Arunesh Sinha
Arunesh Sinha
Verified email at - Homepage
Cited by
Cited by
Towards the science of security and privacy in machine learning
N Papernot, P McDaniel, A Sinha, M Wellman
arXiv preprint arXiv:1611.03814, 2016
Sok: Security and privacy in machine learning
N Papernot, P McDaniel, A Sinha, MP Wellman
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 399-414, 2018
Stackelberg security games: Looking beyond a decade of success
A Sinha, F Fang, B An, C Kiekintveld, M Tambe
IJCAI, 2018
Keeping pace with criminals: An extended study of designing patrol allocation against adaptive opportunistic criminals
C Zhang, S Gholami, D Kar, A Sinha, M Jain, R Goyal, M Tambe
Games 7 (3), 15, 2016
Capture: A new predictive anti-poaching tool for wildlife protection
TH Nguyen, A Sinha, S Gholami, A Plumptre, L Joppa, M Tambe, ...
One size does not fit all: A game-theoretic approach for dynamically and effectively screening for threats
M Brown, A Sinha, A Schlenker, M Tambe
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
From physical security to cybersecurity
A Sinha, TH Nguyen, D Kar, M Brown, M Tambe, AX Jiang
Journal of Cybersecurity 1 (1), 19-35, 2015
Audit games
J Blocki, N Christin, A Datta, AD Procaccia, A Sinha
International Joint Conference on Artificial Intelligence, 2013
Understanding and protecting privacy: Formal semantics and principled audit mechanisms
A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ...
International Conference on Information Systems Security, 1-27, 2011
Learning adversary behavior in security games: A PAC model perspective
A Sinha, D Kar, M Tambe
arXiv preprint arXiv:1511.00043, 2015
Continuous tamper-proof logging using tpm 2.0
A Sinha, L Jia, P England, JR Lorch
International Conference on Trust and Trustworthy Computing, 19-36, 2014
Trends and applications in Stackelberg security games
D Kar, TH Nguyen, F Fang, M Brown, A Sinha, M Tambe, AX Jiang
Handbook of Dynamic Game Theory, 1-47, 2017
Stackelberg security games (SSG): Basics and application overview
B An, M Tambe, A Sinha
Improving Homeland Security Decisions, 485, 2017
Human adversaries in opportunistic crime security games: Evaluating competing bounded rationality models
YD Abbasi, M Short, A Sinha, N Sintov, C Zhang, M Tambe
Proceedings of the third annual conference on advances in cognitive systems …, 2015
Don’t bury your head in warnings: A game-theoretic approach for intelligent allocation of cyber-security alerts
A Schlenker, H Xu, M Guirguis, C Kiekintveld, A Sinha, M Tambe, S Sonya, ...
Three strategies to success: Learning adversary models in security games
N Haghtalab, F Fang, TH Nguyen, A Sinha, AD Procaccia, M Tambe
Audit games with multiple defender resources
J Blocki, N Christin, A Datta, A Procaccia, A Sinha
Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015
Regret minimizing audits: A learning-theoretic basis for privacy protection
J Blocki, N Christin, A Datta, A Sinha
2011 IEEE 24th Computer Security Foundations Symposium, 312-327, 2011
Program actions as actual causes: A building block for accountability
A Datta, D Garg, D Kaynar, D Sharma, A Sinha
2015 IEEE 28th Computer Security Foundations Symposium, 261-275, 2015
Provable de-anonymization of large datasets with sparse dimensions
A Datta, D Sharma, A Sinha
International Conference on Principles of Security and Trust, 229-248, 2012
The system can't perform the operation now. Try again later.
Articles 1–20