PublicationsYevgeniy Vorobeychik logo

2017

Swetasudha Panda and Yevgeniy Vorobeychik. Near-optimal interdiction of factored MDPs. (UAI, 2017, to appear).

Zhiyu Wan, Yevgeniy Vorobeychik, Murat Kantarcioglu, and Bradley Malin. Controlling the Signal: Practical Protection of Genomic Data Sharing In Beacon Services (BMC Medical Genomics, 2017, to appear).

Aron Laszka, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. A game-theoretic approach for integrity assurance in resource-bounded systems. (International Journal of Information Security, 2017, to appear).

Nika Haghtalab, Aron Laszka, Ariel D. Procaccia, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Monitoring stealthy diffusions. (Knowledge and Information Systems, 2017, to appear.)

Bo Li, Yevgeniy Vorobeychik, Muqun Li, and Bradley Malin. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets. (IEEE Transactions on Knowledge and Data Engineering, 2017, to appear).

Andrew M. Smith, Jackson Mayo, Vivian Kammler, Robert C. Armstrong and Yevgeniy Vorobeychik. Using computational game theory to guide verification and security in hardware designs. (HOST, 2017).

Haifeng Zhang, Yevgeniy Vorobeychik, and Ariel Procaccia. Multi-channel marketing with budget complementarities. (AAMAS, 2017).

Ayan Mukhopadhyay, Yevgeniy Vorobeychik, Gautam Biswas, and Abhishek Dubey. Prioritized allocation of emergency responders based on a continuous-time incident prediction model. (AAMAS, 2017).

Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. Improving network connectivity using trusted nodes and edges. (ACC, 2017).

Bo Li, Kevin Roundy, Chris Gates and Yevgeniy Vorobeychik. Large-scale identification of malicious singleton files. (CODASPY, 2017).

Jiarui Gan, Bo An, Yevgeniy Vorobeychik, and Brian Gauch. Security games on a plane. (AAAI, 2017).

Yevgeniy Vorobeychik, Zlatko Joveski, and Sixie Yu. Does communication help people coordinate? (PLoS One, 12(2):e0170780, 2017.)

Zhiyu Wan, Yevgeniy Vorobeychik, Weiyi Xia, Ellen Wright Clayton, Murat Kantarcioglu, and Bradley Malin. Expanding Access to large-scale genomic data while promoting privacy: a game theoretic approach. (The American Journal of Human Genetics, 100(2):316-322, 2017).

Andrew Smith, Jian Lou, and Yevgeniy Vorobeychik. Multidefender security games. (IEEE Intelligent Systems, 32(1):50-60).

Tutorial on GT + Cybersecurity and Privacy.

2016 Yevgeniy Vorobeychik