From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Integral Transforms of Fourier Cosine and Sine Generalized Convolution Type., , и . Int. J. Math. Mathematical Sciences, (2007)Green security games: apply game theory to addressing green security challenges., и . SIGecom Exch., 15 (1): 78-83 (2016)Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility., , , , и . CoRR, (2022)A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty., и . Games, 13 (6): 81 (2022)Game-Theoretic Target Selection in Contagion-Based Domains., , , и . Comput. J., 57 (6): 893-905 (2014)Abstraction Methods for Solving Graph-Based Security Games., , , и . AAMAS Workshops (Visionary Papers), том 10003 из Lecture Notes in Computer Science, стр. 13-33. (2016)Addressing Behavioral Uncertainty in Security Games: An Efficient Robust Strategic Solution for Defender Patrols., , и . IPDPS Workshops, стр. 1831-1838. IEEE Computer Society, (2016)Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception., , , и . ECAI, том 325 из Frontiers in Artificial Intelligence and Applications, стр. 179-186. IOS Press, (2020)Deception in Finitely Repeated Security Games., , , и . AAAI, стр. 2133-2140. AAAI Press, (2019)Deceitful Attacks in Security Games., , и . AAAI Workshops, том WS-18 из AAAI Technical Report, стр. 260-267. AAAI Press, (2018)