{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:09:18Z","timestamp":1749874158166,"version":"3.41.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/cdc.2016.7798940","type":"proceedings-article","created":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T17:11:18Z","timestamp":1483636278000},"page":"4420-4426","source":"Crossref","is-referenced-by-count":5,"title":["Large-scale strategic games and adversarial machine learning"],"prefix":"10.1109","author":[{"given":"Tansu","family":"Alpcan","sequence":"first","affiliation":[]},{"given":"Benjamin I. P.","family":"Rubinstein","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Leckie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref39"},{"journal-title":"Dynamic Noncooperative Game Theory","year":"1999","author":"ba?ar","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814637"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1090\/conm\/026\/737400","article-title":"Extensions of Lipschitz mappings into a Hilbert space","volume":"26","author":"johnson","year":"1984","journal-title":"Contemporary Mathematics"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1002\/0471725250","author":"huber","year":"1981","journal-title":"Robust Statistics Probability and Mathematical Statistics"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.28"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4175.001.0001","author":"scholkopf","year":"2001","journal-title":"Learning With Kernels Support Vector Machines Regularization Optimization and Beyond"},{"key":"ref35","first-page":"1177","article-title":"Random features for large-scale kernel machines","author":"rahimi","year":"2007","journal-title":"Advances in neural information processing systems"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1968.1972"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v29i1.9757","article-title":"Abstraction for Solving Large Incomplete-Information Games","author":"sandholm","year":"2015","journal-title":"AAAI"},{"journal-title":"The Matrix Cookbook","year":"2008","author":"petersen","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481"},{"key":"ref12","first-page":"812","article-title":"Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies","author":"bosansky","year":"2015","journal-title":"AAAI"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230150303"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2315171"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.242"},{"key":"ref16","first-page":"1485","article-title":"Give a Hard Problem to a Diverse Team: Exploring Large Action Spaces","author":"marcolino","year":"2014","journal-title":"AAAI"},{"key":"ref17","first-page":"404","article-title":"Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach","author":"yang","year":"2013","journal-title":"IJCAI"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","article-title":"The Security of Machine Learning","volume":"81","author":"marco","year":"2010","journal-title":"Machine Learning"},{"key":"ref19","first-page":"36","article-title":"Privacy preserving data mining","author":"lindell","year":"2000","journal-title":"Crypto"},{"key":"ref28","first-page":"171","article-title":"Nash Equilibria of Static Prediction Games","author":"br\u00fcckner","year":"2009","journal-title":"NIPS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2326403"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2186410"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546921"},{"journal-title":"Network Security A Decision and Game Theoretic Approach","year":"2011","author":"alpcan","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364710"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.42"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2306192"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.2329397"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139524421"},{"key":"ref20","first-page":"265","article-title":"Calibrating Noise to Sensitivity in Private Data Analysis","author":"dwork","year":"2006","journal-title":"TCC"},{"key":"ref22","article-title":"Good Word Attacks on Statistical Spam Filters","author":"lowd","year":"2005","journal-title":"CEAS"},{"key":"ref21","article-title":"On Attacking Statistical Spam Filters","author":"wittel","year":"2004","journal-title":"CEAS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_5"},{"key":"ref41","first-page":"22:1","article-title":"Random Projections for Linear Support Vector Machines","volume":"8","author":"boutsidis","year":"2014","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"ref23","first-page":"1","article-title":"Exploiting machine learning to subvert your spam filter","author":"nelson","year":"2008","journal-title":"Proc of 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644895"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180414"}],"event":{"name":"2016 IEEE 55th Conference on Decision and Control (CDC)","start":{"date-parts":[[2016,12,12]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 55th Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786694\/7798233\/07798940.pdf?arnumber=7798940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T01:22:19Z","timestamp":1749864139000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7798940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/cdc.2016.7798940","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}