Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    From Passive Defense to Proactive Defence: Strategies and Technologies

    The goal of network defense mechanisms is to enable systems to actively detect and withstand attacks, reduce reliance on external security measures, and quickly recover and repair. This paper elaborates on rel...

    Chong Shi, Jiahao Peng, Shuying Zhu in Artificial Intelligence Security and Priva… (2024)

  2. No Access

    Chapter and Conference Paper

    Policy Advisory Module for Exploration Hindrance Problem in Multi-agent Deep Reinforcement Learning

    This paper proposes a method to improve the policies trained with multi-agent deep learning by adding a policy advisory module (PAM) in the testing phase to relax the exploration hindrance problem. Cooperation an...

    Jiahao Peng, Toshiharu Sugawara in PRIMA 2020: Principles and Practice of Mul… (2021)

  3. No Access

    Chapter and Conference Paper

    Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks

    The emerging link flooding attacks (LFAs) increasingly attract significant attention in both academia and industry, due to their huge threat to the routing infrastructure. Compared with traditional distributed...

    Jiahao Peng, **aobo Ma, Jianfeng Li, Lei Xue, Wenjun Hu in Network and System Security (2018)