Abstract is missing.
- Distributed Generative Adversarial Networks for Anomaly DetectionMarc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, Justin Kopacz. 3-22 [doi]
- Learning and Planning in the Feature Deception ProblemZheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang. 23-44 [doi]
- A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine LearningAlonso Granados, Mohammad Sujan Miah, Anthony Ortiz, Christopher Kiekintveld. 45-57 [doi]
- Adversarial Deep Reinforcement Learning Based Adaptive Moving Target DefenseTaha Eghtesad, Yevgeniy Vorobeychik, Aron Laszka. 58-79 [doi]
- Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception Game of Questionable VeracityMark Bilinski, Joe diVita, Kimberly Ferguson-Walter, Sunny Fugate, Ryan Gabrys, Justin Mauger, Brian Souza. 80-100 [doi]
- Exploiting Bounded Rationality in Risk-Based Cyber Camouflage GamesOmkar Thakoor, Shahin Jabbari, Palvi Aggarwal, Cleotilde Gonzalez, Milind Tambe, Phebe Vayanos. 103-124 [doi]
- Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive HoneypotsLinan Huang, Quanyan Zhu. 125-146 [doi]
- Harnessing the Power of Deception in Attack Graph-Based Security GamesStephanie Milani, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang. 147-167 [doi]
- Decoy Allocation Games on Graphs with Temporal Logic ObjectivesAbhishek Ninad Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, Nandi O. Leslie. 168-187 [doi]
- Popular Imperceptibility Measures in Visual Adversarial Attacks are Far from Human PerceptionAyon Sen, Xiaojin Zhu 0001, Erin Marshall, Robert D. Nowak. 188-199 [doi]
- Secure Discrete-Time Linear-Quadratic Mean-Field GamesMuhammad Aneeq uz Zaman, Sujay Bhatt, Tamer Basar. 203-222 [doi]
- Detection of Dynamically Changing Leaders in Complex Swarms from Observed Dynamic DataChristos N. Mavridis, Nilesh Suriyarachchi, John S. Baras. 223-240 [doi]
- Moving Target Defense for Robust Monitoring of Electric Grid Transformers in Adversarial EnvironmentsSailik Sengupta, Kaustav Basu, Arunabha Sen, Subbarao Kambhampati. 241-253 [doi]
- Blocking Adversarial Influence in Social NetworksFeiran Jia, Kai Zhou, Charles A. Kamhoua, Yevgeniy Vorobeychik. 257-276 [doi]
- Normalizing Flow Policies for Multi-agent SystemsXiaobai Ma, Jayesh K. Gupta, Mykel J. Kochenderfer. 277-296 [doi]
- A Game Theoretic Framework for Software Diversity for Network SecurityAhmed H. Anwar, Nandi O. Leslie, Charles A. Kamhoua, Christopher Kiekintveld. 297-311 [doi]
- Partially Observable Stochastic Games for Cyber Deception Against Network EpidemicOlivier Tsemogne, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue. 312-325 [doi]
- Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber Supply Chain EcosystemYuhan Zhao, Quanyan Zhu. 326-345 [doi]
- On the Characterization of Saddle Point Equilibrium for Security Games with Additive UtilityHamid Emadi, Sourabh Bhattacharya. 349-364 [doi]
- MASAGE: Model-Agnostic Sequential and Adaptive Game EstimationYunian Pan, Guanze Peng, Juntao Chen, Quanyan Zhu. 365-384 [doi]
- Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential AttacksPetr Tomásek, Branislav Bosanský, Thanh Hong Nguyen. 385-404 [doi]
- A Data-Driven Distributionally Robust Game Using Wasserstein DistanceGuanze Peng, Tao Zhang 0011, Quanyan Zhu. 405-421 [doi]
- Security Games over Lexicographic OrdersStefan Rass, Angelika Wiegele, Sandra König. 422-441 [doi]
- Game Theory on Attack Graph for Cyber DeceptionAhmed H. Anwar, Charles A. Kamhoua. 445-456 [doi]
- Attacking Machine Learning Models for Social GoodVibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani Thuriasingham. 457-471 [doi]
- A Review of Multi Agent Perimeter Defense GamesDaigo Shishika, Vijay Kumar 0001. 472-485 [doi]
- Hardware Security and Trust: A New Battlefield of InformationGang Qu. 486-501 [doi]
- Security Games with Insider ThreatsDerya Cansever. 502-505 [doi]
- Securing Next-Generation Wireless Networks: Challenges and Opportunities (Extended Abstract)Alex Sprintson. 506-510 [doi]