Yevgeniy Vorobeychik
Orcid: 0000-0003-2471-5345
According to our database1,
Yevgeniy Vorobeychik
authored at least 269 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2024
ACM Trans. Knowl. Discov. Data, February, 2024
Optimal policy for control of epidemics with constrained time intervals and region-based interactions.
Networks Heterog. Media, 2024
IEEE Control. Syst. Lett., 2024
CoRR, 2024
CoRR, 2024
Adaptive Recruitment Resource Allocation to Improve Cohort Representativeness in Participatory Biomedical Datasets.
CoRR, 2024
A Game-Theoretic Approach to Privacy-Utility Tradeoff in Sharing Genomic Summary Statistics.
CoRR, 2024
Learning Interpretable Policies in Hindsight-Observable POMDPs through Partially Supervised Reinforcement Learning.
CoRR, 2024
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024
Proceedings of the IEEE Security and Privacy, 2024
Robin Hood: A De-identification Method to Preserve Minority Representation for Disparities Research.
Proceedings of the Privacy in Statistical Databases - International Conference, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024
Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024
RLHFPoison: Reward Poisoning Attack for Reinforcement Learning with Human Feedback in Large Language Models.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Knowl. Data Eng., October, 2023
ACM Trans. Priv. Secur., August, 2023
Managing re-identification risks while providing access to the <i>All of Us</i> research program.
J. Am. Medical Informatics Assoc., April, 2023
Hierarchical Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks.
CoRR, 2023
On the Exploitability of Reinforcement Learning with Human Feedback for Large Language Models.
CoRR, 2023
Conformal Temporal Logic Planning using Large Language Models: Knowing When to Do What and When to Ask for Help.
CoRR, 2023
Enabling Trade-offs in Privacy and Utility in Genomic Data Beacons and Summary Statistics.
CoRR, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023
Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, 2023
Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, 2023
Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency, 2023
SlowLiDAR: Increasing the Latency of LiDAR-Based Detection Using Adversarial Examples.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023
Proceedings of the American Control Conference, 2023
Proceedings of the Thirty-Third International Conference on Automated Planning and Scheduling, 2023
Eroding Trust in Aerial Imagery: Comprehensive Analysis and Evaluation of Adversarial Attacks in Geospatial Systems.
Proceedings of the 52nd IEEE Applied Imagery Pattern Recognition Workshop, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022
Proceedings of the Uncertainty in Artificial Intelligence, 2022
Proceedings of the Uncertainty in Artificial Intelligence, 2022
Just Resource Allocation? How Algorithmic Predictions and Human Notions of Justice Interact.
Proceedings of the EC '22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11, 2022
Proceedings of the Twelfth International Workshop on Agents in Traffic and Transportation co-located with the the 31st International Joint Conference on Artificial Intelligence and the 25th European Conference on Artificial Intelligence (IJCAI-ECAI 2022), 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Proceedings of the International Conference on Machine Learning, 2022
CROP: Certifying Robust Policies for Reinforcement Learning through Functional Smoothing.
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022
Proceedings of the AMIA 2022, 2022
A Representativeness-informed Model for Research Record Selection from Electronic Medical Record Systems.
Proceedings of the AMIA 2022, 2022
2021
Dataset, September, 2021
Robust coordination in adversarial social networks: From human behavior to agent-based modeling.
Netw. Sci., 2021
CoRR, 2021
CoRR, 2021
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
FaceSec: A Fine-Grained Robustness Evaluation Framework for Face Recognition Systems.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the Third IEEE International Conference on Cognitive Machine Intelligence, 2021
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021
De-identifying Socioeconomic Data at the Census Tract Level for Medical Research Through Constraint-based Clustering.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
J. Syst. Archit., 2020
Anatomical context protects deep learning from adversarial perturbations in medical imaging.
Neurocomputing, 2020
Finding Physical Adversarial Examples for Autonomous Driving with Fast and Differentiable Image Compositing.
CoRR, 2020
CoRR, 2020
Proceedings of the Thirty-Sixth Conference on Uncertainty in Artificial Intelligence, 2020
Proceedings of the Thirty-Sixth Conference on Uncertainty in Artificial Intelligence, 2020
Proceedings of the Thirty-Sixth Conference on Uncertainty in Artificial Intelligence, 2020
Proceedings of the 8th International Conference on Learning Representations, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
On Algorithmic Decision Procedures in Emergency Response Systems in Smart and Connected Communities.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020
Inducing Equilibria in Networked Public Goods Games through Network Structure Modification.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020
2019
ACM Trans. Priv. Secur., 2019
J. Biomed. Informatics, 2019
Detection and mitigation of attacks on transportation networks as a multi-stage security game.
Comput. Secur., 2019
Artif. Intell. Rev., 2019
A game-theoretic approach for selecting optimal time-dependent thresholds for anomaly detection.
Auton. Agents Multi Agent Syst., 2019
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Eighth Joint Conference on Lexical and Computational Semantics, 2019
Proceedings of the 15th IEEE International Conference on Embedded Software and Systems, 2019
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019
Proceedings of the AMIA 2019, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool Publishers, ISBN: 978-3-031-01580-9, 2018
Simulation-Based Optimization as a Service for Dynamic Data-Driven Applications Systems.
Proceedings of the Handbook of Dynamic Data Driven Applications Systems., 2018
Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks.
IEEE Trans. Netw. Sci. Eng., 2018
ACM Trans. Knowl. Discov. Data, 2018
Integrating linear optimization with structural modeling to increase HIV neutralization breadth.
PLoS Comput. Biol., 2018
SURE: A Modeling and Simulation Integration Platform for Evaluation of Secure and Resilient Cyber-Physical Systems.
Proc. IEEE, 2018
J. Am. Medical Informatics Assoc., 2018
Int. J. Inf. Sec., 2018
Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network.
CoRR, 2018
Artif. Intell., 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the 35th International Conference on Machine Learning, 2018
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening.
Proceedings of the IEEE International Conference on Industrial Internet, 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018
Proceedings of the AMIA 2018, 2018
2017
IEEE Trans. Knowl. Data Eng., 2017
Proceedings of the Thirty-Third Conference on Uncertainty in Artificial Intelligence, 2017
Using computational game theory to guide verification and security in hardware designs.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017
Prioritized Allocation of Emergency Responders based on a Continuous-Time Incident Prediction Model.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017
Proceedings of the AMIA 2017, 2017
Proceedings of the 2017 American Control Conference, 2017
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017
2016
Optimizing annotation resources for natural language de-identification via a game theoretic framework.
J. Biomed. Informatics, 2016
CoRR, 2016
Auton. Agents Multi Agent Syst., 2016
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
Demo Abstract: SURE: An Experimentation and Evaluation Testbed for CPS Security and Resilience.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015
Integrity assurance in resource-bounded systems through stochastic message authentication.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
Proceedings of the 54th IEEE Conference on Decision and Control, 2015
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015
Scalable Optimization of Randomized Operational Decisions in Adversarial Classification Settings.
Proceedings of the Eighteenth International Conference on Artificial Intelligence and Statistics, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
2014
Characterizing short-term stability for Boolean networks over any distribution of transfer functions.
CoRR, 2014
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014
Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014
Proceedings of the 2014 AAAI Fall Symposia, Arlington, Virginia, USA, November 13-15, 2014, 2014
Proceedings of the 2014 AAAI Fall Symposia, Arlington, Virginia, USA, November 13-15, 2014, 2014
2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the Cyber Security and Information Intelligence, 2013
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013
2012
Auton. Agents Multi Agent Syst., 2012
Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, 2012
Proceedings of the 13th ACM Conference on Electronic Commerce, 2012
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012
Proceedings of the Game Theory for Security, 2012
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012
2011
SIGecom Exch., 2011
Fault oblivious high performance computing with dynamic task replication and substitution.
Comput. Sci. Res. Dev., 2011
Decis. Support Syst., 2011
Noncooperatively Optimized Tolerance: Decentralized Strategic Optimization in Complex Systems
CoRR, 2011
Proceedings of the Internet and Network Economics - 7th International Workshop, 2011
A Game Theoretic Bidding Agent for the Ad Auction Game.
Proceedings of the ICAART 2011 - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, Volume 2, 2011
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011
2010
ACM Trans. Model. Comput. Simul., 2010
Proc. Natl. Acad. Sci. USA, 2010
Algorithmica, 2010
Average-Case Analysis of Mechanism Design with Approximate Resource Allocation Algorithms.
Proceedings of the Internet and Network Economics - 6th International Workshop, 2010
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010
2009
Proceedings of the 2009 Winter Simulation Conference, 2009
Proceedings of the Internet and Network Economics, 5th International Workshop, 2009
Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies.
Proceedings of the UAI 2009, 2009
Proceedings of the International Conference on Information Systems, 2009
Proceedings of the Complex Adaptive Systems and the Threshold Effect, 2009
2008
Int. J. Electron. Bus., 2008
Stochastic search methods for nash equilibrium approximation in simulation-based games.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008
2007
Automated Mechanism Design in Infinite Games of Incomplete Information: Framework and Applications.
Proceedings of the Game Theoretic and Decision Theoretic Agents, 2007
2006
Proceedings of the Proceedings 7th ACM Conference on Electronic Commerce (EC-2006), 2006
2005
Proceedings of the Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms, 2005
2004
Proceedings of the Computers and Games, 4th International Conference, 2004
Proceedings of the Fourteenth International Conference on Automated Planning and Scheduling (ICAPS 2004), 2004