V. S. Subrahmanian
Affiliations: | 1989-2017 | Computer Science | University of Maryland, College Park, College Park, MD |
2017- | Dartmouth College, Hanover, NH, United States |
Area:
Artificial Intelligence,Computer SystemsWebsite:
http://home.cs.dartmouth.edu/~vs/Google:
"V.S. Subrahmanian"Parents
Sign in to add mentorHoward A. Blair | grad student | 1989 | Syracuse (E-Tree) | |
(Computational reasoning with non-classical and paraconsistent logics.) |
Children
Sign in to add traineeKasim Selçuk Candan | grad student | 1997 | University of Maryland |
Alexander M. Dekhtyar | grad student | 2000 | University of Maryland |
Fatma Ozcan | grad student | 2001 | University of Maryland |
Edward Hung | grad student | 2005 | University of Maryland |
Yu Deng | grad student | 2006 | University of Maryland |
Vladimir Kolovski | grad student | 2008 | University of Maryland |
Austin Parker | grad student | 2008 | University of Maryland |
Octavian Udrea | grad student | 2008 | University of Maryland |
Gerardo I. Simari | grad student | 2010 | University of Maryland |
Paulo Shakarian | grad student | 2011 | University of Maryland |
Amy L. Sliva | grad student | 2011 | University of Maryland |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Chen H, Hajiaghayi MT, Kraus S, et al. (2020) PIE: A Data-Driven Payoff Inference Engine for Strategic Security Applications Ieee Transactions On Computational Social Systems. 7: 42-57 |
Chen H, Han Q, Jajodia S, et al. (2020) Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare Ieee Systems Journal. 14: 3779-3790 |
Grover S, Pulice C, Simari GI, et al. (2019) BEEF: Balanced English Explanations of Forecasts Ieee Transactions On Computational Social Systems. 6: 350-364 |
Parisi F, Park N, Pugliese A, et al. (2018) Top-k User-Defined Vertex Scoring Queries in Edge-Labeled Graph Databases Acm Transactions On the Web. 12: 1-35 |
Lancaster E, Chakraborty T, Subrahmanian VS. (2018) |
Jajodia S, Park N, Pierazzi F, et al. (2017) A Probabilistic Logic of Cyber Deception Ieee Transactions On Information Forensics and Security. 12: 2532-2544 |
Sawant A, Dickerson JP, Hajiaghayi MT, et al. (2015) Automated generation of counterterrorism policies using multiexpert input Acm Transactions On Intelligent Systems and Technology. 6 |
Serra E, Jajodia S, Pugliese A, et al. (2015) Pareto-optimal adversarial defense of enterprise systems Acm Transactions On Information and System Security. 17 |
Park N, Serra E, Snitch T, et al. (2015) APE: A Data-Driven, Behavioral Model-Based Anti-Poaching Engine Ieee Transactions On Computational Social Systems. 2: 15-37 |
Spezzano F, Subrahmanian VS, Mannes A. (2014) Reshaping terrorist networks Communications of the Acm. 57: 60-69 |