Selected Publications
2018
Integrated Learning and Feature Selection for Deep Neural Networks in Multispectral Images(A.
Ortiz, A. Granados, O. Fuentes, C. Kiekintveld, D. Rosario, Z. Bell). IEEE Conference on Computer
Vision and Pattern Recognition (CVPR) Workshops.
Bidding
in Periodic Double Auctions Using Heuristics and Dynamic
Monte Carlo Tree Search (M. P. Chowdhury, C. Kiekintveld, S. Tran, W. Yeoh). Joint Conference on Artificial
Intelligence (IJCAI).
Incremental
Strategy Generation for Stackelberg Equilibria in
Extensive-Form Games (J. Cerny, B. Bosansky, C. Kiekintveld). ACM Conference on Economics and Computation (ACM EC).
Algorithms
for Subgame Abstraction with Applications to Cyber
Defense (A. Basak, M. Gutierrez, and
C. Kiekintveld). Conference on Decision and Game
Theory for Security (GameSec).
An
Initial Study of Targeted Personality Models in the FlipIt
Game (A. Basak, J. Cerny, M. Gutierrez, S. Curtis,
C. Kamhoua, D. Jones, B. Bosansky, and C. Kiekintveld). Conference on Decision and Game
Theory for Security (GameSec).
Stackelberg
Security Games: Looking Beyond a Decade of Success (A. Sinha, F. Fang, B. An, C.
Kiekintveld, M. Tambe). International Joint Conference on
Artificial Intelligence (IJCAI) Survey Track.
On the Defense Against
Adversarial Examples Beyond the Visible
Spectrum (A. Ortiz, O. Fuentes, D. Rosario, and
C. Kiekintveld). IEEE Military Communications
Conference (MILCOM).
2017
Don't Bury
your Head in Warnings: A Game-Theoretic Approach for
Intelligent Allocation of Cybersecurity Alerts (A Schlenker, H Xu, M Guirguis, C Kiekintveld, A Sinha,
M Tambe, S Sonya, D Balderas and N Dunstatter). International Joint Conference on Artificial Intelligence (IJCAI).
Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers (K. Durkota, V. Lisy, C. Kiekintveld, K. Horak, B. Bosansky, T. Pevny). Conference on Decision and Game Theory for Security (GameSec).
Comparing Strategic Secrecy and Stackelberg Commitment in Security Games (Q Guo, B. An, B. Bosansky, C. Kiekintveld). Proceedings of the 26th International Joint Conference
on Artificial Intelligence (IJCAI17).
Combining
Game Theory and Learning for Dynamic Network Defense
Strategies (C. Kiekintveld and B. Bosansky). NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence
and Resilience.
2016
Using Correlated Strategies for Computing Stackelberg Equilibria in
Extensive-Form Games (J. Cermak, B. Bosansky, K. Durkota, V. Lisy, C. Kiekintveld). AAAI Conference on Artificial Intelligence.
Case Studies of Network Defense with Attack Graph Games (K. Durkota, V. Lisy, C. Kiekintveld,
B. Bosansky, M. Pechoucek). IEEE Intelligent Systems.
Protecting the NECTAR
of the Ganga River Through Game-Theoretic Factory Inspections (B. Ford, M. Brown, A. Yadav, A. Singh, A. Sinha, B. Srivastava, C. Kiekintveld, M. Tambe). International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS).
Preventing Illegal Logging:
Simultaneous Optimization of Resource Teams and Tactics for
Security (S. McCarthy, M. Tambe, C. Kiekintveld, M. Gore,
A. Killion). AAAI Conference on Artificial Intelligence.
Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks (M. Zhao, B. An, C. Kiekintveld). AAAI Conference on Artificial Intelligence.
2015
Approximate
Solutions for Attack Graph Games with Imperfect
Information (K Durkota, V Lisy, B Bosansky, and C
Kiekintveld). Conference on Decision and Game Theory for Security (GameSec).
Combining online
learning and equilibrium computation in security games (R
Klima, V Lisy, and C Kiekintveld). Conference on Decision and Game Theory for Security (GameSec).
Combining
Compact Representation and Incremental Generation in Large
Games with Sequential Strategies (B Bosansky, A Jiang, M
Tambe, C Kiekintveld). AAAI Conference on Artificial Intelligence.
Abstraction Using
Analysis of Subgames (A Basak and C Kiekintveld). IJCAI Workshop on Algorithmic Game Theory (AGT).
Approximate
Solutions for Attack Graph Games with Imperfect
Information (K Durkota, V Lisy, B Bosansky, and C
Kiekintveld). IJCAI Workshop on Behavioral, Economic and Computational Intelligence for Security (BECIS).
Optimal Network
Security Hardening Using Attack Graph Games (K Durkota, V
Lisy, B Bosansky, and C Kiekintveld). IJCAI International Joint Conference on Artificial Intelligence.
Multi-Agent Patrolling on a Budget: Finding the Best Team for the Job (S McCarthy, A Schlenker, M Tambe, and C Kiekintveld) AAMAS Workshop on Optimization in Multi-Agent Systems (OPTMAS).
Selecting Robust
Strategies Based on Abstracted Game Models (O Veliz and C
Kiekintveld). IJCAI Workshop on Smart Simulation and Modelling for Complex Systems (SSMCS).
2014
An Exact
Double-Oracle Algorithm for Zero-Sum Extensive-Form Games
with Imperfect Information (B Bosansky, C Kiekintveld,
Viliam Lisy, and M Pechoucek). Journal of Artificial Intelligence Research.
Online Learning
Methods for Border Patrol Resource Allocation (R Klima, C
Kiekintveld, V Lisy). Conference on Decision and Game Theory for Security (GameSec).
Game-theoretic
Foundations for the Strategic Use of Honeypots in Network
Security (C Kiekintveld, V Lisy, and Radek Pibil). Chapter in Cyber Warfare: Building the Scientific Foundation, edited by Jajodia et al. in Advances In Information Security (56).
2013
Security Games with
Interval Uncertainty (C Kiekintveld, T Islam, and V
Kreinovich). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
Double-oracle Algorithm for
Computing an Exact Nash Equilibrium in Zero-sum
Extensive-form Games (B Bosansky, C Kiekintveld, V Lisy,
J Cermak, and M Pechoucek). Conference on Autonomous
Agents and Multiagent Systems (AAMAS).
An Extended Study
on Multi-Objective Security Games (M Brown, B An, C
Kiekintveld, F Ordonez, and M Tambe). Journal of Autonomous
Agents and Multi-Agent Systems (JAAMAS).
Security Games with
Contagion: Handling Asymmetric Information (J Tsai, Y
Qian, Y Vorobeychik, C Kiekintveld, and M
Tambe). Conference on Autonomous Agents and Multiagent
Systems (AAMAS).
Improving
Resource Allocation Strategies Against Human Adversaries in
Security Games: An Extended Study (R Yang, C Kiekintveld,
F Ordonez, M Tambe, and R John). Artificial Intelligence Journal.
2012
Efficient Approximation for
Security Games with Interval Uncertainty (C Kiekintveld
and V Kreinovich). AAAI Spring Symposium on Game Theory for Security, Sustainability, and Health (GTSSH).
Iterative Algorithm for
Solving Two-player Zero-sum Extensive-form Games with
Imperfect Information (B Bosansky, C Kiekintveld, V
Lisy, and M Pechoucek). European Conference on Artificial Intelligence (ECAI).
Game Theoretic Model
of Strategic Honeypot Allocation in Computer Networks
(R Pibil, V Lisy, C Kiekintveld, B Bosansky, and M
Pechoucek). Conference on Decision and Game Theory for Security (GameSec).
TRUSTS: Scheduling
Randomized Patrols for Fare Inspection in Transit Systems
Using Game Theory (Z Yin, A Jiang, M Tambe, C
Kiekintveld, K Leyton-Brown, T Sandholm, J Sullivan). AI Magazine.
Multi-Objective
Optimization for Security Games (M Brown, B An, C
Kiekintveld, F Ordonez, and M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
Security
Games with Limited Surveillance (B An, D Kempe, C
Kiekintveld, E Shieh, S Singh, M Tambe, Y
Vorobeychik). Conference on Artificial Intelligence (AAAI).
Deployed
Security Games for Patrol Planning (F Ordonez, M
Tambe, J Jara, M Jain, C Kiekintveld, and J Tsai). Handbook on Operations Research for Homeland Security.
TRUSTS: Scheduling
Randomized Patrols for Fare Inspection in Transit
Systems (Z Yin, A Jiang, M Johnson, M Tambe, C
Kiekintveld, K Leyton-Brown, T Sandholm, J Sullivan). Conference on Innovative Applications of Artificial Intelligence (IAAI).
2011
Improving
Resource Allocation Strategy Against Human Adversaries in
Security Games (R Yang, C Kiekintveld, F Ordonez, M Tambe,
R John). International Joint Conference on Artificial Intelligence (IJCAI).
Linear-Time Resource
Allocation in Security Games with Identical Fully
Protective Resources (O Lerma, V Kreinovich, C
Kiekintveld). AAAI Workshop on Applied Adversarial Reasoning and Risk Modeling (AARM).
Stackelberg
vs. Nash in Security Games: Interchangeability, Equivalence,
and Uniqueness (JAIR journal vesion) (D Korzhyk, Z Yin,
C Kiekintveld, V Conitzer, and M Tambe). Journal of AI Research (JAIR)
Approximation Methods
for Infinite Bayesian Stackelberg Games: Modeling
Distributional Payoff Uncertainty (C Kiekintveld, J
Marecki, and M Tambe). Conference on Autonomous Agents
and Multiagent Systems (AAMAS).
Quality-bounded
Solutions for Finite Bayesian Stackelberg Games: Scaling
up (M Jain, C Kiekintveld, and M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
GUARDS - Game Theoretic
Security Allocation on a National Scale (J Pita, M
Tambe, C Kiekintveld, S Cullen, E Steigerwald). Conference on Autonomous Agents and Multiagent Systems (AAMAS). Winner of Best Industry Track Paper Award
Improved
Computational Models of Human Behavior in Security Games
(Extended Abstract) (R Yang, C Kiekintveld, F Ordonez, M
Tambe, R John). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
GUARDS and PROTECT: Next Generation
Applications of Security Games (B An, J Pita, E Shieh, M Tambe, C
Kiekintveld, and J Marecki). ACM SIGecom Exchanges.
Two
Decades of Multiagent Teamwork Research: Past, Present,
and Future (M Taylor, M Jain, C Kiekintveld, JY Kwak,
R Yang, Z Yin, M Tambe). Postproceedings of Collaborative Agents REsearch and Development (CARE) Workshop.
Towards Optimal
Placement of Bio-Weapon Detectors (C Kiekintveld and O
Lerma). North American Fuzzy Information Processing Society (NAFIPS).
Towards Optimal Knowledge
Processing: From Centralization Through
Cyberinsfrastructure To Cloud Computing (O Lerma, E
Gutierrez, C Kiekintveld, and V
Kreinovich). International Journal of Innovative
Management, Information and Production (IJIMIP).
Optimizing Trajectories for
Unmanned Aerial Vehicles (UAVs) Patrolling the Border (C
Kiekintveld, V Kreinovich, and O Lerma). World Conference on Soft Computing (2011).
Refinement of Strong
Stackelberg Equilibria in Security Games (B An, M
Tambe, F Ordonez, Eric Shieh, and C Kiekintveld). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
2010
Security Games with
Arbitrary Schedules: A Branch and Price Approach (M
Jain, E Kardes, C Kiekintveld, M Tambe, and F Ordonez). Conference on Artificial Intelligence (AAAI).
Urban Security:
Game-Theoretic Resource Allocation in Networked Physical
Domains (J Tsai, Z Yin, J Kwak, D Kempe, C Kiekintveld,
and M Tambe). Conference on Artificial Intelligence (AAAI).
Asynchronous Algorithms for
Approximate Distributed Constraint Optimization with Quality
Bounds (C Kiekintveld, Z Yin, A Kumar, and M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
Software Assistants for
Randomized Patrol Planning for The LAX Airport Police and
The Federal Air Marshals Service (M Jain, J Tsai, J
Pita, C Kiekintveld, S Rathi, F Ordonez, M Tambe). INFORMS Interfaces Journal. Finalist, EURO Excellence in Practice Award EEPA 2010
Stackelberg
vs. Nash in Security Games: Interchangeability, Equivalence,
and Uniqueness (Z Yin, D Korzhyk, C Kiekintveld, V
Conitzer, and M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
Robust Bayesian Methods
for Stackelberg Security Games (Extended Abstract) (C
Kiekintveld, J Marecki, M Tambe). Conference on Autonomous Agents and Multiagent Systems (AAMAS).
A Framework for
Evaluating Deployed Security Systems: Is There a Chink in
your ARMOR? (M Taylor, C Kiekintveld, C Western, and M
Tambe). Informatica Journal.
2009
Computing
Optimal Randomized Resource Allocations for Massive Security
Games (C Kiekintveld, M Jain, J Tsai, J Pita, F Ordonez,
and M Tambe). Conference on Autonomous Agents and
Multiagent Systems (AAMAS).
IRIS - A Tool for Strategic
Security Allocation in Transportation Networks (J Tsai,
S Rathi, C Kiekintveld, F Ordonez, and M
Tambe). Conference on Autonomous Agents and Multiagent
Systems (AAMAS). Winner of Best Industry Track Paper Award
Strategic
Security Placement in Network Domains with Applications to
Transit Security (J Tsai, Z Yin, J Kwak, D Kempe, C
Kiekintveld, and M Tambe). AAMAS Workshop on Quantitative Risk Analysis for Security Applications (QRASA).
Security Applications:
Lessons of Real-World Deployment (J Pita, H Bellamane, M
Jain, C Kiekintveld, J Tsai, F Ordonez, and M Tambe). SIGEcom Exchanges.
2008
Empirical Game-Theoretic Methods
for Strategy Design and Analysis in Complex Games (Doctoral
Thesis) (C Kiekintveld). Doctoral Thesis, University of Michigan.
Selecting
Strategies Using Empirical Game Models: An Experimental
Analysis of Meta-Strategies (C Kiekintveld and MP
Wellman). Conference on Autonomous Agents and Multiagent Systems.
Forecasting
Market Prices in a Supply Chain Game (C Kiekintveld, J
Miller, PR Jordan, LF Callender, and MP
Wellman). Electronic Commerce Research and Applications
Journal (ECRA).
2007
Forecasting
Market Prices in a Supply Chain Game. (C Kiekintveld, J
Miller, PR Jordan, and MP Wellman). Conference on
Autonomous Agents and Multiagent Systems (AAMAS).
Empirical Game-Theoretic
Analysis of the TAC Supply Chain Game. (PR Jordan, C
Kiekintveld, and MP Wellman). Joint Conference on
Autonomous Agents and Multiagent Systems (AAMAS)
2006
Controlling a
Supply Chain Agent Using Value-Based Decomposition. (C
Kiekintveld, J Miller, PR Jordan, and MP Wellman). ACM
Conference on Electronic Commerce (ACM-EC).
Empirical Mechanism Design:
Methods, with Application to a Supply-chain Scenario. (Y
Vorobeychik, C Kiekintveld, and MP Wellman). ACM
Conference on Electronic Commerce (ACM-EC).
Empirical
Game-Theoretic Analysis of Chaturanga. (C Kiekintveld,
MP Wellman, and S Singh). AAMAS Workshop on Game
Theoretic and Decision Theoretic Agents (GTDT).
An Analysis of the
2004 Supply Chain Management Trading Agent Competition.
(C Kiekintveld, Y Vorobeychik, and MP Wellman). Agent-Mediated Electronic Commerce: Designing Trading Agents and Mechanisms, LNAI 3937.
Market Efficiency,
Sales Competition, and the Bullwhip Effect in the TAC SCM
Tournaments. (PR Jordan, C Kiekintveld, J Miller, and MP
Wellman). AAMAS Workshop on Trading Agent Design and
Analysis (TADA).
2005
Strategic
Interactions in a Supply Chain Game. (MP Wellman, J
Estelle, S Singh, Y Vorobeychik, C Kiekintveld, V
Soni). Computational Intelligence Journal 21(1).
Value-Driven
Procurement in the TAC Supply Chain Game. (C
Kiekintveld, MP Wellman, S Singh, and V Soni). SIGEcom Exchanges 4(3).
2004
Distributed
Feedback Control for Decision Making on Supply Chains.
(C Kiekintveld, MP Wellman, S Singh, J Estelle, Y
Vorobeychik, V Soni, and M Rudary). International
Conference on Automated Planning and Scheduling (ICAPS).
|
|
|