Parinaz Naghizadeh Ardabili

Orcid: 0000-0002-2277-1709

According to our database1, Parinaz Naghizadeh Ardabili authored at least 54 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Impact of Network Design Interventions on the Security of Interdependent Systems.
IEEE Trans. Control. Netw. Syst., March, 2024

Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment.
J. Cybersecur., January, 2024

Structured Network Games: Leveraging Relational Information in Equilibrium Analysis.
IEEE Trans. Netw. Sci. Eng., 2024

Robust Control Barrier Functions for Sampled-Data Systems.
IEEE Control. Syst. Lett., 2024

The Double-Edged Sword of Behavioral Responses in Strategic Classification: Theory and User Studies.
CoRR, 2024

Enhancing Group Fairness in Federated Learning through Personalization.
CoRR, 2024

Generalization Error Bounds for Learning under Censored Feedback.
CoRR, 2024

United We Fall: On the Nash Equilibria of Multiplex and Multilayer Network Games.
CoRR, 2024

Extended Horizons: Multi-hop Awareness in Network Games.
Proceedings of the Decision and Game Theory for Security - 15th International Conference, 2024

2023
An advantage based policy transfer algorithm for reinforcement learning with metrics of transferability.
CoRR, 2023

Safe Control Using High-Order Measurement Robust Control Barrier Functions.
Proceedings of the American Control Conference, 2023

United We Fall: On the Nash Equilibria of Multiplex Network Games.
Proceedings of the 59th Annual Allerton Conference on Communication, 2023

Social Bias Meets Data Bias: The Impacts of Labeling and Measurement Errors on Fairness Criteria.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Incentive Mechanisms for Strategic Classification and Regression Problems.
Proceedings of the EC '22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11, 2022

Adaptive Data Debiasing through Bounded Exploration.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

DiPLe: Learning Directed Collaboration Graphs for Peer-to-Peer Personalized Learning.
Proceedings of the IEEE Information Theory Workshop, 2022

Fairness Interventions as (Dis)Incentives for Strategic Manipulation.
Proceedings of the International Conference on Machine Learning, 2022

2021
Adaptive Data Debiasing through Bounded Exploration and Fairness.
CoRR, 2021

The Impact of Network Design Interventions on CPS Security.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Using Private and Public Assessments in Security Information Sharing Agreements.
IEEE Trans. Inf. Forensics Secur., 2020

Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs.
IEEE Trans. Control. Netw. Syst., 2020

Paid Prioritization with Content Competition.
CoRR, 2020

BASCPS: How does behavioral decision making impact the security of cyber-physical systems?
CoRR, 2020

Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap.
CoRR, 2020

2019
A Reputation-Based Contract for Repeated Crowdsensing With Costly Verification.
IEEE Trans. Signal Process., 2019

Personalized augmented reality via fog-based imitation learning.
Proceedings of the Workshop on Fog Computing and the IoT, 2019

Hurts to Be Too Early: Benefits and Drawbacks of Communication in Multi-Agent Learning.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Adversarial Contract Design for Private Data Commercialization.
Proceedings of the 2019 ACM Conference on Economics and Computation, 2019

Protecting Assets with Heterogeneous Valuations under Behavioral Probability Weighting.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

The Impacts of Behavioral Probability Weighting on Security Investments in Interdependent Systems.
Proceedings of the 2019 American Control Conference, 2019

2018
Provision of Public Goods on Networks: On Existence, Uniqueness, and Centralities.
IEEE Trans. Netw. Sci. Eng., 2018

Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence.
IEEE Trans. Inf. Forensics Secur., 2018

Adaptive Fog-Based Output Security for Augmented Reality.
Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, 2018

2017
Designing cyber insurance policies in the presence of security interdependence.
Proceedings of the 12th workshop on the Economics of Networks, Systems and Computation, 2017

Designing Cyber Insurance Policies: Mitigating Moral Hazard Through Security Pre-Screening.
Proceedings of the Game Theory for Networks - 7th International EAI Conference, 2017

On the uniqueness and stability of equilibria of network games.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

Embracing risk dependency in designing cyber-insurance contracts.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

2016
Perceptions and Truth: A Mechanism Design Approach to Crowd-Sourcing Reputation.
IEEE/ACM Trans. Netw., 2016

Opting Out of Incentive Mechanisms: A Study of Security as a Non-Excludable Public Good.
IEEE Trans. Inf. Forensics Secur., 2016

Risky business: Fine-grained data breach prediction using business profiles.
J. Cybersecur., 2016

On the Role of Public and Private Assessments in Security Information Sharing Agreements.
CoRR, 2016

Exit equilibrium: Towards understanding voluntary participation in security games.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Inter-Temporal Incentives in Security Information Sharing Agreements.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

2015
A Tale of Two Mechanisms: Incentivizing Investments in Security Games.
CoRR, 2015

Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents.
Proceedings of the 24th USENIX Security Symposium, 2015

Provision of non-excludable public goods on networks: From equilibrium to centrality measures.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Closing the price of anarchy gap in the interdependent security game.
Proceedings of the 2014 Information Theory and Applications Workshop, 2014

Can Less Be More? A Game-Theoretic Analysis of Filtering vs. Investment.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Budget balance or voluntary participation? Incentivizing investments in interdependent security games.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
Incentives, Quality, and Risks: A Look Into the NSF Proposal Review Pilot.
CoRR, 2013

2012
Establishing Network Reputation via Mechanism Design.
Proceedings of the Game Theory for Networks, 2012


  Loading...