暂无分享,去创建一个
[1] Yu Li,et al. Improved Approximation Algorithms for the Facility Location Problems with Linear/Submodular Penalties , 2014, Algorithmica.
[2] Richard O. Michaud. The Markowitz Optimization Enigma: Is 'Optimized' Optimal? , 1989 .
[3] Andreas Krause,et al. Continuous DR-submodular Maximization: Structure and Algorithms , 2017, NIPS 2017.
[4] Joel Nothman,et al. SciPy 1.0-Fundamental Algorithms for Scientific Computing in Python , 2019, ArXiv.
[5] Michael C. Georgiadis,et al. A two-stage stochastic programming model for the optimal design of distributed energy systems , 2013 .
[6] Feng Pan,et al. Interdiction of a Markovian Evader , 2010, ICS 2011.
[7] Martin Grohe,et al. Weisfeiler and Leman Go Neural: Higher-order Graph Neural Networks , 2018, AAAI.
[8] Andy J. Keane,et al. Recent advances in surrogate-based optimization , 2009 .
[9] Milind Tambe,et al. Melding the Data-Decisions Pipeline: Decision-Focused Learning for Combinatorial Optimization , 2018, AAAI.
[10] Andreas Krause,et al. Guaranteed Non-convex Optimization: Submodular Maximization over Continuous Domains , 2016, AISTATS.
[11] Pascal Vincent,et al. Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[12] Charles Elkan,et al. The Foundations of Cost-Sensitive Learning , 2001, IJCAI.
[13] Bo An,et al. Stackelberg Security Games: Looking Beyond a Decade of Success , 2018, IJCAI.
[14] D. Hunter,et al. Optimization Transfer Using Surrogate Objective Functions , 2000 .
[15] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[16] Lutz Prechelt,et al. Early Stopping - But When? , 2012, Neural Networks: Tricks of the Trade.
[17] Ambuj Tewari,et al. Generalization Bounds in the Predict-then-Optimize Framework , 2019, NeurIPS.
[18] C. Farhat,et al. Design optimization using hyper-reduced-order models , 2015 .
[19] Milind Tambe,et al. Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data , 2017, AAMAS.
[20] F. O. Isinkaye,et al. Recommendation systems: Principles, methods and evaluation , 2015 .
[21] M. Fischetti,et al. Interdiction Games and Monotonicity , 2016 .
[22] Martin Jaggi,et al. Revisiting Frank-Wolfe: Projection-Free Sparse Convex Optimization , 2013, ICML.
[23] Dachuan Xu,et al. A Primal-Dual Approximation Algorithm for the Facility Location Problem with Submodular Penalties , 2011, Algorithmica.
[24] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[25] Lei Xu,et al. Input Convex Neural Networks : Supplementary Material , 2017 .
[26] W. Sharpe,et al. Mean-Variance Analysis in Portfolio Choice and Capital Markets , 1987 .
[27] Tat-Seng Chua,et al. Neural Collaborative Filtering , 2017, WWW.
[28] Priya L. Donti,et al. Task-based End-to-end Model Learning in Stochastic Optimization , 2017, NIPS.
[29] Tanja Neumann. Mean Variance Analysis In Portfolio Choice And Capital Markets , 2016 .
[30] Stephen P. Boyd,et al. Differentiable Convex Optimization Layers , 2019, NeurIPS.
[31] F. Maxwell Harper,et al. The MovieLens Datasets: History and Context , 2016, TIIS.
[32] Jure Leskovec,et al. Inductive Representation Learning on Large Graphs , 2017, NIPS.
[33] Richard O. Michaud. The Markowitz Optimization Enigma: Is 'Optimized' Optimal? , 1989 .
[34] Theresa Dawn Robinson,et al. Surrogate-Based Optimization Using Multifidelity Models with Variable Parameterization and Corrected Space Mapping , 2008 .
[35] Milind Tambe,et al. MIPaaL: Mixed Integer Program as a Layer , 2019, AAAI.
[36] Philip Wolfe,et al. An algorithm for quadratic programming , 1956 .
[37] John W. Bandler,et al. Space mapping technique for electromagnetic optimization , 1994 .
[38] Adam N. Elmachtoub,et al. Smart "Predict, then Optimize" , 2017, Manag. Sci..
[39] Raphael T. Haftka,et al. Surrogate-based Analysis and Optimization , 2005 .
[40] Milind Tambe,et al. Scalable Game-Focused Learning of Adversary Models: Data-to-Decisions in Network Security Games , 2020, AAMAS.
[41] Milind Tambe,et al. End-to-End Game-Focused Learning of Adversary Behavior in Security Games , 2020, AAAI.
[42] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[43] Max Welling,et al. Semi-Supervised Classification with Graph Convolutional Networks , 2016, ICLR.
[44] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[45] Ioana Popescu,et al. Robust Mean-Covariance Solutions for Stochastic Optimization , 2007, Oper. Res..
[46] J. Zico Kolter,et al. OptNet: Differentiable Optimization as a Layer in Neural Networks , 2017, ICML.