Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game-Theoretic Target Selection in Contagion-Based Domains., , , and . Comput. J., 57 (6): 893-905 (2014)Integral Transforms of Fourier Cosine and Sine Generalized Convolution Type., , and . Int. J. Math. Mathematical Sciences, (2007)A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty., and . Games, 13 (6): 81 (2022)Green security games: apply game theory to addressing green security challenges., and . SIGecom Exch., 15 (1): 78-83 (2016)Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility., , , , and . CoRR, (2022)Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception., , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 179-186. IOS Press, (2020)Protecting Wildlife under Imperfect Observation., , , , , , , , , and 1 other author(s). AAAI Workshop: Computer Poker and Imperfect Information Games, volume WS-16-06 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.Behavioral Learning in Security Games: Threat of Multi-Step Manipulative Attacks., and . AAAI, page 9302-9309. AAAI Press, (2023)Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks., , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 385-404. Springer, (2020)An Exploration of Poisoning Attacks on Data-Based Decision Making., , , and . GameSec, volume 13727 of Lecture Notes in Computer Science, page 231-252. Springer, (2022)