Aron Laszka

Orcid: 0000-0001-7400-2357

According to our database1, Aron Laszka authored at least 134 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reinforcement-Learning-Based Proactive Control for Enabling Power Grid Resilience to Wildfire.
IEEE Trans. Ind. Informatics, January, 2024

Pipelet: Practical Streamlined Blockchain Protocol.
CoRR, 2024

Deploying Mobility-On-Demand for All by Optimizing Paratransit Services.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

SmartTransit.AI: A Dynamic Paratransit and Microtransit Application.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Multi-Agent Reinforcement Learning with Hierarchical Coordination for Emergency Responder Stationing.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

An Online Approach to Solving Public Transit Stationing and Dispatch Problem.
Proceedings of the 15th ACM/IEEE International Conference on Cyber-Physical Systems, 2024

Decision Making in Non-Stationary Environments with Policy-Augmented Search.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

Forecasting and Mitigating Disruptions in Public Bus Transit Services.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

2023
Correct-by-Design Interacting Smart Contracts and a Systematic Approach for Verifying ERC20 and ERC721 Contracts With VeriSolid.
IEEE Trans. Dependable Secur. Comput., 2023

Survey and Taxonomy of Adversarial Reconnaissance Techniques.
ACM Comput. Surv., 2023

Hierarchical Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks.
CoRR, 2023

Task Grouping for Automated Multi-Task Machine Learning via Task Affinity Prediction.
CoRR, 2023

Artificial Intelligence for Smart Transportation.
CoRR, 2023

Adversarial Reconnaissance Mitigation and Modeling.
CoRR, 2023

SoK: The MITRE ATT&CK Framework in Research and Practice.
CoRR, 2023

The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox.
Proceedings of the ACM Web Conference 2023, 2023

Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023

Bayesian Models for Node-Based Inference Techniques.
Proceedings of the IEEE International Systems Conference, 2023

PhobosBC: A Blockchain-based Crowdsourced Post-disaster Mapping System and its Agent-based Simulation.
Proceedings of the 6th ACM SIGSPATIAL International Workshop on GeoSpatial Simulation, 2023

Rolling Horizon Based Temporal Decomposition for the Offline Pickup and Delivery Problem with Time Windows.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Principled Data-Driven Decision Support for Cyber-Forensic Investigations.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Data-Driven Prediction and Optimization of Energy Use for Transit Fleets of Electric and ICE Vehicles.
ACM Trans. Internet Techn., 2022

Neural Architecture and Feature Search for Predicting the Ridership of Public Transportation Routes.
Proceedings of the 2022 IEEE International Conference on Smart Computing, 2022

Offline Vehicle Routing Problem with Online Bookings: A Novel Problem Formulation with Applications to Paratransit.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

An Online Approach to Solve the Dynamic Vehicle Routing Problem with Stochastic Trip Requests for Paratransit Services.
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022

A Taxonomy of Blockchain Oracles: The Truth Depends on the Question.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Decentralized Computation Market for Stream Processing Applications.
Proceedings of the IEEE International Conference on Cloud Engineering, 2022

2021
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations.
IEEE Trans. Inf. Forensics Secur., 2021

Safe and Private Forward-trading Platform for Transactive Microgrids.
ACM Trans. Cyber Phys. Syst., 2021

Reinforcement Learning based Proactive Control for Transmission Grid Resilience to Wildfire.
CoRR, 2021

Efficient Data Management for Intelligent Urban Mobility Systems.
CoRR, 2021

TRANSIT-GYM: A Simulation and Evaluation Engine for Analysis of Bus Transit Systems.
Proceedings of the IEEE International Conference on Smart Computing, 2021

Energy and Emission Prediction for Mixed-Vehicle Transit Fleets Using Multi-task and Inductive Transfer Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

PoolParty: Efficient Blockchain-Agnostic Decentralized Mining Pool.
Proceedings of the ICBCT '21: The 3rd International Conference on Blockchain Technology, 2021

Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Selfish Mining Attacks Exacerbated by Elastic Hash Supply.
Proceedings of the Financial Cryptography and Data Security, 2021

DEIMOSBC: A Blockchain-based System for Crowdsensing after Natural Disasters.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021

Minimizing Energy Use of Mixed-Fleet Public Transit for Fixed-Route Service.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Graph-Theoretic Approach for Increasing Participation in Networks With Assorted Resources.
IEEE Trans. Netw. Sci. Eng., 2020

A Privacy-Preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission.
IEEE J. Biomed. Health Informatics, 2020

The Role of Blockchains in Multi-Stakeholder Transactive Energy Systems.
Frontiers Blockchain, 2020

Impact of COVID-19 on Public Transit Accessibility and Ridership.
CoRR, 2020

A Review and Outlook of Energy Consumption Estimation Models for Electric Vehicles.
CoRR, 2020

Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities.
CoRR, 2020

Plasma Go: A Scalable Sidechain Protocol for Flexible Payment Mechanisms in Blockchain-based Marketplaces.
CoRR, 2020

Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches.
Computer, 2020

An Empirical Study of Android Security Bulletins in Different Vendors.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Data-Driven Prediction of Route-Level Energy Use for Mixed-Vehicle Transit Fleets.
Proceedings of the IEEE International Conference on Smart Computing, 2020

Cyber-Attacks and Mitigation in Blockchain Based Transactive Energy Systems.
Proceedings of the IEEE Conference on Industrial Cyberphysical Systems, 2020

Verified Development and Deployment of Multiple Interacting Smart Contracts with VeriSolid.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social Media.
Proceedings of the Financial Cryptography and Data Security, 2020

Mechanisms for outsourcing computation via a decentralized market.
Proceedings of the 14th ACM International Conference on Distributed and Event-based Systems, 2020

Equilibrium of Blockchain Miners with Dynamic Asset Allocation.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020

Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020

Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Database Audit Workload Prioritization via Game Theory.
ACM Trans. Priv. Secur., 2019

Deep Reinforcement Learning based Adaptive Moving Target Defense.
CoRR, 2019

Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities.
CoRR, 2019

Smart Contract Development in Practice: Trends, Issues, and Discussions on Stack Overflow.
CoRR, 2019

TRANSAX: A Blockchain-based Decentralized Forward-Trading Energy Exchange for Transactive Microgrids.
CoRR, 2019

Post-incident audits on cyber insurance discounts.
Comput. Secur., 2019

Detection and mitigation of attacks on transportation networks as a multi-stage security game.
Comput. Secur., 2019

A game-theoretic approach for selecting optimal time-dependent thresholds for anomaly detection.
Auton. Agents Multi Agent Syst., 2019

Augmenting Learning Components for Safety in Resource Constrained Autonomous Robots.
Proceedings of the IEEE 22nd International Symposium on Real-Time Distributed Computing, 2019

VeriSolid: Correct-by-Design Smart Contracts for Ethereum.
Proceedings of the Financial Cryptography and Data Security, 2019

Cyber-Physical Simulation Platform for Security Assessment of Transactive Energy Systems.
Proceedings of the 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2019

Diversity and Trust to Increase Structural Robustness in Networks.
Proceedings of the 2019 American Control Conference, 2019

2018
On the Assessment of Systematic Risk in Networked Systems.
ACM Trans. Internet Techn., 2018

Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks.
IEEE Trans. Netw. Sci. Eng., 2018

Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus.
IEEE Trans. Control. Netw. Syst., 2018

Application-Aware Anomaly Detection of Sensor Measurements in Cyber-Physical Systems.
Sensors, 2018

SURE: A Modeling and Simulation Integration Platform for Evaluation of Secure and Resilient Cyber-Physical Systems.
Proc. IEEE, 2018

A game-theoretic approach for integrity assurance in resource-bounded systems.
Int. J. Inf. Sec., 2018

Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

SolidWorx: A Resilient and Trustworthy Transactive Platform for Smart and Connected Communities.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Economic Analyses of Security Investments on Cryptocurrency Exchanges.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

TRANSAX: A Blockchain-Based Decentralized Forward-Trading Energy Exchanged for Transactive Microgrids.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening.
Proceedings of the IEEE International Conference on Industrial Internet, 2018

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach.
Proceedings of the Financial Cryptography and Data Security, 2018

The Rules of Engagement for Bug Bounty Programs.
Proceedings of the Financial Cryptography and Data Security, 2018

An Economic Study of the Effect of Android Platform Fragmentation on Security Updates.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
Monitoring stealthy diffusion.
Knowl. Inf. Syst., 2017

Scheduling Battery-Powered Sensor Networks for Minimizing Detection Delays.
IEEE Commun. Lett., 2017

Privacy-Preserving Platform for Transactive Energy Systems.
CoRR, 2017

PlaTIBART: a platform for transactive IoT blockchain applications with repeatable testing.
Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things, 2017

On the design of communication and transaction anonymity in blockchain-based transactive microgrids.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017

Providing privacy, safety, and security in IoT-based transactive energy systems using distributed ledgers.
Proceedings of the Seventh International Conference on the Internet of Things, 2017

On the Economics of Ransomware.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Synergic security for smart water networks: redundancy, diversity, and hardening.
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017

Optimal detection of faulty traffic sensors used in route planning.
Proceedings of the 2nd International Workshop on Science of Smart City Operations and Platforms Engineering, 2017

Graph-Theoretic Approach for Increasing Participation in Social Sensing.
Proceedings of the 2nd International Workshop on Social Sensing, 2017

Improving network connectivity using trusted nodes and edges.
Proceedings of the 2017 American Control Conference, 2017

A Game-Theoretic Approach for Alert Prioritization.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Vulnerability of Transportation Networks to Traffic-Signal Tampering.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

Optimal thresholds for intrusion detection systems.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent Security.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms.
Proceedings of the Computer Security - ESORICS 2016, 2016

Multi-Defender Strategic Filtering Against Spear-Phishing Attacks.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Adaptive Steganography and Steganalysis with Fixed-Size Embedding.
Trans. Data Hiding Multim. Secur., 2015

Network Topology Vulnerability/Cost Trade-Off: Model, Application, and Computational Complexity.
Internet Math., 2015

Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A game-theoretic approach for minimizing security risks in the Internet-of-Things.
Proceedings of the IEEE International Conference on Communication, 2015

Integrity assurance in resource-bounded systems through stochastic message authentication.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Games of Timing for Security in Dynamic Environments.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools.
Proceedings of the Financial Cryptography and Data Security, 2015

Should Cyber-Insurance Providers Invest in Software Security?
Proceedings of the Computer Security - ESORICS 2015, 2015

Resilient observation selection in adversarial settings.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

Optimal Personalized Filtering Against Spear-Phishing Attacks.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Robustness Against Strategic Attacks
PhD thesis, 2014

Secure Team Composition to Thwart Insider Threats and Cyber-Espionage.
ACM Trans. Internet Techn., 2014

Quantifying all-to-one network topology robustness under budget constraints.
SIGMETRICS Perform. Evaluation Rev., 2014

A Survey of Interdependent Information Security Games.
ACM Comput. Surv., 2014

FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Estimating Systematic Risk in Real-World Networks.
Proceedings of the Financial Cryptography and Data Security, 2014

Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools.
Proceedings of the Financial Cryptography and Data Security, 2014

The Complexity of Estimating Systematic Risk in Networks.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

How many down?: toward understanding systematic risk in networks.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Designing robust network topologies for wireless sensor networks in adversarial environments.
Pervasive Mob. Comput., 2013

Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks.
Proceedings of the Web and Internet Economics - 9th International Conference, 2013

Bitspotting: Detecting Optimal Adaptive Steganography.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

Quantifying Network Topology Robustness under Budget Constraints: General Model and Computational Complexity.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

A game-theoretic analysis of content-adaptive steganography with independent embedding.
Proceedings of the 21st European Signal Processing Conference, 2013

Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Game-theoretic Robustness of Many-to-one Networks.
Proceedings of the Game Theory for Networks, 2012

2011
Optimal selection of sink nodes in wireless sensor networks in adversarial environments.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

2009
Universal autonomous robot navigation using quasi optimal path generation.
Proceedings of the 4th International Conference on Autonomous Robots and Agents, 2009


  Loading...