


default search action
11th GameSec 2020: College Park, MD, USA
- Quanyan Zhu

, John S. Baras
, Radha Poovendran
, Juntao Chen
:
Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings. Lecture Notes in Computer Science 12513, Springer 2020, ISBN 978-3-030-64792-6
Machine Learning and Security
- Marc Katzef

, Andrew C. Cullen
, Tansu Alpcan
, Christopher Leckie
, Justin Kopacz
:
Distributed Generative Adversarial Networks for Anomaly Detection. 3-22 - Zheyuan Ryan Shi

, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang
:
Learning and Planning in the Feature Deception Problem. 23-44 - Alonso Granados, Mohammad Sujan Miah, Anthony Ortiz, Christopher Kiekintveld:

A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine Learning. 45-57 - Taha Eghtesad, Yevgeniy Vorobeychik, Aron Laszka

:
Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense. 58-79 - Mark Bilinski

, Joe DiVita
, Kimberly Ferguson-Walter
, Sunny Fugate
, Ryan Gabrys
, Justin Mauger
, Brian Souza
:
Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception Game of Questionable Veracity. 80-100
Cyber Deception
- Omkar Thakoor, Shahin Jabbari, Palvi Aggarwal

, Cleotilde Gonzalez, Milind Tambe, Phebe Vayanos:
Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games. 103-124 - Linan Huang

, Quanyan Zhu:
Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots. 125-146 - Stephanie Milani

, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang
:
Harnessing the Power of Deception in Attack Graph-Based Security Games. 147-167 - Abhishek Ninad Kulkarni

, Jie Fu
, Huan Luo
, Charles A. Kamhoua
, Nandi O. Leslie
:
Decoy Allocation Games on Graphs with Temporal Logic Objectives. 168-187 - Ayon Sen, Xiaojin Zhu, Erin Marshall

, Robert D. Nowak:
Popular Imperceptibility Measures in Visual Adversarial Attacks are Far from Human Perception. 188-199
Cyber-Physical System Security
- Muhammad Aneeq uz Zaman

, Sujay Bhatt, Tamer Basar:
Secure Discrete-Time Linear-Quadratic Mean-Field Games. 203-222 - Christos N. Mavridis

, Nilesh Suriyarachchi, John S. Baras:
Detection of Dynamically Changing Leaders in Complex Swarms from Observed Dynamic Data. 223-240 - Sailik Sengupta, Kaustav Basu, Arunabha Sen, Subbarao Kambhampati:

Moving Target Defense for Robust Monitoring of Electric Grid Transformers in Adversarial Environments. 241-253
Security of Network Systems
- Feiran Jia, Kai Zhou

, Charles A. Kamhoua, Yevgeniy Vorobeychik:
Blocking Adversarial Influence in Social Networks. 257-276 - Xiaobai Ma

, Jayesh K. Gupta
, Mykel J. Kochenderfer
:
Normalizing Flow Policies for Multi-agent Systems. 277-296 - Ahmed H. Anwar

, Nandi O. Leslie, Charles A. Kamhoua
, Christopher Kiekintveld
:
A Game Theoretic Framework for Software Diversity for Network Security. 297-311 - Olivier Tsemogne, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue:

Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic. 312-325 - Yuhan Zhao, Quanyan Zhu:

Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber Supply Chain Ecosystem. 326-345
Theoretic Foundations of Security Games
- Hamid Emadi

, Sourabh Bhattacharya
:
On the Characterization of Saddle Point Equilibrium for Security Games with Additive Utility. 349-364 - Yunian Pan

, Guanze Peng
, Juntao Chen
, Quanyan Zhu
:
MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation. 365-384 - Petr Tomásek

, Branislav Bosanský, Thanh Hong Nguyen:
Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks. 385-404 - Guanze Peng

, Tao Zhang
, Quanyan Zhu
:
A Data-Driven Distributionally Robust Game Using Wasserstein Distance. 405-421 - Stefan Rass

, Angelika Wiegele
, Sandra König
:
Security Games over Lexicographic Orders. 422-441
Emerging Topics
- Ahmed H. Anwar

, Charles A. Kamhoua
:
Game Theory on Attack Graph for Cyber Deception. 445-456 - Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:

Attacking Machine Learning Models for Social Good. 457-471 - Daigo Shishika

, Vijay Kumar
:
A Review of Multi Agent Perimeter Defense Games. 472-485 - Gang Qu:

Hardware Security and Trust: A New Battlefield of Information. 486-501 - Derya Cansever:

Security Games with Insider Threats. 502-505 - Alex Sprintson

:
Securing Next-Generation Wireless Networks: Challenges and Opportunities (Extended Abstract). 506-510

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














