Aron Laszka
Orcid: 0000-0001-7400-2357
According to our database1,
Aron Laszka
authored at least 134 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Reinforcement-Learning-Based Proactive Control for Enabling Power Grid Resilience to Wildfire.
IEEE Trans. Ind. Informatics, January, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Multi-Agent Reinforcement Learning with Hierarchical Coordination for Emergency Responder Stationing.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the 15th ACM/IEEE International Conference on Cyber-Physical Systems, 2024
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024
Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024
2023
Correct-by-Design Interacting Smart Contracts and a Systematic Approach for Verifying ERC20 and ERC721 Contracts With VeriSolid.
IEEE Trans. Dependable Secur. Comput., 2023
ACM Comput. Surv., 2023
Hierarchical Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks.
CoRR, 2023
Task Grouping for Automated Multi-Task Machine Learning via Task Affinity Prediction.
CoRR, 2023
The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox.
Proceedings of the ACM Web Conference 2023, 2023
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the IEEE International Systems Conference, 2023
PhobosBC: A Blockchain-based Crowdsourced Post-disaster Mapping System and its Agent-based Simulation.
Proceedings of the 6th ACM SIGSPATIAL International Workshop on GeoSpatial Simulation, 2023
Rolling Horizon Based Temporal Decomposition for the Offline Pickup and Delivery Problem with Time Windows.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Data-Driven Prediction and Optimization of Energy Use for Transit Fleets of Electric and ICE Vehicles.
ACM Trans. Internet Techn., 2022
Neural Architecture and Feature Search for Predicting the Ridership of Public Transportation Routes.
Proceedings of the 2022 IEEE International Conference on Smart Computing, 2022
Offline Vehicle Routing Problem with Online Bookings: A Novel Problem Formulation with Applications to Paratransit.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
An Online Approach to Solve the Dynamic Vehicle Routing Problem with Stochastic Trip Requests for Paratransit Services.
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
Proceedings of the IEEE International Conference on Cloud Engineering, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
ACM Trans. Cyber Phys. Syst., 2021
Reinforcement Learning based Proactive Control for Transmission Grid Resilience to Wildfire.
CoRR, 2021
Proceedings of the IEEE International Conference on Smart Computing, 2021
Energy and Emission Prediction for Mixed-Vehicle Transit Fleets Using Multi-task and Inductive Transfer Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021
Proceedings of the ICBCT '21: The 3rd International Conference on Blockchain Technology, 2021
Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Graph-Theoretic Approach for Increasing Participation in Networks With Assorted Resources.
IEEE Trans. Netw. Sci. Eng., 2020
A Privacy-Preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission.
IEEE J. Biomed. Health Informatics, 2020
Frontiers Blockchain, 2020
CoRR, 2020
CoRR, 2020
Plasma Go: A Scalable Sidechain Protocol for Flexible Payment Mechanisms in Blockchain-based Marketplaces.
CoRR, 2020
Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches.
Computer, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the IEEE International Conference on Smart Computing, 2020
Proceedings of the IEEE Conference on Industrial Cyberphysical Systems, 2020
Verified Development and Deployment of Multiple Interacting Smart Contracts with VeriSolid.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social Media.
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the 14th ACM International Conference on Distributed and Event-based Systems, 2020
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
ACM Trans. Priv. Secur., 2019
Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities.
CoRR, 2019
Smart Contract Development in Practice: Trends, Issues, and Discussions on Stack Overflow.
CoRR, 2019
TRANSAX: A Blockchain-based Decentralized Forward-Trading Energy Exchange for Transactive Microgrids.
CoRR, 2019
Detection and mitigation of attacks on transportation networks as a multi-stage security game.
Comput. Secur., 2019
A game-theoretic approach for selecting optimal time-dependent thresholds for anomaly detection.
Auton. Agents Multi Agent Syst., 2019
Proceedings of the IEEE 22nd International Symposium on Real-Time Distributed Computing, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Cyber-Physical Simulation Platform for Security Assessment of Transactive Energy Systems.
Proceedings of the 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2019
Proceedings of the 2019 American Control Conference, 2019
2018
ACM Trans. Internet Techn., 2018
Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks.
IEEE Trans. Netw. Sci. Eng., 2018
Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus.
IEEE Trans. Control. Netw. Syst., 2018
Application-Aware Anomaly Detection of Sensor Measurements in Cyber-Physical Systems.
Sensors, 2018
SURE: A Modeling and Simulation Integration Platform for Evaluation of Secure and Resilient Cyber-Physical Systems.
Proc. IEEE, 2018
Int. J. Inf. Sec., 2018
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018
SolidWorx: A Resilient and Trustworthy Transactive Platform for Smart and Connected Communities.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
TRANSAX: A Blockchain-Based Decentralized Forward-Trading Energy Exchanged for Transactive Microgrids.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening.
Proceedings of the IEEE International Conference on Industrial Internet, 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
An Economic Study of the Effect of Android Platform Fragmentation on Security Updates.
Proceedings of the Financial Cryptography and Data Security, 2018
2017
IEEE Commun. Lett., 2017
PlaTIBART: a platform for transactive IoT blockchain applications with repeatable testing.
Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things, 2017
On the design of communication and transaction anonymity in blockchain-based transactive microgrids.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017
Providing privacy, safety, and security in IoT-based transactive energy systems using distributed ledgers.
Proceedings of the Seventh International Conference on the Internet of Things, 2017
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017
Proceedings of the 2nd International Workshop on Science of Smart City Operations and Platforms Engineering, 2017
Proceedings of the 2nd International Workshop on Social Sensing, 2017
Proceedings of the 2017 American Control Conference, 2017
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017
2016
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016
Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent Security.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
Trans. Data Hiding Multim. Secur., 2015
Network Topology Vulnerability/Cost Trade-Off: Model, Application, and Computational Complexity.
Internet Math., 2015
Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the IEEE International Conference on Communication, 2015
Integrity assurance in resource-bounded systems through stochastic message authentication.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools.
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 54th IEEE Conference on Decision and Control, 2015
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
2014
ACM Trans. Internet Techn., 2014
SIGMETRICS Perform. Evaluation Rev., 2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Designing robust network topologies for wireless sensor networks in adversarial environments.
Pervasive Mob. Comput., 2013
Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks.
Proceedings of the Web and Internet Economics - 9th International Conference, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
Quantifying Network Topology Robustness under Budget Constraints: General Model and Computational Complexity.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
A game-theoretic analysis of content-adaptive steganography with independent embedding.
Proceedings of the 21st European Signal Processing Conference, 2013
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Proceedings of the Game Theory for Networks, 2012
2011
Optimal selection of sink nodes in wireless sensor networks in adversarial environments.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
2009
Proceedings of the 4th International Conference on Autonomous Robots and Agents, 2009