Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Avast-CTU Public CAPE Dataset., , , , , , and . CoRR, (2022)Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games., , , , and . AAMAS, page 335-342. IFAAMAS, (2013)An Algorithm for Constructing and Solving Imperfect Recall Abstractions of Large Extensive-Form Games., , and . IJCAI, page 936-942. ijcai.org, (2017)Classification with Costly Features Using Deep Reinforcement Learning., , and . AAAI, page 3959-3966. AAAI Press, (2019)Goal-Based Game Tree Search for Complex Domains., , , and . ICAART (Revised Selected Papers), volume 67 of Communications in Computer and Information Science, page 97-109. Springer, (2009)Dinkelbach-Type Algorithm for Computing Quantal Stackelberg Equilibrium., , , and . IJCAI, page 246-253. ijcai.org, (2020)Scheduled for July 2020, Yokohama, Japan, postponed due to the Corona pandemic..Look-ahead Search on Top of Policy Networks in Imperfect Information Games., , and . IJCAI, page 4344-4352. ijcai.org, (2024)Extending Security Games to Defenders with Constrained Mobility., , , , and . AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health, volume SS-12-03 of AAAI Technical Report, AAAI, (2012)Economically Optimal Variable Tag Length Message Authentication., , and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 204-223. Springer, (2017)Iterative Algorithm for Solving Two-player Zero-sum Extensive-form Games with Imperfect Information., , , and . ECAI, volume 242 of Frontiers in Artificial Intelligence and Applications, page 193-198. IOS Press, (2012)