Tansu Alpcan

According to our database1, Tansu Alpcan authored at least 163 papers between 2002 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
A Joint Electrical and Thermodynamic Approach to HVAC Load Control.
IEEE Trans. Smart Grid, 2020

Sample Complexity of Solving Non-Cooperative Games.
IEEE Trans. Information Theory, 2020

2019
Distributed Real-Time IoT for Autonomous Vehicles.
IEEE Trans. Industrial Informatics, 2019

Truthful Mechanism Design for Wireless Powered Network With Channel Gain Reporting.
IEEE Trans. Communications, 2019

An Information Analysis of Iterative Algorithms for Network Utility Maximization and Strategic Games.
IEEE Trans. Control of Network Systems, 2019

Support vector machines resilient against training data integrity attacks.
Pattern Recognit., 2019

Interdependent Security Game Design over Constrained Linear Influence Networks.
ISeCure, 2019

A Template and Suggestions for Writing Easy-to-Read Research Articles.
CoRR, 2019

Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking.
CoRR, 2019

Constrained extremum seeking of a MIMO dynamic system.
Autom., 2019

2018
Stability and Dynamic Control of Underlay Mobile Edge Networks.
IEEE Trans. Mob. Comput., 2018

Convergence Analysis of Quantized Primal-Dual Algorithms in Network Utility Maximization Problems.
IEEE Trans. Control of Network Systems, 2018

Stability and active power sharing in droop controlled inverter interfaced microgrids: Effect of clock mismatches.
Autom., 2018

Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

A Game-Theoretic Analysis of the Adversarial Boyd-Kuramoto Model.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Reinforcement Learning for Autonomous Defence in Software-Defined Networking.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

2017
Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing.
IEEE Trans. Dependable Sec. Comput., 2017

A Game-Theoretic Analysis of Energy Efficiency and Performance for Cloud Computing in Communication Networks.
IEEE Systems Journal, 2017

Guest Editorial Game Theory for Networks, Part II.
IEEE Journal on Selected Areas in Communications, 2017

Guest Editorial Game Theory for Networks, Part I.
IEEE Journal on Selected Areas in Communications, 2017

Lower Bounds on the Complexity of Solving Two Classes of Non-cooperative Games.
CoRR, 2017

Toward the Starting Line: A Systems Engineering Approach to Strong AI.
CoRR, 2017

Game theoretic path selection to support security in device-to-device communications.
Ad Hoc Networks, 2017

Siting and sizing distributed storage for microgrid applications.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Impact of a coal power plant closure on a multi-region wholesale electricity market.
Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2017

Information constrained and finite-time distributed optimisation algorithms.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Nash equilibrium approximation under communication and computation constraints in large-scale non-cooperative games.
Proceedings of the 11th Asian Control Conference, 2017

2016
A Market Mechanism for Electric Vehicle Charging Under Network Constraints.
IEEE Trans. Smart Grid, 2016

Operator Collusion and Market Regulation Policies for Wireless Spectrum Management.
IEEE Trans. Mob. Comput., 2016

Bayesian Mechanisms and Detection Methods for Wireless Network with Malicious Users.
IEEE Trans. Mob. Comput., 2016

A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning.
IEEE Trans. Information Forensics and Security, 2016

Performance Analysis of Gradient-Based Nash Seeking Algorithms Under Quantization.
IEEE Trans. Automat. Contr., 2016

Fog Computing May Help to Save Energy in Cloud Computing.
IEEE Journal on Selected Areas in Communications, 2016

Dynamic Control of Interference Limited Underlay D2D Network.
CoRR, 2016

Entropy-based active learning for wireless scheduling with incomplete channel feedback.
Comput. Networks, 2016

Interference scaling in multi-cell network with rate guarantees.
Proceedings of the Sixth International Conference on Digital Information and Communication Technology and its Applications, 2016

Large-scale strategic games and adversarial machine learning.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
Game Theory for Security.
Proceedings of the Encyclopedia of Systems and Control, 2015

Game-Theoretic Frameworks for Demand Response in Electricity Markets.
IEEE Trans. Smart Grid, 2015

An Information-Based Learning Approach to Dual Control.
IEEE Trans. Neural Netw. Learning Syst., 2015

Energy Consumption Comparison of Interactive Cloud-Based and Local Applications.
IEEE Journal on Selected Areas in Communications, 2015

New online voltage stability margins and risk assessment for multi-bus smart power grids.
Int. J. Control, 2015

Adversarial Behavior in Network Games.
Dynamic Games and Applications, 2015

Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A game-theoretic approach for minimizing security risks in the Internet-of-Things.
Proceedings of the IEEE International Conference on Communication, 2015

Bayesian mechanisms and learning for wireless networks security with QoS requirements.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A Multi-Objective Optimisation Approach for Energy Efficiency of Backhaul Traffic in Mobile Networks.
Proceedings of the 2015 ACM Sixth International Conference on Future Energy Systems, 2015

Convergence analysis of quantized primal-dual algorithm in quadratic network utility maximization problems.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Modelling voltage-demand relationship on power distribution grid for distributed demand management.
Proceedings of the 2015 5th Australian Control Conference (AUCC), Gold Coast, 2015

A distributed multi-objective optimisation framework for energy efficiency in mobile backhaul networks.
Proceedings of the 2015 IEEE Conference on Control Applications, 2015

2014
Energy Consumption of Content Distribution from Nano Data Centers versus Centralized Data Centers.
SIGMETRICS Performance Evaluation Review, 2014

On making energy demand and network constraints compatible in the last mile of the power grid.
Annu. Rev. Control., 2014

Can we measure the difficulty of an optimization problem?
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

A distributed electric vehicle charging management algorithm using only local measurements.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Virtual machine allocation policies against co-resident attacks in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2014

Bayesian mechanisms for wireless network security.
Proceedings of the IEEE International Conference on Communications, 2014

Secure Message Delivery Games for Device-to-Device Communications.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Energy Consumption of Photo Sharing in Online Social Networks.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

Information metrics for model selection in function estimation.
Proceedings of the Australian Communications Theory Workshop, AusCTW 2014, Sydney, 2014

2013
Joint Opportunistic Scheduling and Selective Channel Feedback.
IEEE Trans. Wireless Communications, 2013

Trading privacy with incentives in mobile commerce: A game theoretic approach.
Pervasive Mob. Comput., 2013

A framework for optimization under limited information.
J. Global Optimization, 2013

Game theory meets network security and privacy.
ACM Comput. Surv., 2013

Energy consumption of interactive cloud-based document processing applications.
Proceedings of IEEE International Conference on Communications, 2013

Security Games for Virtual Machine Allocation in Cloud Computing.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

An information-theoretic analysis of distributed resource allocation.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture).
Proceedings of the Eleventh Australasian Information Security Conference, 2013

Learning and information for dual control.
Proceedings of the 9th Asian Control Conference, 2013

2012
Dynamic Pricing and Queue Stability in Wireless Random Access Games.
J. Sel. Topics Signal Processing, 2012

Mechanism design and implementation theoretic perspective for interference coupled wireless systems.
EURASIP J. Wireless Comm. and Networking, 2012

Throughput Optimal Scheduling with Dynamic Channel Feedback
CoRR, 2012

Collusion of operators in wireless spectrum markets.
Proceedings of the 10th International Symposium on Modeling and Optimization in Mobile, 2012

Efficient wireless scheduling with limited channel feedback and performance guarantees.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Risk Management for IT Security: When Theory Meets Practice.
Proceedings of the 5th International Conference on New Technologies, 2012

Dynamic Incentives for Risk Management.
Proceedings of the 5th International Conference on New Technologies, 2012

Competition and regulation in a wireless operator market: An evolutionary game perspective.
Proceedings of the 6th International Conference on Network Games, 2012

Incentive mechanisms for hierarchical spectrum markets.
Proceedings of the 6th International Conference on Network Games, 2012

Demand Response Architectures and Load Management Algorithms for Energy-Efficient Power Grids: A Survey.
Proceedings of the Seventh International Conference on Knowledge, 2012

An outage-based game design for cognitive radio.
Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), 2012

Smart scheduling and feedback allocation over non-stationary wireless channels.
Proceedings of IEEE International Conference on Communications, 2012

Security Games and Risk Minimization for Automatic Generation Control in Smart Grid.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Security games for voltage control in smart grid.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

Energy efficiency games for backhaul traffic in wireless networks.
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012

2011
Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems.
IEEE Trans. Signal Processing, 2011

Security Games for Vehicular Networks.
IEEE Trans. Mob. Comput., 2011

Guest Editorial - Special Issue on Game Theory in Communication Networks.
Telecommunication Systems, 2011

Competition and Regulation in Wireless Services Markets
CoRR, 2011

Dual Control with Active Learning using Gaussian Process Regression
CoRR, 2011

A privacy mechanism for mobile commerce.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Mechanism design for energy efficiency in wireless networks.
Proceedings of the 9th International Symposium on Modeling and Optimization in Mobile, 2011

Adversarial behavior in network mechanism design.
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, 2011

Security Risk Management via Dynamic Games with Learning.
Proceedings of IEEE International Conference on Communications, 2011

Digital Trust Games: An Experimental Study.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Resource allocation game for wireless networks with queue stability constraints.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

Learning user preferences in mechanism design.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

2010
A Markov Decision Process based flow assignment framework for heterogeneous network access.
Wireless Networks, 2010

A system performance approach to OSNR optimization in optical networks.
IEEE Trans. Communications, 2010

Incentive Games and Mechanisms for Risk Management
CoRR, 2010

A Unified Mechanism Design Framework for Networked Systems
CoRR, 2010

An Optimization and Control Theoretic Approach to Noncooperative Game Design
CoRR, 2010

Security Games with Decision and Observation Errors
CoRR, 2010

Distributed Rate Allocation Policies for Multi-Homed Video Streaming over Heterogeneous Access Networks
CoRR, 2010

A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Characterization of Non-Manipulable and Pareto Optimal Resource Allocation Strategies for Interference Coupled Wireless Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Malware Detection on Mobile Devices Using Distributed Machine Learning.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

A Nash Equilibrium Analysis for Interference Coupled Wireless Systems.
Proceedings of IEEE International Conference on Communications, 2010

Dynamic Control and Mitigation of Interdependent IT Security Risks.
Proceedings of IEEE International Conference on Communications, 2010

Characterization of a Class of "Convexificable" Resource Allocation Problems.
Proceedings of IEEE International Conference on Communications, 2010

Concave resource allocation problems for interference coupled wireless systems.
Proceedings of the IEEE International Conference on Acoustics, 2010

A game theoretic model for digital identity and trust in online communities.
Proceedings of the 5th ACM Symposium on Information, 2010

Integrated security risk management for IT-intensive organizations.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

Fictitious Play with Time-invariant Frequency Update for Network Security.
Proceedings of the IEEE International Conference on Control Applications, 2010

2009
Distributed Rate Allocation Policies for Multihomed Video Streaming Over Heterogeneous Access Networks.
IEEE Trans. Multimedia, 2009

Robust Rate Control for Heterogeneous Network Access in Multihomed Environments.
IEEE Trans. Mob. Comput., 2009

VANET Connectivity Analysis
CoRR, 2009

A Robust Control Framework for Malware Filtering
CoRR, 2009

Hopf bifurcation and oscillations in a communication network with heterogeneous delays.
Autom., 2009

Brief Announcement: Cloud Computing Games: Pricing Services of Large Data Centers.
Proceedings of the Distributed Computing, 23rd International Symposium, 2009

Adaptive wireless services for augmented environments.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Dynamic Resource Modeling for Heterogeneous Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2009

Security Games with Incomplete Information.
Proceedings of IEEE International Conference on Communications, 2009

Game theoretic rate control for mobile devices.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

Stochastic games for security in networks with interdependent nodes.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

Nash equilibrium design and optimization.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

Modeling dependencies in security risk management.
Proceedings of the CRiSIS 2009, 2009

A control theoretic approach to noncooperative game design.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

A distributed machine learning framework.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

2008
Power control for multicell CDMA wireless networks: A team optimization approach.
Wireless Networks, 2008

A non-equilibrium analysis and control framework for active queue management.
Autom., 2008

Effects of parameters on Nash games with OSNR target.
Proceedings of the 3rd International ICST Conference on Performance Evaluation Methodologies and Tools, 2008

A lightweight biometric signature scheme for user authentication over networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

A Decentralized Bayesian Attack Detection Algorithm for Network Security.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

The New Web: Characterizing AJAX Traffic.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

Detecting trends in social bookmarking systems using a probabilistic generative model and smoothing.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

A discrete-time parallel update algorithm for distributed learning.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Image retrieval and Web 2.0 - where can we go from here?
Proceedings of the International Conference on Image Processing, 2008

Tailoring Taxonomies for Efficient Text Categorization and Expert Finding.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008

Distributed hypothesis testing with a fusion center: The conditionally dependent case.
Proceedings of the 47th IEEE Conference on Decision and Control, 2008

A stackelberg game for pricing uplink power in wide-band cognitive radio networks.
Proceedings of the 47th IEEE Conference on Decision and Control, 2008

2007
An Optimal Flow Assignment Framework for Heterogeneous Network Access.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

A Robust Flow Control Framework for Heterogenous Network Access.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

An unsupervised hierarchical approach to document categorization.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

A stackelberg game for power control and channel allocation in cognitive radio networks.
Proceedings of the 2nd International Conference on Performance Evaluation Methodolgies and Tools, 2007

Decentralized Detector Generation in Cooperative Intrusion Detection Systems.
Proceedings of the Stabilization, 2007

An intelligent knowledge sharing system for web communities.
Proceedings of the IEEE International Conference on Systems, 2007

The "Spree" Expert Finding System.
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007

Rate allocation for multi-user video streaming over heterogenous access networks.
Proceedings of the 15th International Conference on Multimedia 2007, 2007

Towards heterogeneous network convergence: policies and middleware architecture for efficient flow assignment, rate allocation and rate control for multimedia applications.
Proceedings of the Workshop on Middleware for Next-Generation Converged Networks and Applications, 2007

A Cooperative AIS Framework for Intrusion Detection.
Proceedings of IEEE International Conference on Communications, 2007

An Efficient Ontology-Based Expert Peering System.
Proceedings of the Graph-Based Representations in Pattern Recognition, 2007

Towards 3D Internet: Why, What, and How?
Proceedings of the 2007 International Conference on Cyberworlds, 2007

A Malware Detector Placement Game for Intrusion Detection.
Proceedings of the Critical Information Infrastructures Security, 2007

An optimal control approach to malware filtering.
Proceedings of the 46th IEEE Conference on Decision and Control, 2007

Optimal and robust epidemic response for multiple networks.
Proceedings of the 46th IEEE Conference on Decision and Control, 2007

Malware Filtering for Network Security Using Weighted Optimality Measures.
Proceedings of the IEEE International Conference on Control Applications, 2007

2006
A power control game based on outage probabilities for multicell wireless data networks.
IEEE Trans. Wireless Communications, 2006

A passivity approach to game-theoretic CDMA power control.
Autom., 2006

2005
A globally stable adaptive congestion control scheme for internet-style networks with delay.
IEEE/ACM Trans. Netw., 2005

Randomized algorithms for stability and robustness analysis of high-speed communication networks.
IEEE Trans. Neural Networks, 2005

2004
A hybrid systems model for power control in multicell wireless data networks.
Perform. Evaluation, 2004

2003
A Utility-Based Congestion Control Scheme for Internet-Style Networks with Delay.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

2002
CDMA Uplink Power Control as a Noncooperative Game.
Wireless Networks, 2002


  Loading...