yunhan Huang, Quanyan Zhu
We also show that when the game's horizon goes to infinity, the Nash observation strategy is to observe periodically, and the expected distance between the pursuer and the evader goes to zero with a bounded second moment.
no code implementations • 4 Dec 2020 • Yunhan Huang, Zehui Xiong, Quanyan Zhu
On the other hand, the interactions between the attacker and the defender in the physical layer significantly impact the observation and jamming strategies.
no code implementations • 29 Nov 2020 • Juntao Chen, Yunhan Huang, Rui Zhang, Quanyan Zhu
The designed curing strategy globally optimizes the trade-off between the curing cost and the severity of epidemics in the network.
no code implementations • 7 Feb 2020 • Yunhan Huang, Quanyan Zhu
Focusing on adversarial manipulation on the cost signals, we analyze the performance degradation of TD($\lambda$) and $Q$-learning algorithms under the manipulation.
no code implementations • 24 Jun 2019 • Yunhan Huang, Quanyan Zhu
This paper studies reinforcement learning (RL) under malicious falsification on cost signals and introduces a quantitative framework of attack models to understand the vulnerabilities of RL.