On solving large-scale low-rank zero-sum security games of incomplete information
暂无分享,去创建一个
[1] R.G. Baraniuk,et al. Compressive Sensing [Lecture Notes] , 2007, IEEE Signal Processing Magazine.
[2] Sarah Granger,et al. Social Engineering Fundamentals, Part I: Hacker Tactics , 2003 .
[3] P. Whittle. Risk-sensitive linear/quadratic/gaussian control , 1981, Advances in Applied Probability.
[4] J. Nash. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[5] Andrea J. Goldsmith,et al. Design challenges for energy-constrained ad hoc wireless networks , 2002, IEEE Wirel. Commun..
[6] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[7] Emmanuel J. Candès,et al. Exact Matrix Completion via Convex Optimization , 2008, Found. Comput. Math..
[8] Arkadi Nemirovski,et al. Robust optimization – methodology and applications , 2002, Math. Program..
[9] R. Rockafellar,et al. Optimization of conditional value-at risk , 2000 .
[10] Massimo Fornasier,et al. Compressive Sensing , 2015, Handbook of Mathematical Methods in Imaging.
[11] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[12] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[13] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[14] Pablo A. Parrilo,et al. Guaranteed Minimum-Rank Solutions of Linear Matrix Equations via Nuclear Norm Minimization , 2007, SIAM Rev..
[15] T. Basar,et al. H∞-0ptimal Control and Related Minimax Design Problems: A Dynamic Game Approach , 1996, IEEE Trans. Autom. Control..
[16] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[17] Zaiwen Wen,et al. Robust linear optimization under matrix completion , 2014 .