Arunesh Sinha
Orcid: 0000-0002-3594-3848Affiliations:
- Rutgers University, NJ, USA
- Singapore Management University, Singapore (former)
- University of Southern California, CA, USA (former)
According to our database1,
Arunesh Sinha
authored at least 95 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Tracking people across ultra populated indoor spaces by matching unreliable Wi-Fi signals with disconnected video feeds.
Pervasive Mob. Comput., 2024
CoRR, 2024
CoRR, 2024
Probabilistic Perspectives on Error Minimization in Adversarial Reinforcement Learning.
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Handling Long and Richly Constrained Tasks through Constrained Hierarchical Reinforcement Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
CoRR, 2023
Generative Modelling of Stochastic Actions with Arbitrary Constraints in Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Building a Personalized Messaging System for Health Intervention in Underprivileged Regions Using Reinforcement Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Securing Lifelines: Safe Delivery of Critical Services in Areas with Volatile Security Situation via a Stackelberg Game Approach.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
CoRR, 2022
Safe Delivery of Critical Services in Areas with Volatile Security Situation via a Stackelberg Game Approach.
CoRR, 2022
The Art of Manipulation: Threat of Multi-Step Manipulative Attacks in Security Games.
CoRR, 2022
CoRR, 2022
Scalable Distributional Robustness in a Class of Non-Convex Optimization with Guarantees.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
Trajectory Optimization for Safe Navigation in Maritime Traffic Using Historical Data.
Proceedings of the 28th International Conference on Principles and Practice of Constraint Programming, 2022
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
Choices Are Not Independent: Stackelberg Security Games with Nested Quantal Response Models.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
Multiscale Generative Models: Improving Performance of a Generative Model Using Feedback from Other Dependent Generative Models.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
Proceedings of the EAAMO 2021: ACM Conference on Equity and Access in Algorithms, Mechanisms, and Optimization, Virtual Event, USA, October 5, 2021
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021
2020
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System.
ACM Trans. Intell. Syst. Technol., 2020
CoRR, 2020
CoRR, 2020
Artificial Intelligence for Social Impact: Learning and Planning in the Data-to-Deployment Pipeline.
AI Mag., 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Who and When to Screen: Multi-Round Active Screening for Network Recurrent Infectious Diseases Under Uncertainty.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020
Solving Online Threat Screening Games using Constrained Action Space Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Who and When to Screen: Multi-Round Active Screening for Recurrent Infectious Diseases Under Uncertainty.
CoRR, 2019
Proceedings of the 2019 ACM Conference on Economics and Computation, 2019
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
AI Mag., 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018
2017
Reports of the Workshops of the Thirty-First AAAI Conference on Artificial Intelligence.
AI Mag., 2017
Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals.
Games, 2016
Proceedings of the Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection, 2016
Addressing Behavioral Uncertainty in Security Games: An Efficient Robust Strategic Solution for Defender Patrols.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Get Me to My GATE on Time: Efficiently Solving General-Sum Bayesian Threat Screening Games.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016
SPECTRE: A Game Theoretic Framework for Preventing Collusion in Security Games (Demonstration).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016
Conquering Adversary Behavioral Uncertainty in Security Games: An Efficient Modeling Robust Based Algorithm.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
Proceedings of the Computer Poker and Imperfect Information Games, 2016
One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015
Learning, Predicting and Planning against Crime: Demonstration Based on Real Urban Crime Data (Demonstration).
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
2013
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
What you want is not what you get: predicting sharing policies for text-based content on facebook.
Proceedings of the AISec'13, 2013
2012
Proceedings of the Principles of Security and Trust - First International Conference, 2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
2011
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
2009
Proceedings of the 11th IEEE International Symposium on Web Systems Evolution, 2009