暂无分享,去创建一个
[1] Roger B. Myerson,et al. Optimal Auction Design , 1981, Math. Oper. Res..
[2] Michael N. Katehakis,et al. The Multi-Armed Bandit Problem: Decomposition and Computation , 1987, Math. Oper. Res..
[3] Quanyan Zhu,et al. A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..
[4] Rabih Salhab,et al. A Dynamic Game Model of Collective Choice in Multiagent Systems , 2015, IEEE Transactions on Automatic Control.
[5] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[6] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[7] T. Başar,et al. Stochastic Teams with Nonclassical Information Revisited: When is an Affine Law Optimal? , 1986, 1986 American Control Conference.
[8] Tamer Basar,et al. Variations on the theme of the Witsenhausen counterexample , 2008, 2008 47th IEEE Conference on Decision and Control.
[9] Georges Zaccour,et al. Dynamic Games in the Economics and Management of Pollution , 2009 .
[10] Quanyan Zhu,et al. A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.
[11] H. Chizeck,et al. Controllability, stabilizability, and continuous-time Markovian jump linear quadratic control , 1990 .
[12] Quanyan Zhu,et al. Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.