Follow
Yevgeniy Vorobeychik
Title
Cited by
Cited by
Year
Data poisoning attacks on factorization-based collaborative filtering
B Li, Y Wang, A Singh, Y Vorobeychik
Advances in neural information processing systems 29, 2016
4262016
Adversarial machine learning
Y Vorobeychik, M Kantarcioglu
Morgan & Claypool Publishers, 2018
3192018
Notes on equilibria in symmetric games
SF Cheng, DM Reeves, Y Vorobeychik, MP Wellman
GTDT, 2004
2182004
Empirically grounded agent-based models of innovation diffusion: a critical review
H Zhang, Y Vorobeychik
Artificial Intelligence Review 52, 707-741, 2019
1812019
Data-driven agent-based modeling, with application to rooftop solar adoption
H Zhang, Y Vorobeychik, J Letchford, K Lakkaraju
Autonomous Agents and Multi-Agent Systems 30, 1023-1049, 2016
1702016
Submodular optimization with routing constraints
H Zhang, Y Vorobeychik
Proceedings of the AAAI conference on artificial intelligence 30 (1), 2016
1552016
Feature cross-substitution in adversarial classification
B Li, Y Vorobeychik
Advances in neural information processing systems 27, 2014
1532014
Behavioral dynamics and influence in networked coloring and consensus
S Judd, M Kearns, Y Vorobeychik
Proceedings of the National Academy of Sciences 107 (34), 14978-14982, 2010
1412010
Defending against physically realizable attacks on image classification
T Wu, L Tong, Y Vorobeychik
International Conference on Learning Representations (ICLR), 2020
1362020
Deceiving cyber adversaries: A game theoretic approach
A Schlenker, O Thakoor, H Xu, F Fang, M Tambe, L Tran-Thanh, ...
AAMAS'18: Proceedings of the 17th International Conference on Autonomous …, 2018
1352018
Robust linear regression against training data poisoning
C Liu, B Li, Y Vorobeychik, A Oprea
Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017
1272017
Improving robustness of ML classifiers against realizable evasion attacks using conserved features
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
28th USENIX Security Symposium (USENIX Security 19), 285-302, 2019
122*2019
A tale of evil twins: Adversarial inputs versus poisoned models
R Pang, H Shen, X Zhang, S Ji, Y Vorobeychik, X Luo, A Liu, T Wang
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
1202020
Strategic interactions in a supply chain game
MP Wellman, J Estelle, S Singh, Y Vorobeychik, C Kiekintveld, V Soni
Computational Intelligence 21 (1), 1-26, 2005
1152005
Attacking vision-based perception in end-to-end autonomous driving models
A Boloor, K Garimella, X He, C Gill, Y Vorobeychik, X Zhang
Journal of Systems Architecture 110, 101766, 2020
1132020
Price prediction in a trading agent competition
MP Wellman, DM Reeves, KM Lochner, Y Vorobeychik
Proceedings of the 4th ACM conference on Electronic commerce, 216-217, 2003
1092003
Simple physical adversarial examples against end-to-end autonomous driving models
A Boloor, X He, C Gill, Y Vorobeychik, X Zhang
2019 IEEE International Conference on Embedded Software and Systems (ICESS), 1-7, 2019
1042019
Sociotechnical safeguards for genomic data privacy
Z Wan, JW Hazel, EW Clayton, Y Vorobeychik, M Kantarcioglu, BA Malin
Nature Reviews Genetics 23 (7), 429-445, 2022
1022022
Optimal randomized classification in adversarial settings.
Y Vorobeychik, B Li
AAMAS, 485-492, 2014
982014
Learning payoff functions in infinite games
Y Vorobeychik, MP Wellman, S Singh
Machine Learning 67, 145-168, 2007
952007
The system can't perform the operation now. Try again later.
Articles 1–20