Author of the publication

Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles.

, , and . ISPEC, volume 6047 of Lecture Notes in Computer Science, page 359-376. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic summarization of cricket video events using genetic algorithm., , and . GECCO (Companion), page 2051-2054. ACM, (2010)Deep Learning for Multi-Facility Location Mechanism Design., , and . IJCAI, page 261-267. ijcai.org, (2018)Automated Mechanism Design without Money via Machine Learning., , and . IJCAI, page 433-439. IJCAI/AAAI Press, (2016)GEV-Canonical Regression for Accurate Binary Class Probability Estimation when One Class is Rare., , , and . ICML, volume 32 of JMLR Workshop and Conference Proceedings, page 1989-1997. JMLR.org, (2014)Learning Score Systems for Patient Mortality Prediction in Intensive Care Units via Orthogonal Matching Pursuit., , , , and . ICMLA, page 93-98. IEEE, (2014)Towards a Cooperative Defense Model Against Network Security Attacks., , and . WEIS, (2010)Pairwise Fairness for Ranking and Regression., , , and . AAAI, page 5248-5255. AAAI Press, (2020)Optimizing Black-box Metrics with Iterative Example Weighting., , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 4239-4249. PMLR, (2021)On the Relationship Between Binary Classification, Bipartite Ranking, and Binary Class Probability Estimation., and . NIPS, page 2913-2921. (2013)Robust Optimization for Fairness with Noisy Protected Groups., , , , , and . NeurIPS, (2020)