Computational Economics Research Lab

Home » Publications

Publications

Swetasudha Panda and Yevgeniy Vorobeychik. Near-optimal interdiction of factored MDPs. (UAI, 2017, to appear).

Zhiyu Wan, Yevgeniy Vorobeychik, Murat Kantarcioglu, and Bradley Malin. Controlling the Signal: Practical Protection of Genomic Data Sharing In Beacon Services (BMC Medical Genomics, 2017, to appear).

Aron Laszka, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. A game-theoretic approach for integrity assurance in resource-bounded systems. (International Journal of Information Security, 2017, to appear).

Nika Haghtalab, Aron Laszka, Ariel D. Procaccia, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Monitoring stealthy diffusions. (Knowledge and Information Systems, 2017, to appear.)

Bo Li, Yevgeniy Vorobeychik, Muqun Li, and Bradley Malin.An Iterative Classification Scheme for Sanitizing Large-Scale Datasets. (IEEE Transactions on Knowledge and Data Engineering, 2017, to appear).

Andrew M. Smith, Jackson Mayo, Vivian Kammler, Robert C. Armstrong and Yevgeniy Vorobeychik. Using computational game theory to guide verification and security in hardware designs. (HOST, 2017).

Haifeng Zhang, Yevgeniy Vorobeychik, and Ariel Procaccia. Multi-channel marketing with budget complementarities. (AAMAS, 2017).

Ayan Mukhopadhyay, Yevgeniy Vorobeychik, Gautam Biswas, and Abhishek Dubey. Prioritized allocation of emergency responders based on a continuous-time incident prediction model. (AAMAS, 2017).

Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Improving network connectivity using trusted nodes and edges. (ACC, 2017).

Bo Li, Kevin Roundy, Chris Gates and Yevgeniy Vorobeychik. Large-scale identification of malicious singleton files. (CODASPY, 2017).

Jiarui Gan, Bo An, Yevgeniy Vorobeychik, and Brian Gauch.Security games on a plane. (AAAI, 2017).

Yevgeniy Vorobeychik, Zlatko Joveski, and Sixie Yu. Does communication help people coordinate? (PLoS One, 12(2):e0170780, 2017.)

Zhiyu Wan, Yevgeniy Vorobeychik, Weiyi Xia, Ellen Wright Clayton, Murat Kantarcioglu, and Bradley Malin. Expanding Access to large-scale genomic data while promoting privacy: a game theoretic approach. (The American Journal of Human Genetics, 100(2):316-322, 2017).

Andrew Smith, Jian Lou, and Yevgeniy Vorobeychik.Multidefender security games. (IEEE Intelligent Systems, 32(1):50-60).

C. Seshadhri, Andrew M. Smith, Yevgeniy Vorobeychik, Jackson R. Mayo, and Robert C. Armstrong. Characterizing short-term stability for Boolean networks over any distribution of transfer functions. (Physical Review E, 94:012301, 2016).

Muqun Li, David Carrell, John Aberdeen, Lynette Hirschman, Jacqueline Kirby, Bo Li, Yevgeniy Vorobeychik, Bradley A Malin. Optimizing annotation resources for natural language de-identification via a game theoretic framework. (Journal of Biomedical Informatics, 61(C):97-109, 2016).

Bo Li, Yining Wang, Aarti Singh, and Yevgeniy Vorobeychik.Data poisoning attacks on factorization-based collaborative filtering. (NIPS, 2016).

Ayan Mukhopadhyay, Yevgeniy Vorobeychik, Chao Zhang, Milind Tambe, Kenneth Pence, and Paul Speer. Optimal allocation of police patrol resources using a continuous-time crime model. (GameSec, 2016).

Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Optimal thresholds for anomaly-based intrusion detection in dynamical environments. (GameSec, 2016).

Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering. (ISRCS, 2016).

John Nay and Yevgeniy Vorobeychik. Predicting human cooperation. (PLoS One, 11(5):e0155656, 2016).

Yevgeniy Vorobeychik. Adversarial AI. (IJCAI, 2016); Spotlight Presentation.

Yue Yin, Yevgeniy Vorobeychik, Bo An and Noam Hazon.Optimally protecting elections. (IJCAI, 2016).

Aron Laszka, Waseem Abbas, Shankar Sastry, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Optimal thresholds for intrusion detection systems. (HotSoS, 2016).

Jian Lou and Yevgeniy Vorobeychik. Decentralization and security in dynamic traffic light control. (HotSoS, 2016).

Chao Zhang, Victor Bucarey, Ayan Mukhopadhyay, Arunesh Sinha, Yundi Qian, Yevgeniy Vorobeychik, and Milind Tambe. Using abstractions to solve opportunistic crime security games at scale. (AAMAS, 2016).

Qingyu Guo, Bo An, Yevgeniy Vorobeychik, Long Tran-Thanh, Jiarui Gan, and Chunyan Miao. Coalitional security games. (AAMAS, 2016).

Aron Laszka, Bradley Potteiger, Yevgeniy Vorobeychik, Saurabh Amin, and Xenofon Koutsoukos. Vulnerability of transportation networks to traffic-signal tampering. (ICCPS, 2016).

Liyiming Ke, Bo Li, and Yevgeniy Vorobeychik. Behavioral experiments in email filter evasion. (AAAI, 2016; Supplement; Data).

Haifeng Zhang and Yevgeniy Vorobeychik. Submodular optimization with routing constraints. (AAAI, 2016; extended version).

Aron Laszka, Jian Lou, and Yevgeniy Vorobeychik. Multi-defender strategic filtering against spear-phishing attacks. (AAAI, 2016).

Haifeng Zhang, Yevgeniy Vorobeychik, Joshua Letchford, and Kiran Lakkaraju. Data-driven agent-based modeling, with application to rooftop solar adoption. (Journal of Autonomous Agents and Multiagent Systems, 30(6):1023-1049, 2016).

Bo Li, Yevgeniy Vorobeychik, Rachel Li, and Bradley Malin.Iterative classification for sanitizing large-scale datasets. (ICDM, 2015).

Nika Haghtalab, Aron Laszka, Ariel Procaccia, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Monitoring stealthy diffusion. (ICDM, 2015).

Aron Laszka, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Resilient observation selection in adversarial settings. (CDC, 2015).

Weiyi Xia, Murat Kantarciogul, Zhiyu Wan, Raymond Heatherly, Yevgeniy Vorobeychik, and Bradley Malin.Process-driven data privacy. (CIKM, 2015).

Jian Lou and Yevgeniy Vorobeychik. Equilibrium analysis of multi-defender security games. (IJCAI, 2015).

Zhiyu Wan, Yevgeniy Vorobeychik, Weiyi Xia, Ellen Clayton, Murat Kantarcioglu, Ranjit Ganta, Raymond Heatherly, and Bradley Malin. A game theoretic framework for analyzing re-identification risk. (PLoS One, 2015, 10(3):e0120592).

Aron Laszka, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication. (HotSoS, 2015).

Swetasudha Panda and Yevgeniy Vorobeychik. Stackelberg games for vaccine design. (AAMAS, 2015).

Haifeng Zhang, Yevgeniy Vorobeychik, Joshua Letchford, and Kiran Lakkaraju. Data-Driven Agent-Based Modeling, with Application to Rooftop Solar Adoption. (AAMAS, 2015). Implementation

Haifeng Zhang, Ariel Procaccia, and Yevgeniy Vorobeychik.Dynamic Influence Maximization Under Increasing Returns to Scale. (AAMAS, 2015). Best Paper Award (finalist)

Bo Li and Yevgeniy Vorobeychik. Scalable optimization of randomized operational decisions in adversarial classification settings. (AISTATS, 2015).

Jiarui Gan, Bo An, and Yevgeniy Vorobeychik. Security games with protection externalities. (AAAI, 2015; appendix).

Aron Laszka, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Optimal personalized filtering against spear-phishing attacks. (AAAI, 2015).

Mason Wright and Yevgeniy Vorobeychik. Mechanism design for team formation (extended version). (AAAI, 2015). Implementation

Yevgeniy Vorobeychik and Joshua Letchford. Securing interdependent assets. (Journal of Autonomous Agents and Multiagent Systems, 29(2):305-333, 2015).

Yevgeniy Vorobeychi, Steven Kimbrough, and Howard Kunreuther. A Framework for Computational Strategic Analysis: Applications to Iterated Interdependent Security Games. (Computational Economics, 45(3):469-500, 2015).

Bo Li and Yevgeniy Vorobeychik. Feature cross-substitution in adversarial classification. (NIPS, 2014; supplement)

Waseem Abbas, Sajal Bhatia, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Immunization against infection propagation in heterogeneous networks. (NCA, 2014).

Waseem Abbas, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Resilient consensus protocol in the presence of trusted nodes. (ISRCS, 2014).

Yevgeniy Vorobeychik and Bo Li. Optimal randomized classification in adversarial settings. (AAMAS, 2014).

Yevgeniy Vorobeychik, Bo An, Milind Tambe, and Satinder Singh. Computing solutions in infinite-horizon discounted adversarial patrolling games. (ICAPS, 2014).

Yevgeniy Vorobeychik and John Ross Wallrabenstein. Using Machine Learning for Operational Decisions in Adversarial Environments. (OPTMAS, 2014).

Mark Yampolskiy, Yevgeniy Vorobeychik, Xenofon Koutsoukos, Peter Horvath, Heath Leblanc, and Janos Sztipanovits. Resilient distributed consensus for tree topology. (HiCoNS, 2014).

Yue Yin, Bo An, Yevgeniy Vorobeychik, and Jun Zhuang.Optimal Deceptive Strategies in Security Games: A Preliminary Study. (AAAI Spring Symposium on Applied Computational Game Theory, 2014).

Yan Deng, Siqian Shen, and Yevgeniy Vorobeychik. Optimal decision making in disease prevention and epidemic control. (Mathematical Biosciences, 246(1):213-227, 2013).

Comments are closed.


Back Home