Author of the publication

General-Sum Cyber Deception Games under Partial Attacker Valuation Information.

, , , , and . AAMAS, page 2215-2217. International Foundation for Autonomous Agents and Multiagent Systems, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Imitative Attacker Deception in Stackelberg Security Games., and . IJCAI, page 528-534. ijcai.org, (2019)Predicting advertiser bidding behaviors in sponsored search by rationality modeling., , , and . WWW, page 1433-1444. International World Wide Web Conferences Steering Committee / ACM, (2013)Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs., , , , and . IJCAI, page 681-688. AAAI Press, (2015)Using social networks to raise HIV awareness among homeless youth., , , , , , and . IBM J. Res. Dev., 61 (6): 4:1-4:10 (2017)Multi-Feature Fusion Based Deepfake Face Forgery Video Detection., , , , and . Syst., 10 (2): 31 (2022)Targeting and Signaling in Ad Auctions., , and . CoRR, (2017)Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization under Uncertainty - An Extended Version., , , , , and . CoRR, (2016)Caching Is Hard - Even in the Fault Model., , , and . Algorithmica, 63 (4): 781-794 (2012)Process mining framework with time perspective for understanding acute care: a case study of AIS in hospitals., , , , , , and . BMC Medical Informatics Decis. Mak., 21 (1): 354 (2021)Multi-class fuzzy support matrix machine for classification in roller bearing fault diagnosis., , , , and . Adv. Eng. Informatics, (2022)