From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Game-Theoretic Target Selection in Contagion-Based Domains., , , и . Comput. J., 57 (6): 893-905 (2014)Integral Transforms of Fourier Cosine and Sine Generalized Convolution Type., , и . Int. J. Math. Mathematical Sciences, (2007)A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty., и . Games, 13 (6): 81 (2022)Green security games: apply game theory to addressing green security challenges., и . SIGecom Exch., 15 (1): 78-83 (2016)Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility., , , , и . CoRR, (2022)Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception., , , и . ECAI, том 325 из Frontiers in Artificial Intelligence and Applications, стр. 179-186. IOS Press, (2020)Protecting Wildlife under Imperfect Observation., , , , , , , , , и 1 other автор(ы). AAAI Workshop: Computer Poker and Imperfect Information Games, том WS-16-06 из AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.Behavioral Learning in Security Games: Threat of Multi-Step Manipulative Attacks., и . AAAI, стр. 9302-9309. AAAI Press, (2023)Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks., , и . GameSec, том 12513 из Lecture Notes in Computer Science, стр. 385-404. Springer, (2020)An Exploration of Poisoning Attacks on Data-Based Decision Making., , , и . GameSec, том 13727 из Lecture Notes in Computer Science, стр. 231-252. Springer, (2022)