Author of the publication

Combating Behavioral Deviance via User Behavior Control.

, , , and . AAMAS, page 202-210. International Foundation for Autonomous Agents and Multiagent Systems Richland, SC, USA / ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Note on the Properties of the Supremal Controllable Sublanguage in Pushdown Systems.. IEEE Trans. Automat. Contr., 53 (3): 826-829 (2008)Methods to Window Data to Differentiate Between Markov Models., , and . IEEE Trans. Systems, Man, and Cybernetics, Part B, 41 (3): 650-663 (2011)Behavior Detection Using Confidence Intervals of Hidden Markov Models., , and . IEEE Trans. Systems, Man, and Cybernetics, Part B, 39 (6): 1484-1492 (2009)A cooperate-defect model for the spread of deviant behavior in social networks., , , and . CoRR, (2014)Unsupervised Machine Learning of Open Source Russian Twitter Data Reveals Global Scope and Operational Characteristics., and . CoRR, (2018)A cellular automata model can quickly approximate UDP and TCP network traffic., , and . Complexity, 9 (3): 32-40 (2004)Why and how to deceive: game results with sociological evidence., and . Social Netw. Analys. Mining, 4 (1): 161 (2014)An evolutionary game model for the spread of non-cooperative behavior in online social networks., , , and . SAC, page 1154-1159. ACM, (2015)Deriving an optimally deceptive policy in two-player iterated games., , and . ACC, page 3808-3813. IEEE, (2016)Identification and characterization of cyberbullying dynamics in an online social network., , , and . ASONAM, page 280-285. ACM, (2015)