Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy
 For more images, please select "images" in the filters.
When AI helps wildlife conservation: learning adversary behavior in green security games
PDF
Pdf
Keep the adversary guessing: agent security by policy randomization
Predicting and planning against real-world adversaries: an end-to-end pipeline to combat illegal wildlife poachers on a global scale
PDF
Human adversaries in security games: integrating models of bounded rationality and fast algorithms
PDF
Balancing tradeoffs in security games: handling defenders and adversaries with multiple objectives
PDF
Thwarting adversaries with unpredictability: massive-scale game-theoretic algorithms for real-world security deployments
PDF
The human element: addressing human adversaries in security domains
PDF
Theory and applications of adversarial and structured knowledge learning
PDF
Modeling human bounded rationality in opportunistic security games
PDF
Topics in algorithms for new classes of non-cooperative games
PDF
Game theoretic deception and threat screening for cyber security
PDF
Addressing uncertainty in Stackelberg games for security: models and algorithms
PDF
Discounted robust stochastic games with applications to homeland security and flow control
PDF
Towards addressing spatio-temporal aspects in security games
PDF
Reducing unproductive learning activities in serious games for second language acquisition
PDF
Historicity and sociality in game design: adventures in ludic archaeology
PDF
HARDSCOPE: balancing competition with performance in multiplayer games
PDF
Combating adversaries under uncertainties in real-world security problems: advanced game-theoretic behavioral models and robust algorithms
PDF
Not a Lone Ranger: unleashing defender teamwork in security games
PDF
Protecting networks against diffusive attacks: game-theoretic resource allocation for contagion mitigation
PDF
Pdf
Computational model of human behavior in security games with varying number of targets
Hierarchical planning in security games: a game theoretic approach to strategic, tactical and operational decision making
PDF
Machine learning in interacting multi-agent systems
PDF
Virtual worlds as contact zones: development, localization, and intergroup communication in MMORPGs
PDF
Dynamic jamming games with discrete levels
PDF
of 5