Author of the publication

Protecting Wildlife under Imperfect Observation.

, , , , , , , , , , and . AAAI Workshop: Computer Poker and Imperfect Information Games, volume WS-16-06 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Green security games: apply game theory to addressing green security challenges., and . SIGecom Exch., 15 (1): 78-83 (2016)Integral Transforms of Fourier Cosine and Sine Generalized Convolution Type., , and . Int. J. Math. Mathematical Sciences, (2007)Game-Theoretic Target Selection in Contagion-Based Domains., , , and . Comput. J., 57 (6): 893-905 (2014)Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility., , , , and . CoRR, (2022)Abstraction Methods for Solving Graph-Based Security Games., , , and . AAMAS Workshops (Visionary Papers), volume 10003 of Lecture Notes in Computer Science, page 13-33. (2016)A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty., and . Games, 13 (6): 81 (2022)Addressing Behavioral Uncertainty in Security Games: An Efficient Robust Strategic Solution for Defender Patrols., , and . IPDPS Workshops, page 1831-1838. IEEE Computer Society, (2016)Deception in Finitely Repeated Security Games., , , and . AAAI, page 2133-2140. AAAI Press, (2019)Deceitful Attacks in Security Games., , and . AAAI Workshops, volume WS-18 of AAAI Technical Report, page 260-267. AAAI Press, (2018)Protecting Wildlife under Imperfect Observation., , , , , , , , , and 1 other author(s). AAAI Workshop: Computer Poker and Imperfect Information Games, volume WS-16-06 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.