Arunesh Sinha
Arunesh Sinha
Dirección de correo verificada de - Página principal
Citado por
Citado por
Towards the science of security and privacy in machine learning
N Papernot, P McDaniel, A Sinha, M Wellman
arXiv preprint arXiv:1611.03814, 2016
SoK: Security and privacy in machine learning
N Papernot, P McDaniel, A Sinha, MP Wellman
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 399-414, 2018
Keeping pace with criminals: An extended study of designing patrol allocation against adaptive opportunistic criminals
C Zhang, S Gholami, D Kar, A Sinha, M Jain, R Goyal, M Tambe
Games 7 (3), 15, 2016
Capture: A new predictive anti-poaching tool for wildlife protection
TH Nguyen, A Sinha, S Gholami, A Plumptre, L Joppa, M Tambe, ...
Stackelberg security games: Looking beyond a decade of success
A Sinha, F Fang, B An, C Kiekintveld, M Tambe
IJCAI, 2018
One size does not fit all: A game-theoretic approach for dynamically and effectively screening for threats
M Brown, A Sinha, A Schlenker, M Tambe
ACM, 2016
Understanding and protecting privacy: Formal semantics and principled audit mechanisms
A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ...
International Conference on Information Systems Security, 1-27, 2011
Audit games
J Blocki, N Christin, A Datta, AD Procaccia, A Sinha
International Joint Conference on Artificial Intelligence, 2013
From physical security to cybersecurity
A Sinha, TH Nguyen, D Kar, M Brown, M Tambe, AX Jiang
Journal of Cybersecurity 1 (1), 19-35, 2015
Human adversaries in opportunistic crime security games: Evaluating competing bounded rationality models
YD Abbasi, M Short, A Sinha, N Sintov, C Zhang, M Tambe
Proceedings of the third annual conference on advances in cognitive systems …, 2015
Learning adversary behavior in security games: A PAC model perspective
A Sinha, D Kar, M Tambe
arXiv preprint arXiv:1511.00043, 2015
Continuous tamper-proof logging using TPM 2.0
A Sinha, L Jia, P England, JR Lorch
International Conference on Trust and Trustworthy Computing, 19-36, 2014
Audit games with multiple defender resources
J Blocki, N Christin, A Datta, A Procaccia, A Sinha
arXiv preprint arXiv:1409.4503, 2014
Regret minimizing audits: A learning-theoretic basis for privacy protection
J Blocki, N Christin, A Datta, A Sinha
2011 IEEE 24th Computer Security Foundations Symposium, 312-327, 2011
Trends and applications in Stackelberg security games
D Kar, TH Nguyen, F Fang, M Brown, A Sinha, M Tambe, AX Jiang
Handbook of Dynamic Game Theory, 1-47, 2017
Three strategies to success: Learning adversary models in security games
N Haghtalab, F Fang, TH Nguyen, A Sinha, AD Procaccia, M Tambe
Stackelberg security games (ssg) basics and application overview
B An, M Tambe, A Sinha
Improving Homeland Security Decisions, 485, 2017
Don’t bury your head in warnings: A game-theoretic approach for intelligent allocation of cyber-security alerts
A Schlenker, H Xu, M Guirguis, C Kiekintveld, A Sinha, M Tambe, S Sonya, ...
Provable de-anonymization of large datasets with sparse dimensions
A Datta, D Sharma, A Sinha
International Conference on Principles of Security and Trust, 229-248, 2012
Using abstractions to solve opportunistic crime security games at scale
C Zhang, V Bucarey, A Mukhopadhyay, A Sinha, Q Yundi, Y Vorobeychik, ...
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20