Despite a surge in interest in GNN development, homogeneity in benchmark...
Modeling and simulations of pandemic dynamics play an essential role in
...
We study online learning problems in which the learner has extra knowled...
Symmetry arises in many optimization and decision-making problems, and h...
Motivated by cognitive radios, stochastic Multi-Player Multi-Armed Bandi...
In real-world applications, Federated Learning (FL) meets two challenges...
To understand the security threats to reinforcement learning (RL) algori...
Graph neural networks have been shown to produce impressive results for ...
In this paper, we introduce Temporal Multiresolution Graph Neural Networ...
Repeated coopetitive games capture the situation when one must efficient...
Socialbots are software-driven user accounts on social platforms, acting...
Machine learning inference is increasingly being executed locally on mob...
Inference for Deep Neural Networks is increasingly being executed locall...
This paper studies bandit algorithms under data poisoning attacks in a
b...
In this work, we study sequential choice bandits with feedback. We propo...
We investigate a repeated two-player zero-sum game setting where the col...
Persistence diagrams, a key tool in the field of Topological Data Analys...
This paper considers repeated games in which one player has more informa...
Distributed Constraint Optimization Problems (DCOPs) are an important
fr...
In this paper we consider a defending problem on a network. In the model...
Resource allocation games such as the famous Colonel Blotto (CB) and
Hid...
A key challenge in crowdsourcing is inferring the ground truth from nois...
Evolutionary optimization is a generic population-based metaheuristic th...
We model and study the problem of assigning traffic in an urban road net...
In Stackelberg security games, information about the attacker's type (i....
Resource allocation games such as the famous Colonel Blotto (CB) and
Hid...
Resource allocation games such as the famous Colonel Blotto (CB) and
Hid...
Nowadays, Bitcoin and Proof-of-Work blockchain systems are becoming prom...
Uncertainty is one of the major challenges facing applications of game
t...
Strong Stackelberg equilibrium (SSE) is the standard solution concept of...
This paper investigates the adversarial Bandits with Knapsack (BwK) onli...
Effective game-theoretic modeling of defender-attacker behavior is becom...
Eyal and Sirer's selfish mining strategy has demonstrated that Bitcoin s...
We introduce the functional bandit problem, where the objective is to fi...
In budget-limited multi-armed bandit (MAB) problems, the learner's actio...