Yevgeniy Vorobeychik

Orcid: 0000-0003-2471-5345

According to our database1, Yevgeniy Vorobeychik authored at least 250 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Attacking Shortest Paths by Cutting Edges.
ACM Trans. Knowl. Discov. Data, February, 2024

Attacks on Node Attributes in Graph Neural Networks.
CoRR, 2024

Learning Interpretable Policies in Hindsight-Observable POMDPs through Partially Supervised Reinforcement Learning.
CoRR, 2024

Rationality of Learning Algorithms in Repeated Normal-Form Games.
CoRR, 2024

Preference Poisoning Attacks on Reward Model Learning.
CoRR, 2024

A Visual Active Search Framework for Geospatial Exploration.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

Providing Fair Recourse over Plausible Groups.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Hiding From Centrality Measures: A Stackelberg Game Perspective.
IEEE Trans. Knowl. Data Eng., October, 2023

Defending Against Membership Inference Attacks on Beacon Services.
ACM Trans. Priv. Secur., August, 2023

Subgame Perfect Coalition Formation.
Dyn. Games Appl., June, 2023

Managing re-identification risks while providing access to the <i>All of Us</i> research program.
J. Am. Medical Informatics Assoc., April, 2023

Hierarchical Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks.
CoRR, 2023

On the Exploitability of Reinforcement Learning with Human Feedback for Large Language Models.
CoRR, 2023

Conformal Temporal Logic Planning using Large Language Models: Knowing When to Do What and When to Ask for Help.
CoRR, 2023

Homophily-Driven Sanitation View for Robust Graph Contrastive Learning.
CoRR, 2023

Defense Against Shortest Path Attacks.
CoRR, 2023

Enabling Trade-offs in Privacy and Utility in Genomic Data Beacons and Summary Statistics.
CoRR, 2023

Exact Verification of ReLU Neural Control Barrier Functions.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

A Partially-Supervised Reinforcement Learning Framework for Visual Active Search.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Neural Lyapunov Control for Discrete-Time Systems.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Incentivizing Recourse through Auditing in Strategic Classification.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

CodeIPPrompt: Intellectual Property Infringement Assessment of Code Language Models.
Proceedings of the International Conference on Machine Learning, 2023

Computing an Optimal Pitching Strategy in a Baseball At-Bat.
Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, 2023

IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception.
Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, 2023

Group-Fair Classification with Strategic Agents.
Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency, 2023

SlowLiDAR: Increasing the Latency of LiDAR-Based Detection Using Adversarial Examples.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

UMINT-FS: UMINT-guided Feature Selection for multi-omics datasets.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

Adversarial Link Prediction in Spatial Networks.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

Certified Robust Control under Adversarial Perturbations.
Proceedings of the American Control Conference, 2023

Using Simple Incentives to Improve Two-Sided Fairness in Ridesharing Systems.
Proceedings of the Thirty-Third International Conference on Automated Planning and Scheduling, 2023

Eroding Trust in Aerial Imagery: Comprehensive Analysis and Evaluation of Adversarial Attacks in Geospatial Systems.
Proceedings of the 52nd IEEE Applied Imagery Pattern Recognition Workshop, 2023

The Many Faces of Adversarial Machine Learning.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Popularizing Fairness: Group Fairness and Individual Welfare.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks.
CoRR, 2022

A Visual Active Search Framework for Geospatial Exploration.
CoRR, 2022

A Rotating Proposer Mechanism for Team Formation.
CoRR, 2022

Artificial Intelligence for Cyber Security (AICS).
CoRR, 2022

PROVES: Establishing Image Provenance using Semantic Signatures.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

Adversarial Robustness of Deep Sensor Fusion Models.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

Learning binary multi-scale games on networks.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Solving structured hierarchical games using differential backward induction.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Just Resource Allocation? How Algorithmic Predictions and Human Notions of Justice Interact.
Proceedings of the EC '22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11, 2022

Improving Zonal Fairness While Maintaining Efficiency in Rideshare Matching.
Proceedings of the Twelfth International Workshop on Agents in Traffic and Transportation co-located with the the 31st International Joint Conference on Artificial Intelligence and the 25th European Conference on Artificial Intelligence (IJCAI-ECAI 2022), 2022

Manipulating Elections by Changing Voter Perceptions.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum.
Proceedings of the International Conference on Machine Learning, 2022

CROP: Certifying Robust Policies for Reinforcement Learning through Functional Smoothing.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Reward Delay Attacks on Deep Reinforcement Learning.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

When Evil Calls: Targeted Adversarial Voice over IP Network.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Networked Restless Multi-Armed Bandits for Mobile Interventions.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

A Scalable Tool for Realistic Health Data Re-identification Risk Assessment.
Proceedings of the AMIA 2022, 2022

A Representativeness-informed Model for Research Record Selection from Electronic Medical Record Systems.
Proceedings of the AMIA 2022, 2022

2021
Robust coordination in adversarial social networks: From human behavior to agent-based modeling.
Netw. Sci., 2021

Spoofing the Limit Order Book: A Strategic Agent-Based Analysis.
Games, 2021

Unfairness Despite Awareness: Group-Fair Classification with Strategic Agents.
CoRR, 2021

Optimal Edge Weight Perturbations to Attack Shortest Paths.
CoRR, 2021

Enhancing Robustness of Neural Networks through Fourier Stabilization.
CoRR, 2021

A Game-Theoretic Approach for Hierarchical Policy-Making.
CoRR, 2021

Re-identification of Individuals in Genomic Datasets Using Public Face Images.
CoRR, 2021

POTION : Optimizing Graph Structure for Targeted Diffusion.
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021

PATHATTACK: Attacking Shortest Paths in Complex Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021

Altruism Design in Networked Public Goods Games.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Enhancing Robustness of Neural Networks through Fourier Stabilization.
Proceedings of the 38th International Conference on Machine Learning, 2021

Can Optical Trojans Assist Adversarial Perturbations?
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021

Learning Generative Deception Strategies in Combinatorial Masking Games.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

FaceSec: A Fine-Grained Robustness Evaluation Framework for Face Recognition Systems.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Research Challenges for Combined Autonomy, AI, and Real-Time Assurance.
Proceedings of the Third IEEE International Conference on Cognitive Machine Intelligence, 2021

Strategic Evasion of Centrality Measures.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

De-identifying Socioeconomic Data at the Census Tract Level for Medical Research Through Constraint-based Clustering.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021

Multi-Scale Games: Representing and Solving Games on Networks with Group Structure.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Incentivizing Truthfulness Through Audits in Strategic Classification.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Attacking vision-based perception in end-to-end autonomous driving models.
J. Syst. Archit., 2020

Anatomical context protects deep learning from adversarial perturbations in medical imaging.
Neurocomputing, 2020

Finding Physical Adversarial Examples for Autonomous Driving with Fast and Differentiable Image Compositing.
CoRR, 2020

Optimizing Graph Structure for Targeted Diffusion.
CoRR, 2020

Towards Robust Sensor Fusion in Visual Perception.
CoRR, 2020

A Review of Emergency Incident Prediction, Resource Allocation and Dispatch Models.
CoRR, 2020

Towards Robustness against Unsuspicious Adversarial Examples.
CoRR, 2020

Robust Collective Classification against Structural Attacks.
Proceedings of the Thirty-Sixth Conference on Uncertainty in Artificial Intelligence, 2020

Robust Spatial-Temporal Incident Prediction.
Proceedings of the Thirty-Sixth Conference on Uncertainty in Artificial Intelligence, 2020

Election Control by Manipulating Issue Significance.
Proceedings of the Thirty-Sixth Conference on Uncertainty in Artificial Intelligence, 2020

Defending Against Physically Realizable Attacks on Image Classification.
Proceedings of the 8th International Conference on Learning Representations, 2020

To Warn or Not to Warn: Online Signaling in Audit Games.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Blocking Adversarial Influence in Social Networks.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

On Algorithmic Decision Procedures in Emergency Response Systems in Smart and Connected Communities.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Inducing Equilibria in Networked Public Goods Games through Network Structure Modification.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Computing Equilibria in Binary Networked Public Goods Games.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Protecting Geolocation Privacy of Photo Collections.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Deception through Half-Truths.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Plan Interdiction Games.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Database Audit Workload Prioritization via Game Theory.
ACM Trans. Priv. Secur., 2019

A method for analyzing inpatient care variability through physicians' orders.
J. Biomed. Informatics, 2019

Deep Reinforcement Learning based Adaptive Moving Target Defense.
CoRR, 2019

The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models.
CoRR, 2019

Path Planning Games.
CoRR, 2019

Distributionally Robust Removal of Malicious Nodes from Networks.
CoRR, 2019

Detection and mitigation of attacks on transportation networks as a multi-stage security game.
Comput. Secur., 2019

Empirically grounded agent-based models of innovation diffusion: a critical review.
Artif. Intell. Rev., 2019

A game-theoretic approach for selecting optimal time-dependent thresholds for anomaly detection.
Auton. Agents Multi Agent Syst., 2019

Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.
Proceedings of the 28th USENIX Security Symposium, 2019

A Semantic Cover Approach for Topic Modeling.
Proceedings of the Eighth Joint Conference on Lexical and Computational Semantics, 2019

Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models.
Proceedings of the 15th IEEE International Conference on Embedded Software and Systems, 2019

Adversarial Robustness of Similarity-Based Link Prediction.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

Incident management and analysis dashboard for fire departments: ICCPS demo.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

An online decision-theoretic pipeline for responder dispatch.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

Attacking Similarity-Based Link Prediction in Social Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Removing Malicious Nodes from Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Manipulating Elections by Selecting Issues.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Adversarial Coordination on Social Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Biomedical Research Cohort Membership Disclosure on Social Media.
Proceedings of the AMIA 2019, 2019

Defending Elections against Malicious Spread of Misinformation.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Adversarial Machine Learning
Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool Publishers, ISBN: 978-3-031-01580-9, 2018

Simulation-Based Optimization as a Service for Dynamic Data-Driven Applications Systems.
Proceedings of the Handbook of Dynamic Data Driven Applications Systems., 2018

Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks.
IEEE Trans. Netw. Sci. Eng., 2018

Evasion-Robust Classification on Binary Domains.
ACM Trans. Knowl. Discov. Data, 2018

Integrating linear optimization with structural modeling to increase HIV neutralization breadth.
PLoS Comput. Biol., 2018

SURE: A Modeling and Simulation Integration Platform for Evaluation of Secure and Resilient Cyber-Physical Systems.
Proc. IEEE, 2018

It's all in the timing: calibrating temporal penalties for biomedical data sharing.
J. Am. Medical Informatics Assoc., 2018

A game-theoretic approach for integrity assurance in resource-bounded systems.
Int. J. Inf. Sec., 2018

Regularized Ensembles and Transferability in Adversarial Learning.
CoRR, 2018

Plan Interdiction Games.
CoRR, 2018

Adversarial Link Prediction in Social Networks.
CoRR, 2018

Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network.
CoRR, 2018

Adversarial Coordination on Social Networks.
CoRR, 2018

Optical Neural Networks.
CoRR, 2018

Community Detection by Information Flow Simulation.
CoRR, 2018

Optimal defense against election control by deleting voter groups.
Artif. Intell., 2018

A Cloaking Mechanism to Mitigate Market Manipulation.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Scalable Initial State Interdiction for Factored MDPs.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Adversarial Task Assignment.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Adversarial Regression for Detecting Attacks in Cyber-Physical Systems.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Adversarial Regression with Multiple Learners.
Proceedings of the 35th International Conference on Machine Learning, 2018

Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening.
Proceedings of the IEEE International Conference on Industrial Internet, 2018

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Mining the Best Observational Window to Model Social Phenomena.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Adversarial Classification on Social Networks.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Controlling Elections through Social Influence.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Deceiving Cyber Adversaries: A Game Theoretic Approach.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

A Decision Theoretic Framework for Emergency Responder Dispatch.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Detecting the Presence of an Individual in Phenotypic Summary Data.
Proceedings of the AMIA 2018, 2018

Crowdsourcing Clinical Chart Reviews.
Proceedings of the AMIA 2018, 2018

2017
Scalable Iterative Classification for Sanitizing Large-Scale Datasets.
IEEE Trans. Knowl. Data Eng., 2017

Monitoring stealthy diffusion.
Knowl. Inf. Syst., 2017

Multidefender Security Games.
IEEE Intell. Syst., 2017

Adversarial Task Allocation.
CoRR, 2017

Feature Conservation in Adversarial Classifier Evasion: A Case Study.
CoRR, 2017

Near-Optimal Interdiction of Factored MDPs.
Proceedings of the Thirty-Third Conference on Uncertainty in Artificial Intelligence, 2017

Using computational game theory to guide verification and security in hardware designs.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Synergic security for smart water networks: redundancy, diversity, and hardening.
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017

Large-Scale Identification of Malicious Singleton Files.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Robust Linear Regression Against Training Data Poisoning.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

Multi-Channel Marketing with Budget Complementarities.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

Prioritized Allocation of Emergency Responders based on a Continuous-Time Incident Prediction Model.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

An Open Source Tool for Game Theoretic Health Data De-Identification.
Proceedings of the AMIA 2017, 2017

Improving network connectivity using trusted nodes and edges.
Proceedings of the 2017 American Control Conference, 2017

A Game-Theoretic Approach for Alert Prioritization.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

Security Games on a Plane.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Optimizing annotation resources for natural language de-identification via a game theoretic framework.
J. Biomed. Informatics, 2016

Predicting Human Cooperation.
CoRR, 2016

Robust High-Dimensional Linear Regression.
CoRR, 2016

A General Retraining Framework for Scalable Adversarial Classification.
CoRR, 2016

Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering.
CoRR, 2016

Data-driven agent-based modeling, with application to rooftop solar adoption.
Auton. Agents Multi Agent Syst., 2016

Data Poisoning Attacks on Factorization-Based Collaborative Filtering.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Optimally Protecting Elections.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Adversarial AI.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Demo Abstract: SURE: An Experimentation and Evaluation Testbed for CPS Security and Resilience.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

Vulnerability of Transportation Networks to Traffic-Signal Tampering.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

Decentralization and security in dynamic traffic light control.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Optimal thresholds for intrusion detection systems.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Using Abstractions to Solve Opportunistic Crime Security Games at Scale.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Coalitional Security Games.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Submodular Optimization with Routing Constraints.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Multi-Defender Strategic Filtering Against Spear-Phishing Attacks.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Behavioral Experiments in Email Filter Evasion.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Securing interdependent assets.
Auton. Agents Multi Agent Syst., 2015

Equilibrium Analysis of Multi-Defender Security Games.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Iterative Classification for Sanitizing Large-Scale Datasets.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Integrity assurance in resource-bounded systems through stochastic message authentication.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Process-Driven Data Privacy.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Resilient observation selection in adversarial settings.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

Dynamic Influence Maximization Under Increasing Returns to Scale.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Stackelberg Games for Robust Vaccine Design.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Stackelberg Games for Vaccine Design.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Scalable Optimization of Randomized Operational Decisions in Adversarial Classification Settings.
Proceedings of the Eighteenth International Conference on Artificial Intelligence and Statistics, 2015

Mechanism Design for Team Formation.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Designing Vaccines that Are Robust to Virus Escape.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Optimal Personalized Filtering Against Spear-Phishing Attacks.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Security Games with Protection Externalities.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
MultiDefender security games on networks.
SIGMETRICS Perform. Evaluation Rev., 2014

Characterizing short-term stability for Boolean networks over any distribution of transfer functions.
CoRR, 2014

Feature Cross-Substitution in Adversarial Classification.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Immunization against Infection Propagation in Heterogeneous Networks.
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014

Resilient distributed consensus for tree topology.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Optimal randomized classification in adversarial settings.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games.
Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014

Predicting Rooftop Solar Adoption Using Agent-Based Modeling.
Proceedings of the 2014 AAAI Fall Symposia, Arlington, Virginia, USA, November 13-15, 2014, 2014

Individual Household Modeling of Photovoltaic Adoption.
Proceedings of the 2014 AAAI Fall Symposia, Arlington, Virginia, USA, November 13-15, 2014, 2014

2013
Bayesian Security Games for Controlling Contagion.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Fireaxe: the DHS secure design competition pilot.
Proceedings of the Cyber Security and Information Intelligence, 2013

Security games with contagion: handling asymmetric information.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Optimal interdiction of attack plans.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Security games with surveillance cost and optimal timing of attack execution.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
Constrained automated mechanism design for infinite games of incomplete information.
Auton. Agents Multi Agent Syst., 2012

Computing Optimal Security Strategies for Interdependent Assets.
Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, 2012

Behavioral experiments on a network formation game.
Proceedings of the 13th ACM Conference on Electronic Commerce, 2012

Adversarial patrolling games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Computing optimal security strategies in networked domains: a cost-benefit approach.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Security Games with Limited Surveillance: An Initial Report.
Proceedings of the Game Theory for Security, 2012

Computing Stackelberg Equilibria in Discounted Stochastic Games.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

Security Games with Limited Surveillance.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Security and network effects: centralized and decentralized perspectives.
SIGecom Exch., 2011

Fault oblivious high performance computing with dynamic task replication and substitution.
Comput. Sci. Res. Dev., 2011

Average-case analysis of VCG with approximate resource allocation algorithms.
Decis. Support Syst., 2011

Influence and Dynamic Behavior in Random Boolean Networks
CoRR, 2011

Noncooperatively Optimized Tolerance: Decentralized Strategic Optimization in Complex Systems
CoRR, 2011

Behavioral Conflict and Fairness in Social Networks.
Proceedings of the Internet and Network Economics - 7th International Workshop, 2011

A Game Theoretic Bidding Agent for the Ad Auction Game.
Proceedings of the ICAART 2011 - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, Volume 2, 2011

Computing Randomized Security Strategies in Networked Domains.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011

2010
Probabilistic analysis of simulation-based games.
ACM Trans. Model. Comput. Simul., 2010

Behavioral dynamics and influence in networked coloring and consensus.
Proc. Natl. Acad. Sci. USA, 2010

Maintaining Equilibria During Exploration in Sponsored Search Auctions.
Algorithmica, 2010

Average-Case Analysis of Mechanism Design with Approximate Resource Allocation Algorithms.
Proceedings of the Internet and Network Economics - 6th International Workshop, 2010

Incentive analysis of approximately efficient allocation algorithms.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

History-dependent graphical multiagent models.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

2009
Simulation-based analysis of keyword auctions.
SIGecom Exch., 2009

Strategic Analysis with Simulation-based Games.
Proceedings of the 2009 Winter Simulation Conference, 2009

Nudging Mechanisms for Technology Adoption.
Proceedings of the Internet and Network Economics, 5th International Workshop, 2009

Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies.
Proceedings of the UAI 2009, 2009

Learning Graphical Game Models.
Proceedings of the IJCAI 2009, 2009

Quality and Price Effects on Technology Adoption.
Proceedings of the International Conference on Information Systems, 2009

The Effects of Quality and Price on Adoption Dynamics of Competing Technologies.
Proceedings of the Complex Adaptive Systems and the Threshold Effect, 2009

2008
Mechanism Design and Analysis Using Simulation-Based Game Models.
PhD thesis, 2008

Equilibrium analysis of dynamic bidding in sponsored search auctions.
Int. J. Electron. Bus., 2008

Stochastic search methods for nash equilibrium approximation in simulation-based games.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Searching for approximate equilibria in empirical games.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

2007
Learning payoff functions in infinite games.
Mach. Learn., 2007

Automated Mechanism Design in Infinite Games of Incomplete Information: Framework and Applications.
Proceedings of the Game Theoretic and Decision Theoretic Agents, 2007

2006
Empirical mechanism design: methods, with application to a supply-chain scenario.
Proceedings of the Proceedings 7th ACM Conference on Electronic Commerce (EC-2006), 2006

2005
Strategic Interactions in a Supply Chain Game.
Comput. Intell., 2005

An Analysis of the 2004 Supply Chain Management Trading Agent Competition.
Proceedings of the Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms, 2005

2004
Price Prediction in a Trading Agent Competition.
J. Artif. Intell. Res., 2004

Strategic Interactions in the TAC 2003 Supply Chain Tournament.
Proceedings of the Computers and Games, 4th International Conference, 2004

Distributed Feedback Control for Decision Making on Supply Chains.
Proceedings of the Fourteenth International Conference on Automated Planning and Scheduling (ICAPS 2004), 2004


  Loading...