Christopher Griffin

According to our database1, Christopher Griffin authored at least 78 papers between 2000 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Unsupervised Machine Learning of Open Source Russian Twitter Data Reveals Global Scope and Operational Characteristics.
CoRR, 2018

Combating Behavioral Deviance via User Behavior Control.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

2017
Positive and negative behavioral analysis in social networks.
Wiley Interdiscip. Rev. Data Min. Knowl. Discov., 2017

Optimal digital product maintenance with a continuous revenue stream.
Oper. Res. Lett., 2017

Control Problems with Vanishing Lie Bracket Arising from Complete Odd Circulant Evolutionary Games.
CoRR, 2017

Increasing Peer Pressure on any Connected Graph Leads to Consensus.
CoRR, 2017

Consensus on Social Graphs under Increasing Peer Pressure.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
Optimal Decision-Making in an Opportunistic Sensing Problem.
IEEE Trans. Cybernetics, 2016

A hybrid epidemic model for deindividuation and antinormative behavior in online social networks.
Social Netw. Analys. Mining, 2016

An In-Depth Study of Peer Influence on Collective Decision Making for Multi-party Access Control (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Content-Driven Detection of Cyberbullying on the Instagram Social Network.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Invited Paper: A Model of Paradoxical Privacy Behavior in Online Users.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Little Data, Big Stories: Taking the Pulse of Large-Scaled Events on Twitter.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Constrained Social-Energy Minimization for Multi-Party Sharing in Online Social Networks.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Deriving an optimally deceptive policy in two-player iterated games.
Proceedings of the 2016 American Control Conference, 2016

2015
Optimizing cluster formation in super-peer networks via local incentive design.
Peer-to-Peer Networking and Applications, 2015

Computational Complexity of the Minimum State Probabilistic Finite State Learning Problem on Finite Data Sets.
CoRR, 2015

An evolutionary game model for the spread of non-cooperative behavior in online social networks.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Roaming charges for customers of cellular-wireless entrant providers.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Determining a Discrete Set of Site-Constrained Privacy Options for Users in Social Networks Through Stackelberg Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Epidemic Behavior of Negative Users in Online Social Sites.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Identification and characterization of cyberbullying dynamics in an online social network.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

A Hybrid Epidemic Model for Antinormative Behavior in Online Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Why and how to deceive: game results with sociological evidence.
Social Netw. Analys. Mining, 2014

Generation bidding game with flexible demand.
CoRR, 2014

A cooperate-defect model for the spread of deviant behavior in social networks.
CoRR, 2014

Roaming charges for customers of cellular-wireless entrant and incumbent providers.
CoRR, 2014

A Bidding Game for Generators in the Presence of Flexible Demand.
Proceedings of the 9th International Workshop on Feedback Computing, 2014

Behavior in a shared resource game with cooperative, greedy, and vigilante players.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

2013
Inferring Statistically Significant Hidden Markov Models.
IEEE Trans. Knowl. Data Eng., 2013

A Normalized Statistical Metric Space for Hidden Markov Models.
IEEE Trans. Cybernetics, 2013

Distributed medium access control with conditionally altruistic users.
EURASIP J. Wireless Comm. and Networking, 2013

Modeling and Control of Rare Segments in BitTorrent with Epidemic Dynamics.
CoRR, 2013

Good Behavior in a Communications System with Cooperative, Greedy, and Vigilante Players.
CoRR, 2013

Impact of a Non-linear Pay-Off Function on Pairwise Stable Collaborative Oligopolies.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Research in progress: Understanding how emergency managers evaluate crowdsourced data: A trust game-based approach.
Proceedings of the 10th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2013

2012
Two Species Evolutionary Game Model of User and Moderator Dynamics
CoRR, 2012

Game Theoretic Formation of a Centrality Based Network
CoRR, 2012

An Informed Model of Personal Information Release in Social Networking Sites
CoRR, 2012

CSMA Local Area Networking under Dynamic Altruism
CoRR, 2012

Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

A Framework for Modeling Decision Making and Deception with Semantic Information.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Game Theoretic Formation of a Centrality Based Network.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

Two Species Evolutionary Game Model of User and Moderator Dynamics.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

An Informed Model of Personal Information Release in Social Networking Sites.
Proceedings of the 2012 International Conference on Privacy, 2012

Distributed Medium Access Control with Dynamic Altruism.
Proceedings of the Ad Hoc Networks - 4th International ICST Conference, 2012

2011
Methods to Window Data to Differentiate Between Markov Models.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2011

An Algorithm for Constructing and Searching Spaces of Alternative Hypotheses.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2011

On Bandwidth-Limited Sum-of-Games Problems.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2011

A Hybrid Statistical Technique for Modeling Recurrent Tracks in a Compact Set.
IEEE Trans. Automat. Contr., 2011

Calculating the Price of Anarchy for Network Formation Games
CoRR, 2011

Collaborative Network Formation in Spatial Oligopolies
CoRR, 2011

Link Biased Strategies in Network Formation Games
CoRR, 2011

A Game Theoretic Perspective on Network Topologies
CoRR, 2011

Side-Channel Analysis for Detecting Protocol Tunneling.
Adv. Internet of Things, 2011

Towards a Game Theoretical Model for Identity Validation in Social Network Sites.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Link Bias in Network Formation Games.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Noise tolerant symbolic learning of Markov models of tunneled protocols.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

An Epidemic Model of Bit Torrent with Control.
Proceedings of IEEE International Conference on Communications, 2011

Hard sensor fusion for COIN inspired situation awareness.
Proceedings of the 14th International Conference on Information Fusion, 2011

Iterative partitioning scheme for distributed simulation of dynamic networks.
Proceedings of the 16th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2011

2009
Behavior Detection Using Confidence Intervals of Hidden Markov Models.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2009

Markovian Search Games in Heterogeneous Spaces.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2009

Zero knowledge hidden Markov model inference.
Pattern Recognition Letters, 2009

A sybil-proof referral system based on multiplicative reputation chains.
IEEE Communications Letters, 2009

2008
Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2008

A Note on the Properties of the Supremal Controllable Sublanguage in Pushdown Systems.
IEEE Trans. Automat. Contr., 2008

2006
A note on the spread of worms in scale-free networks.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2006

A note on deciding controllability in pushdown systems.
IEEE Trans. Automat. Contr., 2006

Verification of Secure Network Protocols in Uncertain Environments.
IJWIN, 2006

2005
Space-time Coordinated Distributed Sensing Algorithms for Resource Efficient Narrowband Target Localization and Tracking.
IJDSN, 2005

State Space Approach to Security Quantification.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
A cellular automata model can quickly approximate UDP and TCP network traffic.
Complexity, 2004

A Finite Model Theory for Biological Hypotheses.
Proceedings of the 3rd International IEEE Computer Society Computational Systems Bioinformatics Conference, 2004

2003
Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network.
EURASIP J. Adv. Sig. Proc., 2003

2002
Self-Organized Distributed Sensor Network Entity Tracking.
IJHPCA, 2002

Traffic Model Evaluation of Ad Hoc Target Tracking Algorithms.
IJHPCA, 2002

2000
Reactive Sensor Networks.
Proceedings of the Distributed Autonomous Robotic Systems 4, 2000


  Loading...