Author of the publication

Attacking Similarity-Based Link Prediction in Social Networks.

, , , , and . AAMAS, page 305-313. International Foundation for Autonomous Agents and Multiagent Systems, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Matchings with externalities and attitudes., , , , and . AAMAS, page 295-302. IFAAMAS, (2013)Efficient Computation of the Shapley Value for Centrality in Networks., , , and . WINE, volume 6484 of Lecture Notes in Computer Science, page 1-13. Springer, (2010)Repeated Dollar Auctions: A Multi-Armed Bandit Approach., , and . AAMAS, page 579-587. ACM, (2016)A Pseudo-Polynomial Algorithm for Computing Power Indices in Graph-Restricted Weighted Voting Games., , , and . IJCAI, page 631-637. AAAI Press, (2015)Representation of coalitional games with algebraic decision diagrams., , and . AAMAS, page 1121-1122. IFAAMAS, (2011)A logic-based representation for coalitional games with externalities., , , , , , and . AAMAS, page 125-132. IFAAMAS, (2010)Algorithms for the shapley and myerson values in graph-restricted games., , , and . AAMAS, page 197-204. IFAAMAS/ACM, (2014)Computational Aspects of Extending the Shapley Value to Coalitional Games with Externalities., , , , and . ECAI, volume 215 of Frontiers in Artificial Intelligence and Applications, page 197-202. IOS Press, (2010)Two-phase Attacks in Security Games., , and . UAI, volume 216 of Proceedings of Machine Learning Research, page 1489-1498. PMLR, (2023)A Shapley Value-based Approach to Determine Gatekeepers in Social Networks with Applications., , , and . ECAI, volume 263 of Frontiers in Artificial Intelligence and Applications, page 651-656. IOS Press, (2014)