Thanh Hong Nguyen

Orcid: 0000-0002-8466-1724

According to our database1, Thanh Hong Nguyen authored at least 64 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ComaDICE: Offline Cooperative Multi-Agent Reinforcement Learning with Stationary Distribution Shift Regularization.
CoRR, 2024

Tackling Stackelberg Network Interdiction against a Boundedly Rational Adversary.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Regret-based Defense in Adversarial Reinforcement Learning.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

2023
Information Design for Multiple Interdependent Defenders: Work Less, Pay Off More.
Games, February, 2023

Inverse Factorized Q-Learning for Cooperative Multi-agent Imitation Learning.
CoRR, 2023

Mimicking To Dominate: Imitation Learning Strategies for Success in Multiagent Competitive Games.
CoRR, 2023

Tackling Stackelberg Network Interdiction against a Boundedly Rational Adversary.
CoRR, 2023

Generative Modelling of Stochastic Actions with Arbitrary Constraints in Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

CounterNet: End-to-End Training of Prediction Aware Counterfactual Explanations.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Building a Personalized Messaging System for Health Intervention in Underprivileged Regions Using Reinforcement Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Imitating Opponent to Win: Adversarial Policy Imitation Learning in Two-player Competitive Games.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

Beyond NaN: Resiliency of Optimization Layers in the Face of Infeasibility.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Behavioral Learning in Security Games: Threat of Multi-Step Manipulative Attacks.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty.
Games, 2022

The Art of Manipulation: Threat of Multi-Step Manipulative Attacks in Security Games.
CoRR, 2022

Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility.
CoRR, 2022

Information design for multiple independent and self-interested defenders: Work less, pay off more.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Algorithmic Information Design in Multi-Player Games: Possibilities and Limits in Singleton Congestion.
Proceedings of the EC '22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11, 2022

The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty?
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

An Exploration of Poisoning Attacks on Data-Based Decision Making.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

2021
Algorithmic Information Design in Multi-Player Games: Possibility and Limits in Singleton Congestion.
CoRR, 2021

CounterNet: End-to-End Training of Counterfactual Aware Predictions.
CoRR, 2021

Countering Attacker Data Manipulation in Security Games.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

2020
Partial Adversarial Behavior Deception in Security Games.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

Tackling Imitative Attacker Deception in Repeated Bayesian Stackelberg Security Games.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

2019
Empirical Game-Theoretic Methods for Adaptive Cyber-Defense.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Adaptive Cyber Defenses for Botnet Detection and Mitigation.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Learning to Signal in the Goldilocks Zone: Improving Adversary Compliance in Security Games.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

Tackling Sequential Attacks in Security Games.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Warning Time: Optimizing Strategic Signaling for Security Against Boundedly Rational Adversaries.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Deception in Finitely Repeated Security Games.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis.
Secur. Commun. Networks, 2018

Deceitful Attacks in Security Games.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Predicting poaching for wildlife Protection.
IBM J. Res. Dev., 2017

Keeping it Real: Using Real-World Problems to Teach AI to Diverse Audiences.
AI Mag., 2017

PAWS - A Deployed Game-Theoretic Application to Combat Poaching.
AI Mag., 2017

A Stackelberg Game Model for Botnet Data Exfiltration.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Multi-Stage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

A Stackelberg Game Model for Botnet Traffic Exfiltration.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Green security games: apply game theory to addressing green security challenges.
SIGecom Exch., 2016

Addressing Behavioral Uncertainty in Security Games: An Efficient Robust Strategic Solution for Defender Patrols.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Three Strategies to Success: Learning Adversary Models in Security Games.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Combining Graph Contraction and Strategy Generation for Green Security Games.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Abstraction Methods for Solving Graph-Based Security Games.
Proceedings of the Autonomous Agents and Multiagent Systems - AAMAS 2016 Workshops, - Visionary Papers, 2016

From the Lab to the Classroom and Beyond: Extending a Game-Based Research Platform for Teaching AI to Diverse Audiences.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Conquering Adversary Behavioral Uncertainty in Security Games: An Efficient Modeling Robust Based Algorithm.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Protecting Wildlife under Imperfect Observation.
Proceedings of the Computer Poker and Imperfect Information Games, 2016

Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Deploying PAWS to Combat Poaching: Game-Theoretic Patrolling in Areas with Complex Terrain (Demonstration).
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
From physical security to cybersecurity.
J. Cybersecur., 2015

Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

A Unifying Methodology for Confronting Uncertainties in Security Games: Advances and Algorithms: (Doctoral Consortium).
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

2014
Game-Theoretic Target Selection in Contagion-Based Domains.
Comput. J., 2014

Stop the compartmentalization: unified robust algorithms for handling uncertainties in security games.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

Modeling human adversary decision making in security games: an initial report.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Analyzing the Effectiveness of Adversary Modeling in Security Games.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012
Security Games on Social Networks.
Proceedings of the Social Networks and Social Contagion, 2012

Security Games for Controlling Contagion.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012


  Loading...