State Transition Model

Unleashing the Power of LLM to Infer State Machine from the Protocol Implementation

Authors: Haiyang Wei, Ligeng Chen, Zhengjie Du, Yuhan Wu, Haohui Huang, Yue Liu, Guang Cheng, Fengyuan Xu, Linzhang Wang, Bing Mao | Published: 2024-05-01 | Updated: 2025-03-27
LLM Performance Evaluation
Prompt Injection
State Transition Model

Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems

Authors: Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari | Published: 2020-03-17 | Updated: 2021-08-26
Training Method
State Transition Model
Vulnerability Attack Method

Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach

Authors: Mehmet Necip Kurt, Oyetunji Ogundijo, Chong Li, Xiaodong Wang | Published: 2018-09-14
POMDP Problem
Online Learning
State Transition Model

Architectures for Detecting Interleaved Multi-stage Network Attacks Using Hidden Markov Models

Authors: Tawfeeq Shawly, Ali Elghariani, Jason Kobes, Arif Ghafoor | Published: 2018-07-25 | Updated: 2019-10-30
Markov Model
Attack Scenario Analysis
State Transition Model

Time Series Deinterleaving of DNS Traffic

Authors: Amir Asiaee, Hardik Goel, Shalini Ghosh, Vinod Yegneswaran, Arindam Banerjee | Published: 2018-07-16
Markov Model
Time Series Analysis
State Transition Model