From bandits to experts: A tale of domination and independence, the 27th Advances in Neural Information Processing Systems (NeurIPS), pp.1610-1618, 2013. ,
Online learning with feedback graphs: Beyond bandits, the 28th Conference on Learning Theory (COLT), vol.40, pp.23-35, 2015. ,
Regret in online combinatorial optimization, Mathematics of Operations Research, vol.39, issue.1, pp.31-45, 2014. ,
The nonstochastic multiarmed bandit problem, SIAM journal on computing, vol.32, issue.1, pp.48-77, 2002. ,
Faster and simpler algorithm for optimal strategies of blotto game, the 31st AAAI Conference on Artificial Intelligence (AAAI), pp.369-375, 2017. ,
Surveillance for security as a pursuit-evasion game, the 5th International Conference on Decision and Game Theory for Security (GameSec), pp.370-379, 2014. ,
Audit games, the 23rd International Joint Conference on Artificial Intelligence (IJCAI), pp.41-47, 2013. ,
, La théorie du jeu et leséquations intégralesà noyau symétrique. Comptes rendus de l'Académie des Sciences, vol.173, p.58, 1921.
From resource allocation to strategy, 2005. ,
Combinatorial bandits, Journal of Computer and System Sciences, vol.78, issue.5, pp.1404-1422, 2012. ,
Combinatorial multiarmed bandit: General framework and applications, the 30th International Conference on Machine Learning (ICML), pp.151-159, 2013. ,
Colonel Blotto in web security, the 11th Workshop on Economics and Information Security, WEIS Rump Session, pp.141-150, 2012. ,
Stochastic asymmetric blotto game approach for wireless resource allocation strategies, IEEE Transactions on Wireless Communications, 2019. ,
A decision-theoretic generalization of on-line learning and an application to boosting, Journal of computer and system sciences, vol.55, issue.1, pp.119-139, 1997. ,
A continuous colonel blotto game, 1950. ,
The on-line shortest path problem under partial monitoring, Journal of Machine Learning Research, vol.8, pp.2369-2403, 2007. ,
Probabilistic pursuit-evasion games: A one-step nash approach, the 39th IEEE Conference on Decision and Control (CDC), pp.2272-2277, 2000. ,
Efficient algorithms for online decision problems, Journal of Computer and System Sciences, vol.71, issue.3, pp.291-307, 2005. ,
Efficient learning by implicit exploration in bandit problems with side observations, the 28th Advances in Neural Information Processing Systems (NeurIPS), pp.613-621, 2014. ,
Complexity of computing optimal stackelberg strategies in security resource allocation games, the 24th AAAI Conference on Artificial Intelligence (AAAI), pp.805-810, 2010. ,
Coalitional Colonel Blotto games with application to the economics of alliances, Journal of Public Economic Theory, vol.14, issue.4, pp.653-676, 2012. ,
From bandits to experts: On the value of side-observations, the 25th Advances in Neural Information Processing Systems (NeurIPS), pp.684-692, 2011. ,
Strategic resource allocation for competitive influence in social networks, the 52nd Annual Allerton Conference on Communication, Control, and Computing, pp.951-958, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00950653
Defensive resource allocation in social networks, the 54th IEEE Conference on Decision and Control (CDC), pp.2927-2932, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01180954
Using channel hopping to increase 802.11 resilience to jamming attacks, INFOCOM 2007. 26th IEEE International Conference on Computer Communications, pp.2526-2530, 2007. ,
The Colonel Blotto game, Economic Theory, vol.29, issue.1, pp.2-24, 2006. ,
Efficient bandit combinatorial optimization algorithm with zero-suppressed binary decision diagrams, International Conference on Artificial Intelligence and Statistics, pp.585-594, 2018. ,
The heterogeneous Colonel Blotto game, the 7th International Conference on Network Games, Control and Optimization (NetGCoop), pp.232-238, 2014. ,
Path kernels and multiplicative updates, Journal of Machine Learning Research, vol.4, pp.773-818, 2003. ,
Probabilistic pursuit-evasion games: theory, implementation, and experimental evaluation, IEEE transactions on robotics and automation, vol.18, issue.5, pp.662-669, 2002. ,
A certain zero-sum two-person game equivalent to the optimal assignment problem, Contributions to the Theory of Games, vol.2, pp.5-12, 1953. ,
Efficient computation of approximate equilibria in discrete colonel blotto games, the 27th International Joint Conference on Artificial Intelligence (IJCAI), pp.519-526, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01955448
Learning in hide-and-seek, 2016. ,
, IEEE/ACM Transactions on Networking, vol.24, issue.2, pp.1279-1292
Pursuit-evasion differential games with deception or interrupted observation, Pursuit-Evasion Differential Games, pp.191-203, 1987. ,
A survey of spectrum sensing algorithms for cognitive radio applications, IEEE communications surveys & tutorials, vol.11, issue.1, pp.116-130, 2009. ,
A multi-agent learning approach to online distributed resource allocation, the 21st International Joint Conference on Artificial Intelligence (IJCAI), 2009. ,