Sciweavers

179 search results - page 8 / 36
» Adversarial Leakage in Games
Sort
View
GAMESEC
2010
128views Game Theory» more  GAMESEC 2010»
13 years 7 months ago
Tracking Games in Mobile Networks
Abstract. Users of mobile networks can change their identifiers in regions called mix zones in order to defeat the attempt of third parties to track their location. Mix zones must ...
Mathias Humbert, Mohammad Hossein Manshaei, Julien...
ICMCS
2007
IEEE
153views Multimedia» more  ICMCS 2007»
14 years 4 months ago
Towards Adversary Aware Surveillance Systems
We consider surveillance problems to be a set of system- adversary interaction problems in which an adversary can be modeled as a rational (selfish) agent trying to maximize his ...
Vivek K. Singh, Mohan S. Kankanhalli
COLT
2008
Springer
13 years 11 months ago
When Random Play is Optimal Against an Adversary
We analyze a sequential game between a Gambler and a Casino. The Gambler allocates bets from a limited budget over a fixed menu of gambling events that are offered at equal time i...
Jacob Abernethy, Manfred K. Warmuth, Joel Yellin
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
14 years 1 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
ICML
2010
IEEE
13 years 11 months ago
Convergence, Targeted Optimality, and Safety in Multiagent Learning
This paper introduces a novel multiagent learning algorithm, Convergence with Model Learning and Safety (or CMLeS in short), which achieves convergence, targeted optimality agains...
Doran Chakraborty, Peter Stone