default search action
Zhengyu Yin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2014
- [j4]Francesco Maria Delle Fave, Albert Xin Jiang, Zhengyu Yin, Chao Zhang, Milind Tambe, Sarit Kraus, John P. Sullivan:
Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System. J. Artif. Intell. Res. 50: 321-367 (2014) - 2012
- [j3]Zhengyu Yin, Albert Xin Jiang, Milind Tambe, Christopher Kiekintveld, Kevin Leyton-Brown, Tuomas Sandholm, John P. Sullivan:
TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems Using Game Theory. AI Mag. 33(4): 59-72 (2012) - [j2]Lei Shi, Bin Liu, Changhua Sun, Zhengyu Yin, Laxmi N. Bhuyan, H. Jonathan Chao:
Load-Balancing Multipath Switching System with Flow Slice. IEEE Trans. Computers 61(3): 350-365 (2012) - 2011
- [j1]Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintveld, Vincent Conitzer, Milind Tambe:
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness. J. Artif. Intell. Res. 41: 297-327 (2011)
Conference and Workshop Papers
- 2023
- [c22]Zhengyu Yin:
Implementation and research of a pre hospital emergency system based on optimized PBFT consensus algorithm. AIBDF 2023: 203-208 - 2013
- [c21]Albert Xin Jiang, Zhengyu Yin, Chao Zhang, Milind Tambe, Sarit Kraus:
Game-theoretic randomization for security patrolling with dynamic execution uncertainty. AAMAS 2013: 207-214 - [c20]Samantha Luber, Zhengyu Yin, Francesco Maria Delle Fave, Albert Xin Jiang, Milind Tambe, John P. Sullivan:
Game-theoretic patrol strategies for transit systems: the TRUSTS system and its mobile app. AAMAS 2013: 1377-1378 - 2012
- [c19]Albert Xin Jiang, Zhengyu Yin, Matthew P. Johnson, Milind Tambe, Christopher Kiekintveld, Kevin Leyton-Brown, Tuomas Sandholm:
Towards Optimal Patrol Strategies for Fare Inspection in Transit Systems. AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health 2012 - [c18]Zhengyu Yin, Milind Tambe:
A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games. AAMAS 2012: 855-862 - [c17]Ondrej Vanek, Zhengyu Yin, Manish Jain, Branislav Bosanský, Milind Tambe, Michal Pechoucek:
Game-theoretic resource allocation for malicious packet detection in computer networks. AAMAS 2012: 905-912 - [c16]Michal Jakob, Zbynek Moler, Antonín Komenda, Zhengyu Yin, Albert Xin Jiang, Matthew Paul Johnson, Michal Pechoucek, Milind Tambe:
AgentPolis: towards a platform for fully agent-based modeling of multi-modal transportation (demonstration). AAMAS 2012: 1501-1502 - [c15]Zhengyu Yin, Albert Xin Jiang, Matthew Paul Johnson, Christopher Kiekintveld, Kevin Leyton-Brown, Tuomas Sandholm, Milind Tambe, John P. Sullivan:
TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems. IAAI 2012: 2348-2355 - 2011
- [c14]Manish Jain, Zhengyu Yin, Milind Tambe, Fernando Ordóñez:
Addressing Execution and Observation Error in Security Games. Applied Adversarial Reasoning and Risk Modeling 2011 - [c13]Zhengyu Yin, Manish Jain, Milind Tambe, Fernando Ordóñez:
Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty. AAAI 2011: 758-763 - [c12]Rong Yang, Milind Tambe, Manish Jain, Jun-young Kwak, James Pita, Zhengyu Yin:
Game Theory and Human Behavior: Challenges in Security and Sustainability. ADT 2011: 320-330 - [c11]Meritxell Vinyals, Eric Anyung Shieh, Jesús Cerquides, Juan A. Rodríguez-Aguilar, Zhengyu Yin, Milind Tambe, Emma Bowring:
Quality guarantees for region optimal DCOP algorithms. AAMAS 2011: 133-140 - [c10]Jun-young Kwak, Rong Yang, Zhengyu Yin, Matthew E. Taylor, Milind Tambe:
Teamwork in distributed POMDPs: execution-time coordination under model uncertainty. AAMAS 2011: 1261-1262 - [c9]Jun-young Kwak, Rong Yang, Zhengyu Yin, Matthew E. Taylor, Milind Tambe:
Towards Addressing Model Uncertainty: Robust Execution-Time Coordination for Teamwork. IAT 2011: 204-207 - [c8]Zhengyu Yin, Milind Tambe:
Continuous Time Planning for Multiagent Teams with Temporal Constraints. IJCAI 2011: 465-471 - 2010
- [c7]Jun-young Kwak, Rong Yang, Zhengyu Yin, Matthew E. Taylor, Milind Tambe:
Teamwork and Coordination under Model Uncertainty in DEC-POMDPs. Interactive Decision Theory and Game Theory 2010 - [c6]Jason Tsai, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld, Milind Tambe:
Urban Security: Game-Theoretic Resource Allocation in Networked Domains. AAAI 2010: 881-886 - [c5]Christopher Kiekintveld, Zhengyu Yin, Atul Kumar, Milind Tambe:
Asynchronous algorithms for approximate distributed constraint optimization with quality bounds. AAMAS 2010: 133-140 - [c4]Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintveld, Vincent Conitzer, Milind Tambe:
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness. AAMAS 2010: 1139-1146 - [c3]Jason Tsai, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld, Milind Tambe:
How to protect a city: strategic security placement in graph-based domains. AAMAS 2010: 1453-1454 - 2009
- [c2]Emma Bowring, Zhengyu Yin, Rob Zinkov, Milind Tambe:
Sensitivity analysis for distributed optimization with resource constraints. AAMAS (1) 2009: 633-640 - 2007
- [c1]Lei Shi, Bin Liu, Changhua Sun, Zhengyu Yin, Laxmi N. Bhuyan, H. Jonathan Chao:
Flow-slice: a novel load-balancing scheme for multi-path switching systems. ANCS 2007: 45-46
Informal and Other Publications
- 2014
- [i1]Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintveld, Vincent Conitzer, Milind Tambe:
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness. CoRR abs/1401.3888 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint