default search action
Thanh Hong Nguyen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Roman Belaire, Pradeep Varakantham, Thanh Hong Nguyen, David Lo:
Regret-based Defense in Adversarial Reinforcement Learning. AAMAS 2024: 2633-2640 - [c44]Tien Mai, Avinandan Bose, Arunesh Sinha, Thanh Hong Nguyen, Ayushman Kumar singh:
Tackling Stackelberg Network Interdiction against a Boundedly Rational Adversary. IJCAI 2024: 2913-2921 - [i10]The Viet Bui, Thanh Hong Nguyen, Tien Mai:
ComaDICE: Offline Cooperative Multi-Agent Reinforcement Learning with Stationary Distribution Shift Regularization. CoRR abs/2410.01954 (2024) - 2023
- [j9]Chenghan Zhou, Andrew Spivey, Haifeng Xu, Thanh Hong Nguyen:
Information Design for Multiple Interdependent Defenders: Work Less, Pay Off More. Games 14(1): 12 (2023) - [c43]Thanh Hong Nguyen, Arunesh Sinha:
Behavioral Learning in Security Games: Threat of Multi-Step Manipulative Attacks. AAAI 2023: 9302-9309 - [c42]Wai Tuck Wong, Sarah Eve Kinsey, Ramesha Karunasena, Thanh Hong Nguyen, Arunesh Sinha:
Beyond NaN: Resiliency of Optimization Layers in the Face of Infeasibility. AAAI 2023: 15242-15250 - [c41]The Viet Bui, Tien Mai, Thanh Hong Nguyen:
Imitating Opponent to Win: Adversarial Policy Imitation Learning in Two-player Competitive Games. AAMAS 2023: 1285-1293 - [c40]Sarah Eve Kinsey, Jack Wolf, Nalini Saligram, Varun Ramesan, Meeta Walavalkar, Nidhi Jaswal, Sandhya Ramalingam, Arunesh Sinha, Thanh Hong Nguyen:
Building a Personalized Messaging System for Health Intervention in Underprivileged Regions Using Reinforcement Learning. IJCAI 2023: 6022-6030 - [c39]Hangzhi Guo, Thanh Hong Nguyen, Amulya Yadav:
CounterNet: End-to-End Training of Prediction Aware Counterfactual Explanations. KDD 2023: 577-589 - [c38]Changyu Chen, Ramesha Karunasena, Thanh Hong Nguyen, Arunesh Sinha, Pradeep Varakantham:
Generative Modelling of Stochastic Actions with Arbitrary Constraints in Reinforcement Learning. NeurIPS 2023 - [i9]Tien Mai, Avinandan Bose, Arunesh Sinha, Thanh Hong Nguyen:
Tackling Stackelberg Network Interdiction against a Boundedly Rational Adversary. CoRR abs/2301.12232 (2023) - [i8]The Viet Bui, Tien Mai, Thanh Hong Nguyen:
Mimicking To Dominate: Imitation Learning Strategies for Success in Multiagent Competitive Games. CoRR abs/2308.10188 (2023) - [i7]The Viet Bui, Tien Mai, Thanh Hong Nguyen:
Inverse Factorized Q-Learning for Cooperative Multi-agent Imitation Learning. CoRR abs/2310.06801 (2023) - [i6]Changyu Chen, Ramesha Karunasena, Thanh Hong Nguyen, Arunesh Sinha, Pradeep Varakantham:
Generative Modelling of Stochastic Actions with Arbitrary Constraints in Reinforcement Learning. CoRR abs/2311.15341 (2023) - 2022
- [j8]Thanh Hong Nguyen, Amulya Yadav:
A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty. Games 13(6): 81 (2022) - [c37]Thanh Hong Nguyen, Amulya Yadav:
The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty? GameSec 2022: 3-22 - [c36]Sarah Eve Kinsey, Wong Wai Tuck, Arunesh Sinha, Thanh Hong Nguyen:
An Exploration of Poisoning Attacks on Data-Based Decision Making. GameSec 2022: 231-252 - [c35]Chenghan Zhou, Thanh Hong Nguyen, Haifeng Xu:
Algorithmic Information Design in Multi-Player Games: Possibilities and Limits in Singleton Congestion. EC 2022: 869 - [c34]Chenghan Zhou, Andrew Spivey, Haifeng Xu, Thanh Hong Nguyen:
Information design for multiple independent and self-interested defenders: Work less, pay off more. UAI 2022: 2404-2413 - [i5]Wai Tuck Wong, Andrew Butler, Ramesha Karunasena, Thanh Hong Nguyen, Arunesh Sinha:
Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility. CoRR abs/2202.06242 (2022) - [i4]Thanh Hong Nguyen, Arunesh Sinha:
The Art of Manipulation: Threat of Multi-Step Manipulative Attacks in Security Games. CoRR abs/2202.13424 (2022) - [i3]The Viet Bui, Tien Mai, Thanh Hong Nguyen:
Imitating Opponent to Win: Adversarial Policy Imitation Learning in Two-player Competitive Games. CoRR abs/2210.16915 (2022) - 2021
- [c33]Andrew R. Butler, Thanh Hong Nguyen, Arunesh Sinha:
Countering Attacker Data Manipulation in Security Games. GameSec 2021: 59-79 - [i2]Hangzhi Guo, Thanh Hong Nguyen, Amulya Yadav:
CounterNet: End-to-End Training of Counterfactual Aware Predictions. CoRR abs/2109.07557 (2021) - [i1]Chenghan Zhou, Thanh Hong Nguyen, Haifeng Xu:
Algorithmic Information Design in Multi-Player Games: Possibility and Limits in Singleton Congestion. CoRR abs/2109.12445 (2021) - 2020
- [c32]Thanh Hong Nguyen, Nam Vu, Amulya Yadav, Uy Nguyen:
Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception. ECAI 2020: 179-186 - [c31]Thanh Hong Nguyen, Andrew Butler, Haifeng Xu:
Tackling Imitative Attacker Deception in Repeated Bayesian Stackelberg Security Games. ECAI 2020: 187-194 - [c30]Petr Tomásek, Branislav Bosanský, Thanh Hong Nguyen:
Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks. GameSec 2020: 385-404 - [c29]Thanh Hong Nguyen, Arunesh Sinha, He He:
Partial Adversarial Behavior Deception in Security Games. IJCAI 2020: 283-289
2010 – 2019
- 2019
- [c28]Thanh Hong Nguyen, Yongzhao Wang, Arunesh Sinha, Michael P. Wellman:
Deception in Finitely Repeated Security Games. AAAI 2019: 2133-2140 - [c27]Sarah Cooney, Phebe Vayanos, Thanh Hong Nguyen, Cleotilde Gonzalez, Christian Lebiere, Edward A. Cranford, Milind Tambe:
Warning Time: Optimizing Strategic Signaling for Security Against Boundedly Rational Adversaries. AAMAS 2019: 1892-1894 - [c26]Thanh Hong Nguyen, Amulya Yadav, Branislav Bosanský, Yu Liang:
Tackling Sequential Attacks in Security Games. GameSec 2019: 331-351 - [c25]Sarah Cooney, Kai Wang, Elizabeth Bondi, Thanh Hong Nguyen, Phebe Vayanos, Hailey Winetrobe, Edward A. Cranford, Cleotilde Gonzalez, Christian Lebiere, Milind Tambe:
Learning to Signal in the Goldilocks Zone: Improving Adversary Compliance in Security Games. ECML/PKDD (1) 2019: 725-740 - [p2]Michael P. Wellman, Thanh Hong Nguyen, Mason Wright:
Empirical Game-Theoretic Methods for Adaptive Cyber-Defense. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 112-128 - [p1]Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Hong Nguyen:
Adaptive Cyber Defenses for Botnet Detection and Mitigation. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 156-205 - 2018
- [j7]Thanh Hong Nguyen, Mason Wright, Michael P. Wellman, Satinder Singh:
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis. Secur. Commun. Networks 2018: 2864873:1-2864873:28 (2018) - [c24]Thanh Hong Nguyen, Michael P. Wellman, Arunesh Sinha:
Deceitful Attacks in Security Games. AAAI Workshops 2018: 260-267 - 2017
- [j6]Fei Fang, Thanh Hong Nguyen, Rob Pickles, Wai Y. Lam, Gopalasamy R. Clements, Bo An, Amandeep Singh, Brian C. Schwedock, Milind Tambe, Andrew Lemieux:
PAWS - A Deployed Game-Theoretic Application to Combat Poaching. AI Mag. 38(1): 23-36 (2017) - [j5]Nicole D. Sintov, Debarun Kar, Thanh Hong Nguyen, Fei Fang, Kevin Hoffman, Arnaud Lyet, Milind Tambe:
Keeping it Real: Using Real-World Problems to Teach AI to Diverse Audiences. AI Mag. 38(2): 35-47 (2017) - [j4]Fei Fang, Thanh Hong Nguyen, Arunesh Sinha, Shahrzad Gholami, Andrew J. Plumptre, Lucas Joppa, Milind Tambe, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba, Rob Critchlow, Colin M. Beale:
Predicting poaching for wildlife Protection. IBM J. Res. Dev. 61(6): 3:1-3:12 (2017) - [c23]Thanh Hong Nguyen, Michael P. Wellman, Satinder Singh:
A Stackelberg Game Model for Botnet Traffic Exfiltration. AAAI Workshops 2017 - [c22]Thanh Hong Nguyen, Mason Wright, Michael P. Wellman, Satinder Singh:
Multi-Stage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis. MTD@CCS 2017: 87-97 - [c21]Thanh Hong Nguyen, Michael P. Wellman, Satinder Singh:
A Stackelberg Game Model for Botnet Data Exfiltration. GameSec 2017: 151-170 - 2016
- [j3]Fei Fang, Thanh Hong Nguyen:
Green security games: apply game theory to addressing green security challenges. SIGecom Exch. 15(1): 78-83 (2016) - [c20]Fei Fang, Thanh Hong Nguyen, Rob Pickles, Wai Y. Lam, Gopalasamy R. Clements, Bo An, Amandeep Singh, Milind Tambe, Andrew Lemieux:
Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security. AAAI 2016: 3966-3973 - [c19]Fei Fang, Thanh Hong Nguyen, Rob Pickles, Wai Y. Lam, Gopalasamy R. Clements, Bo An, Amandeep Singh, Milind Tambe:
Deploying PAWS to Combat Poaching: Game-Theoretic Patrolling in Areas with Complex Terrain (Demonstration). AAAI 2016: 4355-4356 - [c18]Thanh Hong Nguyen, Arunesh Sinha, Shahrzad Gholami, Andrew J. Plumptre, Lucas Joppa, Milind Tambe, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba, Rob Critchlow, Colin M. Beale:
Protecting Wildlife under Imperfect Observation. AAAI Workshop: Computer Poker and Imperfect Information Games 2016 - [c17]Nicole D. Sintov, Debarun Kar, Thanh Hong Nguyen, Fei Fang, Kevin Hoffman, Arnaud Lyet, Milind Tambe:
From the Lab to the Classroom and Beyond: Extending a Game-Based Research Platform for Teaching AI to Diverse Audiences. AAAI 2016: 4107-4112 - [c16]Thanh Hong Nguyen, Arunesh Sinha, Milind Tambe:
Conquering Adversary Behavioral Uncertainty in Security Games: An Efficient Modeling Robust Based Algorithm. AAAI 2016: 4242-4243 - [c15]Anjon Basak, Fei Fang, Thanh Hong Nguyen, Christopher Kiekintveld:
Abstraction Methods for Solving Graph-Based Security Games. AAMAS Workshops (Visionary Papers) 2016: 13-33 - [c14]Thanh Hong Nguyen, Arunesh Sinha, Shahrzad Gholami, Andrew J. Plumptre, Lucas Joppa, Milind Tambe, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba, Rob Critchlow, Colin M. Beale:
CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection. AAMAS 2016: 767-775 - [c13]Anjon Basak, Fei Fang, Thanh Hong Nguyen, Christopher Kiekintveld:
Combining Graph Contraction and Strategy Generation for Green Security Games. GameSec 2016: 251-271 - [c12]Nika Haghtalab, Fei Fang, Thanh Hong Nguyen, Arunesh Sinha, Ariel D. Procaccia, Milind Tambe:
Three Strategies to Success: Learning Adversary Models in Security Games. IJCAI 2016: 308-314 - [c11]Thanh Hong Nguyen, Arunesh Sinha, Milind Tambe:
Addressing Behavioral Uncertainty in Security Games: An Efficient Robust Strategic Solution for Defender Patrols. IPDPS Workshops 2016: 1831-1838 - 2015
- [j2]Arunesh Sinha, Thanh Hong Nguyen, Debarun Kar, Matthew Brown, Milind Tambe, Albert Xin Jiang:
From physical security to cybersecurity. J. Cybersecur. 1(1): 19-35 (2015) - [c10]Thanh Hong Nguyen, Milind Tambe:
A Unifying Methodology for Confronting Uncertainties in Security Games: Advances and Algorithms: (Doctoral Consortium). AAMAS 2015: 1963-1964 - [c9]Benjamin J. Ford, Thanh Hong Nguyen, Milind Tambe, Nicole D. Sintov, Francesco Maria Delle Fave:
Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games. GameSec 2015: 35-56 - [c8]Thanh Hong Nguyen, Francesco Maria Delle Fave, Debarun Kar, Aravind S. Lakshminarayanan, Amulya Yadav, Milind Tambe, Noa Agmon, Andrew J. Plumptre, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba:
Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games. GameSec 2015: 170-191 - 2014
- [j1]Jason Tsai, Thanh Hong Nguyen, Nicholas Weller, Milind Tambe:
Game-Theoretic Target Selection in Contagion-Based Domains. Comput. J. 57(6): 893-905 (2014) - [c7]Thanh Hong Nguyen, Amulya Yadav, Bo An, Milind Tambe, Craig Boutilier:
Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty. AAAI 2014: 756-762 - [c6]Thanh Hong Nguyen, Albert Xin Jiang, Milind Tambe:
Stop the compartmentalization: unified robust algorithms for handling uncertainties in security games. AAMAS 2014: 317-324 - 2013
- [c5]Thanh Hong Nguyen, Rong Yang, Amos Azaria, Sarit Kraus, Milind Tambe:
Analyzing the Effectiveness of Adversary Modeling in Security Games. AAAI 2013: 718-724 - [c4]Thanh Hong Nguyen, James Pita, Rajiv T. Maheswaran, Milind Tambe, Amos Azaria, Sarit Kraus:
Modeling human adversary decision making in security games: an initial report. AAMAS 2013: 1297-1298 - [c3]Albert Xin Jiang, Thanh Hong Nguyen, Milind Tambe, Ariel D. Procaccia:
Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers. GameSec 2013: 119-139 - 2012
- [c2]Jason Tsai, Thanh Hong Nguyen, Milind Tambe:
Security Games for Controlling Contagion. AAAI 2012: 1464-1470 - [c1]Thanh Hong Nguyen, Jason Tsai, Albert Xin Jiang, Emma Bowring, Rajiv T. Maheswaran, Milind Tambe:
Security Games on Social Networks. AAAI Fall Symposium: Social Networks and Social Contagion 2012
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint