Haifeng Xu

ORCID: 0000-0001-6371-4906
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Auction Theory and Applications
  • Game Theory and Applications
  • Advanced Bandit Algorithms Research
  • Infrastructure Resilience and Vulnerability Analysis
  • Information and Cyber Security
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Consumer Market Behavior and Pricing
  • Opinion Dynamics and Social Influence
  • Complex Network Analysis Techniques
  • Experimental Behavioral Economics Studies
  • Reinforcement Learning in Robotics
  • Mobile Crowdsensing and Crowdsourcing
  • Adversarial Robustness in Machine Learning
  • Game Theory and Voting Systems
  • Optimization and Search Problems
  • Technology Adoption and User Behaviour
  • Advanced Malware Detection Techniques
  • Smart Grid Energy Management
  • Privacy-Preserving Technologies in Data
  • Artificial Intelligence in Games
  • Digital Marketing and Social Media
  • Guidance and Control Systems
  • Manufacturing Process and Optimization
  • Analytic Number Theory Research

University of Chicago
2022-2025

Google (United States)
2024-2025

University of South China
2025

Hunan Provincial Science and Technology Department
2025

University of Illinois Chicago
2022-2025

Shanghai Jiao Tong University
2022-2024

Chongqing University
2023-2024

Xihua University
2024

Harbin University of Science and Technology
2023

Medical Architecture (United Kingdom)
2023

Persuasion, defined as the act of exploiting an informational advantage in order to effect decisions others, is ubiquitous. Indeed, persuasive communication has been estimated account for almost a third all economic activity US. This paper examines persuasion through computational lens, focusing on what perhaps most basic and fundamental model this space: celebrated Bayesian Kamenica Gentzkow. Here there are two players, sender receiver. The receiver must take one number actions with...

10.1145/2897518.2897583 article EN 2016-06-10

Stackelberg security games have been widely deployed to protect real-word assets. The main solution concept there is the Strong Equilibrium (SSE), which optimizes defender's random allocation of limited resources. However, solely deploying SSE mixed strategy has limitations. In extreme case, are where defender able defend all assets ``almost perfectly" at SSE, but she still sustains significant loss. this paper, we propose an approach for improving utility in such scenarios. Perhaps...

10.1609/aaai.v29i1.9290 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2015-02-16

This paper presents HEALER, a software agent that recommends sequential intervention plans for use by homeless shelters, who organize these interventions to raise awareness about HIV among youth. HEALER's (built using knowledge of social networks youth) choose participants strategically maximize influence spread, while reasoning uncertainties in the network. While previous work maximizing techniques participants, they do not address three real-world issues: (i) completely fail scale up...

10.5555/2936924.2937034 article EN Adaptive Agents and Multi-Agents Systems 2016-05-09

In this paper we present a novel Stackelberg-type model of security domains: Security Assets aSsignment with Information disclosure (SASI). The combines both the features Stackelberg Games (SSGs) and Bayesian Persuasion (BP) model. More specifically, SASI includes: a) an uncontrolled, exogenous state that serves as Defender's private information; b) multiple assets non-accumulating, targetlocal defence capability; c) pro-active, verifiable public, unidirectional information channel from...

10.5555/2772879.2773237 article EN 2015-05-04

Formalin-fixed and paraffin-embedded tissues represent the vast majority of archived tissue. Access to such tissue specimens via shotgun-based proteomic analyses may open new avenues for both prospective retrospective translational research. In this study, we evaluate effects fixation time on antigen retrieval purposes shotgun proteomics. For first time, demonstrate capability a capillary isotachophoresis (CITP)-based platform analysis proteins recovered from FFPE tissues. comparison our...

10.1021/pr7006768 article EN Journal of Proteome Research 2008-02-08

In recent years, there have been a number of successful cyber attacks on enterprise networks by malicious actors which caused severe damage. These Intrusion Detection and Prevention Systems in place to protect them, but they are notorious for producing high volume alerts. alerts must be investigated analysts determine whether an attack or benign. Unfortunately, magnitude more generated than investigate them. This trend is expected continue into the future creating need tools find optimal...

10.24963/ijcai.2017/54 article EN 2017-07-28

We study the algorithmics of information structure design --- a.k.a. persuasion or signaling in a fundamental special case introduced by Arieli and Babichenko: multiple agents, binary actions, no inter-agent externalities. Unlike prior work on this model, we allow many states nature. assume that principal's objective is monotone set function, problem both public signal private models, drawing sharp contrast between two terms efficacy computational complexity.

10.1145/3033274.3085152 article EN 2017-06-20

Algorithms for solving Stackelberg games are used in an ever-growing variety of real-world domains. Previous work has extended this framework to allow the leader commit not only a distribution over actions, but also scheme stochastically signaling information about these actions follower. This can result higher utility leader. In paper, we extend methodology Bayesian games, which either or follower payoff-relevant private both. leads novel variants model, example by imposing incentive...

10.5555/2936924.2936950 article EN Adaptive Agents and Multi-Agents Systems 2016-05-09

We propose and study a planning problem we call Sequential Fault-Intolerant Process Planning (SFIPP). SFIPP captures reward structure common in many sequential multi-stage decision problems where the is deemed successful only if all stages succeed. Such structures are different from classic additive arise important applications such as drug/material discovery, security, quality-critical product design. design provably tight online algorithms for settings which need to pick between actions...

10.48550/arxiv.2502.04998 preprint EN arXiv (Cornell University) 2025-02-07

Consider public health officials aiming to spread awareness about a new vaccine in community interconnected by social network. How can they distribute information with minimal resources, so as avoid polarization and ensure community-wide convergence of opinion? To tackle such challenges, we initiate the study sample complexity opinion formation networks. Our framework is built on recognized game, where regard each agent’s data-derived model, unlike previous works that treat opinions...

10.1609/aaai.v39i13.33531 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

The security game is a basic model for resource allocation in adversarial environments. Here there are two players, defender and an attacker. wants to allocate her limited resources defend critical targets the attacker seeks his most favorable target attack. In past decade, has been surge of research interest analyzing solving games that motivated by applications from various domains. Remarkably, these models their game-theoretic solutions have led real-world deployments use major agencies...

10.1145/2940716.2940796 article EN 2016-07-21

Although artificial intelligence (AI) has achieved high levels of accuracy in the diagnosis various diseases, its impact on physicians' decision-making performance clinical practice is uncertain. This study aims to assess AI diagnostic physicians with differing self-efficacy under working conditions involving different time pressures.A 2 (independent vs AI-assisted diagnosis) × (no pressure 2-minute limit) randomized controlled experiment multicenter was conducted. Participants diagnosed 10...

10.1093/jamia/ocac179 article EN Journal of the American Medical Informatics Association 2022-09-24

10.1145/3589334.3645511 article Proceedings of the ACM Web Conference 2022 2024-05-08

Recent work has shown that diverse teams can outperform a uniform team made of copies the best agent. However, there are fundamental questions were not asked before. When should we use or teams? How does performance change as action space get larger? Hence, present new model diversity for teams, is more general than previous models. We prove improves size gets larger. Concerning team, show converges exponentially fast to optimal one increase number agents. synthetic experiments allow us gain...

10.1609/aaai.v28i1.8880 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2014-06-21
Coming Soon ...