Skip to main content

Showing 1–43 of 43 results for author: Alpcan, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.19275  [pdf, ps, other

    quant-ph cs.LG

    A Qubit-Efficient Hybrid Quantum Encoding Mechanism for Quantum Machine Learning

    Authors: Hevish Cowlessur, Tansu Alpcan, Chandra Thapa, Seyit Camtepe, Neel Kanth Kundu

    Abstract: Efficiently embedding high-dimensional datasets onto noisy and low-qubit quantum systems is a significant barrier to practical Quantum Machine Learning (QML). Approaches such as quantum autoencoders can be constrained by current hardware capabilities and may exhibit vulnerabilities to reconstruction attacks due to their invertibility. We propose Quantum Principal Geodesic Analysis (qPGA), a novel,… ▽ More

    Submitted 23 June, 2025; originally announced June 2025.

  2. arXiv:2411.06863  [pdf, other

    cs.LG cs.AI cs.ET quant-ph

    Computable Model-Independent Bounds for Adversarial Quantum Machine Learning

    Authors: Bacui Li, Tansu Alpcan, Chandra Thapa, Udaya Parampalli

    Abstract: By leveraging the principles of quantum mechanics, QML opens doors to novel approaches in machine learning and offers potential speedup. However, machine learning models are well-documented to be vulnerable to malicious manipulations, and this susceptibility extends to the models of QML. This situation necessitates a thorough understanding of QML's resilience against adversarial attacks, particula… ▽ More

    Submitted 11 November, 2024; originally announced November 2024.

    Comments: 21 pages, 9 figures

  3. arXiv:2409.16593  [pdf, ps, other

    quant-ph cs.AI

    A Hybrid Quantum Neural Network for Split Learning

    Authors: Hevish Cowlessur, Chandra Thapa, Tansu Alpcan, Seyit Camtepe

    Abstract: Quantum Machine Learning (QML) is an emerging field of research with potential applications to distributed collaborative learning, such as Split Learning (SL). SL allows resource-constrained clients to collaboratively train ML models with a server, reduce their computational overhead, and enable data privacy by avoiding raw data sharing. Although QML with SL has been studied, the problem remains o… ▽ More

    Submitted 4 July, 2025; v1 submitted 24 September, 2024; originally announced September 2024.

    Comments: 54 pages (revised version of original submission)

  4. arXiv:2405.01584  [pdf, other

    cs.CL cs.LG eess.SP

    Lightweight Conceptual Dictionary Learning for Text Classification Using Information Compression

    Authors: Li Wan, Tansu Alpcan, Margreta Kuijper, Emanuele Viterbo

    Abstract: We propose a novel, lightweight supervised dictionary learning framework for text classification based on data compression and representation. This two-phase algorithm initially employs the Lempel-Ziv-Welch (LZW) algorithm to construct a dictionary from text datasets, focusing on the conceptual significance of dictionary elements. Subsequently, dictionaries are refined considering label data, opti… ▽ More

    Submitted 28 April, 2024; originally announced May 2024.

    Comments: 12 pages, TKDE format

  5. arXiv:2402.07385  [pdf, other

    cs.NI eess.SP

    An Efficient Wireless Channel Estimation Model for Environment Sensing

    Authors: Zainab Zaidi, Tansu Alpcan, Christopher Leckie, Sarah Efrain

    Abstract: This paper presents a novel and efficient wireless channel estimation scheme based on a tapped delay line (TDL) model of wireless signal propagation, where a data-driven machine learning approach is used to estimate the path delays and gains. The key motivation for our novel channel estimation model is to gain environment awareness, i.e., detecting changes in path delays and gains related to inter… ▽ More

    Submitted 24 May, 2024; v1 submitted 11 February, 2024; originally announced February 2024.

  6. arXiv:2402.04567  [pdf, other

    cs.LG cs.AI

    OIL-AD: An Anomaly Detection Framework for Sequential Decision Sequences

    Authors: Chen Wang, Sarah Erfani, Tansu Alpcan, Christopher Leckie

    Abstract: Anomaly detection in decision-making sequences is a challenging problem due to the complexity of normality representation learning and the sequential nature of the task. Most existing methods based on Reinforcement Learning (RL) are difficult to implement in the real world due to unrealistic assumptions, such as having access to environment dynamics, reward signals, and online interactions with th… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  7. arXiv:2303.13015  [pdf, other

    cs.LG cs.AI cs.DC

    Failure-tolerant Distributed Learning for Anomaly Detection in Wireless Networks

    Authors: Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, Justin Kopacz

    Abstract: The analysis of distributed techniques is often focused upon their efficiency, without considering their robustness (or lack thereof). Such a consideration is particularly important when devices or central servers can fail, which can potentially cripple distributed systems. When such failures arise in wireless communications networks, important services that they use/provide (like anomaly detectio… ▽ More

    Submitted 22 March, 2023; originally announced March 2023.

  8. arXiv:2207.00414  [pdf, other

    cs.NI cs.AI eess.SP

    Artificial Intelligence Techniques for Next-Generation Mega Satellite Networks

    Authors: Bassel Al Homssi, Kosta Dakic, Ke Wang, Tansu Alpcan, Ben Allen, Russell Boyce, Sithamparanathan Kandeepan, Akram Al-Hourani, Walid Saad

    Abstract: Space communications, particularly massive satellite networks, re-emerged as an appealing candidate for next generation networks due to major advances in space launching, electronics, processing power, and miniaturization. However, massive satellite networks rely on numerous underlying and intertwined processes that cannot be truly captured using conventionally used models, due to their dynamic an… ▽ More

    Submitted 16 September, 2023; v1 submitted 2 June, 2022; originally announced July 2022.

  9. Adversarial Decisions on Complex Dynamical Systems using Game Theory

    Authors: Andrew C. Cullen, Tansu Alpcan, Alexander C. Kalloniatis

    Abstract: We apply computational Game Theory to a unification of physics-based models that represent decision-making across a number of agents within both cooperative and competitive processes. Here the competitors try to both positively influence their own returns, while negatively affecting those of their competitors. Modelling these interactions with the so-called Boyd-Kuramoto-Lanchester (BKL) complex d… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

  10. arXiv:2201.05187  [pdf, ps, other

    cs.NI

    Online Slice Reconfiguration for End-to-End QoE in 6G Applications

    Authors: Dibbendu Roy, Aravinda S. Rao, Tansu Alpcan, Akilan Wick, Goutam Das, Marimuthu Palaniswami

    Abstract: End-to-end (E2E) quality of experience (QoE) for 6G applications depends on the synchronous allocation of networking and computing resources, also known as slicing. However, the relationship between the resources and the E2E QoE outcomes is typically stochastic and non-stationary. Existing works consider known resource demands for slicing and formulate optimization problems for slice reconfigurati… ▽ More

    Submitted 13 January, 2022; originally announced January 2022.

  11. arXiv:2201.05184  [pdf, ps, other

    cs.NI eess.SY

    Achieving AI-enabled Robust End-to-End Quality of Experience over Radio Access Networks

    Authors: Dibbendu Roy, Aravinda S. Rao, Tansu Alpcan, Goutam Das, Marimuthu Palaniswami

    Abstract: Emerging applications such as Augmented Reality, the Internet of Vehicles and Remote Surgery require both computing and networking functions working in harmony. The End-to-end (E2E) quality of experience (QoE) for these applications depends on the synchronous allocation of networking and computing resources. However, the relationship between the resources and the E2E QoE outcomes is typically stoc… ▽ More

    Submitted 13 January, 2022; originally announced January 2022.

  12. arXiv:2112.02223  [pdf, other

    cs.CR cs.AI

    A Game-Theoretic Approach for AI-based Botnet Attack Defence

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit A. Camtepe

    Abstract: The new generation of botnets leverages Artificial Intelligent (AI) techniques to conceal the identity of botmasters and the attack intention to avoid detection. Unfortunately, there has not been an existing assessment tool capable of evaluating the effectiveness of existing defense strategies against this kind of AI-based botnet attack. In this paper, we propose a sequential game theory model tha… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

  13. arXiv:2109.14208  [pdf, other

    cs.GT cs.CR

    A Communication Security Game on Switched Systems for Autonomous Vehicle Platoons

    Authors: Guoxin Sun, Tansu Alpcan, Benjamin I. P. Rubinstein, Seyit Camtepe

    Abstract: Vehicle-to-vehicle communication enables autonomous platoons to boost traffic efficiency and safety, while ensuring string stability with a constant spacing policy. However, communication-based controllers are susceptible to a range of cyber-attacks. In this paper, we propose a distributed attack mitigation defense framework with a dual-mode control system reconfiguration scheme to prevent a compr… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

    Comments: 9 pages, 5 figures; full version of paper accepted to CDC2021

  14. arXiv:2109.11803  [pdf, other

    cs.LG

    Local Intrinsic Dimensionality Signals Adversarial Perturbations

    Authors: Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie, Benjamin I. P. Rubinstein

    Abstract: The vulnerability of machine learning models to adversarial perturbations has motivated a significant amount of research under the broad umbrella of adversarial machine learning. Sophisticated attacks may cause learning algorithms to learn decision functions or make decisions with poor predictive performance. In this context, there is a growing body of literature that uses local intrinsic dimensio… ▽ More

    Submitted 24 September, 2021; originally announced September 2021.

    Comments: 13 pages

  15. arXiv:2109.02186  [pdf, other

    cs.NI eess.SY

    Achieving QoS for Real-Time Bursty Applications over Passive Optical Networks

    Authors: Dibbendu Roy, Aravinda S. Rao, Tansu Alpcan, Goutam Das, Marimuthu Palaniswami

    Abstract: Emerging real-time applications such as those classified under ultra-reliable low latency (uRLLC) generate bursty traffic and have strict Quality of Service (QoS) requirements. Passive Optical Network (PON) is a popular access network technology, which is envisioned to handle such applications at the access segment of the network. However, the existing standards cannot handle strict QoS constraint… ▽ More

    Submitted 5 September, 2021; originally announced September 2021.

  16. arXiv:2107.09258  [pdf, other

    cs.GT

    A Markov Game Model for AI-based Cyber Security Attack Mitigation

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit A. Camtepe

    Abstract: The new generation of cyber threats leverages advanced AI-aided methods, which make them capable to launch multi-stage, dynamic, and effective attacks. Current cyber-defense systems encounter various challenges to defend against such new and emerging threats. Modeling AI-aided threats through game theory models can help the defender to select optimal strategies against the attacks and make wise de… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Comments: 11 pages

  17. arXiv:2008.09284  [pdf, other

    cs.LG stat.ML

    Defending Distributed Classifiers Against Data Poisoning Attacks

    Authors: Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie

    Abstract: Support Vector Machines (SVMs) are vulnerable to targeted training data manipulations such as poisoning attacks and label flips. By carefully manipulating a subset of training samples, the attacker forces the learner to compute an incorrect decision boundary, thereby cause misclassifications. Considering the increased importance of SVMs in engineering and life-critical applications, we develop a n… ▽ More

    Submitted 20 August, 2020; originally announced August 2020.

    Comments: 14 pages

  18. arXiv:2008.09279  [pdf, other

    cs.LG stat.ML

    Defending Regression Learners Against Poisoning Attacks

    Authors: Sandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie, Justin Kopacz

    Abstract: Regression models, which are widely used from engineering applications to financial forecasting, are vulnerable to targeted malicious attacks such as training data poisoning, through which adversaries can manipulate their predictions. Previous works that attempt to address this problem rely on assumptions about the nature of the attack/attacker or overestimate the knowledge of the learner, making… ▽ More

    Submitted 20 August, 2020; originally announced August 2020.

    Comments: 13 pages

  19. arXiv:1911.03632  [pdf, ps, other

    cs.NI

    Smart Scheduling and Feedback Allocation over Non-stationary Wireless Channels

    Authors: Mehmet Karaca, Tansu Alpcan, Ozgur Ercetin

    Abstract: It is well known that opportunistic scheduling algorithms are throughput optimal under dynamic channel and network conditions. However, these algorithms achieve a hypothetical rate region which does not take into account the overhead associated with channel probing and feedback required to obtain the full channel state information at every slot. In this work, we design a joint scheduling and chann… ▽ More

    Submitted 9 November, 2019; originally announced November 2019.

  20. arXiv:1907.12204  [pdf, ps, other

    cs.GL

    A Template and Suggestions for Writing Easy-to-Read Research Articles

    Authors: Tansu Alpcan

    Abstract: The number of research papers written has been growing at least linearly -- if not exponentially -- in recent years. In proportion, the amount of time a reader allocates per paper has been decreasing. While an accessible paper will be appreciated by a large audience, hard-to-read papers may remain obscure for a long time regardless of scientific merit. Unfortunately, there is still insufficient em… ▽ More

    Submitted 29 July, 2019; originally announced July 2019.

    Comments: 5 pages

  21. arXiv:1902.09062  [pdf, other

    stat.ML cs.CR cs.LG

    Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence

    Authors: Yi Han, David Hubczenko, Paul Montague, Olivier De Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah Erfani

    Abstract: Recent studies have demonstrated that reinforcement learning (RL) agents are susceptible to adversarial manipulation, similar to vulnerabilities previously demonstrated in the supervised learning setting. While most existing work studies the problem in the context of computer vision or console games, this paper focuses on reinforcement learning in autonomous cyber defence under partial observabili… ▽ More

    Submitted 16 August, 2020; v1 submitted 24 February, 2019; originally announced February 2019.

    Comments: 8 pages, 4 figures

  22. arXiv:1808.05770  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    Reinforcement Learning for Autonomous Defence in Software-Defined Networking

    Authors: Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier De Vel, Sarah Erfani, David Hubczenko, Christopher Leckie, Paul Montague

    Abstract: Despite the successful application of machine learning (ML) in a wide range of domains, adaptability---the very property that makes machine learning desirable---can be exploited by adversaries to contaminate training and evade classification. In this paper, we investigate the feasibility of applying a specific class of machine learning algorithms, namely, reinforcement learning (RL) algorithms, fo… ▽ More

    Submitted 17 August, 2018; originally announced August 2018.

    Comments: 20 pages, 8 figures

  23. arXiv:1803.10623  [pdf, ps, other

    cs.IT cs.NI

    Stability and Dynamic Control of Underlay Mobile Edge Networks

    Authors: Y. Sarikaya, H. Inaltekin, T. Alpcan, J. S. Evans

    Abstract: This paper studies the stability and dynamic control of underlay mobile edge networks. First, the stability region for a multiuser edge network is obtained under the assumption of full channel state information. This result provides a benchmark figure for comparing performance of the proposed algorithms. Second, a centralized joint flow control and scheduling algorithm is proposed to stabilize the… ▽ More

    Submitted 25 March, 2018; originally announced March 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1606.00534

  24. Game theoretic path selection to support security in device-to-device communications

    Authors: Emmanouil Panaousis, Eirini Karapistoli, Hadeer Elsemary, Tansu Alpcan, MHR Khuzani, Anastasios A. Economides

    Abstract: Device-to-Device (D2D) communication is expected to be a key feature supported by 5G networks, especially due to the proliferation of Mobile Edge Computing (MEC), which has a prominent role in reducing network stress by shifting computational tasks from the Internet to the mobile edge. Apart from being part of MEC, D2D can extend cellular coverage allowing users to communicate directly when teleco… ▽ More

    Submitted 4 November, 2017; originally announced November 2017.

    Comments: 35 pages, 7 figures

    ACM Class: K.6.5, C.2.2

    Journal ref: Ad Hoc Networks (2017), 28-42

  25. arXiv:1707.09095  [pdf, ps, other

    cs.AI eess.SY

    Toward the Starting Line: A Systems Engineering Approach to Strong AI

    Authors: Tansu Alpcan, Sarah M. Erfani, Christopher Leckie

    Abstract: Artificial General Intelligence (AGI) or Strong AI aims to create machines with human-like or human-level intelligence, which is still a very ambitious goal when compared to the existing computing and AI systems. After many hype cycles and lessons from AI history, it is clear that a big conceptual leap is needed for crossing the starting line to kick-start mainstream AGI research. This position pa… ▽ More

    Submitted 18 October, 2017; v1 submitted 27 July, 2017; originally announced July 2017.

    Comments: 11 pages, 3 figures

  26. arXiv:1701.06717  [pdf, ps, other

    cs.IT

    Lower Bounds on the Complexity of Solving Two Classes of Non-cooperative Games

    Authors: Ehsan Nekouei, Girish N. Nair, Tansu Alpcan, Robin J. Evans

    Abstract: This paper studies the complexity of solving two classes of non-cooperative games in a distributed manner in which the players communicate with a set of system nodes over noisy communication channels. The complexity of solving each game class is defined as the minimum number of iterations required to find a Nash equilibrium (NE) of any game in that class with $ε$ accuracy. First, we consider the c… ▽ More

    Submitted 23 January, 2017; originally announced January 2017.

  27. arXiv:1609.06438  [pdf, other

    cs.GT cs.LG

    Large-Scale Strategic Games and Adversarial Machine Learning

    Authors: Tansu Alpcan, Benjamin I. P. Rubinstein, Christopher Leckie

    Abstract: Decision making in modern large-scale and complex systems such as communication networks, smart electricity grids, and cyber-physical systems motivate novel game-theoretic approaches. This paper investigates big strategic (non-cooperative) games where a finite number of individual players each have a large number of continuous decision variables and input data points. Such high-dimensional decisio… ▽ More

    Submitted 21 September, 2016; originally announced September 2016.

    Comments: 7 pages, 1 figure; CDC'16 to appear

  28. arXiv:1606.00534  [pdf, ps, other

    cs.NI

    Dynamic Control of Interference Limited Underlay D2D Network

    Authors: Yunus Sarikaya, Hazer Inaltekin, Tansu Alpcan, Jamie Evans

    Abstract: Device-to-Device (D2D) communication appears as a key communication paradigm to realizing the vision of Internet of Things (IoT) into reality by supporting heterogeneous objects interconnection in a large scale network. These devices may be many types of objects with embedded intelligence and communication capabilities, e.g., smart phones, cars, or home appliances. The issue in in this type of com… ▽ More

    Submitted 2 June, 2016; originally announced June 2016.

    Comments: arXiv admin note: text overlap with arXiv:1310.0720 by other authors

  29. Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking

    Authors: Emmanouil Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, Tansu Alpcan

    Abstract: Nowadays, mobile users have a vast number of applications and services at their disposal. Each of these might impose some privacy threats on users' "Personally Identifiable Information" (PII). Location privacy is a crucial part of PII, and as such, privacy-aware users wish to maximize it. This privacy can be, for instance, threatened by a company, which collects users' traces and shares them with… ▽ More

    Submitted 2 January, 2016; originally announced January 2016.

    Comments: 8 pages, 7 figures, In Proceedings of 2015 IEEE Trustcom/BigDataSE/ISPA

  30. Throughput Optimal Scheduling with Dynamic Channel Feedback

    Authors: Mehmet Karaca, Yunus Sarikaya, Ozgur Ercetin, Tansu Alpcan, Holger Boche

    Abstract: It is well known that opportunistic scheduling algorithms are throughput optimal under full knowledge of channel and network conditions. However, these algorithms achieve a hypothetical achievable rate region which does not take into account the overhead associated with channel probing and feedback required to obtain the full channel state information at every slot. We adopt a channel probing mode… ▽ More

    Submitted 26 March, 2012; v1 submitted 23 March, 2012; originally announced March 2012.

    Comments: submitted

    Journal ref: Wireless Communications, IEEE Transactions on vol.12, No:6, 2013

  31. arXiv:1112.2437  [pdf, ps, other

    cs.NI cs.GT eess.SY

    Competition and Regulation in Wireless Services Markets

    Authors: Omer Korcak, George Iosifidis, Tansu Alpcan, Iordanis Koutsopoulos

    Abstract: We consider a wireless services market where a set of operators compete for a large common pool of users. The latter have a reservation utility of U0 units or, equivalently, an alternative option to satisfy their communication needs. The operators must satisfy these minimum requirements in order to attract the users. We model the users decisions and interaction as an evolutionary game and the comp… ▽ More

    Submitted 11 September, 2012; v1 submitted 11 December, 2011; originally announced December 2011.

    Comments: submitted

  32. arXiv:1111.4350  [pdf, ps, other

    cs.NI cs.GT eess.SY

    Incentive Mechanisms for Hierarchical Spectrum Markets

    Authors: George Iosifidis, Anil Kumar Chorppath, Tansu Alpcan, Iordanis Koutsopoulos

    Abstract: In this paper, we study spectrum allocation mechanisms in hierarchical multi-layer markets which are expected to proliferate in the near future based on the current spectrum policy reform proposals. We consider a setting where a state agency sells spectrum channels to Primary Operators (POs) who subsequently resell them to Secondary Operators (SOs) through auctions. We show that these hierarchical… ▽ More

    Submitted 12 December, 2011; v1 submitted 18 November, 2011; originally announced November 2011.

    Comments: 9 pages

  33. arXiv:1105.2211  [pdf, ps, other

    math.OC cs.IT cs.LG eess.SY

    Dual Control with Active Learning using Gaussian Process Regression

    Authors: Tansu Alpcan

    Abstract: In many real world problems, control decisions have to be made with limited information. The controller may have no a priori (or even posteriori) data on the nonlinear system, except from a limited number of points that are obtained over time. This is either due to high cost of observation or the highly non-stationary nature of the system. The resulting conflict between information collection (ide… ▽ More

    Submitted 11 May, 2011; originally announced May 2011.

  34. arXiv:1105.2176  [pdf, ps, other

    math.OC cs.IT cs.LG eess.SY

    A Framework for Optimization under Limited Information

    Authors: Tansu Alpcan

    Abstract: In many real world problems, optimization decisions have to be made with limited information. The decision maker may have no a priori or posteriori data about the often nonconvex objective function except from on a limited number of points that are obtained over time through costly observations. This paper presents an optimization framework that takes into account the information collection (obser… ▽ More

    Submitted 11 May, 2011; originally announced May 2011.

  35. arXiv:1012.3282  [pdf, ps, other

    cs.GT

    Incentive Games and Mechanisms for Risk Management

    Authors: Tansu Alpcan

    Abstract: Incentives play an important role in (security and IT) risk management of a large-scale organization with multiple autonomous divisions. This paper presents an incentive mechanism design framework for risk management based on a game-theoretic approach. The risk manager acts as a mechanism designer providing rules and incentive factors such as assistance or subsidies to divisions or units, which ar… ▽ More

    Submitted 15 December, 2010; originally announced December 2010.

  36. arXiv:1009.0377  [pdf, ps, other

    cs.GT cs.NI

    A Unified Mechanism Design Framework for Networked Systems

    Authors: Tansu Alpcan, Holger Boche, Siddharth Naik

    Abstract: Mechanisms such as auctions and pricing schemes are utilized to design strategic (noncooperative) games for networked systems. Although the participating players are selfish, these mechanisms ensure that the game outcome is optimal with respect to a global criterion (e.g. maximizing a social welfare function), preference-compatible, and strategy-proof, i.e. players have no reason to deceive the de… ▽ More

    Submitted 2 September, 2010; originally announced September 2010.

  37. arXiv:1007.0144  [pdf, ps, other

    cs.GT cs.NI math.OC

    An Optimization and Control Theoretic Approach to Noncooperative Game Design

    Authors: Tansu Alpcan, Lacra Pavel, Nem Stefanovic

    Abstract: This paper investigates design of noncooperative games from an optimization and control theoretic perspective. Pricing mechanisms are used as a design tool to ensure that the Nash equilibrium of a fairly general class of noncooperative games satisfies certain global objectives such as welfare maximization or achieving a certain level of quality-of-service (QoS). The class of games considered provi… ▽ More

    Submitted 1 July, 2010; originally announced July 2010.

    Comments: Earlier versions of this work have appeared partly in the International Conference on Game Theory for Networks (GameNets), in Istanbul, Turkey in May 2009 and Conference on Decision and Control (CDC), Shanghai, China, in December 2009

  38. arXiv:1006.3417  [pdf, ps, other

    cs.GT cs.CR cs.LG

    Fictitious Play with Time-Invariant Frequency Update for Network Security

    Authors: Kien C. Nguyen, Tansu Alpcan, Tamer Başar

    Abstract: We study two-player security games which can be viewed as sequences of nonzero-sum matrix games played by an Attacker and a Defender. The evolution of the game is based on a stochastic fictitious play process, where players do not have access to each other's payoff matrix. Each has to observe the other's actions up to present and plays the action generated based on the best response to these obser… ▽ More

    Submitted 17 June, 2010; originally announced June 2010.

    Comments: Proceedings of the 2010 IEEE Multi-Conference on Systems and Control (MSC10), September 2010, Yokohama, Japan

  39. arXiv:1003.2767  [pdf, ps, other

    cs.GT cs.CR

    Security Games with Decision and Observation Errors

    Authors: Kien C. Nguyen, Tansu Alpcan, Tamer Basar

    Abstract: We study two-player security games which can be viewed as sequences of nonzero-sum matrix games played by an Attacker and a Defender. The evolution of the game is based on a stochastic fictitious play process. Players do not have access to each other's payoff matrix. Each has to observe the other's actions up to present and plays the action generated based on the best response to these observation… ▽ More

    Submitted 14 March, 2010; originally announced March 2010.

  40. arXiv:1003.2440  [pdf, ps, other

    cs.CR cs.GT

    Stochastic Games for Security in Networks with Interdependent Nodes

    Authors: Kien C. Nguyen, Tansu Alpcan, Tamer Basar

    Abstract: This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take part in a two-player game over a network of nodes whose security assets and vulnerabilities are correlated. Such a network can be modeled using weighted directed graphs with the edges representing the influence among the n… ▽ More

    Submitted 11 March, 2010; originally announced March 2010.

  41. arXiv:1001.1013  [pdf, ps, other

    cs.MM cs.NI

    Distributed Rate Allocation Policies for Multi-Homed Video Streaming over Heterogeneous Access Networks

    Authors: Xiaoqing Zhu, Piyush Agrawal, Jatinder Pal Singh, Tansu Alpcan, Bernd Girod

    Abstract: We consider the problem of rate allocation among multiple simultaneous video streams sharing multiple heterogeneous access networks. We develop and evaluate an analytical framework for optimal rate allocation based on observed available bit rate (ABR) and round-trip time (RTT) over each access network and video distortion-rate (DR) characteristics. The rate allocation is formulated as a convex o… ▽ More

    Submitted 6 January, 2010; originally announced January 2010.

    Comments: 12 pages, 22 figures

    Journal ref: IEEE Transactions on Multimedia, Pages: 752-764, Volume: 11 Issue: 4, Date: June 2009

  42. arXiv:0912.5527  [pdf, ps, other

    cs.NI

    VANET Connectivity Analysis

    Authors: M. Kafsi, P. Papadimitratos, O. Dousse, T. Alpcan, J. -P. Hubaux

    Abstract: Vehicular Ad Hoc Networks (VANETs) are a peculiar subclass of mobile ad hoc networks that raise a number of technical challenges, notably from the point of view of their mobility models. In this paper, we provide a thorough analysis of the connectivity of such networks by leveraging on well-known results of percolation theory. By means of simulations, we study the influence of a number of parame… ▽ More

    Submitted 30 December, 2009; originally announced December 2009.

    Journal ref: IEEE AutoNet, New Orleans, LA, USA, December 2008

  43. arXiv:0911.2293  [pdf, ps, other

    cs.CR

    A Robust Control Framework for Malware Filtering

    Authors: Michael Bloem, Tansu Alpcan, Tamer Basar

    Abstract: We study and develop a robust control framework for malware filtering and network security. We investigate the malware filtering problem by capturing the tradeoff between increased security on one hand and continued usability of the network on the other. We analyze the problem using a linear control system model with a quadratic cost structure and develop algorithms based on H infinity-optimal c… ▽ More

    Submitted 11 November, 2009; originally announced November 2009.

    Comments: 8 pages, 10 figures, IEEE format