Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring the social influences of scientist groups based on multiple types of collaboration relations, , , , and . Information Processing & Management, 53 (1): 1--20 (January 2017)Game Theoretic Analysis of Security and Sustainability.. IJCAI, page 5111-5115. ijcai.org, (2017)Efficient Resource Allocation for Protecting Coral Reef Ecosystems., and . IJCAI, page 531-537. IJCAI/AAAI Press, (2016)Game-Theoretic Considerations for Optimizing Taxi System Efficiency., and . IEEE Intell. Syst., 32 (3): 46-52 (2017)Getting Started on a Real-World Challenge Problem in Computational Game Theory and Beyond., and . AAAI Spring Symposium: AI, The Fundamental Social Aggregation Challenge, volume SS-12-01 of AAAI Technical Report, AAAI, (2012)Regularized Matrix Factorization for Multilabel Learning With Missing Labels., , , and . IEEE Trans. Cybern., 52 (5): 3710-3721 (2022)Computing Team-Maxmin Equilibria in Zero-Sum Multiplayer Extensive-Form Games., and . AAAI, page 2318-2325. AAAI Press, (2020)An Efficient Deep Reinforcement Learning Algorithm for Solving Imperfect Information Extensive-Form Games., , , , and . AAAI, page 5823-5831. AAAI Press, (2023)Strategic Information Revelation and Commitment in Security Games., , , and . AAAI Workshops, volume WS-17 of AAAI Technical Report, AAAI Press, (2017)Data Poisoning Attacks on Multi-Task Relationship Learning., , , , and . AAAI, page 2628-2635. AAAI Press, (2018)