These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

112 related articles for article (PubMed ID: 26415195)

  • 1. Security Games With Unknown Adversarial Strategies.
    Garnaev A; Baykal-Gursoy M; Poor HV
    IEEE Trans Cybern; 2016 Oct; 46(10):2291-2299. PubMed ID: 26415195
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Leading the Game, Losing the Competition: Identifying Leaders and Followers in a Repeated Game.
    Seip KL; Grøn Ø
    PLoS One; 2016; 11(3):e0150398. PubMed ID: 26968032
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Should the model for risk-informed regulation be game theory rather than decision theory?
    Bier VM; Lin SW
    Risk Anal; 2013 Feb; 33(2):281-91. PubMed ID: 22908942
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.
    Abdalzaher MS; Seddik K; Elsabrouty M; Muta O; Furukawa H; Abdel-Rahman A
    Sensors (Basel); 2016 Jun; 16(7):. PubMed ID: 27367700
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Game-Theoretic Framework to Preserve Location Information Privacy in Location-based Service Applications.
    Tefera MK; Yang X
    Sensors (Basel); 2019 Apr; 19(7):. PubMed ID: 30939858
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Learning-Based Solution for an Adversarial Repeated Game in Cyber-Physical Power Systems.
    Paul S; Ni Z; Mu C
    IEEE Trans Neural Netw Learn Syst; 2020 Nov; 31(11):4512-4523. PubMed ID: 31899439
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Tale of HodgeRank and Spectral Method: Target Attack Against Rank Aggregation is the Fixed Point of Adversarial Game.
    Ma K; Xu Q; Zeng J; Li G; Cao X; Huang Q
    IEEE Trans Pattern Anal Mach Intell; 2023 Apr; 45(4):4090-4108. PubMed ID: 35834468
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.
    He X; Yang X; Yu W; Lin J; Yang Q
    Sensors (Basel); 2018 Feb; 18(2):. PubMed ID: 29495291
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Security Investment in Contagious Networks.
    Hasheminasab SA; Tork Ladani B
    Risk Anal; 2018 Aug; 38(8):1559-1575. PubMed ID: 29341178
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Randomized Prediction Games for Adversarial Machine Learning.
    Rota Bulo S; Biggio B; Pillai I; Pelillo M; Roli F
    IEEE Trans Neural Netw Learn Syst; 2017 Nov; 28(11):2466-2478. PubMed ID: 27514067
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Extortion under uncertainty: Zero-determinant strategies in noisy games.
    Hao D; Rong Z; Zhou T
    Phys Rev E Stat Nonlin Soft Matter Phys; 2015 May; 91(5):052803. PubMed ID: 26066208
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Win-stay, lose-shift strategies for repeated games-memory length, aspiration levels and noise.
    Posch M
    J Theor Biol; 1999 May; 198(2):183-95. PubMed ID: 10339393
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A sequential-move game for enhancing safety and security cooperation within chemical clusters.
    Pavlova Y; Reniers G
    J Hazard Mater; 2011 Feb; 186(1):401-6. PubMed ID: 21146296
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Dressing the mind properly for the game.
    Sally D
    Philos Trans R Soc Lond B Biol Sci; 2003 Mar; 358(1431):583-92. PubMed ID: 12689383
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Defending Against Advanced Persistent Threats Using Game-Theory.
    Rass S; König S; Schauer S
    PLoS One; 2017; 12(1):e0168675. PubMed ID: 28045922
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Self-organization in a simple model of adaptive agents playing 2 x 2 games with arbitrary payoff matrices.
    Fort H; Viola S
    Phys Rev E Stat Nonlin Soft Matter Phys; 2004 Mar; 69(3 Pt 2):036110. PubMed ID: 15089364
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines.
    Zhang R; Zhu Q
    IEEE Trans Neural Netw Learn Syst; 2018 Nov; 29(11):5512-5527. PubMed ID: 29993612
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Zero-Determinant Strategies in Iterated Public Goods Game.
    Pan L; Hao D; Rong Z; Zhou T
    Sci Rep; 2015 Aug; 5():13096. PubMed ID: 26293589
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Structure coefficients and strategy selection in multiplayer games.
    McAvoy A; Hauert C
    J Math Biol; 2016 Jan; 72(1-2):203-38. PubMed ID: 25842359
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.