Author of the publication

Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification.

, , , and . AAAI, page 8054-8061. AAAI Press, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Targeting and Signaling in Ad Auctions., , and . CoRR, (2017)Information Design in the Principal-Agent Problem., , , and . CoRR, (2022)Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification., , , and . AAAI, page 8054-8061. AAAI Press, (2022)Learning in Online Principal-Agent Interactions: The Power of Menus., , and . AAAI, page 17426-17434. AAAI Press, (2024)Information Shaping for Enhanced Goal Recognition of Partially-Informed Agents., , , , and . AAAI, page 9908-9915. AAAI Press, (2020)Exploring Information Asymmetry in Two-Stage Security Games., , , and . AAAI, page 1057-1063. AAAI Press, (2015)Mitigating the Curse of Correlation in Security Games by Entropy Maximization., , , and . AAMAS, page 2127-2129. International Foundation for Autonomous Agents and Multiagent Systems Richland, SC, USA / ACM, (2018)The Economics of Machine Learning.. IJCAI, page 7057-7061. ijcai.org, (2023)Berth Allocation Considering Fuel Consumption and Turnover Rate in the Mooring Period., , , , and . ICSAI, page 576-581. IEEE, (2018)Green computing: A life cycle perspective., , , , , , and . IGCC, page 1-6. IEEE Computer Society, (2013)