Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning and Planning in Feature Deception Games., , , , , , , and . CoRR, (2019)Mitigation of Jamming Attacks via Deception., , , and . PIMRC, page 1-6. IEEE, (2020)Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness., , , , and . CDC, page 586-592. IEEE, (2021)Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions., , , , , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 4523-4532. PMLR, (2021)Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments., , , , , and . WISA, volume 11897 of Lecture Notes in Computer Science, page 299-312. Springer, (2019)Behavioral Cyber Deception: A Game and Prospect Theoretic Approach., , , and . GLOBECOM, page 1-6. IEEE, (2019)Synthesizing Attack-Aware Control and Active Sensing Strategies Under Reactive Sensor Attacks., , , , , and . IEEE Control. Syst. Lett., (2023)Honeypot Allocation for Cyber Deception Under Uncertainty., , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 3438-3452 (2022)A Game Theoretic Framework for Software Diversity for Network Security., , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 297-311. Springer, (2020)Deceptive Labeling: Hypergames on Graphs for Stealthy Deception., , , , and . IEEE Control. Syst. Lett., 5 (3): 977-982 (2021)