共 50 条
- [1] Security Games with Information Leakage: Modeling and Computation PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 674 - 680
- [3] Valid Utility Games with Information Sharing Constraints 2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 5739 - 5744
- [5] Simple Utility Design for Welfare Games under Global Information IFAC PAPERSONLINE, 2020, 53 (02): : 16964 - 16970
- [7] Exploring Information Asymmetry in Two-Stage Security Games PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 1057 - 1063
- [8] Differential privacy: On the trade-off between utility and information leakage Lect. Notes Comput. Sci., (39-54):
- [10] A Potential Function View of Information Theoretic Interference Games 2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011, : 1250 - 1254