- Auction Theory and Applications
- Game Theory and Applications
- Advanced Bandit Algorithms Research
- Infrastructure Resilience and Vulnerability Analysis
- Information and Cyber Security
- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Consumer Market Behavior and Pricing
- Opinion Dynamics and Social Influence
- Complex Network Analysis Techniques
- Experimental Behavioral Economics Studies
- Reinforcement Learning in Robotics
- Mobile Crowdsensing and Crowdsourcing
- Adversarial Robustness in Machine Learning
- Game Theory and Voting Systems
- Optimization and Search Problems
- Technology Adoption and User Behaviour
- Advanced Malware Detection Techniques
- Smart Grid Energy Management
- Privacy-Preserving Technologies in Data
- Artificial Intelligence in Games
- Digital Marketing and Social Media
- Guidance and Control Systems
- Manufacturing Process and Optimization
- Analytic Number Theory Research
University of Chicago
2022-2025
Google (United States)
2024-2025
University of South China
2025
Hunan Provincial Science and Technology Department
2025
University of Illinois Chicago
2022-2025
Shanghai Jiao Tong University
2022-2024
Chongqing University
2023-2024
Xihua University
2024
Harbin University of Science and Technology
2023
Medical Architecture (United Kingdom)
2023
Persuasion, defined as the act of exploiting an informational advantage in order to effect decisions others, is ubiquitous. Indeed, persuasive communication has been estimated account for almost a third all economic activity US. This paper examines persuasion through computational lens, focusing on what perhaps most basic and fundamental model this space: celebrated Bayesian Kamenica Gentzkow. Here there are two players, sender receiver. The receiver must take one number actions with...
Stackelberg security games have been widely deployed to protect real-word assets. The main solution concept there is the Strong Equilibrium (SSE), which optimizes defender's random allocation of limited resources. However, solely deploying SSE mixed strategy has limitations. In extreme case, are where defender able defend all assets ``almost perfectly" at SSE, but she still sustains significant loss. this paper, we propose an approach for improving utility in such scenarios. Perhaps...
This paper presents HEALER, a software agent that recommends sequential intervention plans for use by homeless shelters, who organize these interventions to raise awareness about HIV among youth. HEALER's (built using knowledge of social networks youth) choose participants strategically maximize influence spread, while reasoning uncertainties in the network. While previous work maximizing techniques participants, they do not address three real-world issues: (i) completely fail scale up...
In this paper we present a novel Stackelberg-type model of security domains: Security Assets aSsignment with Information disclosure (SASI). The combines both the features Stackelberg Games (SSGs) and Bayesian Persuasion (BP) model. More specifically, SASI includes: a) an uncontrolled, exogenous state that serves as Defender's private information; b) multiple assets non-accumulating, targetlocal defence capability; c) pro-active, verifiable public, unidirectional information channel from...
Formalin-fixed and paraffin-embedded tissues represent the vast majority of archived tissue. Access to such tissue specimens via shotgun-based proteomic analyses may open new avenues for both prospective retrospective translational research. In this study, we evaluate effects fixation time on antigen retrieval purposes shotgun proteomics. For first time, demonstrate capability a capillary isotachophoresis (CITP)-based platform analysis proteins recovered from FFPE tissues. comparison our...
In recent years, there have been a number of successful cyber attacks on enterprise networks by malicious actors which caused severe damage. These Intrusion Detection and Prevention Systems in place to protect them, but they are notorious for producing high volume alerts. alerts must be investigated analysts determine whether an attack or benign. Unfortunately, magnitude more generated than investigate them. This trend is expected continue into the future creating need tools find optimal...
We study the algorithmics of information structure design --- a.k.a. persuasion or signaling in a fundamental special case introduced by Arieli and Babichenko: multiple agents, binary actions, no inter-agent externalities. Unlike prior work on this model, we allow many states nature. assume that principal's objective is monotone set function, problem both public signal private models, drawing sharp contrast between two terms efficacy computational complexity.
Algorithms for solving Stackelberg games are used in an ever-growing variety of real-world domains. Previous work has extended this framework to allow the leader commit not only a distribution over actions, but also scheme stochastically signaling information about these actions follower. This can result higher utility leader. In paper, we extend methodology Bayesian games, which either or follower payoff-relevant private both. leads novel variants model, example by imposing incentive...
We propose and study a planning problem we call Sequential Fault-Intolerant Process Planning (SFIPP). SFIPP captures reward structure common in many sequential multi-stage decision problems where the is deemed successful only if all stages succeed. Such structures are different from classic additive arise important applications such as drug/material discovery, security, quality-critical product design. design provably tight online algorithms for settings which need to pick between actions...
Consider public health officials aiming to spread awareness about a new vaccine in community interconnected by social network. How can they distribute information with minimal resources, so as avoid polarization and ensure community-wide convergence of opinion? To tackle such challenges, we initiate the study sample complexity opinion formation networks. Our framework is built on recognized game, where regard each agent’s data-derived model, unlike previous works that treat opinions...
The security game is a basic model for resource allocation in adversarial environments. Here there are two players, defender and an attacker. wants to allocate her limited resources defend critical targets the attacker seeks his most favorable target attack. In past decade, has been surge of research interest analyzing solving games that motivated by applications from various domains. Remarkably, these models their game-theoretic solutions have led real-world deployments use major agencies...
Although artificial intelligence (AI) has achieved high levels of accuracy in the diagnosis various diseases, its impact on physicians' decision-making performance clinical practice is uncertain. This study aims to assess AI diagnostic physicians with differing self-efficacy under working conditions involving different time pressures.A 2 (independent vs AI-assisted diagnosis) × (no pressure 2-minute limit) randomized controlled experiment multicenter was conducted. Participants diagnosed 10...
Recent work has shown that diverse teams can outperform a uniform team made of copies the best agent. However, there are fundamental questions were not asked before. When should we use or teams? How does performance change as action space get larger? Hence, present new model diversity for teams, is more general than previous models. We prove improves size gets larger. Concerning team, show converges exponentially fast to optimal one increase number agents. synthetic experiments allow us gain...