Selected Publications

  2018

    Integrated Learning and Feature Selection for Deep Neural Networks in Multispectral Images(A. Ortiz, A. Granados, O. Fuentes, C. Kiekintveld, D. Rosario, Z. Bell). IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops.
    Bidding in Periodic Double Auctions Using Heuristics and Dynamic Monte Carlo Tree Search (M. P. Chowdhury, C. Kiekintveld, S. Tran, W. Yeoh). Joint Conference on Artificial Intelligence (IJCAI).
    Incremental Strategy Generation for Stackelberg Equilibria in Extensive-Form Games (J. Cerny, B. Bosansky, C. Kiekintveld). ACM Conference on Economics and Computation (ACM EC).
    Algorithms for Subgame Abstraction with Applications to Cyber Defense (A. Basak, M. Gutierrez, and C. Kiekintveld). Conference on Decision and Game Theory for Security (GameSec).
    An Initial Study of Targeted Personality Models in the FlipIt Game (A. Basak, J. Cerny, M. Gutierrez, S. Curtis, C. Kamhoua, D. Jones, B. Bosansky, and C. Kiekintveld). Conference on Decision and Game Theory for Security (GameSec).
    Stackelberg Security Games: Looking Beyond a Decade of Success (A. Sinha, F. Fang, B. An, C. Kiekintveld, M. Tambe). International Joint Conference on Artificial Intelligence (IJCAI) Survey Track.
    On the Defense Against Adversarial Examples Beyond the Visible Spectrum (A. Ortiz, O. Fuentes, D. Rosario, and C. Kiekintveld). IEEE Military Communications Conference (MILCOM).

  2017

    Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cybersecurity Alerts (A Schlenker, H Xu, M Guirguis, C Kiekintveld, A Sinha, M Tambe, S Sonya, D Balderas and N Dunstatter). International Joint Conference on Artificial Intelligence (IJCAI).
    Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers (K. Durkota, V. Lisy, C. Kiekintveld, K. Horak, B. Bosansky, T. Pevny). Conference on Decision and Game Theory for Security (GameSec).
    Comparing Strategic Secrecy and Stackelberg Commitment in Security Games (Q Guo, B. An, B. Bosansky, C. Kiekintveld). Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI17).
    Combining Game Theory and Learning for Dynamic Network Defense Strategies (C. Kiekintveld and B. Bosansky). NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience.

  2016

    Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games (J. Cermak, B. Bosansky, K. Durkota, V. Lisy, C. Kiekintveld). AAAI Conference on Artificial Intelligence.
    Case Studies of Network Defense with Attack Graph Games (K. Durkota, V. Lisy, C. Kiekintveld, B. Bosansky, M. Pechoucek). IEEE Intelligent Systems.
    Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections (B. Ford, M. Brown, A. Yadav, A. Singh, A. Sinha, B. Srivastava, C. Kiekintveld, M. Tambe). International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS).
    Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security (S. McCarthy, M. Tambe, C. Kiekintveld, M. Gore, A. Killion). AAAI Conference on Artificial Intelligence.
    Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks (M. Zhao, B. An, C. Kiekintveld). AAAI Conference on Artificial Intelligence.

  2015

    Approximate Solutions for Attack Graph Games with Imperfect Information (K Durkota, V Lisy, B Bosansky, and C Kiekintveld). Conference on Decision and Game Theory for Security (GameSec).
    Combining online learning and equilibrium computation in security games (R Klima, V Lisy, and C Kiekintveld). Conference on Decision and Game Theory for Security (GameSec).
    Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies (B Bosansky, A Jiang, M Tambe, C Kiekintveld). AAAI Conference on Artificial Intelligence.
    Abstraction Using Analysis of Subgames (A Basak and C Kiekintveld). IJCAI Workshop on Algorithmic Game Theory (AGT).
    Approximate Solutions for Attack Graph Games with Imperfect Information (K Durkota, V Lisy, B Bosansky, and C Kiekintveld). IJCAI Workshop on Behavioral, Economic and Computational Intelligence for Security (BECIS).
    Optimal Network Security Hardening Using Attack Graph Games (K Durkota, V Lisy, B Bosansky, and C Kiekintveld). IJCAI International Joint Conference on Artificial Intelligence.
    Multi-Agent Patrolling on a Budget: Finding the Best Team for the Job (S McCarthy, A Schlenker, M Tambe, and C Kiekintveld) AAMAS Workshop on Optimization in Multi-Agent Systems (OPTMAS).
    Selecting Robust Strategies Based on Abstracted Game Models (O Veliz and C Kiekintveld). IJCAI Workshop on Smart Simulation and Modelling for Complex Systems (SSMCS).

  2014

    An Exact Double-Oracle Algorithm for Zero-Sum Extensive-Form Games with Imperfect Information (B Bosansky, C Kiekintveld, Viliam Lisy, and M Pechoucek). Journal of Artificial Intelligence Research.
    Online Learning Methods for Border Patrol Resource Allocation (R Klima, C Kiekintveld, V Lisy). Conference on Decision and Game Theory for Security (GameSec).
    Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security (C Kiekintveld, V Lisy, and Radek Pibil). Chapter in Cyber Warfare: Building the Scientific Foundation, edited by Jajodia et al. in Advances In Information Security (56).

  2013

    Security Games with Interval Uncertainty (C Kiekintveld, T Islam, and V Kreinovich). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    Double-oracle Algorithm for Computing an Exact Nash Equilibrium in Zero-sum Extensive-form Games (B Bosansky, C Kiekintveld, V Lisy, J Cermak, and M Pechoucek). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    An Extended Study on Multi-Objective Security Games (M Brown, B An, C Kiekintveld, F Ordonez, and M Tambe). Journal of Autonomous Agents and Multi-Agent Systems (JAAMAS).
    Security Games with Contagion: Handling Asymmetric Information (J Tsai, Y Qian, Y Vorobeychik, C Kiekintveld, and M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    Improving Resource Allocation Strategies Against Human Adversaries in Security Games: An Extended Study (R Yang, C Kiekintveld, F Ordonez, M Tambe, and R John). Artificial Intelligence Journal.

  2012

    Efficient Approximation for Security Games with Interval Uncertainty (C Kiekintveld and V Kreinovich). AAAI Spring Symposium on Game Theory for Security, Sustainability, and Health (GTSSH).
    Iterative Algorithm for Solving Two-player Zero-sum Extensive-form Games with Imperfect Information (B Bosansky, C Kiekintveld, V Lisy, and M Pechoucek). European Conference on Artificial Intelligence (ECAI).
    Game Theoretic Model of Strategic Honeypot Allocation in Computer Networks (R Pibil, V Lisy, C Kiekintveld, B Bosansky, and M Pechoucek). Conference on Decision and Game Theory for Security (GameSec).
    TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems Using Game Theory (Z Yin, A Jiang, M Tambe, C Kiekintveld, K Leyton-Brown, T Sandholm, J Sullivan). AI Magazine.
    Multi-Objective Optimization for Security Games (M Brown, B An, C Kiekintveld, F Ordonez, and M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    Security Games with Limited Surveillance (B An, D Kempe, C Kiekintveld, E Shieh, S Singh, M Tambe, Y Vorobeychik). Conference on Artificial Intelligence (AAAI).
    Deployed Security Games for Patrol Planning (F Ordonez, M Tambe, J Jara, M Jain, C Kiekintveld, and J Tsai). Handbook on Operations Research for Homeland Security.
    TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems (Z Yin, A Jiang, M Johnson, M Tambe, C Kiekintveld, K Leyton-Brown, T Sandholm, J Sullivan). Conference on Innovative Applications of Artificial Intelligence (IAAI).

  2011

    Improving Resource Allocation Strategy Against Human Adversaries in Security Games (R Yang, C Kiekintveld, F Ordonez, M Tambe, R John). International Joint Conference on Artificial Intelligence (IJCAI).
    Linear-Time Resource Allocation in Security Games with Identical Fully Protective Resources (O Lerma, V Kreinovich, C Kiekintveld). AAAI Workshop on Applied Adversarial Reasoning and Risk Modeling (AARM).
    Stackelberg vs. Nash in Security Games: Interchangeability, Equivalence, and Uniqueness (JAIR journal vesion) (D Korzhyk, Z Yin, C Kiekintveld, V Conitzer, and M Tambe). Journal of AI Research (JAIR)
    Approximation Methods for Infinite Bayesian Stackelberg Games: Modeling Distributional Payoff Uncertainty (C Kiekintveld, J Marecki, and M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    Quality-bounded Solutions for Finite Bayesian Stackelberg Games: Scaling up (M Jain, C Kiekintveld, and M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    GUARDS - Game Theoretic Security Allocation on a National Scale (J Pita, M Tambe, C Kiekintveld, S Cullen, E Steigerwald). Conference on Autonomous Agents and Multiagent Systems (AAMAS). Winner of Best Industry Track Paper Award
    Improved Computational Models of Human Behavior in Security Games (Extended Abstract) (R Yang, C Kiekintveld, F Ordonez, M Tambe, R John). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    GUARDS and PROTECT: Next Generation Applications of Security Games (B An, J Pita, E Shieh, M Tambe, C Kiekintveld, and J Marecki). ACM SIGecom Exchanges.
    Two Decades of Multiagent Teamwork Research: Past, Present, and Future (M Taylor, M Jain, C Kiekintveld, JY Kwak, R Yang, Z Yin, M Tambe). Postproceedings of Collaborative Agents REsearch and Development (CARE) Workshop.
    Towards Optimal Placement of Bio-Weapon Detectors (C Kiekintveld and O Lerma). North American Fuzzy Information Processing Society (NAFIPS).
    Towards Optimal Knowledge Processing: From Centralization Through Cyberinsfrastructure To Cloud Computing (O Lerma, E Gutierrez, C Kiekintveld, and V Kreinovich). International Journal of Innovative Management, Information and Production (IJIMIP).
    Optimizing Trajectories for Unmanned Aerial Vehicles (UAVs) Patrolling the Border (C Kiekintveld, V Kreinovich, and O Lerma). World Conference on Soft Computing (2011).
    Refinement of Strong Stackelberg Equilibria in Security Games (B An, M Tambe, F Ordonez, Eric Shieh, and C Kiekintveld). Conference on Autonomous Agents and Multiagent Systems (AAMAS).

  2010

    Security Games with Arbitrary Schedules: A Branch and Price Approach (M Jain, E Kardes, C Kiekintveld, M Tambe, and F Ordonez). Conference on Artificial Intelligence (AAAI).
    Urban Security: Game-Theoretic Resource Allocation in Networked Physical Domains (J Tsai, Z Yin, J Kwak, D Kempe, C Kiekintveld, and M Tambe). Conference on Artificial Intelligence (AAAI).
    Asynchronous Algorithms for Approximate Distributed Constraint Optimization with Quality Bounds (C Kiekintveld, Z Yin, A Kumar, and M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    Software Assistants for Randomized Patrol Planning for The LAX Airport Police and The Federal Air Marshals Service (M Jain, J Tsai, J Pita, C Kiekintveld, S Rathi, F Ordonez, M Tambe). INFORMS Interfaces Journal. Finalist, EURO Excellence in Practice Award EEPA 2010
    Stackelberg vs. Nash in Security Games: Interchangeability, Equivalence, and Uniqueness (Z Yin, D Korzhyk, C Kiekintveld, V Conitzer, and M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    Robust Bayesian Methods for Stackelberg Security Games (Extended Abstract) (C Kiekintveld, J Marecki, M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR? (M Taylor, C Kiekintveld, C Western, and M Tambe). Informatica Journal.

  2009

    Computing Optimal Randomized Resource Allocations for Massive Security Games (C Kiekintveld, M Jain, J Tsai, J Pita, F Ordonez, and M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    IRIS - A Tool for Strategic Security Allocation in Transportation Networks (J Tsai, S Rathi, C Kiekintveld, F Ordonez, and M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS). Winner of Best Industry Track Paper Award
    Strategic Security Placement in Network Domains with Applications to Transit Security (J Tsai, Z Yin, J Kwak, D Kempe, C Kiekintveld, and M Tambe). AAMAS Workshop on Quantitative Risk Analysis for Security Applications (QRASA).
    Security Applications: Lessons of Real-World Deployment (J Pita, H Bellamane, M Jain, C Kiekintveld, J Tsai, F Ordonez, and M Tambe). SIGEcom Exchanges.

  2008

    Empirical Game-Theoretic Methods for Strategy Design and Analysis in Complex Games (Doctoral Thesis) (C Kiekintveld). Doctoral Thesis, University of Michigan.
    Selecting Strategies Using Empirical Game Models: An Experimental Analysis of Meta-Strategies (C Kiekintveld and MP Wellman). Conference on Autonomous Agents and Multiagent Systems.
    Forecasting Market Prices in a Supply Chain Game (C Kiekintveld, J Miller, PR Jordan, LF Callender, and MP Wellman). Electronic Commerce Research and Applications Journal (ECRA).

  2007

    Forecasting Market Prices in a Supply Chain Game. (C Kiekintveld, J Miller, PR Jordan, and MP Wellman). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    Empirical Game-Theoretic Analysis of the TAC Supply Chain Game. (PR Jordan, C Kiekintveld, and MP Wellman). Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS)

  2006

    Controlling a Supply Chain Agent Using Value-Based Decomposition. (C Kiekintveld, J Miller, PR Jordan, and MP Wellman). ACM Conference on Electronic Commerce (ACM-EC).
    Empirical Mechanism Design: Methods, with Application to a Supply-chain Scenario. (Y Vorobeychik, C Kiekintveld, and MP Wellman). ACM Conference on Electronic Commerce (ACM-EC).
    Empirical Game-Theoretic Analysis of Chaturanga. (C Kiekintveld, MP Wellman, and S Singh). AAMAS Workshop on Game Theoretic and Decision Theoretic Agents (GTDT).
    An Analysis of the 2004 Supply Chain Management Trading Agent Competition. (C Kiekintveld, Y Vorobeychik, and MP Wellman). Agent-Mediated Electronic Commerce: Designing Trading Agents and Mechanisms, LNAI 3937.
    Market Efficiency, Sales Competition, and the Bullwhip Effect in the TAC SCM Tournaments. (PR Jordan, C Kiekintveld, J Miller, and MP Wellman). AAMAS Workshop on Trading Agent Design and Analysis (TADA).

  2005

    Strategic Interactions in a Supply Chain Game. (MP Wellman, J Estelle, S Singh, Y Vorobeychik, C Kiekintveld, V Soni). Computational Intelligence Journal 21(1).
    Value-Driven Procurement in the TAC Supply Chain Game. (C Kiekintveld, MP Wellman, S Singh, and V Soni). SIGEcom Exchanges 4(3).

  2004

    Distributed Feedback Control for Decision Making on Supply Chains. (C Kiekintveld, MP Wellman, S Singh, J Estelle, Y Vorobeychik, V Soni, and M Rudary). International Conference on Automated Planning and Scheduling (ICAPS).