Demand response (DR) plays a critical role in ensuring efficient electri...
Finding diverse solutions to optimization problems has been of practical...
We study the excludable public project model where the decision is binar...
We study worst-case VCG redistribution mechanism design for the public
p...
We study a Stackelberg game between one attacker and one defender in a
c...
We propose a combinatorial optimisation model called Limited Query Graph...
Active Directory (AD) is the default security management system for Wind...
In this paper, we present the Multi-Forgery Detection Challenge held
con...
Active Directory (AD) is the default security management system for Wind...
Many important problems in multiagent systems involve resource allocatio...
In this work, we consider the problem of finding a set of tours to a
tra...
Active Directory is the default security management system for Windows d...
Within natural language processing tasks, linguistic knowledge can alway...
As facial interaction systems are prevalently deployed, security and
rel...
Generating diverse populations of high quality solutions has gained inte...
Multi-document summarization (MDS) is an effective tool for information
...
Optimizing within the affine maximizer auctions (AMA) is an effective
ap...
Markets for zero-day exploits (software vulnerabilities unknown to the
v...
We study a cost sharing problem derived from bug bounty programs, where
...
As a fundraising method, Initial Coin Offering (ICO) has raised billions...
We study mechanism design for nonexcludable and excludable binary public...
Game theory is an established branch of mathematics that offers a rich s...
Background: While bug bounty programs are not new in software developmen...