Arunesh Sinha

Orcid: 0000-0002-3594-3848

Affiliations:
  • Rutgers University, NJ, USA
  • Singapore Management University, Singapore (former)
  • University of Southern California, CA, USA (former)


According to our database1, Arunesh Sinha authored at least 87 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Handling Long and Richly Constrained Tasks through Constrained Hierarchical Reinforcement Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Conditioning Hierarchical Reinforcement Learning on Flexible Constraints.
CoRR, 2023

Tackling Stackelberg Network Interdiction against a Boundedly Rational Adversary.
CoRR, 2023

Generative Modelling of Stochastic Actions with Arbitrary Constraints in Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Building a Personalized Messaging System for Health Intervention in Underprivileged Regions Using Reinforcement Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Beyond NaN: Resiliency of Optimization Layers in the Face of Infeasibility.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Behavioral Learning in Security Games: Threat of Multi-Step Manipulative Attacks.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Securing Lifelines: Safe Delivery of Critical Services in Areas with Volatile Security Situation via a Stackelberg Game Approach.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

A Fair Incentive Scheme for Community Health Workers.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Mind Your Data! Hiding Backdoors in Offline Reinforcement Learning Datasets.
CoRR, 2022

Safe Delivery of Critical Services in Areas with Volatile Security Situation via a Stackelberg Game Approach.
CoRR, 2022

Artificial Intelligence for Cyber Security (AICS).
CoRR, 2022

The Art of Manipulation: Threat of Multi-Step Manipulative Attacks in Security Games.
CoRR, 2022

Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility.
CoRR, 2022

Scalable Distributional Robustness in a Class of Non-Convex Optimization with Guarantees.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

An Exploration of Poisoning Attacks on Data-Based Decision Making.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

Trajectory Optimization for Safe Navigation in Maritime Traffic Using Historical Data.
Proceedings of the 28th International Conference on Principles and Practice of Constraint Programming, 2022

AI and Security: A Game Perspective.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

Curiosity-Driven and Victim-Aware Adversarial Policies.
Proceedings of the Annual Computer Security Applications Conference, 2022

Choices Are Not Independent: Stackelberg Security Games with Nested Quantal Response Models.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Multiscale Generative Models: Improving Performance of a Generative Model Using Feedback from Other Dependent Generative Models.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Building Action Sets in a Deep Reinforcement Learner.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021

Countering Attacker Data Manipulation in Security Games.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Measuring Data Collection Diligence for Community Healthcare.
Proceedings of the EAAMO 2021: ACM Conference on Equity and Access in Algorithms, Mechanisms, and Optimization, Virtual Event, USA, October 5, 2021

Ship-GAN: Generative Modeling Based Maritime Traffic Simulator.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

2020
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System.
ACM Trans. Intell. Syst. Technol., 2020

Measuring Data Collection Quality for Community Healthcare.
CoRR, 2020

Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop 2020.
CoRR, 2020

AI for Social Impact: Learning and Planning in the Data-to-Deployment Pipeline.
CoRR, 2020

Artificial Intelligence for Social Impact: Learning and Planning in the Data-to-Deployment Pipeline.
AI Mag., 2020

Partial Adversarial Behavior Deception in Security Games.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Who and When to Screen: Multi-Round Active Screening for Network Recurrent Infectious Diseases Under Uncertainty.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Solving Online Threat Screening Games using Constrained Action Space Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Generating Realistic Stock Market Order Streams.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Bounding Regret in Empirical Games.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Who and When to Screen: Multi-Round Active Screening for Recurrent Infectious Diseases Under Uncertainty.
CoRR, 2019

Adversarial Contract Design for Private Data Commercialization.
Proceedings of the 2019 ACM Conference on Economics and Computation, 2019

Incentivizing Collaboration in a Competition.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Deception in Finitely Repeated Security Games.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Reports of the Workshops of the 32nd AAAI Conference on Artificial Intelligence.
AI Mag., 2018

Stackelberg Security Games: Looking Beyond a Decade of Success.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

The Price of Usability: Designing Operationalizable Strategies for Security Games.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Scaling-Up Stackelberg Security Games Applications Using Approximations.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

A Learning and Masking Approach to Secure Learning.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

SoK: Security and Privacy in Machine Learning.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Deceitful Attacks in Security Games.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Predicting poaching for wildlife Protection.
IBM J. Res. Dev., 2017

Practical Scalability for Stackelberg Security Games.
CoRR, 2017

A Learning Approach to Secure Learning.
CoRR, 2017

Reports of the Workshops of the Thirty-First AAAI Conference on Artificial Intelligence.
AI Mag., 2017

Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

10th International Workshop on Artificial Intelligence and Security (AISec 2017).
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals.
Games, 2016

Towards the Science of Security and Privacy in Machine Learning.
CoRR, 2016

Reports of the 2016 AAAI Workshop Program.
AI Mag., 2016

Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections.
Proceedings of the Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection, 2016

Addressing Behavioral Uncertainty in Security Games: An Efficient Robust Strategic Solution for Defender Patrols.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Three Strategies to Success: Learning Adversary Models in Security Games.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Get Me to My GATE on Time: Efficiently Solving General-Sum Bayesian Threat Screening Games.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

9th International Workshop on Artificial Intelligence and Security: AISec 2016.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Using Abstractions to Solve Opportunistic Crime Security Games at Scale.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Learning Adversary Behavior in Security Games: A PAC Model Perspective.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

SPECTRE: A Game Theoretic Framework for Preventing Collusion in Security Games (Demonstration).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Conquering Adversary Behavioral Uncertainty in Security Games: An Efficient Modeling Robust Based Algorithm.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Protecting Wildlife under Imperfect Observation.
Proceedings of the Computer Poker and Imperfect Information Games, 2016

One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
From physical security to cybersecurity.
J. Cybersecur., 2015

Security Games with Information Leakage: Modeling and Computation.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Incentivizing Peer Grading in MOOCS: An Audit Game Approach.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Program Actions as Actual Causes: A Building Block for Accountability.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Learning, Predicting and Planning against Crime: Demonstration Based on Real Urban Crime Data (Demonstration).
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Audit Games with Multiple Defender Resources.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Audit Games.
PhD thesis, 2014

Continuous Tamper-Proof Logging Using TPM 2.0.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

2013
Audit Games.
Proceedings of the IJCAI 2013, 2013

Adaptive Regret Minimization in Bounded-Memory Games.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

What you want is not what you get: predicting sharing policies for text-based content on facebook.
Proceedings of the AISec'13, 2013

2012
Provable De-anonymization of Large Datasets with Sparse Dimensions.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Audit Mechanisms for Provable Risk Management and Accountable Data Governance.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

2011
Audit Mechanisms for Privacy Protection in Healthcare Environments.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2009
Migrating a Web-based application to a service-based system - an experience report.
Proceedings of the 11th IEEE International Symposium on Web Systems Evolution, 2009


  Loading...