ARUNESH SINHA
Journal articles are indicated by [JO]. Book chapters are indicated by [BC]. Workshop papers are not listed here.
Alphabetical ordering of authors is indicated by [ALPHABETA]

    Work in Progress
Incentivizing Collaboration in a Competition, with Michael P. Wellman
Adversarial Contract Design for Data Commercialization, with Parinaz Naghizadeh 
    2019
T. H. Nguyen, Y. Wang, A. Sinha, M. P. Wellman. Deception in Finitely Repeated Security Games, in Proceedings of 33rd AAAI Conference on Artificial Intelligence (AAAI), 2019 (to appear)
    2018
A. Sinha, A. Schlenker, D. Dmello, M. Tambe. Scaling-up Stackelberg Security Games Applications using Approximations, in Proceedings of Conference on Decision and Game Theory for Security (GameSec), Oct 2018
L. Nguyen, S. Wang, A. SinhaA Learning and Masking Approach to Secure Learning, in Proceedings of Conference on Decision and Game Theory for Security (GameSec), Oct 2018
A. Sinha, F. Fang, B. An, C. Kiekintveld, M. Tambe. Stackelberg Security Games: Looking Beyond a Decade of Success, in Proceedings of 27th International Joint Conference on Artificial Intelligence (IJCAI), July 2018
S. M. Mc Carthy, C. M. Laan, K. Wang, P. Vayanos, A. Sinha, M. Tambe. The Price of Usability: Designing Operationalizable Strategies for Security Games, in Proceedings of 27th International Joint Conference on Artificial Intelligence (IJCAI), July 2018
N. Papernot, P. McDaniel, A. Sinha, M. Wellman. Towards the Science of Security and Privacy in Machine Learning, in Proceedings of 3rd IEEE European Symposium on Security and Privacy (EuroS&P), April 2018
    2017
A. Schlenker, H. Xu, M. Guirguis, C. Kiekintveld, A. Sinha, M. Tambe, S. Sonya, D. Balderas, N, Dunstatter. Don’t Bury your Head inWarnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts, in Proceedings of 26th International Joint Conference on Artificial Intelligence (IJCAI), Aug 2017
[JO] F. Fang, T. H. Nguyen, A. Sinha, S. Gholami, A. Plumptre, L. Joppa, M. Tambe, M. Driciru, F. Wanyama, A. Rwetsiba, R. Critchlow, C. M. Beale. Predicting Poaching for Wildlife Protection, in IBM Journal of Research and Development, 2017
[BC] S. M. Mc Carthy, A. Sinha, M. Tambe, P. Manadhata. Decision Theory for Network Security: Active Sensing for Detection and Prevention of Data Exfiltration, in Applied Risk Analysis for Guiding Homeland Security Policy and Decisions. John Wiley & Sons Inc, 2017
    2016
[BC] S. M. Mc Carthy, A. Sinha, M.Tambe. Game Theoretic Defense for Maritime Security, in Book on Challenges in Maritime Security (CCICADA Department of Homeland Security), 2016
S. M. Mc Carthy, A. Sinha, M. Tambe, P. Manadhata. Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks, in Proceedings of Decision and Game Theory for Security (GameSec 2016)
A. Schlenker, M. Brown, A. Sinha, M. Tambe, R. Mehta. Get Me to My GATE On Time: Efficiently Solving General-Sum Bayesian Threat Screening Games, in Proceedings of 22nd European Conference on Artificial Intelligence (ECAI), Aug 2016.
N. Haghtalab, F. Fang, T. Nguyen, A. Sinha, A. D. Procaccia, M. Tambe. Three Strategies to Success: Learning Adversary Models in Security Games, in Proceedings of 25th International Joint Conference on Artificial Intelligence (IJCAI), July 2016.
B. Ford, M. Brown, A. Yadav, A. Singh, A. Sinha, B. Srivastava, C. Kiekintveld, M. Tambe. Protecting the NECTAR of the Ganga River through Game-Theoretic Factory Inspections, in Proceedings of International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS), June 2016
A. Sinha, D. Kar, M. Tambe. Learning Adversary Behavior in Security Games: A PAC Model Perspective, in Proceedings of 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May 2016. [Appendix]
T. Nguyen, A. Sinha, S. Gholami, A. Plumptre, L. Joppa, M. Tambe, M. Driciru, F. Wanyama, A. Rwetsiba, R. Critchlow, C. Beale. CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection, in Proceedings of 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May 2016.
C. Zhang, V. Bucarey, A. Mukhopadhyay, A. Sinha, Y. Qian, Y. Vorobeychik, M. Tambe. Using abstractions to solve opportunistic crime security games at scale, in Proceedings of 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May 2016.
[JO] C. Zhang, S. Gholami, D. Kar, A. Sinha, M. Jain, R. Goyal, M. Tambe. Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals, in Games Journal, 2016.
M. Brown*, A. Sinha*, A. Schlenker, M. Tambe. One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats, in Proceedings of 30th AAAI Conference on Artificial Intelligence (AAAI), Feb 2016. [Appendix] [*=Joint lead authors]
[BC] T.H. Nguyen, D. Kar, M. Brown, A. Sinha, A. X. Jiang, M. Tambe. Towards a Science of Security Games, in Interdisciplinary Mathematical Research and Applications, edited by B. Toni, Springer, 2016.
[BC] B. An, M. Tambe, A. Sinha. Stackelberg Security Games (SSG) Basics and Application Overview. Improving Homeland Security Decisions, in Improving Homeland Security Decisions, edited by A. Abbas, M. Tambe, D. Von Winterfeldt, Cambridge University Press, 2016. The book publisher made a mistake and did not include my name in the chapter, which should hopefully be corrected soon.
    2015
[JO] A. Sinha, T.H. Nguyen, D. Kar, M. Brown, M. Tambe, A. X. Jiang. From Physical Security to Cyber Security, in Journal of Cybersecurity, 2015.
[ALPHABETA] A. Carbonara, A. Datta, A. Sinha, Y. Zick. Incentivizing Peer Grading in MOOCs: An Audit Game Approach, in Proceedings of International Joint Conference on Artificial Intelligence (IJCAI), July 2015.
H. Xu, A. X. Jiang, A. Sinha, Z. Rabinovich, S. Dughmi, M. Tambe. Security Games with Information Leakage: Modeling and Computation, in Proceedings of International Joint Conference on Artificial Intelligence (IJCAI), July 2015. [Long Version]
[ALPHABETA] A. Datta, D. Garg, D. Kaynar, D. Sharma, A. SinhaProgram Actions as Actual Causes: A Building Block for Accountability, in Proceedings of 28th IEEE Computer Security Foundations Symposium, July 2015. [Long Version]
Y. D. Abbasi, M. Short, A. Sinha, N. Sintov, C. Zhang, M. Tambe. Human Adversaries in Opportunistic Crime Security Games: Evaluating Competing Bounded Rationality Models, in Proceedings of 3rd Conference on Advances in Cognitive Systems, May 2015.
C. Zhang, A. Sinha, M. Tambe. Keeping pace with criminals: Designing patrol allocation against adaptive opportunistic criminals, in Proceedings of 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May 2015.
[ALPHABETA] J. Blocki, N. Christin, A. Datta, A. D. Procaccia, A. Sinha*Audit Games with Multiple Defender Resources, in Proceedings of 29th AAAI Conference on Artificial Intelligence (AAAI), Jan 2015. [Long version] [*=Lead author]
    2014
A. Sinha, J. Lia, P. England, J. Lorch. Continuous Tamper-proof Logging Using TPM 2.0, in Proceedings of 7th International Conference on Trust & Trustworthy Computing (TRUST), June 2014. [Long Version]
    2013
[ALPHABETA] J. Blocki, N. Christin, A. Datta, A. Sinha. Adaptive Regret Minimization in Bounded-Memory Games, in Proceedings of 4th Conference on Decision and Game Theory for Security (GameSec), November 2013. [Long Version]
[ALPHABETA] J. Blocki, N. Christin, A. Datta, A. D. Procaccia, A. Sinha*Audit Games, in Proceedings of 23rd International Joint Conference on Artificial Intelligence (IJCAI), August 2013. [Long Version] [*=Lead author]
    2012
[ALPHABETA] J. Blocki, N. Christin, A. Datta, A. Sinha*Audit Mechanisms for Provable Risk Management and Accountable Data Governance, in Proceedings of 3rd Conference on Decision and Game Theory for Security (GameSec), November 2012. [*=Lead author]
[ALPHABETA] A. Datta, D. Sharma, A. SinhaProvable De-anonymization of Large Datasets with Sparse Dimensions, in Proceedings of Principles of Security and Trust (POST), 2012.
    2011
A. Datta, J. Blocki, N. Christin, H. DeYoung, D. Garg, L. Jia, D. Kaynar, A. Sinha. Understanding and protecting privacy: Formal semantics and principled audit mechanisms, in Information Systems Security, pp. 1-27. Springer Berlin Heidelberg, 2011.
[ALPHABETA] J. Blocki, N. Christin, A. Datta, A. Sinha*Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection, in Proceedings of 24th IEEE Computer Security Foundations Symposium (CSF), June 2011. [*=Lead author]
    2009
P. Bhallamudi, S. Tilley, A. Sinha, Migrating a Web-Based Application to a Service-Based System - An Experience Report, in proceedings of 11th IEEE International Symposium on Web Systems Evolution Sep 2009.