Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Targeting and Signaling in Ad Auctions., , and . CoRR, (2017)Information Design in the Principal-Agent Problem., , , and . CoRR, (2022)Imitative Attacker Deception in Stackelberg Security Games., and . IJCAI, page 528-534. ijcai.org, (2019)Predicting advertiser bidding behaviors in sponsored search by rationality modeling., , , and . WWW, page 1433-1444. International World Wide Web Conferences Steering Committee / ACM, (2013)Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs., , , , and . IJCAI, page 681-688. AAAI Press, (2015)Information Shaping for Enhanced Goal Recognition of Partially-Informed Agents., , , , and . AAAI, page 9908-9915. AAAI Press, (2020)Exploring Information Asymmetry in Two-Stage Security Games., , , and . AAAI, page 1057-1063. AAAI Press, (2015)Learning in Online Principal-Agent Interactions: The Power of Menus., , and . AAAI, page 17426-17434. AAAI Press, (2024)Competitive Information Design for Pandora's Box., , , , and . SODA, page 353-381. SIAM, (2023)Tackling Imitative Attacker Deception in Repeated Bayesian Stackelberg Security Games., , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 187-194. IOS Press, (2020)