[HTML][HTML] A survey on mixed-integer programming techniques in bilevel optimization
Bilevel optimization is a field of mathematical programming in which some variables are
constrained to be the solution of another optimization problem. As a consequence, bilevel …
constrained to be the solution of another optimization problem. As a consequence, bilevel …
Review of major approaches to analyze vulnerability in power system
The failure of a power system as a critical infrastructure causes considerable damage to
society. Hence, the vulnerabilities of such facilities should be minimized to cope with several …
society. Hence, the vulnerabilities of such facilities should be minimized to cope with several …
Open problems in cooperative ai
Problems of cooperation--in which agents seek ways to jointly improve their welfare--are
ubiquitous and important. They can be found at scales ranging from our daily routines--such …
ubiquitous and important. They can be found at scales ranging from our daily routines--such …
Strategic classification
Machine learning relies on the assumption that unseen test instances of a classification
problem follow the same distribution as observed training data. However, this principle can …
problem follow the same distribution as observed training data. However, this principle can …
Stackelberg security games: Looking beyond a decade of success
Abstract The Stackelberg Security Game (SSG) model has been immensely influential in
security research since it was introduced roughly a decade ago. Furthermore, deployed SSG …
security research since it was introduced roughly a decade ago. Furthermore, deployed SSG …
[HTML][HTML] Decision support approaches for cyber security investment
When investing in cyber security resources, information security managers have to follow
effective decision-making strategies. We refer to this as the cyber security investment …
effective decision-making strategies. We refer to this as the cyber security investment …
Protecting location privacy: optimal strategy against localization attacks
The mainstream approach to protecting the location-privacy of mobile users in location-
based services (LBSs) is to alter the users' actual locations in order to reduce the location …
based services (LBSs) is to alter the users' actual locations in order to reduce the location …
Sample-efficient learning of stackelberg equilibria in general-sum games
Real world applications such as economics and policy making often involve solving multi-
agent games with two unique features:(1) The agents are inherently asymmetric and …
agent games with two unique features:(1) The agents are inherently asymmetric and …
False data injection attacks on networked control systems: A Stackelberg game analysis
In this paper, a security problem in networked control systems (NCS) is studied. In a
standard linear quadratic Gaussian (LQG) control scenario in NCS, a so-called false data …
standard linear quadratic Gaussian (LQG) control scenario in NCS, a so-called false data …
A review of attacker-defender games: Current state and paths forward
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …
against strategic adversarial threats. More specifically, we follow the systematic literature …