Sciweavers

179 search results - page 24 / 36
» Adversarial Leakage in Games
Sort
View
AAAI
2008
14 years 4 days ago
Proactive Intrusion Detection
Machine learning systems are deployed in many adversarial conditions like intrusion detection, where a classifier has to decide whether a sequence of actions come from a legitimat...
Benjamin Liebald, Dan Roth, Neelay Shah, Vivek Sri...
RAS
2007
103views more  RAS 2007»
13 years 9 months ago
A decomposition approach to multi-vehicle cooperative control
We use a decomposition approach to generate cooperative strategies for a class of multi-vehicle control problems. By introducing a set of tasks to be completed by the team of vehi...
Matthew G. Earl, Raffaello D'Andrea
INFORMATICASI
2010
13 years 7 months ago
Strategic Modeling of Information Sharing among Data Privacy Attackers
Research in privacy-preserving data publishing has revealed the necessity of accounting for an adversary's background knowledge when reasoning about the protection afforded b...
Quang Duong, Kristen LeFevre, Michael P. Wellman
FSEN
2009
Springer
14 years 4 months ago
The Complexity of Reachability in Randomized Sabotage Games
Abstract. We analyze a model of fault-tolerant systems in a probabilistic setting. The model has been introduced under the name of “sabotage games”. A reachability problem over...
Dominik Klein, Frank G. Radmacher, Wolfgang Thomas
INFOCOM
2008
IEEE
14 years 4 months ago
Information Concealing Games
— Consider the situation in which a decision maker (Actor) has to decide which of several available resources to use in the presence of an adversary (called Controller) that can ...
Saswati Sarkar, Eitan Altman, Rachid El Azouzi, Ye...