Security Games for Controlling Contagion
暂无分享,去创建一个
[1] Roger Wattenhofer,et al. Word of Mouth: Rumor Dissemination in Social Networks , 2008, SIROCCO.
[2] Divyakant Agrawal,et al. Limiting the spread of misinformation in social networks , 2011, WWW.
[3] Yevgeniy Vorobeychik,et al. Computing Randomized Security Strategies in Networked Domains , 2011, Applied Adversarial Reasoning and Risk Modeling.
[4] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[5] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[6] Asuman E. Ozdaglar,et al. Optimization-based influencing of village social networks in a counterinsurgency , 2011, TIST.
[7] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[8] Nicola Basilico,et al. Automated Abstractions for Patrolling Security Games , 2011, AAAI.
[9] Shishir Bharathi,et al. Competitive Influence Maximization in Social Networks , 2007, WINE.
[10] Branislav Bosanský,et al. Computing time-dependent policies for patrolling games with mobile targets , 2011, AAMAS.
[11] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[12] Wei Chen,et al. Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.
[13] Allan Borodin,et al. Threshold Models for Competitive Influence in Social Networks , 2010, WINE.
[14] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.
[15] Andreas Krause,et al. Cost-effective outbreak detection in networks , 2007, KDD '07.
[16] Wei Chen,et al. Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model , 2011, SDM.
[17] Kyle Beardsley,et al. Peacekeeping and the Contagion of Armed Conflict , 2011 .
[18] Avrim Blum,et al. Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.
[19] Nicholas J. Howard,et al. Finding optimal strategies for influencing social networks in two player games , 2010 .
[20] Michael Kearns,et al. Competitive contagion in networks , 2011, STOC '12.
[21] K. Pauwels,et al. Effects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site , 2009 .
[22] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[23] Masahiro Kimura,et al. Extracting influential nodes on a social network for information diffusion , 2009, Data Mining and Knowledge Discovery.
[24] Sarit Kraus,et al. A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.
[25] Vincent Conitzer,et al. Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.
[26] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[27] Benjamin W. K. Hung. Optimization-based selection of influential agents in a rural Afghan social network , 2010 .