Author of the publication

PIE: A Data-Driven Payoff Inference Engine for Strategic Security Applications.

, , , , , , and . IEEE Trans. Comput. Soc. Syst., 7 (1): 42-57 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Pricing for Efficient Electric Vehicle Charging Station Management., , , , and . AAMAS, page 749-757. ACM, (2016)Optimal Electric Vehicle Charging Station Placement., , , , and . IJCAI, page 2662-2668. AAAI Press, (2015)Electric vehicle charging strategy study and the application on charging station placement., , and . Auton. Agents Multi Agent Syst., 35 (1): 3 (2021)Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare., , , , , and . IEEE Syst. J., 14 (3): 3779-3790 (2020)PIE: A Data-Driven Payoff Inference Engine for Strategic Security Applications., , , , , , and . IEEE Trans. Comput. Soc. Syst., 7 (1): 42-57 (2020)Generating Fake Documents Using Probabilistic Logic Graphs., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2428-2441 (2022)HogRider: Champion Agent of Microsoft Malmo Collaborative AI Challenge., , , and . AAAI, page 4767-4775. AAAI Press, (2018)Android Malware Detection via (Somewhat) Robust Irreversible Feature Transformations., , and . IEEE Trans. Inf. Forensics Secur., (2020)Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1434-1445 (2022)