Yevgeniy Vorobeychik

According to our database1, Yevgeniy Vorobeychik authored at least 175 papers between 2004 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Anatomical context protects deep learning from adversarial perturbations in medical imaging.
Neurocomputing, 2020

Optimizing Graph Structure for Targeted Diffusion.
CoRR, 2020

Robust Collective Classification against Structural Attacks.
CoRR, 2020

Election Control by Manipulating Issue Significance.
CoRR, 2020

Towards Robust Sensor Fusion in Visual Perception.
CoRR, 2020

A Review of Emergency Incident Prediction, Resource Allocation and Dispatch Models.
CoRR, 2020

Towards Robustness against Unsuspicious Adversarial Examples.
CoRR, 2020

Defending Against Physically Realizable Attacks on Image Classification.
Proceedings of the 8th International Conference on Learning Representations, 2020

To Warn or Not to Warn: Online Signaling in Audit Games.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

On Algorithmic Decision Procedures in Emergency Response Systems in Smart and Connected Communities.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Inducing Equilibria in Networked Public Goods Games through Network Structure Modification.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Computing Equilibria in Binary Networked Public Goods Games.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Protecting Geolocation Privacy of Photo Collections.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Deception through Half-Truths.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Plan Interdiction Games.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Database Audit Workload Prioritization via Game Theory.
ACM Trans. Priv. Secur., 2019

A method for analyzing inpatient care variability through physicians' orders.
J. Biomed. Informatics, 2019

Deep Reinforcement Learning based Adaptive Moving Target Defense.
CoRR, 2019

The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models.
CoRR, 2019

Path Planning Games.
CoRR, 2019

Attacking Vision-based Perception in End-to-End Autonomous Driving Models.
CoRR, 2019

Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning.
CoRR, 2019

To Warn or Not to Warn: Online Signaling in Audit Games.
CoRR, 2019

Distributionally Robust Removal of Malicious Nodes from Networks.
CoRR, 2019

Detection and mitigation of attacks on transportation networks as a multi-stage security game.
Comput. Secur., 2019

Empirically grounded agent-based models of innovation diffusion: a critical review.
Artif. Intell. Rev., 2019

A game-theoretic approach for selecting optimal time-dependent thresholds for anomaly detection.
Auton. Agents Multi Agent Syst., 2019

Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.
Proceedings of the 28th USENIX Security Symposium, 2019

A Semantic Cover Approach for Topic Modeling.
Proceedings of the Eighth Joint Conference on Lexical and Computational Semantics, 2019

Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models.
Proceedings of the 15th IEEE International Conference on Embedded Software and Systems, 2019

Adversarial Robustness of Similarity-Based Link Prediction.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

Incident management and analysis dashboard for fire departments: ICCPS demo.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

An online decision-theoretic pipeline for responder dispatch.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

Attacking Similarity-Based Link Prediction in Social Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Removing Malicious Nodes from Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Manipulating Elections by Selecting Issues.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Adversarial Coordination on Social Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Biomedical Research Cohort Membership Disclosure on Social Media.
Proceedings of the AMIA 2019, 2019

Defending Elections against Malicious Spread of Misinformation.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Adversarial Machine Learning
Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool Publishers, 2018

Simulation-Based Optimization as a Service for Dynamic Data-Driven Applications Systems.
Proceedings of the Handbook of Dynamic Data Driven Applications Systems., 2018

Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks.
IEEE Trans. Netw. Sci. Eng., 2018

Evasion-Robust Classification on Binary Domains.
ACM Trans. Knowl. Discov. Data, 2018

Integrating linear optimization with structural modeling to increase HIV neutralization breadth.
PLoS Comput. Biol., 2018

SURE: A Modeling and Simulation Integration Platform for Evaluation of Secure and Resilient Cyber-Physical Systems.
Proceedings of the IEEE, 2018

It's all in the timing: calibrating temporal penalties for biomedical data sharing.
J. Am. Medical Informatics Assoc., 2018

A game-theoretic approach for integrity assurance in resource-bounded systems.
Int. J. Inf. Sec., 2018

Regularized Ensembles and Transferability in Adversarial Learning.
CoRR, 2018

Plan Interdiction Games.
CoRR, 2018

Adversarial Link Prediction in Social Networks.
CoRR, 2018

Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network.
CoRR, 2018

Adversarial Coordination on Social Networks.
CoRR, 2018

Optical Neural Networks.
CoRR, 2018

Community Detection by Information Flow Simulation.
CoRR, 2018

Optimal defense against election control by deleting voter groups.
Artif. Intell., 2018

A Cloaking Mechanism to Mitigate Market Manipulation.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Scalable Initial State Interdiction for Factored MDPs.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Adversarial Task Assignment.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Adversarial Regression for Detecting Attacks in Cyber-Physical Systems.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Adversarial Regression with Multiple Learners.
Proceedings of the 35th International Conference on Machine Learning, 2018

Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening.
Proceedings of the IEEE International Conference on Industrial Internet, 2018

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Mining the Best Observational Window to Model Social Phenomena.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Adversarial Classification on Social Networks.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Controlling Elections through Social Influence.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Deceiving Cyber Adversaries: A Game Theoretic Approach.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

A Decision Theoretic Framework for Emergency Responder Dispatch.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Detecting the Presence of an Individual in Phenotypic Summary Data.
Proceedings of the AMIA 2018, 2018

Crowdsourcing Clinical Chart Reviews.
Proceedings of the AMIA 2018, 2018

2017
Scalable Iterative Classification for Sanitizing Large-Scale Datasets.
IEEE Trans. Knowl. Data Eng., 2017

Monitoring stealthy diffusion.
Knowl. Inf. Syst., 2017

Multidefender Security Games.
IEEE Intell. Syst., 2017

Adversarial Task Allocation.
CoRR, 2017

Feature Conservation in Adversarial Classifier Evasion: A Case Study.
CoRR, 2017

Near-Optimal Interdiction of Factored MDPs.
Proceedings of the Thirty-Third Conference on Uncertainty in Artificial Intelligence, 2017

Using computational game theory to guide verification and security in hardware designs.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Synergic security for smart water networks: redundancy, diversity, and hardening.
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017

Large-Scale Identification of Malicious Singleton Files.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Robust Linear Regression Against Training Data Poisoning.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

Multi-Channel Marketing with Budget Complementarities.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

Prioritized Allocation of Emergency Responders based on a Continuous-Time Incident Prediction Model.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

An Open Source Tool for Game Theoretic Health Data De-Identification.
Proceedings of the AMIA 2017, 2017

Improving network connectivity using trusted nodes and edges.
Proceedings of the 2017 American Control Conference, 2017

A Game-Theoretic Approach for Alert Prioritization.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

Security Games on a Plane.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Optimizing annotation resources for natural language de-identification via a game theoretic framework.
J. Biomed. Informatics, 2016

Predicting Human Cooperation.
CoRR, 2016

Robust High-Dimensional Linear Regression.
CoRR, 2016

A General Retraining Framework for Scalable Adversarial Classification.
CoRR, 2016

Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering.
CoRR, 2016

Data-driven agent-based modeling, with application to rooftop solar adoption.
Auton. Agents Multi Agent Syst., 2016

Data Poisoning Attacks on Factorization-Based Collaborative Filtering.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Optimally Protecting Elections.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Adversarial AI.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Demo Abstract: SURE: An Experimentation and Evaluation Testbed for CPS Security and Resilience.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

Vulnerability of Transportation Networks to Traffic-Signal Tampering.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

Decentralization and security in dynamic traffic light control.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Optimal thresholds for intrusion detection systems.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Using Abstractions to Solve Opportunistic Crime Security Games at Scale.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Coalitional Security Games.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Submodular Optimization with Routing Constraints.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Multi-Defender Strategic Filtering Against Spear-Phishing Attacks.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Behavioral Experiments in Email Filter Evasion.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Securing interdependent assets.
Auton. Agents Multi Agent Syst., 2015

Equilibrium Analysis of Multi-Defender Security Games.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Iterative Classification for Sanitizing Large-Scale Datasets.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Integrity assurance in resource-bounded systems through stochastic message authentication.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Process-Driven Data Privacy.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Resilient observation selection in adversarial settings.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

Dynamic Influence Maximization Under Increasing Returns to Scale.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Stackelberg Games for Robust Vaccine Design.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Stackelberg Games for Vaccine Design.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Scalable Optimization of Randomized Operational Decisions in Adversarial Classification Settings.
Proceedings of the Eighteenth International Conference on Artificial Intelligence and Statistics, 2015

Mechanism Design for Team Formation.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Designing Vaccines that Are Robust to Virus Escape.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Optimal Personalized Filtering Against Spear-Phishing Attacks.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Security Games with Protection Externalities.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
MultiDefender security games on networks.
SIGMETRICS Perform. Evaluation Rev., 2014

Characterizing short-term stability for Boolean networks over any distribution of transfer functions.
CoRR, 2014

Feature Cross-Substitution in Adversarial Classification.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Immunization against Infection Propagation in Heterogeneous Networks.
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014

Resilient distributed consensus for tree topology.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Optimal randomized classification in adversarial settings.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games.
Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014

Predicting Rooftop Solar Adoption Using Agent-Based Modeling.
Proceedings of the 2014 AAAI Fall Symposia, Arlington, Virginia, USA, November 13-15, 2014, 2014

Individual Household Modeling of Photovoltaic Adoption.
Proceedings of the 2014 AAAI Fall Symposia, Arlington, Virginia, USA, November 13-15, 2014, 2014

2013
Bayesian Security Games for Controlling Contagion.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Fireaxe: the DHS secure design competition pilot.
Proceedings of the Cyber Security and Information Intelligence, 2013

Security games with contagion: handling asymmetric information.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Optimal interdiction of attack plans.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Security games with surveillance cost and optimal timing of attack execution.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
Constrained automated mechanism design for infinite games of incomplete information.
Auton. Agents Multi Agent Syst., 2012

Computing Optimal Security Strategies for Interdependent Assets.
Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, 2012

Behavioral experiments on a network formation game.
Proceedings of the 13th ACM Conference on Electronic Commerce, 2012

Adversarial patrolling games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Computing optimal security strategies in networked domains: a cost-benefit approach.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Security Games with Limited Surveillance: An Initial Report.
Proceedings of the Game Theory for Security, 2012

Computing Stackelberg Equilibria in Discounted Stochastic Games.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

Security Games with Limited Surveillance.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Security and network effects: centralized and decentralized perspectives.
SIGecom Exch., 2011

Fault oblivious high performance computing with dynamic task replication and substitution.
Comput. Sci. Res. Dev., 2011

Average-case analysis of VCG with approximate resource allocation algorithms.
Decis. Support Syst., 2011

Influence and Dynamic Behavior in Random Boolean Networks
CoRR, 2011

Noncooperatively Optimized Tolerance: Decentralized Strategic Optimization in Complex Systems
CoRR, 2011

Behavioral Conflict and Fairness in Social Networks.
Proceedings of the Internet and Network Economics - 7th International Workshop, 2011

A Game Theoretic Bidding Agent for the Ad Auction Game.
Proceedings of the ICAART 2011 - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, Volume 2, 2011

Computing Randomized Security Strategies in Networked Domains.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011

2010
Probabilistic analysis of simulation-based games.
ACM Trans. Model. Comput. Simul., 2010

Behavioral dynamics and influence in networked coloring and consensus.
Proc. Natl. Acad. Sci. USA, 2010

Maintaining Equilibria During Exploration in Sponsored Search Auctions.
Algorithmica, 2010

Average-Case Analysis of Mechanism Design with Approximate Resource Allocation Algorithms.
Proceedings of the Internet and Network Economics - 6th International Workshop, 2010

Incentive analysis of approximately efficient allocation algorithms.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

History-dependent graphical multiagent models.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

2009
Simulation-based analysis of keyword auctions.
SIGecom Exch., 2009

Strategic Analysis with Simulation-based Games.
Proceedings of the 2009 Winter Simulation Conference, 2009

Nudging Mechanisms for Technology Adoption.
Proceedings of the Internet and Network Economics, 5th International Workshop, 2009

Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies.
Proceedings of the UAI 2009, 2009

Learning Graphical Game Models.
Proceedings of the IJCAI 2009, 2009

Quality and Price Effects on Technology Adoption.
Proceedings of the International Conference on Information Systems, 2009

The Effects of Quality and Price on Adoption Dynamics of Competing Technologies.
Proceedings of the Complex Adaptive Systems and the Threshold Effect, 2009

2008
Equilibrium analysis of dynamic bidding in sponsored search auctions.
Int. J. Electron. Bus., 2008

Stochastic search methods for nash equilibrium approximation in simulation-based games.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Searching for approximate equilibria in empirical games.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

2007
Learning payoff functions in infinite games.
Mach. Learn., 2007

Automated Mechanism Design in Infinite Games of Incomplete Information: Framework and Applications.
Proceedings of the Game Theoretic and Decision Theoretic Agents, 2007

2006
Empirical mechanism design: methods, with application to a supply-chain scenario.
Proceedings of the Proceedings 7th ACM Conference on Electronic Commerce (EC-2006), 2006

2005
Strategic Interactions in a Supply Chain Game.
Comput. Intell., 2005

An Analysis of the 2004 Supply Chain Management Trading Agent Competition.
Proceedings of the Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms, 2005

2004
Price Prediction in a Trading Agent Competition.
J. Artif. Intell. Res., 2004

Strategic Interactions in the TAC 2003 Supply Chain Tournament.
Proceedings of the Computers and Games, 4th International Conference, 2004

Distributed Feedback Control for Decision Making on Supply Chains.
Proceedings of the Fourteenth International Conference on Automated Planning and Scheduling (ICAPS 2004), 2004


  Loading...