Juntao Chen

Juntao Chen
Fordham University · Department of Computer and Information Sciences

Doctor of Philosophy

About

75
Publications
6,356
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,131
Citations
Introduction
Juntao Chen is an assistant professor at Fordham University. He received his PhD degree in Electrical Engineering from New York University. His current research interests include Cyber-Physical Systems, Security and Resilience, Dynamic Decision-Making over Networks, Mechanism Design, and Artificial Intelligence.

Publications

Publications (75)
Preprint
Despite advancements, current quantum hardware faces significant challenges, including limited qubit counts and high susceptibility to noise, which hinder the execution of large, complex algorithms. To address these limitations, multi-node quantum systems and quantum circuit cutting techniques partition large circuits into smaller subcircuits that...
Preprint
The escalating threat of phishing emails has become increasingly sophisticated with the rise of Large Language Models (LLMs). As attackers exploit LLMs to craft more convincing and evasive phishing emails, it is crucial to assess the resilience of current phishing defenses. In this study we conduct a comprehensive evaluation of traditional phishing...
Preprint
Full-text available
Optimal transport is a powerful framework for the efficient allocation of resources between sources and targets. However, traditional models often struggle to scale effectively in the presence of large and heterogeneous populations. In this work, we introduce a discrete optimal transport framework designed to handle large-scale, heterogeneous targe...
Preprint
Full-text available
Mean field control provides a robust framework for coordinating large-scale populations with complex interactions and has wide applications across diverse fields. However, the inherent nonlinearity and the presence of unknown system dynamics pose significant challenges for developing effective analytic or numerical solutions. There is a pressing ne...
Article
The wide adoption of the Internet of Things (IoT)-enabled energy devices improves the quality of life, but simultaneously, it enlarges the attack surface of the power grid system. The adversary can gain illegitimate control of a large number of these devices and use them as a means to compromise the physical grid operation, a mechanism known as the...
Article
Full-text available
The security in networked systems depends greatly on recognizing and identifying adversarial behaviors. Traditional detection methods focus on specific categories of attacks and have become inadequate for increasingly stealthy and deceptive attacks that are designed to bypass detection strategically. This work aims to develop a holistic theory to c...
Article
The massive deployment of Internet of Things (IoT) devices, including sensors and actuators, is ushering in smart and connected communities of the future. The massive deployment of IoT devices, including sensors and actuators, is ushering in smart and connected communities of the future. The availability of real-time and high-quality sensor data is...
Chapter
Due to the increasing adoption of smart and Internet of things (IoT) devices, Wind Energy System (WES) becomes more vulnerable to cyber- and physical-attacks. Therefore, designing a secure and resilient WES is critical. In this chapter, we first propose a System-of-Systems (SoS) framework for the cyber-physical WES. Specifically, on the one hand, w...
Article
Due to the increasing adoption of smart sensing and Internet of things (IoT) devices, wind energy system (WES) becomes more vulnerable to cyber and physical attacks. Therefore, designing a secure and resilient WES is critical. This paper first proposes a system-of-systems (SoS) framework for the cyber-physical WES. Specifically, on the one hand, we...
Article
Full-text available
The emerging Internet of Things (IoT) applications that leverage ubiquitous connectivity and big data are facilitating the realization of smart everything initiatives. IoT-enabled infrastructures have naturally a multi-layer system architecture with an overlaid or underlaid device network and its coexisting infrastructure network. The connectivity...
Preprint
Full-text available
The emerging Internet of Things (IoT) applications that leverage ubiquitous connectivity and big data are facilitating the realization of smart everything initiatives. IoT-enabled infrastructures have naturally a multi-layer system architecture with an overlaid or underlaid device network and its coexisting infrastructure network. The connectivity...
Article
Full-text available
The interconnectivity of cyber and physical systems and Internet of things has created ubiquitous concerns of cyber threats for enterprise system managers. It is common that the asset owners and enterprise network operators need to work with cybersecurity professionals to manage the risk by remunerating them for their efforts that are not directly...
Preprint
Full-text available
Renewable energy-based microgrids play a critical role in future smart grids. Due to the uncertainties of renewable generations, the microgrids face potential risk of load shedding during operation. To address this problem, we propose a contract-based approach to enhance the resilience of microgrids. Specifically, in the framework, the microgrids w...
Preprint
Full-text available
In this paper, we consider a linear-quadratic-Gaussian defending assets differential game (DADG) where the attacker and the defender do not know each other's state information while they know the trajectory of a moving asset. Both players can choose to observe the other player's state information by paying a cost. The defender and the attacker have...
Article
Full-text available
Optimal curing strategy of suppressing competing epidemics spreading over complex networks is a critical issue. In this paper, we first establish a framework to capture the coupling between two epidemics, and then analyze the system's equilibrium states by categorizing them into three classes, and deriving their stability conditions. The designed c...
Chapter
Zero-sum games have been used to model cybersecurity scenarios between an attacker and a defender. However, unknown and uncertain environments have made it difficult to rely on a prescribed zero-sum game to capture the interactions between the players. In this work, we aim to estimate and recover an unknown matrix game that encodes the uncertaintie...
Preprint
Full-text available
Optimal quarantining strategy of suppressing interdependent epidemics spreading over complex networks is a critical issue. In this paper, we first establish a framework to capture the coupling between two epidemics, and then analyze the system's equilibrium states by categorizing them into three classes, and deriving their stability conditions. The...
Preprint
Full-text available
Network games have been instrumental in understanding strategic behaviors over networks for applications such as critical infrastructure networks, social networks, and cyber-physical systems. One critical challenge of network games is that the behaviors of the players are constrained by the underlying physical laws or safety rules, and the players...
Article
Full-text available
Modern control systems are featured by their hierarchical structure composed of cyber, physical and human layers. The intricate dependencies among multiple layers and units of modern control systems require an integrated framework to address cross-layer design issues related to security and resilience challenges. To this end, game theory provides a...
Article
In this paper, we study the stabilization of two interdependent Markov jump linear systems (MJLSs) with partial information, where the interdependency arises as the transition of the mode of one system depends on the states of the other system. First, we formulate a framework for the two interdependent MJLSs to capture the interactions between vari...
Preprint
Full-text available
In this paper, we study the stabilization of a class of state interdependent Markov jump linear systems (MJLS) with partial information. First, we formulate a framework for the interdependent multiple MJLSs to capture the interactions between various entities in the system, where the modes of the system cannot be observed directly. Instead, a signa...
Chapter
This chapter briefly presents the basics of game theory and network science which lay theoretical foundations of the book.
Chapter
In this chapter, we provide meta-network modeling and investigate both static and dynamic network resilience games. We leverage the established network-of-networks model and study the decentralized decision-makings of players that control the agents at each layer of networks. Furthermore, we provide a tractable problem formulation of which the opti...
Chapter
This book has investigated the resilient design and analysis of interdependent networks using game and decision theoretic approaches. To address the distinct challenges arising from interdependencies, theoretical frameworks on the network-of-networks have been established which facilitates a holistic design of interdependent networks. The book has...
Chapter
When the number of agents grows and becomes enormous, e.g., social network and the Internet, the finite network modeling capturing the explicit interactions between agents is inefficient and prohibitive. To this end, this chapter investigates decision-making on complex networks by proposing a new type of system framework. The focus of this chapter...
Chapter
Full-text available
In this chapter, we adopt the established model of network-of-networks to design optimal secure interdependent IoT-enabled infrastructures. IoT networks are vulnerable to cyber attacks which result in link removals. We develop a heterogeneous IoT network design framework in which a network designer can add links to provide additional communication...
Book
This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29...
Article
Multiple heterogeneous mobile autonomous system (MAS) networks can be integrated together as a multi-layer MAS network to offer holistic services. The network connectivity of multi-layer MAS plays an important role in the information exchange between agents within and across different layers of the network. In this paper, we establish a games-in-ga...
Preprint
Full-text available
Mobile autonomous system (MAS) becomes pervasive especially in the vehicular and robotic networks. Multiple heterogeneous MAS networks can be integrated together as a multi-layer MAS network to offer holistic services. The network connectivity of multi-layer MAS plays an important role in the information exchange between agents within and across di...
Preprint
Full-text available
Modern control systems are featured by their hierarchical structure composing of cyber, physical, and human layers. The intricate dependencies among multiple layers and units of modern control systems require an integrated framework to address cross-layer design issues related to security and resilience challenges. To this end, game theory provides...
Preprint
Full-text available
The interconnectivity of cyber and physical systems and Internet of things has created ubiquitous concerns of cyber threats for enterprise system managers. It is common that the asset owners and enterprise network operators need to work with cybersecurity professionals to manage the risk by remunerating them for their efforts that are not directly...
Article
Full-text available
Infrastructure networks are vulnerable to both cyber and physical attacks. Building a secure and resilient networked system is essential for providing reliable and dependable services. To this end, we establish a two-player three-stage game framework to capture the dynamics in the infrastructure protection and recovery phases. Specifically, the goa...
Preprint
Full-text available
Infrastructure networks are vulnerable to both cyber and physical attacks. Building a secure and resilient networked system is essential for providing reliable and dependable services. To this end, we establish a two-player three-stage game framework to capture the dynamics in the infrastructure protection and recovery phases. Specifically, the goa...
Preprint
Full-text available
This paper presents a games-in-games approach to provide design guidelines for mosaic command and control that enables the secure and resilient multi-domain operations. Under the mosaic design, pieces or agents in the network are equipped with flexible interoperability and the capability of self-adaptability, self-healing, and resiliency so that th...
Preprint
Full-text available
With the increasing connectivity enabled by the Internet of Things (IoT), security becomes a critical concern, and the users should invest to secure their IoT applications. Due to the massive devices in the IoT network, users cannot be aware of the security policies taken by all its connected neighbors. Instead, a user makes security decisions base...
Article
With the increasing connectivity enabled by the Internet of Things (IoT), security becomes a critical concern, and the users should invest to secure their IoT applications. Due to the massive devices in the IoT network, users cannot be aware of the security policies taken by all its connected neighbors. Instead, a user makes security decisions base...
Article
Full-text available
The cloud-enabled Internet of controlled things (IoCT) envisions a network of sensors, controllers, and actuators connected through a local cloud in order to intelligently control physical devices. Because cloud services are vulnerable to advanced persistent threats (APTs), each device in the IoCT must strategically decide whether to trust cloud se...
Preprint
Full-text available
The complex interconnections between heterogeneous critical infrastructure sectors make the system of systems (SoS) vulnerable to natural or human-made disasters and lead to cascading failures both within and across sectors. Hence, the robustness and resilience of the interdependent critical infrastructures (ICIs) against extreme events are essenti...
Chapter
Full-text available
With the integration of modern information and communication technologies (ICTs) into critical infrastructures (CIs) such as 5G networks and the Internet of Things (IoTs), the CIs are becoming vulnerable to cyber threats at the same time improving its connectivity and functionalities. Hence it is essential to understand the risk of ICTs on CIs holi...
Preprint
Full-text available
The cloud-enabled Internet of controlled things (IoCT) envisions a network of sensors, controllers, and actuators connected through a local cloud in order to intelligently control physical devices. Because cloud services are vulnerable to advanced persistent threats (APTs), each device in the IoCT must strategically decide whether to trust cloud se...
Conference Paper
Full-text available
The integration of modern information and communication technologies (ICTs) into critical infrastructures (CIs) improves its con- nectivity and functionalities yet also brings cyber threats. It is thus es- sential to understand the risk of ICTs on CIs holistically as a cyber- physical system and design efficient security hardening mechanisms. To th...
Article
Full-text available
Optimal control of interdependent epidemics spreading over complex networks is a critical issue. We first establish a framework to capture the coupling between two epidemics, and then analyze the system's equilibrium states by categorizing them into three classes, and deriving their stability conditions. The designed control strategy globally optim...
Article
Full-text available
Infrastructure networks are vulnerable to both cyber and physical attacks. Building a secure and resilient networked system is essential for providing reliable and dependable services. To this end, we establish a two-player three-stage game framework to capture the dynamics in the infrastructure protection and recovery phases. Specifically, the goa...
Article
Full-text available
With the remarkable growth of the Internet and communication technologies over the past few decades, Internet of Things (IoTs) is enabling the ubiquitous connectivity of heterogeneous physical devices with software, sensors, and actuators. IoT networks are naturally multi-layer with the cloud and cellular networks coexisting with the underlaid devi...
Preprint
Infrastructure networks are vulnerable to both cyber and physical attacks. Building a secure and resilient networked system is essential for providing reliable and dependable services. To this end, we establish a two-player three-stage game framework to capture the dynamics in the infrastructure protection and recovery phases. Specifically, the goa...
Preprint
With the remarkable growth of the Internet and communication technologies over the past few decades, Internet of Things (IoTs) is enabling the ubiquitous connectivity of heterogeneous physical devices with software, sensors, and actuators. IoT networks are naturally two-layer with the cloud and cellular networks coexisting with the underlaid device...
Article
Full-text available
In this paper, we aim to establish a holistic framework that integrates the cyber-physical layers of a cloud-enabled Internet of Controlled Things (IoCT) through the lens of contract theory. At the physical layer, the device uses cloud services to operate the system. The quality of cloud services is unknown to the device, and hence the device desig...
Conference Paper
Peak time water demands cause significant burden to the utility providers in terms of pumping loads. Its coincidence with the peak hours of electricity consumption makes the situation worse. In this paper, we bring forth the requirement as well as the viability of implementing time-varying tariffs in the 'smart water systems'.We present the problem...
Conference Paper
Full-text available
Enhancing the security and resilience of interdependent infrastructures is crucial. In this paper, we establish a theoretical framework based on Markov decision processes (MDPs) to design optimal resiliency mechanisms for interdependent infrastructures. We use MDPs to capture the dynamics of the failure of constituent components of an infrastructur...
Conference Paper
Full-text available
Network connectivity plays an important role in the information exchange between different agents in the multi-level networks. In this paper, we establish a game-theoretic framework to capture the uncoordinated nature of the decision making at different layers of the multi-level networks. To study the network resiliency, we introduce two adversaria...
Conference Paper
Full-text available
The development of advanced wireless communication technologies and smart embedded control devices makes everything connected, leading to an emerging paradigm of the Internet of Controlled Things (IoCT). IoCT consists of two layers of systems: cyber layer and physical layer. This work aims to establish a holistic framework that integrates the cyber...
Article
Full-text available
The pursuit of sustainability motivates microgrids that depend on distributed resources to produce more renewable energies. An efficient operation and planning relies on a holistic framework that takes into account the interdependent decision-making of the generators of the existing power grids and the distributed resources of the microgrid in the...
Article
Full-text available
The integration of microgrids that depend on the renewable distributed energy resources with the current power systems is a critical issue in the smart grid. In this paper, we propose a non-cooperative game-theoretic framework to study the strategic behavior of distributed microgrids that generate renewable energies and characterize the power gener...
Conference Paper
Wind turbines can fail during the operation due to various types of faults. Thus, one of the key problems in wind energy systems is the resilient control to achieve their high reliability. To reach this goal, we first model the wind turbine as a Markov jump linear system based on its operating conditions, and then design a resilient controller that...
Conference Paper
Wind turbines play an important role in producing clean energy and reducing pollution, but they can fail during the operation due to various types of faults and environment uncertainties. Therefore, one of the key problems in wind energy systems is the resilient control to achieve their high reliability. To reach this goal, we first design a resili...
Conference Paper
Full-text available
Designing optimal interdependent networks is important for the robustness and efficiency of national critical infrastructures. Here, we establish a two-person game-theoretic model in which two network designers choose to maximize the global connectivity independently. This framework enables decentralized network design by using iterative algorithms...

Network

Cited By