default search action
11th GameSec 2020: College Park, MD, USA
- Quanyan Zhu, John S. Baras, Radha Poovendran, Juntao Chen:
Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings. Lecture Notes in Computer Science 12513, Springer 2020, ISBN 978-3-030-64792-6
Machine Learning and Security
- Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, Justin Kopacz:
Distributed Generative Adversarial Networks for Anomaly Detection. 3-22 - Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang:
Learning and Planning in the Feature Deception Problem. 23-44 - Alonso Granados, Mohammad Sujan Miah, Anthony Ortiz, Christopher Kiekintveld:
A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine Learning. 45-57 - Taha Eghtesad, Yevgeniy Vorobeychik, Aron Laszka:
Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense. 58-79 - Mark Bilinski, Joe DiVita, Kimberly Ferguson-Walter, Sunny Fugate, Ryan Gabrys, Justin Mauger, Brian Souza:
Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception Game of Questionable Veracity. 80-100
Cyber Deception
- Omkar Thakoor, Shahin Jabbari, Palvi Aggarwal, Cleotilde Gonzalez, Milind Tambe, Phebe Vayanos:
Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games. 103-124 - Linan Huang, Quanyan Zhu:
Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots. 125-146 - Stephanie Milani, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang:
Harnessing the Power of Deception in Attack Graph-Based Security Games. 147-167 - Abhishek Ninad Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, Nandi O. Leslie:
Decoy Allocation Games on Graphs with Temporal Logic Objectives. 168-187 - Ayon Sen, Xiaojin Zhu, Erin Marshall, Robert D. Nowak:
Popular Imperceptibility Measures in Visual Adversarial Attacks are Far from Human Perception. 188-199
Cyber-Physical System Security
- Muhammad Aneeq uz Zaman, Sujay Bhatt, Tamer Basar:
Secure Discrete-Time Linear-Quadratic Mean-Field Games. 203-222 - Christos N. Mavridis, Nilesh Suriyarachchi, John S. Baras:
Detection of Dynamically Changing Leaders in Complex Swarms from Observed Dynamic Data. 223-240 - Sailik Sengupta, Kaustav Basu, Arunabha Sen, Subbarao Kambhampati:
Moving Target Defense for Robust Monitoring of Electric Grid Transformers in Adversarial Environments. 241-253
Security of Network Systems
- Feiran Jia, Kai Zhou, Charles A. Kamhoua, Yevgeniy Vorobeychik:
Blocking Adversarial Influence in Social Networks. 257-276 - Xiaobai Ma, Jayesh K. Gupta, Mykel J. Kochenderfer:
Normalizing Flow Policies for Multi-agent Systems. 277-296 - Ahmed H. Anwar, Nandi O. Leslie, Charles A. Kamhoua, Christopher Kiekintveld:
A Game Theoretic Framework for Software Diversity for Network Security. 297-311 - Olivier Tsemogne, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue:
Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic. 312-325 - Yuhan Zhao, Quanyan Zhu:
Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber Supply Chain Ecosystem. 326-345
Theoretic Foundations of Security Games
- Hamid Emadi, Sourabh Bhattacharya:
On the Characterization of Saddle Point Equilibrium for Security Games with Additive Utility. 349-364 - Yunian Pan, Guanze Peng, Juntao Chen, Quanyan Zhu:
MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation. 365-384 - Petr Tomásek, Branislav Bosanský, Thanh Hong Nguyen:
Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks. 385-404 - Guanze Peng, Tao Zhang, Quanyan Zhu:
A Data-Driven Distributionally Robust Game Using Wasserstein Distance. 405-421 - Stefan Rass, Angelika Wiegele, Sandra König:
Security Games over Lexicographic Orders. 422-441
Emerging Topics
- Ahmed H. Anwar, Charles A. Kamhoua:
Game Theory on Attack Graph for Cyber Deception. 445-456 - Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:
Attacking Machine Learning Models for Social Good. 457-471 - Daigo Shishika, Vijay Kumar:
A Review of Multi Agent Perimeter Defense Games. 472-485 - Gang Qu:
Hardware Security and Trust: A New Battlefield of Information. 486-501 - Derya Cansever:
Security Games with Insider Threats. 502-505 - Alex Sprintson:
Securing Next-Generation Wireless Networks: Challenges and Opportunities (Extended Abstract). 506-510
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.