Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic search methods for nash equilibrium approximation in simulation-based games., and . AAMAS (2), page 1055-1062. IFAAMAS, (2008)Optical Neural Networks., and . CoRR, (2018)Detection and mitigation of attacks on transportation networks as a multi-stage security game., , , and . Comput. Secur., (2019)Optimal Personalized Filtering Against Spear-Phishing Attacks., , and . AAAI, page 958-964. AAAI Press, (2015)Computing Stackelberg Equilibria in Discounted Stochastic Games., and . AAAI, page 1478-1484. AAAI Press, (2012)Fireaxe: the DHS secure design competition pilot., , , , , , , , , and 3 other author(s). CSIIRW, page 21. ACM, (2013)Characterizing short-term stability for Boolean networks over any distribution of transfer functions., , , , and . CoRR, (2014)Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies.. UAI, page 583-590. AUAI Press, (2009)Research Challenges for Combined Autonomy, AI, and Real-Time Assurance., , , , , and . CogMI, page 163-167. IEEE, (2021)Incentivizing Truthfulness Through Audits in Strategic Classification., , and . CoRR, (2020)