Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring the social influences of scientist groups based on multiple types of collaboration relations, , , , and . Information Processing & Management, 53 (1): 1--20 (January 2017)Game-Theoretic Considerations for Optimizing Taxi System Efficiency., and . IEEE Intell. Syst., 32 (3): 46-52 (2017)Getting Started on a Real-World Challenge Problem in Computational Game Theory and Beyond., and . AAAI Spring Symposium: AI, The Fundamental Social Aggregation Challenge, volume SS-12-01 of AAAI Technical Report, AAAI, (2012)Game Theoretic Analysis of Security and Sustainability.. IJCAI, page 5111-5115. ijcai.org, (2017)Efficient Resource Allocation for Protecting Coral Reef Ecosystems., and . IJCAI, page 531-537. IJCAI/AAAI Press, (2016)Regularized Matrix Factorization for Multilabel Learning With Missing Labels., , , and . IEEE Trans. Cybern., 52 (5): 3710-3721 (2022)Tibetan Dependency Parsing with Graph Convolutional Neural Networks.. ALP@RANLP, page 213-221. INCOMA Ltd., Shoumen, Bulgaria / ACL, (2023)Refinement of Strong Stackelberg Equilibria in Security Games., , , , and . AAAI, page 587-593. AAAI Press, (2011)Data Poisoning Attacks on Multi-Task Relationship Learning., , , , and . AAAI, page 2628-2635. AAAI Press, (2018)An Efficient Deep Reinforcement Learning Algorithm for Solving Imperfect Information Extensive-Form Games., , , , and . AAAI, page 5823-5831. AAAI Press, (2023)