Personensuche
X
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
2
Casino Rationale: Countering Attacker Deception in Zero-Sum..:
, In:
?
2022 IEEE Applied Imagery Pattern Recognition Workshop (AIPR) ,
3
Maritime Object Detection with Event-Based Cameras:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
4
No Time to Lie: Bounds on the Learning Rate of a Defender f..:
, In:
?
2021 IEEE Applied Imagery Pattern Recognition Workshop (AIPR) ,
5
Real-Time Event-Based Tracking and Detection for Maritime E..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
6
Lie Another Day: Demonstrating Bias in a Multi-round Cyber ..:
, In:
?
2020 29th Wireless and Optical Communications Conference (WOCC) ,
7
Blind Source Separation with L1 Regularized Sparse Autoenco..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
8
You only Lie Twice: A Multi-round Cyber Deception Game of Q..:
, In:
?
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security ,
9
Game theory for adaptive defensive cyber deception:
, In:
?
2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI) ,
10
Creating Cyber Deception Games:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
11