Yevgeniy Vorobeychik
Cited by
Cited by
Data poisoning attacks on factorization-based collaborative filtering
B Li, Y Wang, A Singh, Y Vorobeychik
Advances in neural information processing systems 29, 2016
Adversarial machine learning
Y Vorobeychik, M Kantarcioglu, R Brachman, P Stone, F Rossi
Morgan & Claypool Publishers, 2018
Notes on equilibria in symmetric games
SF Cheng, DM Reeves, Y Vorobeychik, MP Wellman
GTDT, 2004
Feature cross-substitution in adversarial classification
B Li, Y Vorobeychik
Advances in neural information processing systems 27, 2014
Data-driven agent-based modeling, with application to rooftop solar adoption
H Zhang, Y Vorobeychik, J Letchford, K Lakkaraju
Autonomous Agents and Multi-Agent Systems 30, 1023-1049, 2016
Behavioral dynamics and influence in networked coloring and consensus
S Judd, M Kearns, Y Vorobeychik
Proceedings of the National Academy of Sciences 107 (34), 14978-14982, 2010
Empirically grounded agent-based models of innovation diffusion: a critical review
H Zhang, Y Vorobeychik
Artificial Intelligence Review 52, 707-741, 2019
Submodular optimization with routing constraints
H Zhang, Y Vorobeychik
Proceedings of the AAAI conference on artificial intelligence 30 (1), 2016
Deceiving cyber adversaries: A game theoretic approach
A Schlenker, O Thakoor, H Xu, F Fang, M Tambe, L Tran-Thanh, ...
AAMAS'18: Proceedings of the 17th International Conference on Autonomous …, 2018
Robust linear regression against training data poisoning
C Liu, B Li, Y Vorobeychik, A Oprea
Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017
Strategic interactions in a supply chain game
MP Wellman, J Estelle, S Singh, Y Vorobeychik, C Kiekintveld, V Soni
Computational Intelligence 21 (1), 1-26, 2005
Price prediction in a trading agent competition
MP Wellman, DM Reeves, KM Lochner
Proceedings of the 4th ACM conference on Electronic commerce, 216-217, 2003
Optimal randomized classification in adversarial settings.
Y Vorobeychik, B Li
AAMAS, 485-492, 2014
Defending against physically realizable attacks on image classification
T Wu, L Tong, Y Vorobeychik
arXiv preprint arXiv:1909.09552, 2019
Improving robustness of ML classifiers against realizable evasion attacks using conserved features
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
28th USENIX Security Symposium (USENIX Security 19), 285-302, 2019
Learning payoff functions in infinite games
Y Vorobeychik, MP Wellman, S Singh
Machine Learning 67, 145-168, 2007
Distributed Feedback Control for Decision Making on Supply Chains.
C Kiekintveld, MP Wellman, S Singh, J Estelle, Y Vorobeychik, V Soni, ...
ICAPS, 384-392, 2004
A tale of evil twins: Adversarial inputs versus poisoned models
R Pang, H Shen, X Zhang, S Ji, Y Vorobeychik, X Luo, A Liu, T Wang
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
Stochastic search methods for nash equilibrium approximation in simulation-based games.
Y Vorobeychik, MP Wellman
AAMAS (2), 1055-1062, 2008
SURE: A modeling and simulation integration platform for evaluation of secure and resilient cyber–physical systems
X Koutsoukos, G Karsai, A Laszka, H Neema, B Potteiger, P Volgyesi, ...
Proceedings of the IEEE 106 (1), 93-112, 2017
The system can't perform the operation now. Try again later.
Articles 1–20