
-
Multi-Scale Games: Representing and Solving Games on Networks with Group Structure
Network games provide a natural machinery to compactly represent strateg...
read it
-
Incentivizing Truthfulness Through Audits in Strategic Classification
In many societal resource allocation domains, machine learning methods a...
read it
-
Blocking Adversarial Influence in Social Networks
While social networks are widely used as a media for information diffusi...
read it
-
Finding Physical Adversarial Examples for Autonomous Driving with Fast and Differentiable Image Compositing
There is considerable evidence that deep neural networks are vulnerable ...
read it
-
Optimizing Graph Structure for Targeted Diffusion
The problem of diffusion control on networks has been extensively studie...
read it
-
Robust Collective Classification against Structural Attacks
Collective learning methods exploit relations among data points to enhan...
read it
-
Election Control by Manipulating Issue Significance
Integrity of elections is vital to democratic systems, but it is frequen...
read it
-
Towards Robust Sensor Fusion in Visual Perception
We study the problem of robust sensor fusion in visual perception, espec...
read it
-
A Review of Emergency Incident Prediction, Resource Allocation and Dispatch Models
Emergency response to incidents such as roadway accidents is one of the ...
read it
-
Towards Robustness against Unsuspicious Adversarial Examples
Despite the remarkable success of deep neural networks, significant conc...
read it
-
Inducing Equilibria in Networked Public Goods Games through Network Structure Modification
Networked public goods games model scenarios in which self-interested ag...
read it
-
On Algorithmic Decision Procedures in Emergency Response Systems in Smart and Connected Communities
Emergency Response Management (ERM) is a critical problem faced by commu...
read it
-
Protecting Geolocation Privacy of Photo Collections
People increasingly share personal information, including their photos a...
read it
-
Manipulating Elections by Selecting Issues
Constructive election control considers the problem of an adversary who ...
read it
-
Deep Reinforcement Learning based Adaptive Moving Target Defense
Moving target defense (MTD) is a proactive defense approach that aims to...
read it
-
Deception through Half-Truths
Deception is a fundamental issue across a diverse array of settings, fro...
read it
-
Computing Equilibria in Binary Networked Public Goods Games
Public goods games study the incentives of individuals to contribute to ...
read it
-
The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models
Despite their tremendous success in a wide range of applications, deep n...
read it
-
Path Planning Games
Path planning is a fundamental and extensively explored problem in robot...
read it
-
Attacking Vision-based Perception in End-to-End Autonomous Driving Models
Recent advances in machine learning, especially techniques such as deep ...
read it
-
Defending Against Physically Realizable Attacks on Image Classification
We study the problem of defending deep neural network approaches for ima...
read it
-
Adversarial Robustness of Similarity-Based Link Prediction
Link prediction is one of the fundamental problems in social network ana...
read it
-
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning
Detection of malicious behavior is a fundamental problem in security. On...
read it
-
To Warn or Not to Warn: Online Signaling in Audit Games
Routine operational use of sensitive data is commonly governed by laws a...
read it
-
Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models
Recent advances in machine learning, especially techniques such as deep ...
read it
-
An Online Decision-Theoretic Pipeline for Responder Dispatch
The problem of dispatching emergency responders to service traffic accid...
read it
-
Distributionally Robust Removal of Malicious Nodes from Networks
An important problem in networked systems is detection and removal of su...
read it
-
Removing Malicious Nodes from Networks
A fundamental challenge in networked systems is detection and removal of...
read it
-
Regularized Ensembles and Transferability in Adversarial Learning
Despite the considerable success of convolutional neural networks in a b...
read it
-
Plan Interdiction Games
We propose a framework for cyber risk assessment and mitigation which mo...
read it
-
Adversarial Link Prediction in Social Networks
Link prediction is one of the fundamental tools in social network analys...
read it
-
Defending Elections Against Malicious Spread of Misinformation
The integrity of democratic elections depends on voters' access to accur...
read it
-
Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network
Link prediction is one of the fundamental research problems in network a...
read it
-
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening
As the Industrial Internet of Things (IIot) becomes more prevalent in cr...
read it
-
Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game
In recent years, state-of-the-art traffic-control devices have evolved f...
read it
-
Adversarial Regression with Multiple Learners
Despite the considerable success enjoyed by machine learning techniques ...
read it
-
Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
Attacks in cyber-physical systems (CPS) which manipulate sensor readings...
read it
-
Adversarial Task Assignment
The problem of assigning tasks to workers is of long-standing fundamenta...
read it
-
Adversarial Classification on Social Networks
The spread of unwanted or malicious content through social media has bec...
read it
-
Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing
For enhancing the privacy protections of databases, where the increasing...
read it
-
Controlling Elections through Social Influence
Election control considers the problem of an adversary who attempts to t...
read it
-
Adversarial Task Allocation
The problem of allocating tasks to workers is of long standing fundament...
read it
-
Robust High-Dimensional Linear Regression
The effectiveness of supervised learning techniques has made them ubiqui...
read it
-
A General Retraining Framework for Scalable Adversarial Classification
Traditional classification algorithms assume that training and test data...
read it
-
Multidefender Security Games
Stackelberg security game models and associated computational tools have...
read it
-
Influence and Dynamic Behavior in Random Boolean Networks
We present a rigorous mathematical framework for analyzing dynamics of a...
read it