Author of the publication

Securing the Deep Fraud Detector in Large-Scale E-Commerce Platform via Adversarial Machine Learning Approach.

, , , , , , and . WWW, page 616-626. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Yushu: A Heuristic-Based Agent for Automated Negotiating Competition., and . New Trends in Agent-Based Complex Automated Negotiations, volume 383 of Studies in Computational Intelligence, Springer, (2012)An Application of Automated Negotiation to Distributed Task Allocation., , and . IAT, page 138-145. IEEE Computer Society, (2007)Refinement of Strong Stackelberg Equilibria in Security Games., , , , and . AAAI, AAAI Press, (2011)Strategic agents for multi-resource negotiation., , and . Autonomous Agents and Multi-Agent Systems, 23 (1): 114-153 (2011)Getting Started on a Real-World Challenge Problem in Computational Game Theory and Beyond., and . AAAI Spring Symposium: AI, The Fundamental Social Aggregation Challenge, volume SS-12-01 of AAAI Technical Report, AAAI, (2012)Human-Computer Negotiation in Three-Player Market Settings., , , and . ECAI, volume 263 of Frontiers in Artificial Intelligence and Applications, page 417-422. IOS Press, (2014)Modeling Bounded Rationality for Sponsored Search Auctions., , , and . ECAI, volume 285 of Frontiers in Artificial Intelligence and Applications, page 515-523. IOS Press, (2016)Measuring the social influences of scientist groups based on multiple types of collaboration relations., , , , and . Inf. Process. Manage., 53 (1): 1-20 (2017)Accelerating Multiagent Reinforcement Learning by Equilibrium Transfer., , and . IEEE Trans. Cybernetics, 45 (7): 1289-1302 (2015)Sentence Rewriting for Semantic Parsing., , , and . CoRR, (2019)