default search action
Yevgeniy Vorobeychik
Person information
SPARQL queries
🛈 Please note that only 54% of the records listed on this page have a DOI. Therefore, DOI-based queries can only provide partial results.
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j42]Shivam Bajaj, Pranoy Das, Yevgeniy Vorobeychik, Vijay Gupta:
Rationality of Learning Algorithms in Repeated Normal-Form Games. IEEE Control. Syst. Lett. 8: 2409-2414 (2024) - [j41]Xia Li, Andrea L. Bertozzi, P. Jeffrey Brantingham, Yevgeniy Vorobeychik:
Optimal policy for control of epidemics with constrained time intervals and region-based interactions. Networks Heterog. Media 19(2): 867-886 (2024) - [j40]Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld:
Attacking Shortest Paths by Cutting Edges. ACM Trans. Knowl. Discov. Data 18(2): 35:1-35:42 (2024) - [c177]Jayanth Yetukuri, Ian Hardy, Yevgeniy Vorobeychik, Berk Ustun, Yang Liu:
Providing Fair Recourse over Plausible Groups. AAAI 2024: 21753-21760 - [c176]Jiongxiao Wang, Junlin Wu, Muhao Chen, Yevgeniy Vorobeychik, Chaowei Xiao:
RLHFPoison: Reward Poisoning Attack for Reinforcement Learning with Human Feedback in Large Language Models. ACL (1) 2024: 2551-2570 - [c175]Taha Eghtesad, Sirui Li, Yevgeniy Vorobeychik, Aron Laszka:
Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks. AAMAS 2024: 508-515 - [c174]Anindya Sarkar, Alex DiChristofano, Sanmay Das, Patrick J. Fowler, Nathan Jacobs, Yevgeniy Vorobeychik:
Geospatial Active Search for Preventing Evictions. AAMAS 2024: 2456-2458 - [c173]Andrew Estornell, Tina Zhang, Sanmay Das, Chien-Ju Ho, Brendan Juba, Yevgeniy Vorobeychik:
The Impact of Features Used by Algorithms on Perceptions of Fairness. IJCAI 2024: 376-384 - [c172]James Thomas Brown, Ellen Wright Clayton, Michael E. Matheny, Murat Kantarcioglu, Yevgeniy Vorobeychik, Bradley A. Malin:
Robin Hood: A De-identification Method to Preserve Minority Representation for Disparities Research. PSD 2024: 67-83 - [c171]Junlin Wu, Hussein Sibai, Yevgeniy Vorobeychik:
Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks. SP (Workshops) 2024: 57-67 - [c170]Anindya Sarkar, Michael Lanier, Scott Alfeld, Jiarui Feng, Roman Garnett, Nathan Jacobs, Yevgeniy Vorobeychik:
A Visual Active Search Framework for Geospatial Exploration. WACV 2024: 8301-8310 - [i116]Junlin Wu, Jiongxiao Wang, Chaowei Xiao, Chenguang Wang, Ning Zhang, Yevgeniy Vorobeychik:
Preference Poisoning Attacks on Reward Model Learning. CoRR abs/2402.01920 (2024) - [i115]Shivam Bajaj, Pranoy Das, Yevgeniy Vorobeychik, Vijay Gupta:
Rationality of Learning Algorithms in Repeated Normal-Form Games. CoRR abs/2402.08747 (2024) - [i114]Michael Lanier, Ying Xu, Nathan Jacobs, Chongjie Zhang, Yevgeniy Vorobeychik:
Learning Interpretable Policies in Hindsight-Observable POMDPs through Partially Supervised Reinforcement Learning. CoRR abs/2402.09290 (2024) - [i113]Ying Xu, Michael Lanier, Anindya Sarkar, Yevgeniy Vorobeychik:
Attacks on Node Attributes in Graph Neural Networks. CoRR abs/2402.12426 (2024) - [i112]Luise Ge, Brendan Juba, Yevgeniy Vorobeychik:
Learning Linear Utility Functions From Pairwise Comparison Queries. CoRR abs/2405.02612 (2024) - [i111]Luise Ge, Daniel Halpern, Evi Micha, Ariel D. Procaccia, Itai Shapira, Yevgeniy Vorobeychik, Junlin Wu:
Axioms for AI Alignment from Human Feedback. CoRR abs/2405.14758 (2024) - [i110]Junlin Wu, Huan Zhang, Yevgeniy Vorobeychik:
Verified Safe Reinforcement Learning for Neural Network Dynamic Models. CoRR abs/2405.15994 (2024) - [i109]Tao Zhang, Rajagopal Venkatesaramani, Rajat K. De, Bradley A. Malin, Yevgeniy Vorobeychik:
A Game-Theoretic Approach to Privacy-Utility Tradeoff in Sharing Genomic Summary Statistics. CoRR abs/2406.01811 (2024) - [i108]Anindya Sarkar, Srikumar Sastry, Aleksis Pirinen, Chongjie Zhang, Nathan Jacobs, Yevgeniy Vorobeychik:
GOMAA-Geo: GOal Modality Agnostic Active Geo-localization. CoRR abs/2406.01917 (2024) - [i107]Zonglin Di, Sixie Yu, Yevgeniy Vorobeychik, Yang Liu:
Adversarial Machine Unlearning. CoRR abs/2406.07687 (2024) - [i106]Victor A. Borza, Andrew Estornell, Chien-Ju Ho, Bradley A. Malin, Yevgeniy Vorobeychik:
Dataset Representativeness and Downstream Task Fairness. CoRR abs/2407.00170 (2024) - [i105]Victor A. Borza, Andrew Estornell, Ellen Wright Clayton, Chien-Ju Ho, Russell Rothman, Yevgeniy Vorobeychik, Bradley A. Malin:
Adaptive Recruitment Resource Allocation to Improve Cohort Representativeness in Participatory Biomedical Datasets. CoRR abs/2408.01375 (2024) - [i104]Tao Zhang, Bradley A. Malin, Netanel Raviv, Yevgeniy Vorobeychik:
Confounding Privacy and Inverse Composition. CoRR abs/2408.12010 (2024) - [i103]Xiaogeng Liu, Peiran Li, Edward Suh, Yevgeniy Vorobeychik, Zhuoqing Mao, Somesh Jha, Patrick McDaniel, Huan Sun, Bo Li, Chaowei Xiao:
AutoDAN-Turbo: A Lifelong Agent for Strategy Self-Exploration to Jailbreak LLMs. CoRR abs/2410.05295 (2024) - [i102]Tao Zhang, Rajagopal Venkatesaramani, Rajat K. De, Bradley A. Malin, Yevgeniy Vorobeychik:
Bayes-Nash Generative Privacy Protection Against Membership Inference Attacks. CoRR abs/2410.07414 (2024) - 2023
- [j39]Greg Leo, Yevgeniy Vorobeychik, Myrna Wooders:
Subgame Perfect Coalition Formation. Dyn. Games Appl. 13(2): 510-524 (2023) - [j38]Weiyi Xia, Melissa A. Basford, Robert J. Carroll, Ellen Wright Clayton, Paul A. Harris, Murat Kantarcioglu, Yongtai Liu, Steve Nyemba, Yevgeniy Vorobeychik, Zhiyu Wan, Bradley A. Malin:
Managing re-identification risks while providing access to the All of Us research program. J. Am. Medical Informatics Assoc. 30(5): 907-914 (2023) - [j37]Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik:
Defending Against Membership Inference Attacks on Beacon Services. ACM Trans. Priv. Secur. 26(3): 42:1-42:32 (2023) - [j36]Marcin Waniek, Jan Woznica, Kai Zhou, Yevgeniy Vorobeychik, Tomasz P. Michalak, Talal Rahwan:
Hiding From Centrality Measures: A Stackelberg Game Perspective. IEEE Trans. Knowl. Data Eng. 35(10): 10058-10071 (2023) - [c169]Andrew Estornell, Sanmay Das, Brendan Juba, Yevgeniy Vorobeychik:
Popularizing Fairness: Group Fairness and Individual Welfare. AAAI 2023: 7485-7493 - [c168]Yevgeniy Vorobeychik:
The Many Faces of Adversarial Machine Learning. AAAI 2023: 15402-15409 - [c167]Michael Lanier, Aayush Dhakal, Zhexiao Xiong, Arthur Li, Nathan Jacobs, Yevgeniy Vorobeychik:
Eroding Trust in Aerial Imagery: Comprehensive Analysis and Evaluation of Adversarial Attacks in Geospatial Systems. AIPR 2023: 1-13 - [c166]Ashwin Kumar, Yevgeniy Vorobeychik, William Yeoh:
Using Simple Incentives to Improve Two-Sided Fairness in Ridesharing Systems. ICAPS 2023: 227-235 - [c165]Jinghan Yang, Hunmin Kim, Wenbin Wan, Naira Hovakimyan, Yevgeniy Vorobeychik:
Certified Robust Control under Adversarial Perturbations. ACC 2023: 4090-4095 - [c164]Michal Tomasz Godziszewski, Yevgeniy Vorobeychik, Tomasz P. Michalak:
Adversarial Link Prediction in Spatial Networks. AAMAS 2023: 1817-1825 - [c163]Chayan Maitra, Dibyendu Bikash Seal, Vivek Das, Yevgeniy Vorobeychik, Rajat K. De:
UMINT-FS: UMINT-guided Feature Selection for multi-omics datasets. BIBM 2023: 594-601 - [c162]Han Liu, Yuhao Wu, Zhiyuan Yu, Yevgeniy Vorobeychik, Ning Zhang:
SlowLiDAR: Increasing the Latency of LiDAR-Based Detection Using Adversarial Examples. CVPR 2023: 5146-5155 - [c161]Andrew Estornell, Sanmay Das, Yang Liu, Yevgeniy Vorobeychik:
Group-Fair Classification with Strategic Agents. FAccT 2023: 389-399 - [c160]Joseph Bao, Murat Kantarcioglu, Yevgeniy Vorobeychik, Charles A. Kamhoua:
IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception. FLAIRS 2023 - [c159]Connor Douglas, Everett Witt, Mia Bendy, Yevgeniy Vorobeychik:
Computing an Optimal Pitching Strategy in a Baseball At-Bat. FLAIRS 2023 - [c158]Sonja Johnson-Yu, Jessie Finocchiaro, Kai Wang, Yevgeniy Vorobeychik, Arunesh Sinha, Aparna Taneja, Milind Tambe:
Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks. GameSec 2023: 133-152 - [c157]Zhiyuan Yu, Yuhao Wu, Ning Zhang, Chenguang Wang, Yevgeniy Vorobeychik, Chaowei Xiao:
CodeIPPrompt: Intellectual Property Infringement Assessment of Code Language Models. ICML 2023: 40373-40389 - [c156]Andrew Estornell, Yatong Chen, Sanmay Das, Yang Liu, Yevgeniy Vorobeychik:
Incentivizing Recourse through Auditing in Strategic Classification. IJCAI 2023: 400-408 - [c155]Junlin Wu, Andrew Clark, Yiannis Kantaros, Yevgeniy Vorobeychik:
Neural Lyapunov Control for Discrete-Time Systems. NeurIPS 2023 - [c154]Anindya Sarkar, Nathan Jacobs, Yevgeniy Vorobeychik:
A Partially-Supervised Reinforcement Learning Framework for Visual Active Search. NeurIPS 2023 - [c153]Hongchao Zhang, Junlin Wu, Yevgeniy Vorobeychik, Andrew Clark:
Exact Verification of ReLU Neural Control Barrier Functions. NeurIPS 2023 - [e2]Makoto Yokoo, Hong Qiao, Yevgeniy Vorobeychik, Jianye Hao:
Distributed Artificial Intelligence - 4th International Conference, DAI 2022, Tianjin, China, December 15-17, 2022, Proceedings. Lecture Notes in Computer Science 13824, Springer 2023, ISBN 978-3-031-25548-9 [contents] - [i101]Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik:
Enabling Trade-offs in Privacy and Utility in Genomic Data Beacons and Summary Statistics. CoRR abs/2302.01763 (2023) - [i100]Jinghan Yang, Hunmin Kim, Wenbin Wan, Naira Hovakimyan, Yevgeniy Vorobeychik:
Certified Robust Control under Adversarial Perturbations. CoRR abs/2302.02208 (2023) - [i99]Ashwin Kumar, Yevgeniy Vorobeychik, William Yeoh:
Using Simple Incentives to Improve Two-Sided Fairness in Ridesharing Systems. CoRR abs/2303.14332 (2023) - [i98]Joseph Bao, Murat Kantarcioglu, Yevgeniy Vorobeychik, Charles A. Kamhoua:
IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception. CoRR abs/2305.00925 (2023) - [i97]Junlin Wu, Andrew Clark, Yiannis Kantaros, Yevgeniy Vorobeychik:
Neural Lyapunov Control for Discrete-Time Systems. CoRR abs/2305.06547 (2023) - [i96]Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld:
Defense Against Shortest Path Attacks. CoRR abs/2305.19083 (2023) - [i95]Yulin Zhu, Xing Ai, Yevgeniy Vorobeychik, Kai Zhou:
Homophily-Driven Sanitation View for Robust Graph Contrastive Learning. CoRR abs/2307.12555 (2023) - [i94]Jun Wang, Jiaming Tong, Kaiyuan Tan, Yevgeniy Vorobeychik, Yiannis Kantaros:
Conformal Temporal Logic Planning using Large Language Models: Knowing When to Do What and When to Ask for Help. CoRR abs/2309.10092 (2023) - [i93]Hongchao Zhang, Junlin Wu, Yevgeniy Vorobeychik, Andrew Clark:
Exact Verification of ReLU Neural Control Barrier Functions. CoRR abs/2310.09360 (2023) - [i92]Anindya Sarkar, Nathan Jacobs, Yevgeniy Vorobeychik:
A Partially Supervised Reinforcement Learning Framework for Visual Active Search. CoRR abs/2310.09689 (2023) - [i91]Jiongxiao Wang, Junlin Wu, Muhao Chen, Yevgeniy Vorobeychik, Chaowei Xiao:
On the Exploitability of Reinforcement Learning with Human Feedback for Large Language Models. CoRR abs/2311.09641 (2023) - [i90]Michael Lanier, Aayush Dhakal, Zhexiao Xiong, Arthur Li, Nathan Jacobs, Yevgeniy Vorobeychik:
Eroding Trust In Aerial Imagery: Comprehensive Analysis and Evaluation Of Adversarial Attacks In Geospatial Systems. CoRR abs/2312.07389 (2023) - [i89]Taha Eghtesad, Sirui Li, Yevgeniy Vorobeychik, Aron Laszka:
Hierarchical Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks. CoRR abs/2312.14625 (2023) - 2022
- [c152]Victor A. Borza, Ellen Wright Clayton, Murat Kantarcioglu, Yevgeniy Vorobeychik, Bradley A. Malin:
A Representativeness-informed Model for Research Record Selection from Electronic Medical Record Systems. AMIA 2022 - [c151]Weiyi Xia, Yongtai Liu, Zhiyu Wan, Yevgeniy Vorobeychik, Murat Kantarcioglu, Ellen Wright Clayton, Bradley A. Malin:
A Scalable Tool for Realistic Health Data Re-identification Risk Assessment. AMIA 2022 - [c150]Han-Ching Ou, Christoph Siebenbrunner, Jackson A. Killian, Meredith B. Brooks, David Kempe, Yevgeniy Vorobeychik, Milind Tambe:
Networked Restless Multi-Armed Bandits for Mobile Interventions. AAMAS 2022: 1001-1009 - [c149]Han Liu, Zhiyuan Yu, Mingming Zha, XiaoFeng Wang, William Yeoh, Yevgeniy Vorobeychik, Ning Zhang:
When Evil Calls: Targeted Adversarial Voice over IP Network. CCS 2022: 2009-2023 - [c148]Anindya Sarkar, Jiarui Feng, Yevgeniy Vorobeychik, Christopher D. Gill, Ning Zhang:
Reward Delay Attacks on Deep Reinforcement Learning. GameSec 2022: 212-230 - [c147]Fan Wu, Linyi Li, Zijian Huang, Yevgeniy Vorobeychik, Ding Zhao, Bo Li:
CROP: Certifying Robust Policies for Reinforcement Learning through Functional Smoothing. ICLR 2022 - [c146]Junlin Wu, Yevgeniy Vorobeychik:
Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum. ICML 2022: 24177-24211 - [c145]Ashwin Kumar, Yevgeniy Vorobeychik, William Yeoh:
Improving Zonal Fairness While Maintaining Efficiency in Rideshare Matching. ATT@IJCAI 2022: 77-90 - [c144]Junlin Wu, Andrew Estornell, Lecheng Kong, Yevgeniy Vorobeychik:
Manipulating Elections by Changing Voter Perceptions. IJCAI 2022: 557-563 - [c143]Amanda R. Kube, Sanmay Das, Patrick J. Fowler, Yevgeniy Vorobeychik:
Just Resource Allocation? How Algorithmic Predictions and Human Notions of Justice Interact. EC 2022: 1184-1242 - [c142]Zun Li, Feiran Jia, Aditya Mate, Shahin Jabbari, Mithun Chakraborty, Milind Tambe, Yevgeniy Vorobeychik:
Solving structured hierarchical games using differential backward induction. UAI 2022: 1107-1117 - [c141]Sixie Yu, P. Jeffrey Brantingham, Matthew Valasik, Yevgeniy Vorobeychik:
Learning binary multi-scale games on networks. UAI 2022: 2310-2319 - [c140]Shaojie Wang, Tong Wu, Ayan Chakrabarti, Yevgeniy Vorobeychik:
Adversarial Robustness of Deep Sensor Fusion Models. WACV 2022: 1371-1380 - [c139]Mingyang Xie, Manav Kulshrestha, Shaojie Wang, Jinghan Yang, Ayan Chakrabarti, Ning Zhang, Yevgeniy Vorobeychik:
PROVES: Establishing Image Provenance using Semantic Signatures. WACV 2022: 3017-3026 - [i88]Han-Ching Ou, Christoph Siebenbrunner, Jackson A. Killian, Meredith B. Brooks, David Kempe, Yevgeniy Vorobeychik, Milind Tambe:
Networked Restless Multi-Armed Bandits for Mobile Interventions. CoRR abs/2201.12408 (2022) - [i87]James Holt, Edward Raff, Ahmad Ridley, Dennis Ross, Arunesh Sinha, Diane Staheli, William Streilen, Milind Tambe, Yevgeniy Vorobeychik, Allan B. Wollaber:
Artificial Intelligence for Cyber Security (AICS). CoRR abs/2202.14010 (2022) - [i86]Jian Low, Chen Hajaj, Yevgeniy Vorobeychik:
A Rotating Proposer Mechanism for Team Formation. CoRR abs/2204.04251 (2022) - [i85]Junlin Wu, Andrew Estornell, Lecheng Kong, Yevgeniy Vorobeychik:
Manipulating Elections by Changing Voter Perceptions. CoRR abs/2205.00102 (2022) - [i84]Junlin Wu, Yevgeniy Vorobeychik:
Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum. CoRR abs/2206.10057 (2022) - [i83]Anindya Sarkar, Jiarui Feng, Yevgeniy Vorobeychik, Christopher D. Gill, Ning Zhang:
Reward Delay Attacks on Deep Reinforcement Learning. CoRR abs/2209.03540 (2022) - [i82]Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld:
Attacking Shortest Paths by Cutting Edges. CoRR abs/2211.11141 (2022) - [i81]Anindya Sarkar, Michael Lanier, Scott Alfeld, Roman Garnett, Nathan Jacobs, Yevgeniy Vorobeychik:
A Visual Active Search Framework for Geospatial Exploration. CoRR abs/2211.15788 (2022) - [i80]Junlin Wu, Hussein Sibai, Yevgeniy Vorobeychik:
Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks. CoRR abs/2212.14115 (2022) - 2021
- [j35]Xintong Wang, Christopher Hoang, Yevgeniy Vorobeychik, Michael P. Wellman:
Spoofing the Limit Order Book: A Strategic Agent-Based Analysis. Games 12(2): 46 (2021) - [j34]Chen Hajaj, Zlatko Joveski, Sixie Yu, Yevgeniy Vorobeychik:
Robust coordination in adversarial social networks: From human behavior to agent-based modeling. Netw. Sci. 9(3): 255-290 (2021) - [c138]Andrew Estornell, Sanmay Das, Yevgeniy Vorobeychik:
Incentivizing Truthfulness Through Audits in Strategic Classification. AAAI 2021: 5347-5354 - [c137]Kun Jin, Yevgeniy Vorobeychik, Mingyan Liu:
Multi-Scale Games: Representing and Solving Games on Networks with Group Structure. AAAI 2021: 5497-5505 - [c136]Yongtai Liu, Douglas Conway, Zhiyu Wan, Murat Kantarcioglu, Yevgeniy Vorobeychik, Bradley A. Malin:
De-identifying Socioeconomic Data at the Census Tract Level for Medical Research Through Constraint-based Clustering. AMIA 2021 - [c135]Marcin Waniek, Jan Woznica, Kai Zhou, Yevgeniy Vorobeychik, Talal Rahwan, Tomasz P. Michalak:
Strategic Evasion of Centrality Measures. AAMAS 2021: 1389-1397 - [c134]Tarek F. Abdelzaher, Sanjoy K. Baruah, Chris Gill, Yevgeniy Vorobeychik, Ning Zhang, Xuan Zhang:
Research Challenges for Combined Autonomy, AI, and Real-Time Assurance. CogMI 2021: 163-167 - [c133]Liang Tong, Zhengzhang Chen, Jingchao Ni, Wei Cheng, Dongjin Song, Haifeng Chen, Yevgeniy Vorobeychik:
FaceSec: A Fine-Grained Robustness Evaluation Framework for Face Recognition Systems. CVPR 2021: 13254-13263 - [c132]Junlin Wu, Charles A. Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik:
Learning Generative Deception Strategies in Combinatorial Masking Games. GameSec 2021: 98-117 - [c131]Shanto Roy, Salah Uddin Kadir, Yevgeniy Vorobeychik, Aron Laszka:
Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies. GameSec 2021: 271-290 - [c130]Adith Boloor, Tong Wu, Patrick Naughton, Ayan Chakrabarti, Xuan Zhang, Yevgeniy Vorobeychik:
Can Optical Trojans Assist Adversarial Perturbations? ICCVW 2021: 122-131 - [c129]Netanel Raviv, Aidan Kelley, Minzhe Guo, Yevgeniy Vorobeychik:
Enhancing Robustness of Neural Networks through Fourier Stabilization. ICML 2021: 8880-8889 - [c128]Sixie Yu, David Kempe, Yevgeniy Vorobeychik:
Altruism Design in Networked Public Goods Games. IJCAI 2021: 493-499 - [c127]Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld:
PATHATTACK: Attacking Shortest Paths in Complex Networks. ECML/PKDD (2) 2021: 532-547 - [c126]Sixie Yu, Leo Torres, Scott Alfeld, Tina Eliassi-Rad, Yevgeniy Vorobeychik:
POTION : Optimizing Graph Structure for Targeted Diffusion. SDM 2021: 154-162 - [d1]Rajagopal Venkatesaramani, Bradley A. Malin, Yevgeniy Vorobeychik:
Re-identification of Individuals in Genomic Datasets Using Public Face Images. Zenodo, 2021 - [i79]Kun Jin, Yevgeniy Vorobeychik, Mingyan Liu:
Multi-Scale Games: Representing and Solving Games on Networks with Group Structure. CoRR abs/2101.08314 (2021) - [i78]Marcin Waniek, Jan Woznica, Kai Zhou, Yevgeniy Vorobeychik, Talal Rahwan, Tomasz P. Michalak:
Strategic Evasion of Centrality Measures. CoRR abs/2101.10648 (2021) - [i77]Rajagopal Venkatesaramani, Bradley A. Malin, Yevgeniy Vorobeychik:
Re-identification of Individuals in Genomic Datasets Using Public Face Images. CoRR abs/2102.08557 (2021) - [i76]Feiran Jia, Aditya Mate, Zun Li, Shahin Jabbari, Mithun Chakraborty, Milind Tambe, Michael P. Wellman, Yevgeniy Vorobeychik:
A Game-Theoretic Approach for Hierarchical Policy-Making. CoRR abs/2102.10646 (2021) - [i75]Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld:
PATHATTACK: Attacking Shortest Paths in Complex Networks. CoRR abs/2104.03761 (2021) - [i74]Liang Tong, Zhengzhang Chen, Jingchao Ni, Wei Cheng, Dongjin Song, Haifeng Chen, Yevgeniy Vorobeychik:
FACESEC: A Fine-grained Robustness Evaluation Framework for Face Recognition Systems. CoRR abs/2104.04107 (2021) - [i73]Sixie Yu, David Kempe, Yevgeniy Vorobeychik:
Altruism Design in Networked Public Goods Games. CoRR abs/2105.00505 (2021) - [i72]Netanel Raviv, Aidan Kelley, Michael Guo, Yevgeniy Vorobeychik:
Enhancing Robustness of Neural Networks through Fourier Stabilization. CoRR abs/2106.04435 (2021) - [i71]Zun Li, Feiran Jia, Aditya Mate, Shahin Jabbari, Mithun Chakraborty, Milind Tambe, Yevgeniy Vorobeychik:
Solving Structured Hierarchical Games Using Differential Backward Induction. CoRR abs/2106.04663 (2021) - [i70]Fan Wu, Linyi Li, Zijian Huang, Yevgeniy Vorobeychik, Ding Zhao, Bo Li:
CROP: Certifying Robust Policies for Reinforcement Learning through Functional Smoothing. CoRR abs/2106.09292 (2021) - [i69]Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld:
Optimal Edge Weight Perturbations to Attack Shortest Paths. CoRR abs/2107.03347 (2021) - [i68]Shanto Roy, Salah Uddin Kadir, Yevgeniy Vorobeychik, Aron Laszka:
Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies. CoRR abs/2109.07724 (2021) - [i67]Junlin Wu, Charles A. Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik:
Learning Generative Deception Strategies in Combinatorial Masking Games. CoRR abs/2109.11637 (2021) - [i66]Connor Douglas, Everett Witt, Mia Bendy, Yevgeniy Vorobeychik:
Computing an Optimal Pitching Strategy in a Baseball At-Bat. CoRR abs/2110.04321 (2021) - [i65]Mingyang Xie, Manav Kulshrestha, Shaojie Wang, Jinghan Yang, Ayan Chakrabarti, Ning Zhang, Yevgeniy Vorobeychik:
PROVES: Establishing Image Provenance using Semantic Signatures. CoRR abs/2110.11411 (2021) - [i64]Andrew Estornell, Sanmay Das, Yang Liu, Yevgeniy Vorobeychik:
Unfairness Despite Awareness: Group-Fair Classification with Strategic Agents. CoRR abs/2112.02746 (2021) - [i63]Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik:
Defending Against Membership Inference Attacks on Beacon Services. CoRR abs/2112.13301 (2021) - 2020
- [j33]Yi Li, Huahong Zhang, Camilo Bermudez, Yifan Chen, Bennett A. Landman, Yevgeniy Vorobeychik:
Anatomical context protects deep learning from adversarial perturbations in medical imaging. Neurocomputing 379: 370-378 (2020) - [j32]Adith Boloor, Karthik Garimella, Xin He, Christopher D. Gill, Yevgeniy Vorobeychik, Xuan Zhang:
Attacking vision-based perception in end-to-end autonomous driving models. J. Syst. Archit. 110: 101766 (2020) - [c125]Jinghan Yang, Ayan Chakrabarti, Yevgeniy Vorobeychik:
Protecting Geolocation Privacy of Photo Collections. AAAI 2020: 524-531 - [c124]Liang Tong, Aron Laszka, Chao Yan, Ning Zhang, Yevgeniy Vorobeychik:
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning. AAAI 2020: 946-953 - [c123]Sixie Yu, Kai Zhou, P. Jeffrey Brantingham, Yevgeniy Vorobeychik:
Computing Equilibria in Binary Networked Public Goods Games. AAAI 2020: 2310-2317 - [c122]Andrew Estornell, Sanmay Das, Yevgeniy Vorobeychik:
Deception through Half-Truths. AAAI 2020: 10110-10117 - [c121]David Kempe, Sixie Yu, Yevgeniy Vorobeychik:
Inducing Equilibria in Networked Public Goods Games through Network Structure Modification. AAMAS 2020: 611-619 - [c120]Geoffrey Pettet, Ayan Mukhopadhyay, Mykel J. Kochenderfer, Yevgeniy Vorobeychik, Abhishek Dubey:
On Algorithmic Decision Procedures in Emergency Response Systems in Smart and Connected Communities. AAMAS 2020: 1046-1054 - [c119]Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex X. Liu, Ting Wang:
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models. CCS 2020: 85-99 - [c118]Taha Eghtesad, Yevgeniy Vorobeychik, Aron Laszka:
Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense. GameSec 2020: 58-79 - [c117]Feiran Jia, Kai Zhou, Charles A. Kamhoua, Yevgeniy Vorobeychik:
Blocking Adversarial Influence in Social Networks. GameSec 2020: 257-276 - [c116]Chao Yan, Haifeng Xu, Yevgeniy Vorobeychik, Bo Li, Daniel Fabbri, Bradley A. Malin:
To Warn or Not to Warn: Online Signaling in Audit Games. ICDE 2020: 481-492 - [c115]Tong Wu, Liang Tong, Yevgeniy Vorobeychik:
Defending Against Physically Realizable Attacks on Image Classification. ICLR 2020 - [c114]Kai Zhou, Yevgeniy Vorobeychik:
Robust Collective Classification against Structural Attacks. UAI 2020: 250-259 - [c113]Andrew Estornell, Sanmay Das, Edith Elkind, Yevgeniy Vorobeychik:
Election Control by Manipulating Issue Significance. UAI 2020: 340-349 - [c112]Ayan Mukhopadhyay, Kai Wang, Andrew Perrault, Mykel J. Kochenderfer, Milind Tambe, Yevgeniy Vorobeychik:
Robust Spatial-Temporal Incident Prediction. UAI 2020: 360-369 - [p2]Yevgeniy Vorobeychik, Michael Pritchard:
Plan Interdiction Games. Adaptive Autonomous Secure Cyber Systems 2020: 159-182 - [i62]Geoffrey Pettet, Ayan Mukhopadhyay, Mykel J. Kochenderfer, Yevgeniy Vorobeychik, Abhishek Dubey:
On Algorithmic Decision Procedures in Emergency Response Systems in Smart and Connected Communities. CoRR abs/2001.07362 (2020) - [i61]David Kempe, Sixie Yu, Yevgeniy Vorobeychik:
Inducing Equilibria in Networked Public Goods Games through Network Structure Modification. CoRR abs/2002.10627 (2020) - [i60]Liang Tong, Minzhe Guo, Atul Prakash, Yevgeniy Vorobeychik:
Towards Robustness against Unsuspicious Adversarial Examples. CoRR abs/2005.04272 (2020) - [i59]Ayan Mukhopadhyay, Geoffrey Pettet, Sayyed Vazirizade, Yevgeniy Vorobeychik, Mykel J. Kochenderfer, Abhishek Dubey:
A Review of Emergency Incident Prediction, Resource Allocation and Dispatch Models. CoRR abs/2006.04200 (2020) - [i58]Shaojie Wang, Tong Wu, Yevgeniy Vorobeychik:
Towards Robust Sensor Fusion in Visual Perception. CoRR abs/2006.13192 (2020) - [i57]Andrew Estornell, Sanmay Das, Edith Elkind, Yevgeniy Vorobeychik:
Election Control by Manipulating Issue Significance. CoRR abs/2007.09786 (2020) - [i56]Kai Zhou, Yevgeniy Vorobeychik:
Robust Collective Classification against Structural Attacks. CoRR abs/2007.13073 (2020) - [i55]Sixie Yu, Leonardo Torres, Scott Alfeld, Tina Eliassi-Rad, Yevgeniy Vorobeychik:
Optimizing Graph Structure for Targeted Diffusion. CoRR abs/2008.05589 (2020) - [i54]Jinghan Yang, Adith Boloor, Ayan Chakrabarti, Xuan Zhang, Yevgeniy Vorobeychik:
Finding Physical Adversarial Examples for Autonomous Driving with Fast and Differentiable Image Compositing. CoRR abs/2010.08844 (2020) - [i53]Feiran Jia, Kai Zhou, Charles A. Kamhoua, Yevgeniy Vorobeychik:
Blocking Adversarial Influence in Social Networks. CoRR abs/2011.01346 (2020) - [i52]Andrew Estornell, Sanmay Das, Yevgeniy Vorobeychik:
Incentivizing Truthfulness Through Audits in Strategic Classification. CoRR abs/2012.09147 (2020)
2010 – 2019
- 2019
- [j31]Amin Ghafouri, Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
A game-theoretic approach for selecting optimal time-dependent thresholds for anomaly detection. Auton. Agents Multi Agent Syst. 33(4): 430-456 (2019) - [j30]Haifeng Zhang, Yevgeniy Vorobeychik:
Empirically grounded agent-based models of innovation diffusion: a critical review. Artif. Intell. Rev. 52(1): 707-741 (2019) - [j29]Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Detection and mitigation of attacks on transportation networks as a multi-stage security game. Comput. Secur. 87 (2019) - [j28]Matthew C. Lenert, Randolph A. Miller, Yevgeniy Vorobeychik, Colin G. Walsh:
A method for analyzing inpatient care variability through physicians' orders. J. Biomed. Informatics 91 (2019) - [j27]Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley A. Malin:
Database Audit Workload Prioritization via Game Theory. ACM Trans. Priv. Secur. 22(3): 17:1-17:21 (2019) - [c111]Bryan Wilder, Yevgeniy Vorobeychik:
Defending Elections against Malicious Spread of Misinformation. AAAI 2019: 2213-2220 - [c110]Yongtai Liu, Chao Yan, Zhijun Yin, Zhiyu Wan, Weiyi Xia, Murat Kantarcioglu, Yevgeniy Vorobeychik, Ellen Wright Clayton, Bradley A. Malin:
Biomedical Research Cohort Membership Disclosure on Social Media. AMIA 2019 - [c109]Kai Zhou, Tomasz P. Michalak, Marcin Waniek, Talal Rahwan, Yevgeniy Vorobeychik:
Attacking Similarity-Based Link Prediction in Social Networks. AAMAS 2019: 305-313 - [c108]Sixie Yu, Yevgeniy Vorobeychik:
Removing Malicious Nodes from Networks. AAMAS 2019: 314-322 - [c107]Jasper Lu, David Kai Zhang, Zinovi Rabinovich, Svetlana Obraztsova, Yevgeniy Vorobeychik:
Manipulating Elections by Selecting Issues. AAMAS 2019: 529-537 - [c106]Chen Hajaj, Sixie Yu, Zlatko Joveski, Yifan Guo, Yevgeniy Vorobeychik:
Adversarial Coordination on Social Networks. AAMAS 2019: 1515-1523 - [c105]Ayan Mukhopadhyay, Geoffrey Pettet, Chinmaya Samal, Abhishek Dubey, Yevgeniy Vorobeychik:
An online decision-theoretic pipeline for responder dispatch. ICCPS 2019: 185-196 - [c104]Geoffrey Pettet, Ayan Mukhopadhyay, Chinmaya Samal, Abhishek Dubey, Yevgeniy Vorobeychik:
Incident management and analysis dashboard for fire departments: ICCPS demo. ICCPS 2019: 336-337 - [c103]Kai Zhou, Tomasz P. Michalak, Yevgeniy Vorobeychik:
Adversarial Robustness of Similarity-Based Link Prediction. ICDM 2019: 926-935 - [c102]Adith Boloor, Xin He, Christopher D. Gill, Yevgeniy Vorobeychik, Xuan Zhang:
Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models. ICESS 2019: 1-7 - [c101]Rajagopal Venkatesaramani, Doug Downey, Bradley A. Malin, Yevgeniy Vorobeychik:
A Semantic Cover Approach for Topic Modeling. *SEM@NAACL-HLT 2019: 92-102 - [c100]Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik:
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features. USENIX Security Symposium 2019: 285-302 - [e1]Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán:
Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings. Lecture Notes in Computer Science 11836, Springer 2019, ISBN 978-3-030-32429-2 [contents] - [i51]Sixie Yu, Yevgeniy Vorobeychik:
Distributionally Robust Removal of Malicious Nodes from Networks. CoRR abs/1901.11463 (2019) - [i50]Ayan Mukhopadhyay, Geoffrey Pettet, Chinmaya Samal, Abhishek Dubey, Yevgeniy Vorobeychik:
An Online Decision-Theoretic Pipeline for Responder Dispatch. CoRR abs/1902.08274 (2019) - [i49]Adith Boloor, Xin He, Christopher D. Gill, Yevgeniy Vorobeychik, Xuan Zhang:
Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models. CoRR abs/1903.05157 (2019) - [i48]Chao Yan, Haifeng Xu, Yevgeniy Vorobeychik, Bo Li, Daniel Fabbri, Bradley A. Malin:
To Warn or Not to Warn: Online Signaling in Audit Games. CoRR abs/1905.06946 (2019) - [i47]Liang Tong, Aron Laszka, Chao Yan, Ning Zhang, Yevgeniy Vorobeychik:
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning. CoRR abs/1906.08805 (2019) - [i46]Kai Zhou, Tomasz P. Michalak, Yevgeniy Vorobeychik:
Adversarial Robustness of Similarity-Based Link Prediction. CoRR abs/1909.01432 (2019) - [i45]Tong Wu, Liang Tong, Yevgeniy Vorobeychik:
Defending Against Physically Realizable Attacks on Image Classification. CoRR abs/1909.09552 (2019) - [i44]Adith Boloor, Karthik Garimella, Xin He, Christopher D. Gill, Yevgeniy Vorobeychik, Xuan Zhang:
Attacking Vision-based Perception in End-to-End Autonomous Driving Models. CoRR abs/1910.01907 (2019) - [i43]Yi Li, Yevgeniy Vorobeychik:
Path Planning Games. CoRR abs/1910.13880 (2019) - [i42]Ren Pang, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Ting Wang:
The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models. CoRR abs/1911.01559 (2019) - [i41]Sixie Yu, Kai Zhou, P. Jeffrey Brantingham, Yevgeniy Vorobeychik:
Computing Equilibria in Binary Networked Public Goods Games. CoRR abs/1911.05788 (2019) - [i40]Andrew Estornell, Sanmay Das, Yevgeniy Vorobeychik:
Deception through Half-Truths. CoRR abs/1911.05885 (2019) - [i39]Taha Eghtesad, Yevgeniy Vorobeychik, Aron Laszka:
Deep Reinforcement Learning based Adaptive Moving Target Defense. CoRR abs/1911.11972 (2019) - [i38]Jasper Lu, David Kai Zhang, Zinovi Rabinovich, Svetlana Obraztsova, Yevgeniy Vorobeychik:
Manipulating Elections by Selecting Issues. CoRR abs/1911.12472 (2019) - [i37]Jinghan Yang, Ayan Chakrabarti, Yevgeniy Vorobeychik:
Protecting Geolocation Privacy of Photo Collections. CoRR abs/1912.02085 (2019) - 2018
- [b2]Yevgeniy Vorobeychik, Murat Kantarcioglu:
Adversarial Machine Learning. Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool Publishers 2018, ISBN 978-3-031-00452-0 - [j26]Yue Yin, Yevgeniy Vorobeychik, Bo An, Noam Hazon:
Optimal defense against election control by deleting voter groups. Artif. Intell. 259: 32-51 (2018) - [j25]Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
A game-theoretic approach for integrity assurance in resource-bounded systems. Int. J. Inf. Sec. 17(2): 221-242 (2018) - [j24]Weiyi Xia, Zhiyu Wan, Zhijun Yin, James Gaupp, Yongtai Liu, Ellen Wright Clayton, Murat Kantarcioglu, Yevgeniy Vorobeychik, Bradley A. Malin:
It's all in the timing: calibrating temporal penalties for biomedical data sharing. J. Am. Medical Informatics Assoc. 25(1): 25-31 (2018) - [j23]Xenofon D. Koutsoukos, Gabor Karsai, Aron Laszka, Himanshu Neema, Bradley Potteiger, Péter Völgyesi, Yevgeniy Vorobeychik, Janos Sztipanovits:
SURE: A Modeling and Simulation Integration Platform for Evaluation of Secure and Resilient Cyber-Physical Systems. Proc. IEEE 106(1): 93-112 (2018) - [j22]Alexander M. Sevy, Swetasudha Panda, James E. Crowe Jr., Jens Meiler, Yevgeniy Vorobeychik:
Integrating linear optimization with structural modeling to increase HIV neutralization breadth. PLoS Comput. Biol. 14(2) (2018) - [j21]Bo Li, Yevgeniy Vorobeychik:
Evasion-Robust Classification on Binary Domains. ACM Trans. Knowl. Discov. Data 12(4): 50:1-50:32 (2018) - [j20]Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks. IEEE Trans. Netw. Sci. Eng. 5(1): 65-78 (2018) - [c99]Joseph R. Coco, Cheng Ye, Chen Hajaj, Yevgeniy Vorobeychik, Joshua C. Denny, Laurie L. Novak, Bradley A. Malin, Thomas A. Lasko, Daniel Fabbri:
Crowdsourcing Clinical Chart Reviews. AMIA 2018 - [c98]Yongtai Liu, Zhiyu Wan, Weiyi Xia, Murat Kantarcioglu, Yevgeniy Vorobeychik, Ellen Wright Clayton, Abel N. Kho, David S. Carrell, Bradley A. Malin:
Detecting the Presence of an Individual in Phenotypic Summary Data. AMIA 2018 - [c97]Sixie Yu, Yevgeniy Vorobeychik, Scott Alfeld:
Adversarial Classification on Social Networks. AAMAS 2018: 211-219 - [c96]Bryan Wilder, Yevgeniy Vorobeychik:
Controlling Elections through Social Influence. AAMAS 2018: 265-273 - [c95]Ayan Mukhopadhyay, Zilin Wang, Yevgeniy Vorobeychik:
A Decision Theoretic Framework for Emergency Responder Dispatch. AAMAS 2018: 588-596 - [c94]Aaron Schlenker, Omkar Thakoor, Haifeng Xu, Fei Fang, Milind Tambe, Long Tran-Thanh, Phebe Vayanos, Yevgeniy Vorobeychik:
Deceiving Cyber Adversaries: A Game Theoretic Approach. AAMAS 2018: 892-900 - [c93]Chao Yan, Zhijun Yin, Stanley Xiang, You Chen, Yevgeniy Vorobeychik, Daniel Fabbri, Abel N. Kho, David M. Liebovitz, Bradley A. Malin:
Mining the Best Observational Window to Model Social Phenomena. CIC 2018: 46-55 - [c92]Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley A. Malin:
Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing. ICDE 2018: 1304-1307 - [c91]Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening. ICII 2018: 153-158 - [c90]Liang Tong, Sixie Yu, Scott Alfeld, Yevgeniy Vorobeychik:
Adversarial Regression with Multiple Learners. ICML 2018: 4953-4961 - [c89]Xintong Wang, Yevgeniy Vorobeychik, Michael P. Wellman:
A Cloaking Mechanism to Mitigate Market Manipulation. IJCAI 2018: 541-547 - [c88]Amin Ghafouri, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Adversarial Regression for Detecting Attacks in Cyber-Physical Systems. IJCAI 2018: 3769-3775 - [c87]Chen Hajaj, Yevgeniy Vorobeychik:
Adversarial Task Assignment. IJCAI 2018: 3783-3789 - [c86]Swetasudha Panda, Yevgeniy Vorobeychik:
Scalable Initial State Interdiction for Factored MDPs. IJCAI 2018: 4801-4807 - [p1]Yi Li, Shashank Shekhar, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos, Aniruddha S. Gokhale:
Simulation-Based Optimization as a Service for Dynamic Data-Driven Applications Systems. Handbook of Dynamic Data Driven Applications Systems 2018: 589-614 - [i36]Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley A. Malin:
Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing. CoRR abs/1801.07215 (2018) - [i35]Sixie Yu, Yevgeniy Vorobeychik, Scott Alfeld:
Adversarial Classification on Social Networks. CoRR abs/1801.08159 (2018) - [i34]Amin Ghafouri, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Adversarial Regression for Detecting Attacks in Cyber-Physical Systems. CoRR abs/1804.11022 (2018) - [i33]Chen Hajaj, Yevgeniy Vorobeychik:
Adversarial Task Assignment. CoRR abs/1804.11221 (2018) - [i32]Rajagopal Venkatesaramani, Yevgeniy Vorobeychik:
Community Detection by Information Flow Simulation. CoRR abs/1805.04920 (2018) - [i31]Grant Fennessy, Yevgeniy Vorobeychik:
Optical Neural Networks. CoRR abs/1805.06082 (2018) - [i30]Liang Tong, Sixie Yu, Scott Alfeld, Yevgeniy Vorobeychik:
Adversarial Regression with Multiple Learners. CoRR abs/1806.02256 (2018) - [i29]Chen Hajaj, Sixie Yu, Zlatko Joveski, Yevgeniy Vorobeychik:
Adversarial Coordination on Social Networks. CoRR abs/1808.01173 (2018) - [i28]Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game. CoRR abs/1808.08349 (2018) - [i27]Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening. CoRR abs/1808.09090 (2018) - [i26]Marcin Waniek, Kai Zhou, Yevgeniy Vorobeychik, Esteban Moro, Tomasz P. Michalak, Talal Rahwan:
Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network. CoRR abs/1809.00152 (2018) - [i25]Bryan Wilder, Yevgeniy Vorobeychik:
Defending Elections Against Malicious Spread of Misinformation. CoRR abs/1809.05521 (2018) - [i24]Kai Zhou, Tomasz P. Michalak, Talal Rahwan, Marcin Waniek, Yevgeniy Vorobeychik:
Adversarial Link Prediction in Social Networks. CoRR abs/1809.08368 (2018) - [i23]Yevgeniy Vorobeychik, Michael Pritchard:
Plan Interdiction Games. CoRR abs/1811.06162 (2018) - [i22]Yifan Chen, Yevgeniy Vorobeychik:
Regularized Ensembles and Transferability in Adversarial Learning. CoRR abs/1812.01821 (2018) - [i21]Sixie Yu, Yevgeniy Vorobeychik:
Removing Malicious Nodes from Networks. CoRR abs/1812.11448 (2018) - 2017
- [j19]Jian Lou, Andrew M. Smith, Yevgeniy Vorobeychik:
Multidefender Security Games. IEEE Intell. Syst. 32(1): 50-60 (2017) - [j18]Nika Haghtalab, Aron Laszka, Ariel D. Procaccia, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Monitoring stealthy diffusion. Knowl. Inf. Syst. 52(3): 657-685 (2017) - [j17]Bo Li, Yevgeniy Vorobeychik, Muqun Li, Bradley A. Malin:
Scalable Iterative Classification for Sanitizing Large-Scale Datasets. IEEE Trans. Knowl. Data Eng. 29(3): 698-711 (2017) - [c85]Jiarui Gan, Bo An, Yevgeniy Vorobeychik, Brian Gauch:
Security Games on a Plane. AAAI 2017: 530-536 - [c84]Aron Laszka, Yevgeniy Vorobeychik, Daniel Fabbri, Chao Yan, Bradley A. Malin:
A Game-Theoretic Approach for Alert Prioritization. AAAI Workshops 2017 - [c83]Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Improving network connectivity using trusted nodes and edges. ACC 2017: 328-333 - [c82]Fabian Prasser, James Gaupp, Zhiyu Wan, Weiyi Xia, Yevgeniy Vorobeychik, Murat Kantarcioglu, Klaus A. Kuhn, Bradley A. Malin:
An Open Source Tool for Game Theoretic Health Data De-Identification. AMIA 2017 - [c81]Ayan Mukhopadhyay, Yevgeniy Vorobeychik, Abhishek Dubey, Gautam Biswas:
Prioritized Allocation of Emergency Responders based on a Continuous-Time Incident Prediction Model. AAMAS 2017: 168-177 - [c80]Haifeng Zhang, Yevgeniy Vorobeychik, Ariel D. Procaccia:
Multi-Channel Marketing with Budget Complementarities. AAMAS 2017: 1232-1240 - [c79]Chang Liu, Bo Li, Yevgeniy Vorobeychik, Alina Oprea:
Robust Linear Regression Against Training Data Poisoning. AISec@CCS 2017: 91-102 - [c78]Bo Li, Kevin A. Roundy, Christopher S. Gates, Yevgeniy Vorobeychik:
Large-Scale Identification of Malicious Singleton Files. CODASPY 2017: 227-238 - [c77]Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Synergic security for smart water networks: redundancy, diversity, and hardening. CySWATER@CPSWeek 2017: 21-24 - [c76]Andrew M. Smith, Jackson R. Mayo, Vivian Kammler, Robert C. Armstrong, Yevgeniy Vorobeychik:
Using computational game theory to guide verification and security in hardware designs. HOST 2017: 110-115 - [c75]Swetasudha Panda, Yevgeniy Vorobeychik:
Near-Optimal Interdiction of Factored MDPs. UAI 2017 - [i20]Liang Tong, Bo Li, Chen Hajaj, Yevgeniy Vorobeychik:
Feature Conservation in Adversarial Classifier Evasion: A Case Study. CoRR abs/1708.08327 (2017) - [i19]Chen Hajaj, Yevgeniy Vorobeychik:
Adversarial Task Allocation. CoRR abs/1709.00358 (2017) - [i18]Bryan Wilder, Yevgeniy Vorobeychik:
Controlling Elections through Social Influence. CoRR abs/1711.08615 (2017) - 2016
- [j16]Haifeng Zhang, Yevgeniy Vorobeychik, Joshua Letchford, Kiran Lakkaraju:
Data-driven agent-based modeling, with application to rooftop solar adoption. Auton. Agents Multi Agent Syst. 30(6): 1023-1049 (2016) - [j15]Muqun Li, David Carrell, John S. Aberdeen, Lynette Hirschman, Jacqueline Kirby, Bo Li, Yevgeniy Vorobeychik, Bradley A. Malin:
Optimizing annotation resources for natural language de-identification via a game theoretic framework. J. Biomed. Informatics 61: 97-109 (2016) - [c74]Aron Laszka, Jian Lou, Yevgeniy Vorobeychik:
Multi-Defender Strategic Filtering Against Spear-Phishing Attacks. AAAI 2016: 537-543 - [c73]Haifeng Zhang, Yevgeniy Vorobeychik:
Submodular Optimization with Routing Constraints. AAAI 2016: 819-826 - [c72]Liyiming Ke, Bo Li, Yevgeniy Vorobeychik:
Behavioral Experiments in Email Filter Evasion. AAAI 2016: 827-834 - [c71]Qingyu Guo, Bo An, Yevgeniy Vorobeychik, Long Tran-Thanh, Jiarui Gan, Chunyan Miao:
Coalitional Security Games. AAMAS 2016: 159-167 - [c70]Chao Zhang, Victor Bucarey, Ayan Mukhopadhyay, Arunesh Sinha, Yundi Qian, Yevgeniy Vorobeychik, Milind Tambe:
Using Abstractions to Solve Opportunistic Crime Security Games at Scale. AAMAS 2016: 196-204 - [c69]Ayan Mukhopadhyay, Chao Zhang, Yevgeniy Vorobeychik, Milind Tambe, Kenneth Pence, Paul Speer:
Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model. GameSec 2016: 139-158 - [c68]Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments. GameSec 2016: 415-434 - [c67]Aron Laszka, Waseem Abbas, S. Shankar Sastry, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Optimal thresholds for intrusion detection systems. HotSoS 2016: 72-81 - [c66]Jian Lou, Yevgeniy Vorobeychik:
Decentralization and security in dynamic traffic light control. HotSoS 2016: 90-92 - [c65]Aron Laszka, Bradley Potteiger, Yevgeniy Vorobeychik, Saurabh Amin, Xenofon D. Koutsoukos:
Vulnerability of Transportation Networks to Traffic-Signal Tampering. ICCPS 2016: 16:1-16:10 - [c64]Himanshu Neema, Péter Völgyesi, Bradley Potteiger, William Emfinger, Xenofon D. Koutsoukos, Gabor Karsai, Yevgeniy Vorobeychik, Janos Sztipanovits:
Demo Abstract: SURE: An Experimentation and Evaluation Testbed for CPS Security and Resilience. ICCPS 2016: 27:1 - [c63]Yue Yin, Yevgeniy Vorobeychik, Bo An, Noam Hazon:
Optimally Protecting Elections. IJCAI 2016: 538-545 - [c62]Yevgeniy Vorobeychik:
Adversarial AI. IJCAI 2016: 4094-4099 - [c61]Bo Li, Yining Wang, Aarti Singh, Yevgeniy Vorobeychik:
Data Poisoning Attacks on Factorization-Based Collaborative Filtering. NIPS 2016: 1885-1893 - [i17]John J. Nay, Yevgeniy Vorobeychik:
Predicting Human Cooperation. CoRR abs/1601.07792 (2016) - [i16]Bo Li, Yevgeniy Vorobeychik, Xinyun Chen:
A General Retraining Framework for Scalable Adversarial Classification. CoRR abs/1604.02606 (2016) - [i15]Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering. CoRR abs/1606.06698 (2016) - [i14]Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments. CoRR abs/1606.06707 (2016) - [i13]Chang Liu, Bo Li, Yevgeniy Vorobeychik, Alina Oprea:
Robust High-Dimensional Linear Regression. CoRR abs/1608.02257 (2016) - [i12]Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks. CoRR abs/1608.07329 (2016) - [i11]Bo Li, Yining Wang, Aarti Singh, Yevgeniy Vorobeychik:
Data Poisoning Attacks on Factorization-Based Collaborative Filtering. CoRR abs/1608.08182 (2016) - [i10]Haifeng Zhang, Yevgeniy Vorobeychik:
Empirically Grounded Agent-Based Models of Innovation Diffusion: A Critical Review. CoRR abs/1608.08517 (2016) - 2015
- [j14]Yevgeniy Vorobeychik, Joshua Letchford:
Securing interdependent assets. Auton. Agents Multi Agent Syst. 29(2): 305-333 (2015) - [c60]Jiarui Gan, Bo An, Yevgeniy Vorobeychik:
Security Games with Protection Externalities. AAAI 2015: 914-920 - [c59]Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Optimal Personalized Filtering Against Spear-Phishing Attacks. AAAI 2015: 958-964 - [c58]Mason Wright, Yevgeniy Vorobeychik:
Mechanism Design for Team Formation. AAAI 2015: 1050-1056 - [c57]Swetasudha Panda, Yevgeniy Vorobeychik:
Designing Vaccines that Are Robust to Virus Escape. AAAI 2015: 4188-4189 - [c56]Bo Li, Yevgeniy Vorobeychik:
Scalable Optimization of Randomized Operational Decisions in Adversarial Classification Settings. AISTATS 2015 - [c55]Haifeng Zhang, Yevgeniy Vorobeychik, Joshua Letchford, Kiran Lakkaraju:
Data-Driven Agent-Based Modeling, with Application to Rooftop Solar Adoption. AAMAS 2015: 513-521 - [c54]Haifeng Zhang, Ariel D. Procaccia, Yevgeniy Vorobeychik:
Dynamic Influence Maximization Under Increasing Returns to Scale. AAMAS 2015: 949-957 - [c53]Swetasudha Panda, Yevgeniy Vorobeychik:
Stackelberg Games for Vaccine Design. AAMAS 2015: 1391-1399 - [c52]Swetasudha Panda, Yevgeniy Vorobeychik:
Stackelberg Games for Robust Vaccine Design. AAMAS 2015: 2003-2004 - [c51]Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems. CPS-SPC@CCS 2015: 55-66 - [c50]Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Resilient observation selection in adversarial settings. CDC 2015: 7416-7421 - [c49]Weiyi Xia, Murat Kantarcioglu, Zhiyu Wan, Raymond Heatherly, Yevgeniy Vorobeychik, Bradley A. Malin:
Process-Driven Data Privacy. CIKM 2015: 1021-1030 - [c48]Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Integrity assurance in resource-bounded systems through stochastic message authentication. HotSoS 2015: 1:1-1:12 - [c47]Nika Haghtalab, Aron Laszka, Ariel D. Procaccia, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Monitoring Stealthy Diffusion. ICDM 2015: 151-160 - [c46]Bo Li, Yevgeniy Vorobeychik, Muqun Li, Bradley A. Malin:
Iterative Classification for Sanitizing Large-Scale Datasets. ICDM 2015: 841-846 - [c45]Jian Lou, Yevgeniy Vorobeychik:
Equilibrium Analysis of Multi-Defender Security Games. IJCAI 2015: 596-602 - [i9]Mason Wright, Yevgeniy Vorobeychik:
Mechanism Design for Team Formation. CoRR abs/1501.00715 (2015) - [i8]Jian Lou, Andrew M. Smith, Yevgeniy Vorobeychik:
Multidefender Security Games. CoRR abs/1505.07548 (2015) - 2014
- [j13]Andrew M. Smith, Yevgeniy Vorobeychik, Joshua Letchford:
MultiDefender security games on networks. SIGMETRICS Perform. Evaluation Rev. 41(4): 4-7 (2014) - [c44]Joshua Letchford, Kiran Lakkaraju, Yevgeniy Vorobeychik:
Individual Household Modeling of Photovoltaic Adoption. AAAI Fall Symposia 2014 - [c43]Haifeng Zhang, Yevgeniy Vorobeychik, Joshua Letchford, Kiran Lakkaraju:
Predicting Rooftop Solar Adoption Using Agent-Based Modeling. AAAI Fall Symposia 2014 - [c42]Yevgeniy Vorobeychik, Bo An, Milind Tambe, Satinder Singh:
Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games. ICAPS 2014 - [c41]Yevgeniy Vorobeychik, Bo Li:
Optimal randomized classification in adversarial settings. AAMAS 2014: 485-492 - [c40]Mark Yampolskiy, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos, Péter Horváth, Heath J. LeBlanc, Janos Sztipanovits:
Resilient distributed consensus for tree topology. HiCoNS 2014: 41-48 - [c39]Waseem Abbas, Sajal Bhatia, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Immunization against Infection Propagation in Heterogeneous Networks. NCA 2014: 296-300 - [c38]Bo Li, Yevgeniy Vorobeychik:
Feature Cross-Substitution in Adversarial Classification. NIPS 2014: 2087-2095 - [i7]C. Seshadhri, Andrew M. Smith, Yevgeniy Vorobeychik, Jackson R. Mayo, Robert C. Armstrong:
Characterizing short-term stability for Boolean networks over any distribution of transfer functions. CoRR abs/1409.4360 (2014) - 2013
- [c37]Joshua Letchford, Yevgeniy Vorobeychik:
Optimal interdiction of attack plans. AAMAS 2013: 199-206 - [c36]Bo An, Matthew Brown, Yevgeniy Vorobeychik, Milind Tambe:
Security games with surveillance cost and optimal timing of attack execution. AAMAS 2013: 223-230 - [c35]Jason Tsai, Yundi Qian, Yevgeniy Vorobeychik, Christopher Kiekintveld, Milind Tambe:
Security games with contagion: handling asymmetric information. AAMAS 2013: 1185-1186 - [c34]Yevgeniy Vorobeychik, Michael Z. Lee, Adam Anderson, Mitch Adair, William Atkins, Alan Berryhill, Dominic Chen, Ben Cook, Jeremy Erickson, Steve Hurd, Ron Olsberg, Lyndon Pierson, Owen Redwood:
Fireaxe: the DHS secure design competition pilot. CSIIRW 2013: 21 - [c33]Jason Tsai, Yundi Qian, Yevgeniy Vorobeychik, Christopher Kiekintveld, Milind Tambe:
Bayesian Security Games for Controlling Contagion. SocialCom 2013: 33-38 - 2012
- [j12]Yevgeniy Vorobeychik, Daniel M. Reeves, Michael P. Wellman:
Constrained automated mechanism design for infinite games of incomplete information. Auton. Agents Multi Agent Syst. 25(2): 313-351 (2012) - [c32]Bo An, David Kempe, Christopher Kiekintveld, Eric Shieh, Satinder Singh, Milind Tambe, Yevgeniy Vorobeychik:
Security Games with Limited Surveillance. AAAI 2012: 1241-1248 - [c31]Yevgeniy Vorobeychik, Satinder Singh:
Computing Stackelberg Equilibria in Discounted Stochastic Games. AAAI 2012: 1478-1484 - [c30]Bo An, David Kempe, Christopher Kiekintveld, Eric Anyung Shieh, Satinder Singh, Milind Tambe, Yevgeniy Vorobeychik:
Security Games with Limited Surveillance: An Initial Report. AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health 2012 - [c29]Yevgeniy Vorobeychik, Bo An, Milind Tambe:
Adversarial Patrolling Games. AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health 2012 - [c28]Joshua Letchford, Yevgeniy Vorobeychik:
Computing optimal security strategies in networked domains: a cost-benefit approach. AAMAS 2012: 1303-1304 - [c27]Yevgeniy Vorobeychik, Bo An, Milind Tambe:
Adversarial patrolling games. AAMAS 2012: 1307-1308 - [c26]Michael J. Kearns, J. Stephen Judd, Yevgeniy Vorobeychik:
Behavioral experiments on a network formation game. EC 2012: 690-704 - [c25]Joshua Letchford, Yevgeniy Vorobeychik:
Computing Optimal Security Strategies for Interdependent Assets. UAI 2012: 459-468 - [i6]Yevgeniy Vorobeychik:
Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies. CoRR abs/1205.2607 (2012) - [i5]Yevgeniy Vorobeychik, Daniel M. Reeves, Michael P. Wellman:
Constrained Automated Mechanism Design for Infinite Games of Incomplete Information. CoRR abs/1206.5288 (2012) - [i4]Joshua Letchford, Yevgeniy Vorobeychik:
Computing Optimal Security Strategies for Interdependent Assets. CoRR abs/1210.4873 (2012) - 2011
- [j11]Yevgeniy Vorobeychik, Yagil Engel:
Average-case analysis of VCG with approximate resource allocation algorithms. Decis. Support Syst. 51(3): 648-656 (2011) - [j10]Yevgeniy Vorobeychik, Jackson R. Mayo, Robert C. Armstrong, Ronald G. Minnich, Don W. Rudish:
Fault oblivious high performance computing with dynamic task replication and substitution. Comput. Sci. Res. Dev. 26(3-4): 297-305 (2011) - [j9]Yevgeniy Vorobeychik:
Security and network effects: centralized and decentralized perspectives. SIGecom Exch. 10(3): 18-20 (2011) - [c24]Joshua Letchford, Yevgeniy Vorobeychik:
Computing Randomized Security Strategies in Networked Domains. Applied Adversarial Reasoning and Risk Modeling 2011 - [c23]Yevgeniy Vorobeychik:
A Game Theoretic Bidding Agent for the Ad Auction Game. ICAART (2) 2011: 35-44 - [c22]J. Stephen Judd, Michael J. Kearns, Yevgeniy Vorobeychik:
Behavioral Conflict and Fairness in Social Networks. WINE 2011: 242-253 - [i3]Yevgeniy Vorobeychik, Jackson R. Mayo, Robert C. Armstrong, Joseph R. Ruthruff:
Noncooperatively Optimized Tolerance: Decentralized Strategic Optimization in Complex Systems. CoRR abs/1104.3103 (2011) - [i2]Kevin M. Lochner, Daniel M. Reeves, Yevgeniy Vorobeychik, Michael P. Wellman:
Price Prediction in a Trading Agent Competition. CoRR abs/1107.0034 (2011) - [i1]C. Seshadhri, Yevgeniy Vorobeychik, Jackson R. Mayo, Robert C. Armstrong, Joseph R. Ruthruff:
Influence and Dynamic Behavior in Random Boolean Networks. CoRR abs/1107.3792 (2011) - 2010
- [j8]John Langford, Lihong Li, Yevgeniy Vorobeychik, Jennifer Wortman:
Maintaining Equilibria During Exploration in Sponsored Search Auctions. Algorithmica 58(4): 990-1021 (2010) - [j7]J. Stephen Judd, Michael J. Kearns, Yevgeniy Vorobeychik:
Behavioral dynamics and influence in networked coloring and consensus. Proc. Natl. Acad. Sci. USA 107(34): 14978-14982 (2010) - [j6]Yevgeniy Vorobeychik:
Probabilistic analysis of simulation-based games. ACM Trans. Model. Comput. Simul. 20(3): 16:1-16:25 (2010) - [c21]Quang Duong, Michael P. Wellman, Satinder Singh, Yevgeniy Vorobeychik:
History-dependent graphical multiagent models. AAMAS 2010: 1215-1222 - [c20]Yevgeniy Vorobeychik, Yagil Engel:
Incentive analysis of approximately efficient allocation algorithms. AAMAS 2010: 1479-1480 - [c19]Yevgeniy Vorobeychik, Yagil Engel:
Average-Case Analysis of Mechanism Design with Approximate Resource Allocation Algorithms. WINE 2010: 571-578
2000 – 2009
- 2009
- [j5]Yevgeniy Vorobeychik:
Simulation-based analysis of keyword auctions. SIGecom Exch. 8(1) (2009) - [c18]Jacomo Corbo, Yevgeniy Vorobeychik:
The Effects of Quality and Price on Adoption Dynamics of Competing Technologies. AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect 2009 - [c17]Jacomo Corbo, Yevgeniy Vorobeychik:
Quality and Price Effects on Technology Adoption. ICIS 2009: 40 - [c16]Quang Duong, Yevgeniy Vorobeychik, Satinder Singh, Michael P. Wellman:
Learning Graphical Game Models. IJCAI 2009: 116-121 - [c15]Yevgeniy Vorobeychik:
Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies. UAI 2009: 583-590 - [c14]Jacomo Corbo, Yevgeniy Vorobeychik:
Nudging Mechanisms for Technology Adoption. WINE 2009: 505-512 - [c13]Yevgeniy Vorobeychik, Michael P. Wellman:
Strategic Analysis with Simulation-based Games. WSC 2009: 359-372 - 2008
- [b1]Yevgeniy Vorobeychik:
Mechanism Design and Analysis Using Simulation-Based Game Models. University of Michigan, USA, 2008 - [j4]Yevgeniy Vorobeychik, Daniel M. Reeves:
Equilibrium analysis of dynamic bidding in sponsored search auctions. Int. J. Electron. Bus. 6(2): 172-193 (2008) - [c12]Yevgeniy Vorobeychik, Michael P. Wellman:
Stochastic search methods for nash equilibrium approximation in simulation-based games. AAMAS (2) 2008: 1055-1062 - [c11]Patrick R. Jordan, Yevgeniy Vorobeychik, Michael P. Wellman:
Searching for approximate equilibria in empirical games. AAMAS (2) 2008: 1063-1070 - 2007
- [j3]Yevgeniy Vorobeychik, Michael P. Wellman, Satinder Singh:
Learning payoff functions in infinite games. Mach. Learn. 67(1-2): 145-168 (2007) - [c10]Yevgeniy Vorobeychik, Daniel M. Reeves:
Automated Mechanism Design in Infinite Games of Incomplete Information: Framework and Applications. AAAI Spring Symposium: Game Theoretic and Decision Theoretic Agents 2007: 76-84 - [c9]Yevgeniy Vorobeychik, Daniel M. Reeves, Michael P. Wellman:
Constrained Automated Mechanism Design for Infinite Games of Incomplete Information. UAI 2007: 400-407 - [c8]Jennifer Wortman, Yevgeniy Vorobeychik, Lihong Li, John Langford:
Maintaining Equilibria During Exploration in Sponsored Search Auctions. WINE 2007: 119-130 - [c7]Yevgeniy Vorobeychik, Daniel M. Reeves:
Equilibrium Analysis of Dynamic Bidding in Sponsored Search Auctions. WINE 2007: 155-166 - 2006
- [c6]Yevgeniy Vorobeychik, Christopher Kiekintveld, Michael P. Wellman:
Empirical mechanism design: methods, with application to a supply-chain scenario. EC 2006: 306-315 - 2005
- [j2]Michael P. Wellman, Joshua Estelle, Satinder Singh, Yevgeniy Vorobeychik, Christopher Kiekintveld, Vishal Soni:
Strategic Interactions in a Supply Chain Game. Comput. Intell. 21(1): 1-26 (2005) - [c5]Christopher Kiekintveld, Yevgeniy Vorobeychik, Michael P. Wellman:
An Analysis of the 2004 Supply Chain Management Trading Agent Competition. AMEC@AAMAS/TADA@IJCAI 2005: 99-112 - [c4]Yevgeniy Vorobeychik, Michael P. Wellman, Satinder Singh:
Learning Payoff Functions in Infinite Games. IJCAI 2005: 977-982 - 2004
- [j1]Michael P. Wellman, Daniel M. Reeves, Kevin M. Lochner, Yevgeniy Vorobeychik:
Price Prediction in a Trading Agent Competition. J. Artif. Intell. Res. 21: 19-36 (2004) - [c3]Yevgeniy Vorobeychik, Michael P. Wellman, Satinder Singh:
Learning Payoff Functions in Infinite Games. AAAI Technical Report (2) 2004: 60-65 - [c2]Christopher Kiekintveld, Michael P. Wellman, Satinder Singh, Joshua Estelle, Yevgeniy Vorobeychik, Vishal Soni, Matthew R. Rudary:
Distributed Feedback Control for Decision Making on Supply Chains. ICAPS 2004: 384-392 - [c1]Joshua Estelle, Yevgeniy Vorobeychik, Michael P. Wellman, Satinder Singh, Christopher Kiekintveld, Vishal Soni:
Strategic Interactions in the TAC 2003 Supply Chain Tournament. Computers and Games 2004: 316-331