Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game-Theoretic Target Selection in Contagion-Based Domains., , , and . Comput. J., 57 (6): 893-905 (2014)Integral Transforms of Fourier Cosine and Sine Generalized Convolution Type., , and . Int. J. Math. Mathematical Sciences, (2007)Green security games: apply game theory to addressing green security challenges., and . SIGecom Exch., 15 (1): 78-83 (2016)Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility., , , , and . CoRR, (2022)A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty., and . Games, 13 (6): 81 (2022)Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks., , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 385-404. Springer, (2020)An Exploration of Poisoning Attacks on Data-Based Decision Making., , , and . GameSec, volume 13727 of Lecture Notes in Computer Science, page 231-252. Springer, (2022)Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception., , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 179-186. IOS Press, (2020)Deception in Finitely Repeated Security Games., , , and . AAAI, page 2133-2140. AAAI Press, (2019)Deceitful Attacks in Security Games., , and . AAAI Workshops, volume WS-18 of AAAI Technical Report, page 260-267. AAAI Press, (2018)