Protect: A deployed game theoretic system to protect the ports of the united states E Shieh, B An, R Yang, M Tambe, C Baldwin, J DiRenzo, B Maule, ... Proceedings of the 11th International Conference on Autonomous Agents and …, 2012 | 287 | 2012 |
Automated negotiation with decommitment for dynamic resource allocation in cloud computing. B An, VR Lesser, DE Irwin, M Zink AAMAS 10, 981-988, 2010 | 251 | 2010 |
Optimal electric vehicle fast charging station placement based on game theoretical framework Y Xiong, J Gan, B An, C Miao, ALC Bazzan IEEE Transactions on Intelligent Transportation Systems 19 (8), 2493-2504, 2017 | 132 | 2017 |
Poi2vec: Geographical latent representation for predicting future visitors S Feng, G Cong, B An, YM Chee Proceedings of the AAAI Conference on Artificial Intelligence 31 (1), 2017 | 124 | 2017 |
Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security. F Fang, TH Nguyen, R Pickles, WY Lam, GR Clements, B An, A Singh, ... AAAI 16, 3966-3973, 2016 | 102 | 2016 |
Strategic agents for multi-resource negotiation B An, V Lesser, KM Sim Autonomous Agents and Multi-Agent Systems 23 (1), 114-153, 2011 | 85 | 2011 |
Guards and protect: Next generation applications of security games B An, J Pita, E Shieh, M Tambe, C Kiekintveld, J Marecki ACM SIGecom Exchanges 10 (1), 31-34, 2011 | 81 | 2011 |
Challenges and opportunities for trust management in crowdsourcing H Yu, Z Shen, C Miao, B An 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2012 | 72 | 2012 |
Stackelberg security games: Looking beyond a decade of success A Sinha, F Fang, B An, C Kiekintveld, M Tambe IJCAI, 2018 | 69 | 2018 |
Security games with limited surveillance B An, D Kempe, C Kiekintveld, E Shieh, S Singh, M Tambe, ... Proceedings of the AAAI Conference on Artificial Intelligence 26 (1), 2012 | 67 | 2012 |
Refinement of strong Stackelberg equilibria in security games B An, M Tambe, F Ordonez, E Shieh, C Kiekintveld Proceedings of the AAAI Conference on Artificial Intelligence 25 (1), 2011 | 66 | 2011 |
A reputation-aware decision-making approach for improving the efficiency of crowdsourcing systems. H Yu, Z Shen, C Miao, B An AAMAS 13, 1315-1316, 2013 | 60 | 2013 |
Security games with surveillance cost and optimal timing of attack execution. B An, M Brown, Y Vorobeychik, M Tambe AAMAS, 223-230, 2013 | 60 | 2013 |
Computing solutions in infinite-horizon discounted adversarial patrolling games Y Vorobeychik, B An, M Tambe, S Singh Proceedings of the International Conference on Automated Planning and …, 2014 | 58 | 2014 |
Continuous-time negotiation mechanism for software agents B An, KM Sim, LG Tang, SQ Li, DJ Cheng IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 36 …, 2006 | 54 | 2006 |
A reputation management approach for resource constrained trustee agents H Yu, C Miao, B An, C Leung, VR Lesser Twenty-Third International Joint Conference on Artificial Intelligence, 2013 | 53 | 2013 |
PROTECT: An application of computational game theory for the security of the ports of the United States E Shieh, B An, R Yang, M Tambe, C Baldwin, J DiRenzo, B Maule, ... Proceedings of the AAAI Conference on Artificial Intelligence 26 (1), 2012 | 51 | 2012 |
An application of automated negotiation to distributed task allocation M Krainin, B An, V Lesser 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology …, 2007 | 51 | 2007 |
Regret-based optimization and preference elicitation for Stackelberg security games with uncertainty T Nguyen, A Yadav, B An, M Tambe, C Boutilier Proceedings of the AAAI Conference on Artificial Intelligence 28 (1), 2014 | 49 | 2014 |
A deployed quantal response-based patrol planning system for the US Coast Guard B An, F Ordóñez, M Tambe, E Shieh, R Yang, C Baldwin, J DiRenzo III, ... Interfaces 43 (5), 400-420, 2013 | 47 | 2013 |