Arunesh Sinha

According to our database1, Arunesh Sinha authored at least 58 papers between 2009 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Who and When to Screen: Multi-Round Active Screening for Recurrent Infectious Diseases Under Uncertainty.
CoRR, 2019

Adversarial Contract Design for Private Data Commercialization.
Proceedings of the 2019 ACM Conference on Economics and Computation, 2019

Incentivizing Collaboration in a Competition.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Deception in Finitely Repeated Security Games.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Adversarial Contract Design for Private Data Commercialization.
CoRR, 2018

Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System.
CoRR, 2018

Stackelberg Security Games: Looking Beyond a Decade of Success.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

The Price of Usability: Designing Operationalizable Strategies for Security Games.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Scaling-Up Stackelberg Security Games Applications Using Approximations.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

A Learning and Masking Approach to Secure Learning.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

SoK: Security and Privacy in Machine Learning.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Deceitful Attacks in Security Games.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Predicting poaching for wildlife Protection.
IBM Journal of Research and Development, 2017

Practical Scalability for Stackelberg Security Games.
CoRR, 2017

A Learning Approach to Secure Learning.
CoRR, 2017

Reports of the Workshops of the Thirty-First AAAI Conference on Artificial Intelligence.
AI Magazine, 2017

Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

10th International Workshop on Artificial Intelligence and Security (AISec 2017).
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals.
Games, 2016

Towards the Science of Security and Privacy in Machine Learning.
CoRR, 2016

Reports of the 2016 AAAI Workshop Program.
AI Magazine, 2016

Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections.
Proceedings of the Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection, 2016

Addressing Behavioral Uncertainty in Security Games: An Efficient Robust Strategic Solution for Defender Patrols.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Three Strategies to Success: Learning Adversary Models in Security Games.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Get Me to My GATE on Time: Efficiently Solving General-Sum Bayesian Threat Screening Games.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

9th International Workshop on Artificial Intelligence and Security: AISec 2016.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Using Abstractions to Solve Opportunistic Crime Security Games at Scale.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Learning Adversary Behavior in Security Games: A PAC Model Perspective.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

SPECTRE: A Game Theoretic Framework for Preventing Collusion in Security Games (Demonstration).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Conquering Adversary Behavioral Uncertainty in Security Games: An Efficient Modeling Robust Based Algorithm.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Protecting Wildlife under Imperfect Observation.
Proceedings of the Computer Poker and Imperfect Information Games, 2016

One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
From physical security to cybersecurity.
J. Cybersecurity, 2015

Security Games With Information Leakage: Modeling and Computation.
CoRR, 2015

Learning Adversary Behavior in Security Games: A PAC Model Perspective.
CoRR, 2015

Program Actions as Actual Causes: A Building Block for Accountability.
CoRR, 2015

Security Games with Information Leakage: Modeling and Computation.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Incentivizing Peer Grading in MOOCS: An Audit Game Approach.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Program Actions as Actual Causes: A Building Block for Accountability.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Learning, Predicting and Planning against Crime: Demonstration Based on Real Urban Crime Data (Demonstration).
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Audit Games with Multiple Defender Resources.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Audit Games with Multiple Defender Resources.
CoRR, 2014

Continuous Tamper-Proof Logging Using TPM 2.0.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

2013
Audit Games
CoRR, 2013

Audit Games.
Proceedings of the IJCAI 2013, 2013

Adaptive Regret Minimization in Bounded-Memory Games.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

What you want is not what you get: predicting sharing policies for text-based content on facebook.
Proceedings of the AISec'13, 2013

2012
Provable De-anonymization of Large Datasets with Sparse Dimensions.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Audit Mechanisms for Provable Risk Management and Accountable Data Governance.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

2011
Adaptive Regret Minimization in Bounded-Memory Games
CoRR, 2011

Audit Mechanisms for Privacy Protection in Healthcare Environments.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2009
Migrating a Web-based application to a service-based system - an experience report.
Proceedings of the 11th IEEE International Symposium on Web Systems Evolution, 2009


  Loading...