This paper addresses a new motion planning problem for mobile robots tas...
We investigate adversarial robustness of unsupervised Graph Contrastive
...
While ensuring stability for linear systems is well understood, it remai...
Over the years, honeypots emerged as an important security tool to under...
State-of-the-art order dispatching algorithms for ridesharing batch pass...
Autonomous systems increasingly rely on machine learning techniques to
t...
The collection and sharing of genomic data are becoming increasingly
com...
Function approximation has enabled remarkable advances in applying
reinf...
Many problems can be viewed as forms of geospatial search aided by aeria...
Most reinforcement learning algorithms implicitly assume strong synchron...
Despite considerable advances in deep reinforcement learning, it has bee...
The integrity of elections is central to democratic systems. However, a
...
We present a rotating proposer mechanism for team formation, which imple...
The workshop will focus on the application of AI to problems in cyber
se...
Motivated by a broad class of mobile intervention problems, we propose a...
Large genomic datasets are now created through numerous activities, incl...
Modern AI tools, such as generative adversarial networks, have transform...
The field of quantitative analytics has transformed the world of sports ...
Deception is a crucial tool in the cyberdefence repertoire, enabling
def...
Internet of Things (IoT) devices and applications can have significant
v...
We present the first framework of Certifying Robust Policies for
reinfor...
Many real-world systems possess a hierarchical structure where a strateg...
Many collective decision-making settings feature a strategic tension bet...
We present FACESEC, a framework for fine-grained robustness evaluation o...
We present the design and analysis of a multi-level game-theoretic model...
DNA sequencing is becoming increasingly commonplace, both in medical and...
Network games provide a natural machinery to compactly represent strateg...
In many societal resource allocation domains, machine learning methods a...
While social networks are widely used as a media for information diffusi...
There is considerable evidence that deep neural networks are vulnerable ...
The problem of diffusion control on networks has been extensively studie...
Collective learning methods exploit relations among data points to enhan...
Integrity of elections is vital to democratic systems, but it is frequen...
We study the problem of robust sensor fusion in visual perception, espec...
Emergency response to incidents such as roadway accidents is one of the ...
Despite the remarkable success of deep neural networks, significant conc...
Networked public goods games model scenarios in which self-interested ag...
Emergency Response Management (ERM) is a critical problem faced by
commu...
People increasingly share personal information, including their photos a...
Constructive election control considers the problem of an adversary who ...
Moving target defense (MTD) is a proactive defense approach that aims to...
Deception is a fundamental issue across a diverse array of settings, fro...
Public goods games study the incentives of individuals to contribute to ...
Despite their tremendous success in a wide range of applications, deep n...
Path planning is a fundamental and extensively explored problem in robot...
Recent advances in machine learning, especially techniques such as deep
...
We study the problem of defending deep neural network approaches for ima...
Link prediction is one of the fundamental problems in social network
ana...
Detection of malicious behavior is a fundamental problem in security. On...
Routine operational use of sensitive data is commonly governed by laws a...