Author of the publication

Robust Peer-Monitoring on Graphs with an Application to Suicide Prevention in Social Networks.

, , , and . AAMAS, page 2168-2170. International Foundation for Autonomous Agents and Multiagent Systems, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fair Influence Maximization: a Welfare Optimization Approach., , , , , , , and . AAAI, page 11630-11638. AAAI Press, (2021)Learning Optimal Fair Decision Trees: Trade-offs Between Interpretability, Fairness, and Accuracy., , , , and . AIES, page 181-192. ACM, (2023)Street-Level Realities of Data Practices in Homeless Services Provision., , , and . Proc. ACM Hum. Comput. Interact., 3 (CSCW): 184:1-184:23 (2019)Warning Time: Optimizing Strategic Signaling for Security Against Boundedly Rational Adversaries., , , , , , and . AAMAS, page 1892-1894. International Foundation for Autonomous Agents and Multiagent Systems, (2019)Fairness in Contextual Resource Allocation Systems: Metrics and Incompatibility Results., , , , , and . AAAI, page 11837-11846. AAAI Press, (2023)Learning to Signal in the Goldilocks Zone: Improving Adversary Compliance in Security Games., , , , , , , , , and . ECML/PKDD (1), volume 11906 of Lecture Notes in Computer Science, page 725-740. Springer, (2019)Deploying a Robust Active Preference Elicitation Algorithm on MTurk: Experiment Design, Interface, and Evaluation for COVID-19 Patient Prioritization., , , and . EAAMO, page 31:1-31:10. ACM, (2023)Exploring Algorithmic Fairness in Robust Graph Covering Problems., , , , , , and . NeurIPS, page 15750-15761. (2019)Partially Generative Neural Networks for Gang Crime Classification with Partial Information., , , , , , and . AIES, page 257-263. ACM, (2018)Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games., , , , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 103-124. Springer, (2020)