Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Planning and learning in security games., , , , and . SIGecom Exch., 12 (1): 38-41 (2013)Using Abstractions to Solve Opportunistic Crime Security Games at Scale., , , , , , and . AAMAS, page 196-204. ACM, (2016)Beyond Human Data: Scaling Self-Training for Problem-Solving with Language Models., , , , , , , , , and 31 other author(s). CoRR, (2023)To Handle, to Learn and to Manipulate the Attacker's (Uncertain) Payoffs in Security Games: Doctoral Consortium.. AAMAS, page 1961-1962. ACM, (2015)Defender (Mis)coordination in Security Games., , , , and . IJCAI, page 220-226. IJCAI/AAAI, (2013)A fast table lookup based, statistical model driven non-uniform unit selection TTS., , , , and . ICASSP, page 7957-7961. IEEE, (2013)Frontier Language Models are not Robust to Adversarial Arithmetic, or "What do I need to say so you agree 2+2=5?, , , , , , , , , and 20 other author(s). CoRR, (2023)Restless Poachers: Handling Exploration-Exploitation Tradeoffs in Security Domains., , , and . AAMAS, page 123-131. ACM, (2016)Online planning for optimal protector strategies in resource conservation games., , , and . AAMAS, page 733-740. IFAAMAS/ACM, (2014)MLGO: a Machine Learning Guided Compiler Optimizations Framework., , , , , and . CoRR, (2021)