Author of the publication

Diversified Strategies for Mitigating Adversarial Attacks in Multiagent Systems.

, , and . AAMAS, page 407-415. International Foundation for Autonomous Agents and Multiagent Systems Richland, SC, USA / ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Circumventing the Price of Anarchy: Leading Dynamics to Good Behavior., , and . SIAM J. Comput., 42 (1): 230-264 (2013)Near-Optimal Online Auctions, and . 16th Annual ACMSIAM Symposium on Discrete Algorithms, page 1156 --1163. ACMSIAM, (2005)Online Learning in Online Auctions, , and . SODA'03, (2003)On the Computational Hardness of Manipulating Pairwise Voting Rules., , , and . AAMAS, page 358-367. ACM, (2016)Active Tolerant Testing., and . CoRR, (2017)On polynomial-time preference elicitation with value queries., , and . EC, page 176-185. ACM, (2003)On-line Learning and the Metrical Task System Problem., and . COLT, page 45-53. ACM, (1997)On Learning Read-k-Satisfy-j DNF., , , , and . COLT, page 110-117. ACM, (1994)Semi-supervised learning using randomized mincuts., , , and . ICML, volume 69 of ACM International Conference Proceeding Series, ACM, (2004)A Theory of Similarity Functions for Learning and Clustering.. ALT, volume 4754 of Lecture Notes in Computer Science, page 9. Springer, (2007)