Yevgeniy Vorobeychik

According to our database1, Yevgeniy Vorobeychik authored at least 185 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Database Audit Workload Prioritization via Game Theory.
ACM Trans. Priv. Secur., 2019

A method for analyzing inpatient care variability through physicians' orders.
Journal of Biomedical Informatics, 2019

The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models.
CoRR, 2019

Path Planning Games.
CoRR, 2019

Attacking Vision-based Perception in End-to-End Autonomous Driving Models.
CoRR, 2019

Defending Against Physically Realizable Attacks on Image Classification.
CoRR, 2019

Adversarial Robustness of Similarity-Based Link Prediction.
CoRR, 2019

Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning.
CoRR, 2019

To Warn or Not to Warn: Online Signaling in Audit Games.
CoRR, 2019

Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models.
CoRR, 2019

An Online Decision-Theoretic Pipeline for Responder Dispatch.
CoRR, 2019

Distributionally Robust Removal of Malicious Nodes from Networks.
CoRR, 2019

Detection and mitigation of attacks on transportation networks as a multi-stage security game.
Computers & Security, 2019

Empirically grounded agent-based models of innovation diffusion: a critical review.
Artif. Intell. Rev., 2019

A game-theoretic approach for selecting optimal time-dependent thresholds for anomaly detection.
Autonomous Agents and Multi-Agent Systems, 2019

Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.
Proceedings of the 28th USENIX Security Symposium, 2019

A Semantic Cover Approach for Topic Modeling.
Proceedings of the Eighth Joint Conference on Lexical and Computational Semantics, 2019

Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models.
Proceedings of the 15th IEEE International Conference on Embedded Software and Systems, 2019

Incident management and analysis dashboard for fire departments: ICCPS demo.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

An online decision-theoretic pipeline for responder dispatch.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

Attacking Similarity-Based Link Prediction in Social Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Removing Malicious Nodes from Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Manipulating Elections by Selecting Issues.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Adversarial Coordination on Social Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Defending Elections against Malicious Spread of Misinformation.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Adversarial Machine Learning
Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool Publishers, 2018

Simulation-Based Optimization as a Service for Dynamic Data-Driven Applications Systems.
Proceedings of the Handbook of Dynamic Data Driven Applications Systems., 2018

Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks.
IEEE Trans. Network Science and Engineering, 2018

Evasion-Robust Classification on Binary Domains.
TKDD, 2018

Integrating linear optimization with structural modeling to increase HIV neutralization breadth.
PLoS Computational Biology, 2018

SURE: A Modeling and Simulation Integration Platform for Evaluation of Secure and Resilient Cyber-Physical Systems.
Proceedings of the IEEE, 2018

It's all in the timing: calibrating temporal penalties for biomedical data sharing.
JAMIA, 2018

A game-theoretic approach for integrity assurance in resource-bounded systems.
Int. J. Inf. Sec., 2018

Removing Malicious Nodes from Networks.
CoRR, 2018

Regularized Ensembles and Transferability in Adversarial Learning.
CoRR, 2018

Plan Interdiction Games.
CoRR, 2018

Adversarial Link Prediction in Social Networks.
CoRR, 2018

Defending Elections Against Malicious Spread of Misinformation.
CoRR, 2018

Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network.
CoRR, 2018

Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening.
CoRR, 2018

Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game.
CoRR, 2018

Adversarial Coordination on Social Networks.
CoRR, 2018

Adversarial Regression with Multiple Learners.
CoRR, 2018

Optical Neural Networks.
CoRR, 2018

Community Detection by Information Flow Simulation.
CoRR, 2018

Adversarial Task Assignment.
CoRR, 2018

Adversarial Regression for Detecting Attacks in Cyber-Physical Systems.
CoRR, 2018

Adversarial Classification on Social Networks.
CoRR, 2018

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing.
CoRR, 2018

Optimal defense against election control by deleting voter groups.
Artif. Intell., 2018

A Cloaking Mechanism to Mitigate Market Manipulation.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Scalable Initial State Interdiction for Factored MDPs.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Adversarial Task Assignment.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Adversarial Regression for Detecting Attacks in Cyber-Physical Systems.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Adversarial Regression with Multiple Learners.
Proceedings of the 35th International Conference on Machine Learning, 2018

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Mining the Best Observational Window to Model Social Phenomena.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Adversarial Classification on Social Networks.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Controlling Elections through Social Influence.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Deceiving Cyber Adversaries: A Game Theoretic Approach.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

A Decision Theoretic Framework for Emergency Responder Dispatch.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Detecting the Presence of an Individual in Phenotypic Summary Data.
Proceedings of the AMIA 2018, 2018

Crowdsourcing Clinical Chart Reviews.
Proceedings of the AMIA 2018, 2018

2017
Scalable Iterative Classification for Sanitizing Large-Scale Datasets.
IEEE Trans. Knowl. Data Eng., 2017

Monitoring stealthy diffusion.
Knowl. Inf. Syst., 2017

Multidefender Security Games.
IEEE Intelligent Systems, 2017

Controlling Elections through Social Influence.
CoRR, 2017

Adversarial Task Allocation.
CoRR, 2017

Feature Conservation in Adversarial Classifier Evasion: A Case Study.
CoRR, 2017

Near-Optimal Interdiction of Factored MDPs.
Proceedings of the Thirty-Third Conference on Uncertainty in Artificial Intelligence, 2017

Using computational game theory to guide verification and security in hardware designs.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Synergic security for smart water networks: redundancy, diversity, and hardening.
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017

Large-Scale Identification of Malicious Singleton Files.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

Robust Linear Regression Against Training Data Poisoning.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

Multi-Channel Marketing with Budget Complementarities.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

Prioritized Allocation of Emergency Responders based on a Continuous-Time Incident Prediction Model.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

An Open Source Tool for Game Theoretic Health Data De-Identification.
Proceedings of the AMIA 2017, 2017

Improving network connectivity using trusted nodes and edges.
Proceedings of the 2017 American Control Conference, 2017

A Game-Theoretic Approach for Alert Prioritization.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

Security Games on a Plane.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Optimizing annotation resources for natural language de-identification via a game theoretic framework.
Journal of Biomedical Informatics, 2016

Empirically Grounded Agent-Based Models of Innovation Diffusion: A Critical Review.
CoRR, 2016

Predicting Human Cooperation.
CoRR, 2016

Robust High-Dimensional Linear Regression.
CoRR, 2016

Data Poisoning Attacks on Factorization-Based Collaborative Filtering.
CoRR, 2016

A General Retraining Framework for Scalable Adversarial Classification.
CoRR, 2016

Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering.
CoRR, 2016

Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments.
CoRR, 2016

Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks.
CoRR, 2016

Data-driven agent-based modeling, with application to rooftop solar adoption.
Autonomous Agents and Multi-Agent Systems, 2016

Data Poisoning Attacks on Factorization-Based Collaborative Filtering.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Optimally Protecting Elections.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Adversarial AI.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Demo Abstract: SURE: An Experimentation and Evaluation Testbed for CPS Security and Resilience.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

Vulnerability of Transportation Networks to Traffic-Signal Tampering.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

Decentralization and security in dynamic traffic light control.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Optimal thresholds for intrusion detection systems.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Using Abstractions to Solve Opportunistic Crime Security Games at Scale.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Coalitional Security Games.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Submodular Optimization with Routing Constraints.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Multi-Defender Strategic Filtering Against Spear-Phishing Attacks.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Behavioral Experiments in Email Filter Evasion.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Mechanism Design for Team Formation.
CoRR, 2015

Multidefender Security Games.
CoRR, 2015

Securing interdependent assets.
Autonomous Agents and Multi-Agent Systems, 2015

Equilibrium Analysis of Multi-Defender Security Games.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Iterative Classification for Sanitizing Large-Scale Datasets.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Monitoring Stealthy Diffusion.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Integrity assurance in resource-bounded systems through stochastic message authentication.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Process-Driven Data Privacy.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Resilient observation selection in adversarial settings.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

Data-Driven Agent-Based Modeling, with Application to Rooftop Solar Adoption.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Dynamic Influence Maximization Under Increasing Returns to Scale.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Stackelberg Games for Robust Vaccine Design.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Stackelberg Games for Vaccine Design.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Scalable Optimization of Randomized Operational Decisions in Adversarial Classification Settings.
Proceedings of the Eighteenth International Conference on Artificial Intelligence and Statistics, 2015

Mechanism Design for Team Formation.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Designing Vaccines that Are Robust to Virus Escape.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Optimal Personalized Filtering Against Spear-Phishing Attacks.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Security Games with Protection Externalities.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
MultiDefender security games on networks.
SIGMETRICS Performance Evaluation Review, 2014

Characterizing short-term stability for Boolean networks over any distribution of transfer functions.
CoRR, 2014

Feature Cross-Substitution in Adversarial Classification.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Immunization against Infection Propagation in Heterogeneous Networks.
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014

Resilient distributed consensus for tree topology.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Optimal randomized classification in adversarial settings.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games.
Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014

Predicting Rooftop Solar Adoption Using Agent-Based Modeling.
Proceedings of the 2014 AAAI Fall Symposia, Arlington, Virginia, USA, November 13-15, 2014, 2014

Individual Household Modeling of Photovoltaic Adoption.
Proceedings of the 2014 AAAI Fall Symposia, Arlington, Virginia, USA, November 13-15, 2014, 2014

2013
Bayesian Security Games for Controlling Contagion.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Fireaxe: the DHS secure design competition pilot.
Proceedings of the Cyber Security and Information Intelligence, 2013

Security games with contagion: handling asymmetric information.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Optimal interdiction of attack plans.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Security games with surveillance cost and optimal timing of attack execution.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
Computing Optimal Security Strategies for Interdependent Assets
CoRR, 2012

Constrained Automated Mechanism Design for Infinite Games of Incomplete Information
CoRR, 2012

Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies
CoRR, 2012

Constrained automated mechanism design for infinite games of incomplete information.
Autonomous Agents and Multi-Agent Systems, 2012

Computing Optimal Security Strategies for Interdependent Assets.
Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, 2012

Behavioral experiments on a network formation game.
Proceedings of the 13th ACM Conference on Electronic Commerce, 2012

Computing optimal security strategies in networked domains: a cost-benefit approach.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Adversarial Patrolling Games.
Proceedings of the Game Theory for Security, 2012

Security Games with Limited Surveillance: An Initial Report.
Proceedings of the Game Theory for Security, 2012

Computing Stackelberg Equilibria in Discounted Stochastic Games.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

Security Games with Limited Surveillance.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Security and network effects: centralized and decentralized perspectives.
SIGecom Exchanges, 2011

Fault oblivious high performance computing with dynamic task replication and substitution.
Computer Science - R&D, 2011

Average-case analysis of VCG with approximate resource allocation algorithms.
Decision Support Systems, 2011

Influence and Dynamic Behavior in Random Boolean Networks
CoRR, 2011

Price Prediction in a Trading Agent Competition
CoRR, 2011

Noncooperatively Optimized Tolerance: Decentralized Strategic Optimization in Complex Systems
CoRR, 2011

Behavioral Conflict and Fairness in Social Networks.
Proceedings of the Internet and Network Economics - 7th International Workshop, 2011

A Game Theoretic Bidding Agent for the Ad Auction Game.
Proceedings of the ICAART 2011 - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, Volume 2, 2011

Computing Randomized Security Strategies in Networked Domains.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011

2010
Probabilistic analysis of simulation-based games.
ACM Trans. Model. Comput. Simul., 2010

Behavioral dynamics and influence in networked coloring and consensus.
Proc. Natl. Acad. Sci. U.S.A., 2010

Maintaining Equilibria During Exploration in Sponsored Search Auctions.
Algorithmica, 2010

Average-Case Analysis of Mechanism Design with Approximate Resource Allocation Algorithms.
Proceedings of the Internet and Network Economics - 6th International Workshop, 2010

Incentive analysis of approximately efficient allocation algorithms.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

History-dependent graphical multiagent models.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

2009
Simulation-based analysis of keyword auctions.
SIGecom Exchanges, 2009

Strategic Analysis with Simulation-based Games.
Proceedings of the 2009 Winter Simulation Conference, 2009

Nudging Mechanisms for Technology Adoption.
Proceedings of the Internet and Network Economics, 5th International Workshop, 2009

Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies.
Proceedings of the UAI 2009, 2009

Learning Graphical Game Models.
Proceedings of the IJCAI 2009, 2009

Quality and Price Effects on Technology Adoption.
Proceedings of the International Conference on Information Systems, 2009

The Effects of Quality and Price on Adoption Dynamics of Competing Technologies.
Proceedings of the Complex Adaptive Systems and the Threshold Effect, 2009

2008
Equilibrium analysis of dynamic bidding in sponsored search auctions.
IJEB, 2008

Stochastic search methods for nash equilibrium approximation in simulation-based games.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Searching for approximate equilibria in empirical games.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

2007
Learning payoff functions in infinite games.
Machine Learning, 2007

Maintaining Equilibria During Exploration in Sponsored Search Auctions.
Proceedings of the Internet and Network Economics, Third International Workshop, 2007

Equilibrium Analysis of Dynamic Bidding in Sponsored Search Auctions.
Proceedings of the Internet and Network Economics, Third International Workshop, 2007

Constrained Automated Mechanism Design for Infinite Games of Incomplete Information.
Proceedings of the UAI 2007, 2007

Automated Mechanism Design in Infinite Games of Incomplete Information: Framework and Applications.
Proceedings of the Game Theoretic and Decision Theoretic Agents, 2007

2006
Empirical mechanism design: methods, with application to a supply-chain scenario.
Proceedings of the Proceedings 7th ACM Conference on Electronic Commerce (EC-2006), 2006

2005
Strategic Interactions in a Supply Chain Game.
Computational Intelligence, 2005

Learning Payoff Functions in Infinite Games.
Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005

An Analysis of the 2004 Supply Chain Management Trading Agent Competition.
Proceedings of the Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms, 2005

2004
Price Prediction in a Trading Agent Competition.
J. Artif. Intell. Res., 2004

Strategic Interactions in the TAC 2003 Supply Chain Tournament.
Proceedings of the Computers and Games, 4th International Conference, 2004

Distributed Feedback Control for Decision Making on Supply Chains.
Proceedings of the Fourteenth International Conference on Automated Planning and Scheduling (ICAPS 2004), 2004


  Loading...