Viliam Lisý

Orcid: 0000-0002-1647-1507

Affiliations:
  • CTU in Prague
  • University of Alberta


According to our database1, Viliam Lisý authored at least 81 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Look-ahead Search on Top of Policy Networks in Imperfect Information Games.
CoRR, 2023

Generation of Games for Opponent Model Differentiation.
CoRR, 2023

Value functions for depth-limited solving in zero-sum imperfect-information games.
Artif. Intell., 2023

Rethinking Formal Models of Partially Observable Multiagent Decision Making (Extended Abstract).
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
JsonGrinder.jl: automated differentiable neural architecture for embedding arbitrary JSON data.
J. Mach. Learn. Res., 2022

Avast-CTU Public CAPE Dataset.
CoRR, 2022

Explaining Classifiers Trained on Raw Hierarchical Multiple-Instance Data.
CoRR, 2022

Rethinking formal models of partially observable multiagent decision making.
Artif. Intell., 2022

2021
Continual Depth-limited Responses for Computing Counter-strategies in Extensive-form Games.
CoRR, 2021

Fast Algorithms for Poker Require Modelling it as a Sequential Bayesian Game.
CoRR, 2021

Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations.
CoRR, 2021

Mill.jl and JsonGrinder.jl: automated differentiable feature extraction for learning from raw JSON data.
CoRR, 2021

Multi-agent Reinforcement Learning in OpenSpiel: A Reproduction Report.
CoRR, 2021

Complexity and Algorithms for Exploiting Quantal Opponents in Large Two-Player Games.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Computing Quantal Stackelberg Equilibrium in Extensive-Form Games.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Analysis of Hannan consistent selection for Monte Carlo tree search in simultaneous move games.
Mach. Learn., 2020

Classification with costly features as a sequential decision-making problem.
Mach. Learn., 2020

Symbolic Relational Deep Reinforcement Learning based on Graph Neural Networks.
CoRR, 2020

Automated construction of bounded-loss imperfect-recall abstractions in extensive-form games.
Artif. Intell., 2020

Dinkelbach-Type Algorithm for Computing Quantal Stackelberg Equilibrium.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Automated Construction of Bounded-Loss Imperfect-Recall Abstractions in Extensive-Form Games (Extended Abstract).
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
Deep Reinforcement Learning with Explicitly Represented Knowledge and Variable State and Action Spaces.
CoRR, 2019

Value Functions for Depth-Limited Solving in Zero-Sum Imperfect-Information Games.
CoRR, 2019

Problems with the EFG formalism: a solution attempt using observations.
CoRR, 2019

Hardening networks against strategic attackers using attack graph games.
Comput. Secur., 2019

Monte Carlo Continual Resolving for Online Strategy Computation in Imperfect Information Games.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Classification with Costly Features Using Deep Reinforcement Learning.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication.
Secur. Commun. Networks, 2018

Approximating maxmin strategies in imperfect recall games using A-loss recall property.
Int. J. Approx. Reason., 2018

Constructing Imperfect Recall Abstractions to Solve Large Extensive-Form Games.
CoRR, 2018

2017
DeepStack: Expert-Level Artificial Intelligence in No-Limit Poker.
CoRR, 2017

Reports of the Workshops of the Thirty-First AAAI Conference on Artificial Intelligence.
AI Mag., 2017

An Algorithm for Constructing and Solving Imperfect Recall Abstractions of Large Extensive-Form Games.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Economically Optimal Variable Tag Length Message Authentication.
Proceedings of the Financial Cryptography and Data Security, 2017

Path Hopping: an MTD Strategy for Quantum-safe Communication.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

Eqilibrium Approximation Quality of Current No-Limit Poker Bots.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Case Studies of Network Defense with Attack Graph Games.
IEEE Intell. Syst., 2016

Reports of the 2016 AAAI Workshop Program.
AI Mag., 2016

Algorithms for computing strategies in two-player simultaneous move games.
Artif. Intell., 2016

Monte Carlo Tree Search in Continuous Action Spaces with Execution Uncertainty.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Counterfactual Regret Minimization in Sequential Security Games.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Optimal Network Security Hardening Using Attack Graph Games.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Combining Online Learning and Equilibrium Computation in Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Approximate Solutions for Attack Graph Games with Imperfect Information.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Online Monte Carlo Counterfactual Regret Minimization for Search in Imperfect Information Games.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

2014
An Exact Double-Oracle Algorithm for Zero-Sum Extensive-Form Games with Imperfect Information.
J. Artif. Intell. Res., 2014

Computing Optimal Policies for Attack Graphs with Action Failures and Costs.
Proceedings of the STAIRS 2014, 2014

Randomized Operating Point Selection in Adversarial Classification.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2014

Online Learning Methods for Border Patrol Resource Allocation.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Practical Performance of Refinements of Nash Equilibria in Extensive-Form Zero-Sum Games.
Proceedings of the ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic, 2014

2013
Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2013

Convergence of Monte Carlo Tree Search in Simultaneous Move Games.
Proceedings of the Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013

Monte Carlo Tree Search in Simultaneous Move Games with Applications to Goofspiel.
Proceedings of the Computer Games - Workshop on Computer Games, 2013

Using Double-Oracle Method and Serialized Alpha-Beta Search for Pruning in Simultaneous Move Games.
Proceedings of the IJCAI 2013, 2013

Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
Game Theoretic Model of Strategic Honeypot Selection in Computer Networks.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Game-theoretic Approach to Adversarial Plan Recognition.
Proceedings of the ECAI 2012, 2012

Iterative Algorithm for Solving Two-player Zero-sum Extensive-form Games with Imperfect Information.
Proceedings of the ECAI 2012, 2012

Tactical operations of multi-robot teams in urban warfare (demonstration).
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Anytime algorithms for multi-agent visibility-based pursuit-evasion games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Extending Security Games to Defenders with Constrained Mobility.
Proceedings of the Game Theory for Security, 2012

2011
Towards Cooperation in Adversarial Search with Confidentiality.
Proceedings of the Holonic and Multi-Agent Systems for Manufacturing, 2011

Iterative game-theoretic route selection for hostile area transit and patrolling.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Computing time-dependent policies for patrolling games with mobile targets.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

2010
Agent subset adversarial search for complex non-cooperative domains.
Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games, 2010

Deception in networks of mobile sensing agents.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Adversarial planning for large multi-agent simulations.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

2009
Goal-Based Game Tree Search for Complex Domains.
Proceedings of the Agents and Artificial Intelligence - International Conference, 2009

Goal-based Adversarial Search - Searching Game Trees in Complex Domains using Goal-based Heuristic.
Proceedings of the ICAART 2009 - Proceedings of the International Conference on Agents and Artificial Intelligence, Porto, Portugal, January 19, 2009

Biosignals as an Advanced Man-Machine Interface.
Proceedings of the Second International Conference on Health Informatics, 2009

Affective Man-Machine Interface: Unveiling Human Emotions through Biosignals.
Proceedings of the Biomedical Engineering Systems and Technologies, 2009

Adversarial search with procedural knowledge heuristic.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Towards Cooperative Predictive Data Mining in Competitive Environments.
Proceedings of the Agents and Data Mining Interaction, 4th International Workshop, 2009

2008
Utility-based model for classifying adversarial behaviour in multi-agent systems.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

2007
Unconstrained Influence Diagram Solver: Guido.
Proceedings of the 19th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2007), 2007


  Loading...