Viliam Lisý

According to our database1, Viliam Lisý authored at least 51 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Monte Carlo Continual Resolving for Online Strategy Computation in Imperfect Information Games.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication.
Security and Communication Networks, 2018

Approximating maxmin strategies in imperfect recall games using A-loss recall property.
Int. J. Approx. Reasoning, 2018

2017
Reports of the Workshops of the Thirty-First AAAI Conference on Artificial Intelligence.
AI Magazine, 2017

An Algorithm for Constructing and Solving Imperfect Recall Abstractions of Large Extensive-Form Games.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Economically Optimal Variable Tag Length Message Authentication.
Proceedings of the Financial Cryptography and Data Security, 2017

Path Hopping: an MTD Strategy for Quantum-safe Communication.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

Eqilibrium Approximation Quality of Current No-Limit Poker Bots.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Case Studies of Network Defense with Attack Graph Games.
IEEE Intelligent Systems, 2016

Reports of the 2016 AAAI Workshop Program.
AI Magazine, 2016

Algorithms for computing strategies in two-player simultaneous move games.
Artif. Intell., 2016

Monte Carlo Tree Search in Continuous Action Spaces with Execution Uncertainty.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Counterfactual Regret Minimization in Sequential Security Games.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Optimal Network Security Hardening Using Attack Graph Games.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Combining Online Learning and Equilibrium Computation in Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Approximate Solutions for Attack Graph Games with Imperfect Information.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Online Monte Carlo Counterfactual Regret Minimization for Search in Imperfect Information Games.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

2014
An Exact Double-Oracle Algorithm for Zero-Sum Extensive-Form Games with Imperfect Information.
J. Artif. Intell. Res., 2014

Computing Optimal Policies for Attack Graphs with Action Failures and Costs.
Proceedings of the STAIRS 2014, 2014

Randomized Operating Point Selection in Adversarial Classification.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2014

Online Learning Methods for Border Patrol Resource Allocation.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Practical Performance of Refinements of Nash Equilibria in Extensive-Form Zero-Sum Games.
Proceedings of the ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic, 2014

2013
Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2013

Convergence of Monte Carlo Tree Search in Simultaneous Move Games.
Proceedings of the Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013

Monte Carlo Tree Search in Simultaneous Move Games with Applications to Goofspiel.
Proceedings of the Computer Games - Workshop on Computer Games, 2013

Using Double-Oracle Method and Serialized Alpha-Beta Search for Pruning in Simultaneous Move Games.
Proceedings of the IJCAI 2013, 2013

Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
Game Theoretic Model of Strategic Honeypot Selection in Computer Networks.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Game-theoretic Approach to Adversarial Plan Recognition.
Proceedings of the ECAI 2012, 2012

Iterative Algorithm for Solving Two-player Zero-sum Extensive-form Games with Imperfect Information.
Proceedings of the ECAI 2012, 2012

Tactical operations of multi-robot teams in urban warfare (demonstration).
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Anytime algorithms for multi-agent visibility-based pursuit-evasion games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Extending Security Games to Defenders with Constrained Mobility.
Proceedings of the Game Theory for Security, 2012

2011
Towards Cooperation in Adversarial Search with Confidentiality.
Proceedings of the Holonic and Multi-Agent Systems for Manufacturing, 2011

Iterative game-theoretic route selection for hostile area transit and patrolling.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Computing time-dependent policies for patrolling games with mobile targets.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

2010
Agent subset adversarial search for complex non-cooperative domains.
Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games, 2010

Deception in networks of mobile sensing agents.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Adversarial planning for large multi-agent simulations.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

2009
Goal-Based Game Tree Search for Complex Domains.
Proceedings of the Agents and Artificial Intelligence - International Conference, 2009

Goal-based Adversarial Search - Searching Game Trees in Complex Domains using Goal-based Heuristic.
Proceedings of the ICAART 2009 - Proceedings of the International Conference on Agents and Artificial Intelligence, Porto, Portugal, January 19, 2009

Biosignals as an Advanced Man-Machine Interface.
Proceedings of the Second International Conference on Health Informatics, 2009

Affective Man-Machine Interface: Unveiling Human Emotions through Biosignals.
Proceedings of the Biomedical Engineering Systems and Technologies, 2009

Adversarial search with procedural knowledge heuristic.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Towards Cooperative Predictive Data Mining in Competitive Environments.
Proceedings of the Agents and Data Mining Interaction, 4th International Workshop, 2009

2008
Utility-based model for classifying adversarial behaviour in multi-agent systems.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

2007
Unconstrained Influence Diagram Solver: Guido.
Proceedings of the 19th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2007), 2007


  Loading...