Author of the publication

Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception.

, , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 179-186. IOS Press, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence Maximization in the Field: The Arduous Journey from Emerging to Deployed Application., , , , , , , , , and . AAMAS, page 150-158. ACM, (2017)Tackling Sequential Attacks in Security Games., , , and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 331-351. Springer, (2019)An extended study on addressing defender teamwork while accounting for uncertainty in attacker defender games using iterative Dec-MDPs., , , , and . Multiagent Grid Syst., 11 (4): 189-226 (2015)Activating the "Breakfast Club": Modeling Influence Spread in Natural-World Social Networks., , , , and . CoRR, (2017)The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty?, and . GameSec, volume 13727 of Lecture Notes in Computer Science, page 3-22. Springer, (2022)epiDAMIK 6.0: The 6th International Workshop on Epidemiology meets Data Mining and Knowledge Discovery., , , , , , , and . KDD, page 5847-5848. ACM, (2023)POMDPs for Assisting Homeless Shelters - Computational and Deployment Challenges., , , , , , and . AAMAS Workshops (Visionary Papers), volume 10003 of Lecture Notes in Computer Science, page 67-87. (2016)Please be an Influencer?: Contingency-Aware Influence Maximization., , , , , and . AAMAS, page 1423-1431. International Foundation for Autonomous Agents and Multiagent Systems Richland, SC, USA / ACM, (2018)Forecasting the Number of Tenants At-Risk of Formal Eviction: A Machine Learning Approach to Inform Public Policy., , , , , and . IJCAI, page 5178-5184. ijcai.org, (2022)Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty., , , , and . AAAI, page 756-762. AAAI Press, (2014)