Long Tran-Thanh

According to our database1, Long Tran-Thanh authored at least 119 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Symmetric Linear Bandits with Hidden Symmetry.
CoRR, 2024

Betting on what is neither verifiable nor falsifiable.
CoRR, 2024

Learning the Expected Core of Strictly Convex Stochastic Cooperative Games.
CoRR, 2024

A Simulation for Supply Chains Contract Execution.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2024

Identifying the Best Arm in the Presence of Global Environment Shifts.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

HierarchyNet: Learning to Summarize Source Code with Heterogeneous Representations.
Proceedings of the Findings of the Association for Computational Linguistics: EACL 2024, 2024

Attacking Multi-Player Bandits and How to Robustify Them.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

A Summary of Online Markov Decision Processes with Non-oblivious Strategic Adversary.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

2023
Online Markov decision processes with non-oblivious strategic adversary.
Auton. Agents Multi Agent Syst., June, 2023

Efficient and adaptive incentive selection for crowdsourcing contests.
Appl. Intell., April, 2023

Revisiting LARS for Large Batch Training Generalization of Neural Networks.
CoRR, 2023

Examining the Effects of Degree Distribution and Homophily in Graph Learning Models.
CoRR, 2023

Predicting COVID-19 pandemic by spatio-temporal graph neural networks: A New Zealand's study.
CoRR, 2023

Achieving Better Regret against Strategic Adversaries.
CoRR, 2023

Invariant Lipschitz Bandits: A Side Observation Approach.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

Towards Data-Agnostic Pruning At Initialization: What Makes a Good Sparse Mask?
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost.
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023

2022
Invariant Lipschitz Bandits: A Side Observation Approach.
CoRR, 2022

Multi-Player Bandits Robust to Adversarial Collisions.
CoRR, 2022

Label driven Knowledge Distillation for Federated Learning with non-IID Data.
CoRR, 2022

Socialbots on Fire: Modeling Adversarial Behaviors of Socialbots via Multi-Agent Hierarchical Reinforcement Learning.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Expected Improvement for Contextual Bandits.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Sequential Vaccine Allocation with Delayed Feedback.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Understanding the Limits of Poisoning Attacks in Episodic Reinforcement Learning.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Temporal Multiresolution Graph Neural Networks For Epidemic Prediction.
Proceedings of the 1st Workshop on Healthcare AI and COVID-19, 2022

Class Similarity Weighted Knowledge Distillation for Continual Semantic Segmentation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Sequential Blocked Matching.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Adversarial Socialbot Learning via Multi-Agent Deep Hierarchical Reinforcement Learning.
CoRR, 2021

Incremental Training and Group Convolution Pruning for Runtime DNN Performance Scaling on Heterogeneous Embedded Platforms.
CoRR, 2021

Secure-UCB: Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification.
CoRR, 2021

Sequential Choice Bandits with Feedback for Personalizing users' experience.
CoRR, 2021

Speeding up distributed pseudo-tree optimization procedures with cross edge consistency to solve DCOPs.
Appl. Intell., 2021

Partner selection in self-organised wireless sensor networks for opportunistic energy negotiation: A multi-armed bandit based approach.
Ad Hoc Networks, 2021

How to Guide a Non-Cooperative Learner to Cooperate: Exploiting No-Regret Algorithms in System Design.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

Last Round Convergence and No-Dynamic Regret in Asymmetric Repeated Games.
Proceedings of the Algorithmic Learning Theory, 2021

2020
Zealotry and Influence Maximization in the Voter Model: When to Target Zealots?
CoRR, 2020

Exploiting No-Regret Algorithms in System Design.
CoRR, 2020

Fuzzy c-Means Clustering for Persistence Diagrams.
CoRR, 2020

Last Round Convergence and No-Instant Regret in Repeated Games with Asymmetric Information.
CoRR, 2020

Optimal Learning from Verified Training Data.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Adversarial Blocking Bandits.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

To Ask or Not to Ask: A User Annoyance Aware Preference Elicitation Framework for Social Robots.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2020

Learning Optimal Temperature Region for Solving Mixed Integer Functional DCOPs.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Fighting Wildfires under Uncertainty - A Sequential Resource Allocation Approach.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Optimising Resource Management for Embedded Machine Learning.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

Comparison of classical and machine-learning methods on spatio-temporal modeling of daily Ozone concentrations.
Proceedings of the XLVI Latin American Computing Conference, 2020

Continuous Influence Maximisation for the Voter Dynamics: Is Targeting High-Degree Nodes a Good Strategy?
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

AED: An Anytime Evolutionary DCOP Algorithm.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Path Planning Problems with Side Observations - When Colonels Play Hide-and-Seek.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Defending with Shared Resources on a Network.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Bounding Regret in Empirical Games.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Colonel Blotto Games and Hide-and-Seek Games as Path Planning Problems with Side Observations.
CoRR, 2019

An Empirical Evaluation of Selfish Mining and Strategic Mining in Proof-of-Work Blockchain with Multiple Miners.
CoRR, 2019

On the efficiency of data collection for multiple Naïve Bayes classifiers.
Artif. Intell., 2019

Selfish Mining in Proof-of-Work Blockchain with Multiple Miners: An Empirical Evaluation.
Proceedings of the PRIMA 2019: Principles and Practice of Multi-Agent Systems, 2019

What Prize Is Right? How to Learn the Optimal Structure for Crowdsourcing Contests.
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019

Social Cost Guarantees in Smart Route Guidance.
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019

Streaming Bayesian Inference for Crowdsourced Classification.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Manipulating a Learning Defender and Ways to Counteract.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Promoting Cooperation through External Interference.
Proceedings of the 2019 Conference on Artificial Life, 2019

Unifying the Stochastic and the Adversarial Bandits with Knapsack.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Identifying vulnerabilities in trust and reputation systems.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Imitative Follower Deception in Stackelberg Games.
Proceedings of the 2019 ACM Conference on Economics and Computation, 2019

Shielding and Shadowing: A Tale of Two Strategies for Opinion Control in the Voting Dynamics.
Proceedings of the Complex Networks and Their Applications VIII, 2019

Don't Put All Your Strategies in One Basket: Playing Green Security Games with Imperfect Prior Knowledge.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Optimal Interdiction of Urban Criminals with the Aid of Real-Time Information.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

On the Inducibility of Stackelberg Equilibrium for Security Games.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
On the Preliminary Investigation of Selfish Mining Strategy with Multiple Selfish Miners.
CoRR, 2018

Speeding Up GDL-Based Message Passing Algorithms for Large-Scale DCOPs.
Comput. J., 2018

Designing the Game to Play: Optimizing Payoff Structure in Security Games.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

On the Efficiency of Data Collection for Crowdsourced Classification.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Fostering Cooperation in Structured Populations Through Local and Global Interference Strategies.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Adaptive Incentive Selection for Crowdsourcing Contests.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Deceiving Cyber Adversaries: A Game Theoretic Approach.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Preference Elicitation with Interdependency and User Bother Cost.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

A Near-Optimal Node-to-Agent Mapping Heuristic for GDL-Based DCOP Algorithms in Multi-Agent Systems.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

A Generic Domain Pruning Technique for GDL-Based DCOP Algorithms in Cooperative Multi-Agent Systems.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Inducible Equilibrium for Security Games.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Strategic Attacks on Trust Models via Bandit Optimization.
Proceedings of the 20th International Trust Workshop co-located with AAMAS/IJCAI/ECAI/ICML 2018, 2018

Utilizing Housing Resources for Homeless Youth Through the Lens of Multiple Multi-Dimensional Knapsacks.
Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, 2018

2017
Reports of the Workshops of the Thirty-First AAAI Conference on Artificial Intelligence.
AI Mag., 2017

Optimal Escape Interdiction on Transportation Networks.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Playing Repeated Network Interdiction Games with Semi-Bandit Feedback.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Budget Limited Trust-Aware Decision Making.
Proceedings of the Autonomous Agents and Multiagent Systems, 2017

The Dollar Auction with Spiteful Players.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Incentive Engineering Framework for Crowdsourcing Systems.
CoRR, 2016

Efficiency of active learning for the allocation of workers on crowdsourced classification tasks.
CoRR, 2016

Interactive Scheduling of Appliance Usage in the Home.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Playing Repeated Security Games with No Prior Knowledge.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Repeated Dollar Auctions: A Multi-Armed Bandit Approach.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Coalitional Security Games.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
Efficient Thompson Sampling for Online Matrix-Factorization Recommendation.
Proceedings of the Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 2015

Efficient Algorithms with Performance Guarantees for the Stochastic Multiple-Choice Knapsack Problem.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

The Cost of Interference in Evolving Multiagent Systems.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Crowdsourcing Complex Workflows under Budget Constraints.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Functional Bandits.
CoRR, 2014

Efficient crowdsourcing of unknown experts using bounded multi-armed bandits.
Artif. Intell., 2014

Efficient Regret Bounds for Online Bid Optimisation in Budget-Limited Sponsored Search Auctions.
Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence, 2014

Referral Incentives in Crowdfunding.
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014

BudgetFix: budget limited crowdsourcing for interdependent task allocation with quality guarantees.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

2013
Bounding the Estimation Error of Sampling-based Shapley Value Approximation With/Without Stratifying.
CoRR, 2013

Forecasting Multi-Appliance Usage for Smart Home Energy Management.
Proceedings of the IJCAI 2013, 2013

An Efficient Vector-Based Representation for Coalitional Games.
Proceedings of the IJCAI 2013, 2013

Towards appliance usage prediction for home energy management.
Proceedings of the Fourth International Conference on Future Energy Systems, 2013

Efficient budget allocation with accuracy guarantees for crowdsourcing classification tasks.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
Budget-limited multi-armed bandits.
PhD thesis, 2012

Long-term information collection with energy harvesting wireless sensors: a multi-armed bandit based approach.
Auton. Agents Multi Agent Syst., 2012

Efficient Crowdsourcing of Unknown Experts using Multi-Armed Bandits.
Proceedings of the ECAI 2012, 2012

DCOPs and bandits: exploration and exploitation in decentralised coordination.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Knapsack Based Optimal Policies for Budget-Limited Multi-Armed Bandits.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
On the Existence of Pure Strategy Nash Equilibria in Integer-Splittable Weighted Congestion Games.
Proceedings of the Algorithmic Game Theory, 4th International Symposium, 2011

2010
Fading-aware reliable and energy efficient routing in wireless sensor networks.
Comput. Commun., 2010

An Agent-Based Distributed Coordination Mechanism for Wireless Visual Sensor Nodes Using Dynamic Programming.
Comput. J., 2010

Optimal Time Dependent Data Collection Schemes in Wireless Sensor Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Delay Characteristics and Server Update Optimization of Multiplayer Gaming in Mobile Environment.
Proceedings of IEEE International Conference on Communications, 2010

Epsilon-First Policies for Budget-Limited Multi-Armed Bandits.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
A novel reliability based routing protocol for power aware communications in wireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Decentralised control of adaptive sampling and routing in wireless visual sensor networks.
Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009


  Loading...