Recent applications of game theory in security domains use algorithms to solve a Stackelberg model, in which one player (the leader) first commits to a mixed strategy and then th...
Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are commo...
Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they can completely ruin the performance of the waterm...
It is important for programs to have modular correctness properties. We look at non-deterministic programs expressed as termrewriting systems which compute normal forms of input t...
A novel approach to combining clustering and feature selection is presented. It implements a wrapper strategy for feature selection, in the sense that the features are directly se...