Follow
Bo An
Title
Cited by
Cited by
Year
Protect: A deployed game theoretic system to protect the ports of the united states
E Shieh, B An, R Yang, M Tambe, C Baldwin, J DiRenzo, B Maule, ...
Proceedings of the 11th international conference on autonomous agents andá…, 2012
3102012
Automated negotiation with decommitment for dynamic resource allocation in cloud computing.
B An, VR Lesser, DE Irwin, M Zink
AAMAS 10, 981-988, 2010
2592010
Optimal electric vehicle fast charging station placement based on game theoretical framework
Y Xiong, J Gan, B An, C Miao, ALC Bazzan
IEEE Transactions on Intelligent Transportation Systems 19 (8), 2493-2504, 2017
1962017
Poi2vec: Geographical latent representation for predicting future visitors
S Feng, G Cong, B An, YM Chee
Thirty-First AAAI Conference on Artificial Intelligence, 2017
1732017
Combating noisy labels by agreement: A joint training method with co-regularization
H Wei, L Feng, X Chen, B An
Proceedings of the IEEE/CVF Conference on Computer Vision and Patterná…, 2020
1282020
Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security.
F Fang, TH Nguyen, R Pickles, WY Lam, GR Clements, B An, A Singh, ...
AAAI 16, 3966-3973, 2016
1242016
Stackelberg security games: Looking beyond a decade of success
A Sinha, F Fang, B An, C Kiekintveld, M Tambe
IJCAI, 2018
1132018
Strategic agents for multi-resource negotiation
B An, V Lesser, KM Sim
Autonomous Agents and Multi-Agent Systems 23 (1), 114-153, 2011
892011
Guards and protect: Next generation applications of security games
B An, J Pita, E Shieh, M Tambe, C Kiekintveld, J Marecki
ACM SIGecom Exchanges 10 (1), 31-34, 2011
822011
Challenges and opportunities for trust management in crowdsourcing
H Yu, Z Shen, C Miao, B An
2012 IEEE/WIC/ACM International Conferences on Web Intelligence andá…, 2012
752012
Security games with limited surveillance
B An, D Kempe, C Kiekintveld, E Shieh, S Singh, M Tambe, ...
Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012
722012
Refinement of strong Stackelberg equilibria in security games
B An, M Tambe, F Ordonez, E Shieh, C Kiekintveld
Proceedings of the AAAI Conference on Artificial Intelligence 25 (1), 587-593, 2011
722011
Partial label learning with self-guided retraining
L Feng, B An
Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 3542-3549, 2019
652019
A reputation-aware decision-making approach for improving the efficiency of crowdsourcing systems
H Yu, Z Shen, C Miao, B An
Proceedings of the 2013 international conference on autonomous agents andá…, 2013
642013
Security games with surveillance cost and optimal timing of attack execution
B An, M Brown, Y Vorobeychik, M Tambe
Proceedings of the 2013 international conference on Autonomous agents andá…, 2013
642013
Computing solutions in infinite-horizon discounted adversarial patrolling games
Y Vorobeychik, B An, M Tambe, S Singh
Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014
612014
Continuous-time negotiation mechanism for software agents
B An, KM Sim, LG Tang, SQ Li, DJ Cheng
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 36á…, 2006
582006
A deployed quantal response-based patrol planning system for the US Coast Guard
B An, F Ordˇ˝ez, M Tambe, E Shieh, R Yang, C Baldwin, J DiRenzo III, ...
Interfaces 43 (5), 400-420, 2013
572013
PROTECT: An application of computational game theory for the security of the ports of the United States
EA Shieh, B An, R Yang, M Tambe, C Baldwin, J DiRenzo, B Maule, ...
Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012
562012
PAWS—A deployed game-theoretic application to combat poaching
F Fang, TH Nguyen, R Pickles, WY Lam, GR Clements, B An, A Singh, ...
AI Magazine 38 (1), 23-36, 2017
542017
The system can't perform the operation now. Try again later.
Articles 1–20