Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
114 | Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho |
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Network security, anomaly detection, security evaluation, Markov Reward Models |
114 | Marina Gelastou, Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
The Power of the Defender. |
ICDCS Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
83 | Marios Mavronicolas, Vicky Papadopoulou, Anna Philippou, Paul G. Spirakis |
A Network Game with Attackers and a Defender. |
Algorithmica |
2008 |
DBLP DOI BibTeX RDF |
Attacks and defenses, Security, Game theory, Graph theory, Nash equilibria |
63 | Wei Sun, Xiangwei Kong, Dequan He, Xingang You |
Information Security Game Analysis with Penalty Parameter. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Rui Guo, Guiran Chang, Yuhai Qin, Baojing Sun, Yifu Feng, Dan Peng |
Research on Active Defense Strategy of Counter DDoS Attacks Based on Differential Games Model. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Dan Peng, Guiran Chang, Rui Guo, Yuhai Qin |
DG-Based DDoS Detection Using Hybrid Strategy. |
FSKD (5) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Rui Guo, Guiran Chang, Yuhai Qin, Baojing Sun, An Liu, Bencheng Zhang, Dan Peng |
DG-Based Active Defense Strategy to Defend against DDoS. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
Active defense, Nash Equilibrium, DDoS, Differential Games |
63 | Guido Boella, Leendert W. N. van der Torre |
Norm Governed Multiagent Systems: The Delegation of Control to Autonomous Agents. |
IAT |
2003 |
DBLP DOI BibTeX RDF |
|
52 | Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford |
An Attacker-Defender Game for Honeynets. |
COCOON |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Assane Gueye, Jean C. Walrand |
Security in networks: A game-theoretic approach. |
CDC |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Wei He, Chunhe Xia, Haiquan Wang, Cheng Zhang, Yi Ji |
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. |
CSSE (6) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | He Wei, Chunhe Xia, Haiquan Wang, Zhang Cheng, Ji Yi |
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Mark E. Snyder, Ravi Sundaram, Mayur Thakur |
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Stefano Bistarelli, Marco Dall'Aglio, Pamela Peretti |
Strategic Games on Defense Trees. |
Formal Aspects in Security and Trust |
2006 |
DBLP DOI BibTeX RDF |
Security, Game Theory, Risk Analysis |
40 | Haibo Zhang 0006, Shentong Ma, Tao Ding, Yong Lin, Mohammad Shahidehpour |
Multi-Stage Multi-Zone Defender-Attacker-Defender Model for Optimal Resilience Strategy With Distribution Line Hardening and Energy Storage System Deployment. |
IEEE Trans. Smart Grid |
2021 |
DBLP DOI BibTeX RDF |
|
40 | Jacob T. English, Jay P. Wilhelm |
Defender-Aware Attacking Guidance Policy for the Target-Attacker-Defender Differential Game. |
J. Aerosp. Inf. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
40 | Nafiseh Ghorbani-Renani, Andrés D. González, Kash Barker |
A decomposition approach for solving tri-level defender-attacker-defender problems. |
Comput. Ind. Eng. |
2021 |
DBLP DOI BibTeX RDF |
|
40 | Yingmeng Xiang, Lingfeng Wang 0001 |
An Improved Defender-Attacker-Defender Model for Transmission Line Defense Considering Offensive Resource Uncertainties. |
IEEE Trans. Smart Grid |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Tao Ding, Li Yao, Fangxing Li 0001 |
A multi-uncertainty-set based two-stage robust optimization to defender-attacker-defender model for power system protection. |
Reliab. Eng. Syst. Saf. |
2018 |
DBLP DOI BibTeX RDF |
|
40 | Ali Marjanian, Soodabeh Soleymani |
Optimal investment in power system for defending against malicious attacks through defender-attacker-defender model and mixed strategy Nash equilibrium. |
Int. J. Crit. Infrastructures |
2017 |
DBLP DOI BibTeX RDF |
|
40 | Jie Xu, Jun Zhuang 0001 |
Modeling costly learning and counter-learning in a defender-attacker game with private defender information. |
Ann. Oper. Res. |
2016 |
DBLP DOI BibTeX RDF |
|
40 | Eric Shieh, Albert Xin Jiang, Amulya Yadav, Pradeep Varakantham, Milind Tambe |
An extended study on addressing defender teamwork while accounting for uncertainty in attacker defender games using iterative Dec-MDPs. |
Multiagent Grid Syst. |
2015 |
DBLP DOI BibTeX RDF |
|
40 | Jiangliu Wang, Wei Li 0062 |
Motion patterns and phase-transition of a defender-intruder problem and optimal interception strategy of the defender. |
Commun. Nonlinear Sci. Numer. Simul. |
2015 |
DBLP DOI BibTeX RDF |
|
40 | Wei Yuan, Long Zhao, Bo Zeng |
Optimal power grid protection through a defender-attacker-defender model. |
Reliab. Eng. Syst. Saf. |
2014 |
DBLP DOI BibTeX RDF |
|
36 | Rajiv Ramnath, Vasudha Gupta, Jay Ramanathan |
RED-Transaction and Goal-Model Based Analysis of Layered Security of Physical Spaces. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
RED Transaction, Defender, Layered Security, Adversary, Assets |
36 | Petr Jancar, Jirí Srba |
Undecidability of bisimilarity by defender's forcing. |
J. ACM |
2008 |
DBLP DOI BibTeX RDF |
process algebra, undecidability, pushdown automata, Bisimilarity |
36 | Nan Zhang 0004, Wei Yu 0002, Xinwen Fu, Sajal K. Das 0001 |
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. |
ICPADS |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Edmond S. L. Ho, Taku Komura |
Real-Time Character Control for Wrestling Games. |
MIG |
2009 |
DBLP DOI BibTeX RDF |
motion capture, character animation |
31 | Marios Mavronicolas, Loizos Michael, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
The Price of Defense. |
MFCS |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Zonghua Zhang, Pin-Han Ho, Xiaodong Lin 0001, Hong Shen 0001 |
Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan |
A Defense-Centric Taxonomy Based on Attack Manifestations. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Carrie Gates, Tara Whalen |
Profiling the defenders. |
NSPW |
2004 |
DBLP DOI BibTeX RDF |
MBTI, psychological assessment, security |
20 | Musheng Chen, Guowei He, Junhua Wu |
ZDDR: A Zero-Shot Defender for Adversarial Samples Detection and Restoration. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Manar Khalid Ibraheem Ibraheem, Mbarka Belhaj Mohamed, Ahmed Fakhfakh |
Forest Defender Fusion System for Early Detection of Forest Fires. |
Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang |
MEA-Defender: A Robust Watermark against Model Extraction Attack. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Yuqi Zhang, Liang Ding, Lefei Zhang, Dacheng Tao |
Intention Analysis Prompting Makes Large Language Models A Good Jailbreak Defender. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Kyle Hunt, Jun Zhuang 0001 |
A review of attacker-defender games: Current state and paths forward. |
Eur. J. Oper. Res. |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Jiangyi Deng, Xiaoyu Ji 0001, Beibei Wang 0001, Bin Wang 0062, Wenyuan Xu 0001 |
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripides Glavas |
BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Han Fu, Hugh H. T. Liu |
Defending a Target Area With a Slower Defender. |
IEEE Control. Syst. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Naziya Aslam, Shashank Srivastava, M. M. Gore |
ONOS DDoS Defender: A Comparative Analysis of Existing DDoS Attack Datasets using Ensemble Approach. |
Wirel. Pers. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ranyang Zhou, Sabbir Ahmed, Adnan Siraj Rakin, Shaahin Angizi |
DNN-Defender: An in-DRAM Deep Neural Network Defense Mechanism for Adversarial Weight Attack. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Luyi Li, Jiayi Huang 0001, Lang Feng, Zhongfeng Wang 0001 |
PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Zimeng Song, Chun Kai Ling, Fei Fang 0001 |
Multi-defender Security Games with Schedules. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | André Correia, Luís A. Alexandre |
DEFENDER: DTW-Based Episode Filtering Using Demonstrations for Enhancing RL Safety. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Goutam Das, Michael R. Dorothy, Zachary I. Bell, Daigo Shishika |
Defending a Target with a Slower Defender against a Faster Attacker. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Hanyang Hu, Minh Bui, Mo Chen |
Multi-Agent Reach-Avoid Games: Two Attackers Versus One Defender and Mixed Integer Programming. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Haibin Wu, Jiawen Kang, Lingwei Meng, Helen Meng, Hung-yi Lee |
The defender's perspective on automatic speaker verification: An overview. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Gabriel Resende Machado, Eugênio Silva, Ronaldo Ribeiro Goldschmidt |
Adversarial Machine Learning in Image Classification: A Survey Toward the Defender's Perspective. |
ACM Comput. Surv. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Duong Thuy Anh Nguyen, Jiaming Cheng, Ni Trieu, Duong Tung Nguyen |
A Fairness-Aware Attacker-Defender Model for Optimal Edge Network Operation and Protection. |
IEEE Netw. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Najeeb Moharram Jebreel, Josep Domingo-Ferrer |
FL-Defender: Combating targeted attacks in federated learning. |
Knowl. Based Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Elif Haktanir, Cengiz Kahraman |
Intelligent replacement analysis using picture fuzzy sets: Defender-challenger comparison application. |
Eng. Appl. Artif. Intell. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh 0001, Paulo Jorge Sequeira Gonçalves |
Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS). |
Sensors |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Alexander V. Outkin, Patricia V. Schulz, Timothy Schulz, Thomas D. Tarman, Ali Pinar |
Defender Policy Evaluation and Resource Allocation With MITRE ATT&CK Evaluations Data. |
IEEE Trans. Dependable Secur. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Cynara Justine, Sathyanarayanan Manamohan, Jiji Charangatt Victor |
SL-Defender: Decentralized Defense for Adversarial Robustness in Federated Learning. |
ICCST |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Austin K. Chen, Bryce L. Ferguson, Daigo Shishika, Michael R. Dorothy, Jason R. Marden, George J. Pappas, Vijay Kumar 0001 |
Path Defense in Dynamic Defender-Attacker Blotto Games (dDAB) with Limited Information. |
ACC |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Hanyang Hu, Minh Bui, Mo Chen |
Multi-Agent Reach-Avoid Games: Two Attackers Versus One Defender and Mixed Integer Programming. |
CDC |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Haibin Wu, Jiawen Kang, Lingwei Meng, Helen Meng, Hung-yi Lee |
The Defender's Perspective on Automatic Speaker Verification: An Overview. |
DADA@IJCAI |
2023 |
DBLP BibTeX RDF |
|
20 | Mengyao Ma, Yanjun Zhang, Mahawaga Arachchige Pathum Chamikara, Leo Yu Zhang, Mohan Baruwal Chhetri, Guangdong Bai |
LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks. |
AsiaCCS |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Zhuoran Li, Dan Zhao 0001 |
μThingNet: Leveraging Fine-Grained Power Analysis towards A Robust Zero-Day Defender. |
SOCC |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Attracta Brennan, Caroline Manghan, Mary Dempsey, John McAvoy, Sam Redfern |
Through a Gender Lens: A Serious Game for Young Children to Enhance Bullying Awareness and Encourage the Adoption of the Defender Role. |
JCSG |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Margarita Domènech, José Miguel Giménez, María Albina Puente |
Weak null, necessary defender and necessary detractor players: characterizations of the Banzhaf and the Shapley bisemivalues. |
Ann. Oper. Res. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | E. Balamurugan, Abolfazl Mehbodniya, Elham Kariri, Kusum Yadav, Anil Kumar 0009, Mohd Anul Haq |
Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN). |
Pattern Recognit. Lett. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Yuxuan Huang, Jiajing Wu, Chi K. Tse, Zibin Zheng |
Sequential Attacker-Defender Game on Complex Networks Considering the Cascading Failure Process. |
IEEE Trans. Comput. Soc. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Kyle Hunt, Puneet Agarwal, Jun Zhuang 0001 |
On the adoption of new technology to enhance counterterrorism measures: An attacker-defender game with risk preferences. |
Reliab. Eng. Syst. Saf. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Kamal Mammadov, Cheng-Chew Lim, Peng Shi 0001 |
A state-feedback Nash equilibrium for the general Target-Attacker-Defender differential game of degree in arbitrary dimensions. |
Int. J. Control |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Li Liang, Fang Deng, Jianan Wang, Maobin Lu, Jie Chen 0003 |
A Reconnaissance Penetration Game With Territorial-Constrained Defender. |
IEEE Trans. Autom. Control. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Reza Mohammadi 0003, Chhagan Lal, Mauro Conti, Lokesh Sharma |
Software defined network-based HTTP flooding attack defender. |
Comput. Electr. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Naziya Aslam, Shashank Srivastava, M. M. Gore |
ONOS Flood Defender: An Intelligent Approach to Mitigate DDoS Attack in SDN. |
Trans. Emerg. Telecommun. Technol. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Denis Pogonin, Igor Korkin |
Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Goutam Das, Michael R. Dorothy, Zachary I. Bell, Daigo Shishika |
Guarding a Non-Maneuverable Translating Line with an Attached Defender. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Dolev Mutzari, Yonatan Aumann, Sarit Kraus |
Robust Solutions for Multi-Defender Stackelberg Security Games. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Yuedong Xu, John C. S. Lui |
Multi-dimensional Network Security Game: How do attacker and defender battle on parallel targets? |
CoRR |
2022 |
DBLP BibTeX RDF |
|
20 | Austin K. Chen, Bryce L. Ferguson, Daigo Shishika, Michael R. Dorothy, Jason R. Marden, George J. Pappas, Vijay Kumar 0001 |
Path Defense in Dynamic Defender-Attacker Blotto Games (dDAB) with Limited Information. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Erick Galinkin, Emmanouil Pountourakis, John Carter, Spiros Mancoridis |
Simulation of Attacker Defender Interaction in a Noisy Security Game. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Kuan Li, Yang Liu 0200, Xiang Ao 0001, Jianfeng Chi, Jinghua Feng, Hao Yang 0037, Qing He 0003 |
Reliable Representations Make A Stronger Defender: Unsupervised Structure Refinement for Robust GNN. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Najeeb Jebreel, Josep Domingo-Ferrer |
FL-Defender: Combating Targeted Attacks in Federated Learning. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Goutam Das, Daigo Shishika |
Guarding a Translating Line with an Attached Defender. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Zhangnan Wang, Yichen Wang 0002 |
An Intelligent Pilot Contamination Attacker-Defender Model for Wireless Networks: A Stackelberg Game Based Approach. |
Mob. Networks Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Amirhossein Asgharnia, Howard M. Schwartz 0001, Mohamed M. Atia |
Learning Deception Using Fuzzy Multi-Level Reinforcement Learning in a Multi-Defender One-Invader Differential Game. |
Int. J. Fuzzy Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Vitaly Shalumov |
Interagent Distance Control in a Cooperative Multiagent Target-Missile-Defender Engagement. |
IEEE Trans. Control. Netw. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Rudra Prasad Baksi |
Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender's Deception Architecture. |
DSN (Supplements) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Amit Choudhari, Sylvain Guilley, Khaled Karray |
SpecDefender: Transient Execution Attack Defender using Performance Counters. |
ASHES@CCS |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Yukio Ishihara |
Feedback of PC Security Measures Using Microsoft Defender for Endpoint. |
HCI (40) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Zhangnan Wang, Yichen Wang 0002 |
A Pilot Contamination Attacker-Defender Model for Wireless Networks Under Stackelberg Game. |
VTC Spring |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Luyi Li, Jiayi Huang 0001, Lang Feng, Zhongfeng Wang 0001 |
PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender. |
DATE |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Amirhossein Asgharnia, Howard M. Schwartz 0001, Mohamed M. Atia |
Multi-Invader Multi-Defender Differential Game Using Reinforcement Learning. |
FUZZ-IEEE |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Thanh Hong Nguyen, Amulya Yadav |
The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty? |
GameSec |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Goutam Das, Daigo Shishika |
Guarding a Translating Line with an Attached Defender. |
ACC |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Daigo Shishika, Yue Guan, Michael R. Dorothy, Vijay Kumar 0001 |
Dynamic Defender-Attacker Blotto Game. |
ACC |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Kuan Li, Yang Liu 0200, Xiang Ao 0001, Jianfeng Chi, Jinghua Feng, Hao Yang 0037, Qing He 0003 |
Reliable Representations Make A Stronger Defender: Unsupervised Structure Refinement for Robust GNN. |
KDD |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Thanh Nguyen, Haifeng Xu |
When Can the Defender Effectively Deceive Attackers in Security Games? |
AAAI |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Bryce L. Ferguson, Daigo Shishika, Jason R. Marden |
Ensuring the Defense of Paths and Perimeters in Dynamic Defender-Attacker Blotto Games (dDAB) on Graphs. |
Allerton |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Biru Zhu, Yujia Qin, Ganqu Cui, Yangyi Chen, Weilin Zhao, Chong Fu, Yangdong Deng, Zhiyuan Liu 0001, Jingang Wang, Wei Wu, Maosong Sun 0001, Ming Gu 0001 |
Moderate-fitting as a Natural Backdoor Defender for Pre-trained Language Models. |
NeurIPS |
2022 |
DBLP BibTeX RDF |
|
20 | Dolev Mutzari, Yonatan Aumann, Sarit Kraus |
Robust Solutions for Multi-Defender Stackelberg Security Games. |
IJCAI |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Kyle Soska |
Security Defender Advantages Via Economically Rational Adversary Modeling. |
|
2022 |
DOI RDF |
|
20 | Juan Sebastian Borrero, Leonardo Lozano |
Modeling Defender-Attacker Problems as Robust Linear Programs with Mixed-Integer Uncertainty Sets. |
INFORMS J. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Yu-Cheng Chen, Vincent John Mooney, Santiago Grijalva |
Grid Cyber-Security Strategy in an Attacker-Defender Model. |
Cryptogr. |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Xiaoxiong Zhang, Song Ding, Bingfeng Ge, Boyuan Xia, Witold Pedrycz |
Resource allocation among multiple targets for a defender-attacker game with false targets consideration. |
Reliab. Eng. Syst. Saf. |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Jing Zhang, Yan Wang, Jun Zhuang 0001 |
Modeling multi-target defender-attacker games with quantal response attack strategies. |
Reliab. Eng. Syst. Saf. |
2021 |
DBLP DOI BibTeX RDF |
|