Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fireaxe: the DHS secure design competition pilot., , , , , , , , , and 3 other author(s). CSIIRW, page 21. ACM, (2013)Probabilistic analysis of simulation-based games.. ACM Trans. Model. Comput. Simul., 20 (3): 16:1-16:25 (2010)Stochastic search methods for nash equilibrium approximation in simulation-based games., and . AAMAS (2), page 1055-1062. IFAAMAS, (2008)Feature Conservation in Adversarial Classifier Evasion: A Case Study., , , and . CoRR, (2017)Optical Neural Networks., and . CoRR, (2018)Research Challenges for Combined Autonomy, AI, and Real-Time Assurance., , , , , and . CogMI, page 163-167. IEEE, (2021)Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies.. UAI, page 583-590. AUAI Press, (2009)When Evil Calls: Targeted Adversarial Voice over IP Network., , , , , , and . CCS, page 2009-2023. ACM, (2022)Detection and mitigation of attacks on transportation networks as a multi-stage security game., , , and . Comput. Secur., (2019)Incentivizing Recourse through Auditing in Strategic Classification., , , , and . IJCAI, page 400-408. ijcai.org, (2023)