Search

Your search keyword '"Sinha, Arunesh"' showing total 221 results

Search Constraints

Start Over You searched for: Author "Sinha, Arunesh" Remove constraint Author: "Sinha, Arunesh"
221 results on '"Sinha, Arunesh"'

Search Results

1. Heterogeneous Graph Generation: A Hierarchical Approach using Node Feature Pooling

2. Towards Neural Network based Cognitive Models of Dynamic Decision-Making by Humans

3. Bootstrapping Language Models with DPO Implicit Rewards

4. Probabilistic Perspectives on Error Minimization in Adversarial Reinforcement Learning

5. Handling Long and Richly Constrained Tasks through Constrained Hierarchical Reinforcement Learning

6. Tackling Stackelberg Network Interdiction against a Boundedly Rational Adversary

7. BAFFLE: Hiding Backdoors in Offline Reinforcement Learning Datasets

8. Scalable Distributional Robustness in a Class of Non Convex Optimization with Guarantees

9. Safe Delivery of Critical Services in Areas with Volatile Security Situation via a Stackelberg Game Approach

10. Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop at AAAI 2022

11. The Art of Manipulation: Threat of Multi-Step Manipulative Attacks in Security Games

12. Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility

13. Multiscale Generative Models: Improving Performance of a Generative Model Using Feedback from Other Dependent Generative Models

14. Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks

15. An Exploration of Poisoning Attacks on Data-Based Decision Making

17. Measuring Data Collection Diligence for Community Healthcare

18. Generating Realistic Stock Market Order Streams

19. Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop 2020

20. AI for Social Impact: Learning and Planning in the Data-to-Deployment Pipeline

21. Solving Online Threat Screening Games using Constrained Action Space Reinforcement Learning

22. Who and When to Screen: Multi-Round Active Screening for Recurrent Infectious Diseases Under Uncertainty

23. Countering Attacker Data Manipulation in Security Games

24. Adversarial Contract Design for Private Data Commercialization

25. Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System

26. Practical Scalability for Stackelberg Security Games

27. A Learning and Masking Approach to Secure Learning

28. Towards the Science of Security and Privacy in Machine Learning

29. Learning Adversary Behavior in Security Games: A PAC Model Perspective

30. Program Actions as Actual Causes: A Building Block for Accountability

31. Security Games with Information Leakage: Modeling and Computation

32. Programs as Actual Causes: A Building Block for Accountability

33. Audit Games with Multiple Defender Resources

34. Audit Games

36. A Learning and Masking Approach to Secure Learning

37. Scaling-Up Stackelberg Security Games Applications Using Approximations

38. Adaptive Regret Minimization in Bounded-Memory Games

39. Artificial Intelligence for Social Impact: Learning and Planning in the Data-to-Deployment Pipeline

44. Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections

45. Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks

46. Reports of the Workshops of the 32nd AAAI Conference on Artificial Intelligence

47. Generative Modelling of Stochastic Actions with Arbitrary Constraints in Reinforcement Learning

48. Continuous Tamper-Proof Logging Using TPM 2.0

50. Conditioning Hierarchical Reinforcement Learning on Flexible Constraints

Catalog

Books, media, physical & digital resources