Author of the publication

Harnessing the Power of Deception in Attack Graph-Based Security Games.

, , , , , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 147-167. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing human behavior models in repeated Stackelberg security games: An extended study., , , , , and . Artif. Intell., (2016)MS_HGNN: a hybrid online fraud detection model to alleviate graph-based data imbalance., , , , and . Connect. Sci., (December 2023)Language Agents with Reinforcement Learning for Strategic Play in the Werewolf Game., , , , and . CoRR, (2023)Deep Reinforcement Learning for Green Security Games with Real-Time Information., , , , , , and . CoRR, (2018)Scenario-Adaptive and Self-Supervised Model for Multi-Scenario Personalized Recommendation., , , , , and . CIKM, page 3674-3683. ACM, (2022)UDM: A Unified Deep Matching Framework in Recommender Systems., , , and . CIKM, page 3122-3130. ACM, (2022)SKeyword: Ontology-driven Semantic Keyword Search for Heterogeneous XML Data Sources., , , and . International Conference on Internet Computing, page 20-26. CSREA Press, (2009)Modulating Hysteresis of Perovskite Solar Cells by a Poling Voltage, , , , , , and . The Journal of Physical Chemistry C, 120 (40): 22784-22792 (2016)A Comprehensive Pipeline for Complex Text-to-Image Synthesis., , , , , and . J. Comput. Sci. Technol., 35 (3): 522-537 (2020)Harnessing the Power of Deception in Attack Graph-Based Security Games., , , , , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 147-167. Springer, (2020)