Data poisoning attacks on factorization-based collaborative filtering B Li, Y Wang, A Singh, Y Vorobeychik Advances in neural information processing systems 29, 2016 | 395 | 2016 |
Adversarial machine learning Y Vorobeychik, M Kantarcioglu Morgan & Claypool Publishers, 2018 | 304* | 2018 |
Notes on equilibria in symmetric games SF Cheng, DM Reeves, Y Vorobeychik, MP Wellman GTDT, 2004 | 216 | 2004 |
Empirically grounded agent-based models of innovation diffusion: a critical review H Zhang, Y Vorobeychik Artificial Intelligence Review 52, 707-741, 2019 | 163 | 2019 |
Data-driven agent-based modeling, with application to rooftop solar adoption H Zhang, Y Vorobeychik, J Letchford, K Lakkaraju Autonomous Agents and Multi-Agent Systems 30, 1023-1049, 2016 | 159 | 2016 |
Feature cross-substitution in adversarial classification B Li, Y Vorobeychik Advances in neural information processing systems 27, 2014 | 152 | 2014 |
Submodular optimization with routing constraints H Zhang, Y Vorobeychik Proceedings of the AAAI conference on artificial intelligence 30 (1), 2016 | 143 | 2016 |
Behavioral dynamics and influence in networked coloring and consensus S Judd, M Kearns, Y Vorobeychik Proceedings of the National Academy of Sciences 107 (34), 14978-14982, 2010 | 138 | 2010 |
Deceiving cyber adversaries: A game theoretic approach A Schlenker, O Thakoor, H Xu, F Fang, M Tambe, L Tran-Thanh, ... AAMAS'18: Proceedings of the 17th International Conference on Autonomous …, 2018 | 125 | 2018 |
Robust linear regression against training data poisoning C Liu, B Li, Y Vorobeychik, A Oprea Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017 | 124 | 2017 |
Defending against physically realizable attacks on image classification T Wu, L Tong, Y Vorobeychik International Conference on Learning Representations (ICLR), 2020 | 123 | 2020 |
Strategic interactions in a supply chain game MP Wellman, J Estelle, S Singh, Y Vorobeychik, C Kiekintveld, V Soni Computational Intelligence 21 (1), 1-26, 2005 | 114 | 2005 |
Improving robustness of ML classifiers against realizable evasion attacks using conserved features L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik 28th USENIX Security Symposium (USENIX Security 19), 285-302, 2019 | 111* | 2019 |
A tale of evil twins: Adversarial inputs versus poisoned models R Pang, H Shen, X Zhang, S Ji, Y Vorobeychik, X Luo, A Liu, T Wang Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 109 | 2020 |
Price prediction in a trading agent competition MP Wellman, DM Reeves, KM Lochner, Y Vorobeychik Proceedings of the 4th ACM conference on Electronic commerce, 216-217, 2003 | 109 | 2003 |
Attacking vision-based perception in end-to-end autonomous driving models A Boloor, K Garimella, X He, C Gill, Y Vorobeychik, X Zhang Journal of Systems Architecture 110, 101766, 2020 | 99 | 2020 |
Optimal randomized classification in adversarial settings. Y Vorobeychik, B Li AAMAS, 485-492, 2014 | 97 | 2014 |
Simple physical adversarial examples against end-to-end autonomous driving models A Boloor, X He, C Gill, Y Vorobeychik, X Zhang 2019 IEEE International Conference on Embedded Software and Systems (ICESS), 1-7, 2019 | 93 | 2019 |
Learning payoff functions in infinite games Y Vorobeychik, MP Wellman, S Singh Machine Learning 67, 145-168, 2007 | 91 | 2007 |
Attacking similarity-based link prediction in social networks K Zhou, TP Michalak, T Rahwan, M Waniek, Y Vorobeychik International Conference on Autonomous Agents and Multiagent Systems, 305–313, 2019 | 88 | 2019 |