Follow
Arunesh Sinha
Title
Cited by
Cited by
Year
Towards the science of security and privacy in machine learning
N Papernot, P McDaniel, A Sinha, M Wellman
arXiv preprint arXiv:1611.03814, 2016
5782016
Sok: Security and privacy in machine learning
N Papernot, P McDaniel, A Sinha, MP Wellman
2018 IEEE European symposium on security and privacy (EuroS&P), 399-414, 2018
5342018
Stackelberg security games: Looking beyond a decade of success
A Sinha, F Fang, B An, C Kiekintveld, M Tambe
IJCAI, 2018
2062018
Capture: A new predictive anti-poaching tool for wildlife protection
TH Nguyen, A Sinha, S Gholami, A Plumptre, L Joppa, M Tambe, ...
952016
Keeping pace with criminals: An extended study of designing patrol allocation against adaptive opportunistic criminals
C Zhang, S Gholami, D Kar, A Sinha, M Jain, R Goyal, M Tambe
Games 7 (3), 15, 2016
792016
From physical security to cybersecurity
A Sinha, TH Nguyen, D Kar, M Brown, M Tambe, AX Jiang
Journal of Cybersecurity 1 (1), 19-35, 2015
772015
Generating realistic stock market order streams
J Li, X Wang, Y Lin, A Sinha, M Wellman
Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 727-734, 2020
702020
One size does not fit all: A game-theoretic approach for dynamically and effectively screening for threats
M Brown, A Sinha, A Schlenker, M Tambe
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
662016
Audit games
J Blocki, N Christin, A Datta, AD Procaccia, A Sinha
International Joint Conference on Artificial Intelligence, 2013
652013
Trends and applications in Stackelberg security games
D Kar, TH Nguyen, F Fang, M Brown, A Sinha, M Tambe, AX Jiang
Handbook of dynamic game theory, 1-47, 2017
612017
Stackelberg security games (ssg) basics and application overview
B An, M Tambe, A Sinha
Improving Homeland Security Decisions 2, 485, 2017
552017
Understanding and protecting privacy: Formal semantics and principled audit mechanisms
A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ...
International Conference on Information Systems Security, 1-27, 2011
502011
Continuous tamper-proof logging using tpm 2.0
A Sinha, L Jia, P England, JR Lorch
Trust and Trustworthy Computing: 7th International Conference, TRUST 2014 …, 2014
482014
Deception in finitely repeated security games
TH Nguyen, Y Wang, A Sinha, MP Wellman
Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 2133-2140, 2019
462019
Learning adversary behavior in security games: A PAC model perspective
A Sinha, D Kar, M Tambe
arXiv preprint arXiv:1511.00043, 2015
462015
Three strategies to success: Learning adversary models in security games
N Haghtalab, F Fang, TH Nguyen, A Sinha, AD Procaccia, M Tambe
432016
Don’t bury your head in warnings: A game-theoretic approach for intelligent allocation of cyber-security alerts
A Schlenker, H Xu, M Guirguis, C Kiekintveld, A Sinha, M Tambe, S Sonya, ...
412017
Provable de-anonymization of large datasets with sparse dimensions
A Datta, D Sharma, A Sinha
Principles of Security and Trust: First International Conference, POST 2012 …, 2012
412012
Audit games with multiple defender resources
J Blocki, N Christin, A Datta, A Procaccia, A Sinha
Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015
382015
Program actions as actual causes: A building block for accountability
A Datta, D Garg, D Kaynar, D Sharma, A Sinha
2015 IEEE 28th Computer Security Foundations Symposium, 261-275, 2015
372015
The system can't perform the operation now. Try again later.
Articles 1–20