Publication | Date of Publication | Type |
---|
Procurement contract design under asymmetric information of random yield | 2024-11-12 | Paper |
A review of attacker-defender games: current state and paths forward | 2024-06-14 | Paper |
Pricing Decisions with Social Interactions: A Game-Theoretic Model | 2024-02-27 | Paper |
A multi-criteria decision making approach to evaluating the performance of Indian railway zones | 2023-07-13 | Paper |
Health Decision Analysis: Evolution, Trends, and Emerging Topics | 2023-01-30 | Paper |
Stay Home or Not? Modeling Individuals’ Decisions During the COVID-19 Pandemic | 2023-01-30 | Paper |
Transmission Dynamics and Quarantine Control of COVID-19 in Cluster Community | 2022-11-11 | Paper |
Interplay of rumor propagation and clarification on social media during crisis events -- a game-theoretic approach | 2022-02-22 | Paper |
Reciprocal spreading and debunking processes of online misinformation: a new rumor spreading-debunking model with a case study | 2022-01-26 | Paper |
Transmission dynamics and quarantine control of COVID-19 in cluster community: A new transmission-quarantine model with case study for diamond princess | 2021-11-10 | Paper |
Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners | 2021-06-03 | Paper |
Discrete game-theoretic analysis of defense in correlated cyber-physical systems | 2021-01-07 | Paper |
Stability analysis and control strategies for worm attack in mobile networks via a VEIQS propagation model | 2020-01-15 | Paper |
Asymptotics for a delay-claim risk model with diffusion, dependence structures and constant force of interest | 2019-06-20 | Paper |
Regulating food risk management—a government–manufacturer game facing endogenous consumer demand | 2019-02-20 | Paper |
Cyber-physical correlation effects in defense games for large discrete infrastructures | 2018-12-10 | Paper |
Governments' and Terrorists' Defense and Attack in a T-Period Game | 2018-10-24 | Paper |
Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters | 2018-10-24 | Paper |
Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection—A Three-Stage Game | 2018-10-24 | Paper |
Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models | 2018-10-24 | Paper |
Modeling a Multitarget Attacker–Defender Game with Budget Constraints | 2018-10-24 | Paper |
Fluid approximations and control of queues in emergency departments | 2018-05-29 | Paper |
Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors | 2017-12-15 | Paper |
Security screening queues with impatient applicants: a new model with a case study | 2017-11-23 | Paper |
Deception-Based Game Theoretical Approach to Mitigate DoS Attacks | 2016-12-21 | Paper |
Balancing pre-disaster preparedness and post-disaster relief | 2016-10-07 | Paper |
On the value of exposure and secrecy of defense system: first-mover advantage vs. robustness | 2016-10-06 | Paper |
A medical resource allocation model for serving emergency victims with deteriorating health conditions | 2016-09-16 | Paper |
Modeling and mitigating the effects of supply chain disruption in a defender-attacker game | 2016-09-16 | Paper |
Modeling costly learning and counter-learning in a defender-attacker game with private defender information | 2016-09-16 | Paper |
Modeling parking behavior under uncertainty: a static game theoretic versus a sequential neo-additive capacity modeling approach | 2016-06-27 | Paper |
The strategic interaction between a company and the government surrounding disasters | 2016-05-19 | Paper |
Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game | 2016-03-15 | Paper |
Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and \(N\) donors | 2014-12-11 | Paper |
The impact of disaster on the strategic interaction between company and government | 2014-07-27 | Paper |
Balancing congestion and security in the presence of strategic applicants with private information | 2012-05-14 | Paper |
Modeling secrecy and deception in a multiple-period attacker-defender signaling game | 2009-12-21 | Paper |
Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort | 2009-08-13 | Paper |
Transform coding with backward adaptive updates | 2000-09-07 | Paper |