DeepStack: Expert-level artificial intelligence in heads-up no-limit poker M Moravčík, M Schmid, N Burch, V Lisý, D Morrill, N Bard, T Davis, ... Science 356 (6337), 508-513, 2017 | 1169 | 2017 |
Optimal network security hardening using attack graph games K Durkota, V Lisý, B Bošanský, C Kiekintveld Proceedings of IJCAI, 7-14, 2015 | 140 | 2015 |
Classification with costly features using deep reinforcement learning J Janisch, T Pevný, V Lisý Proceedings of the AAAI Conference on Artificial Intelligence 33, 3959-3966, 2019 | 118 | 2019 |
An exact double-oracle algorithm for zero-sum extensive-form games with imperfect information B Bosansky, C Kiekintveld, V Lisy, M Pechoucek Journal of Artificial Intelligence Research 51, 829-866, 2014 | 117 | 2014 |
Game Theoretic Model of Strategic Honeypot Selection in Computer Networks R Píbil, V Lisý, C Kiekintveld, B Bošanský, M Pěchouček Decision and Game Theory for Security, 201-220, 2012 | 112 | 2012 |
Affective man-machine interface: unveiling human emotions through biosignals EL van den Broek, V Lisý, JH Janssen, JHDM Westerink, MH Schut, ... Biomedical Engineering Systems and Technologies, 21-47, 2010 | 108 | 2010 |
Computing time-dependent policies for patrolling games with mobile targets B Bošanský, V Lisý, M Jakob, M Pechoucek Proc. of 10th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS …, 2011 | 94 | 2011 |
Game-theoretic foundations for the strategic use of honeypots in network security C Kiekintveld, V Lisý, R Píbil Cyber Warfare: Building the Scientific Foundation, 81-101, 2015 | 87 | 2015 |
Monte Carlo Tree Search in Continuous Action Spaces with Execution Uncertainty. T Yee, V Lisý, MH Bowling IJCAI, 690-697, 2016 | 81 | 2016 |
Rethinking formal models of partially observable multiagent decision making V Kovařík, M Schmid, N Burch, M Bowling, V Lisý Artificial Intelligence, 103645, 2021 | 79 | 2021 |
Online Monte Carlo Counterfactual Regret Minimization for Search in Imperfect Information Games V Lisý, M Lanctot, M Bowling Proceedings of the 2015 International Conference on Autonomous Agents and …, 2015 | 75 | 2015 |
Approximate Solutions for Attack Graph Games with Imperfect Information K Durkota, V Lisý, B Bošanský, C Kiekintveld | 59 | 2015 |
Using correlated strategies for computing stackelberg equilibria in extensive-form games J Cermák, B Bošanský, K Durkota, V Lisý, C Kiekintveld Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 439-445, 2016 | 56 | 2016 |
Algorithms for computing strategies in two-player simultaneous move games B Bošanský, V Lisý, M Lanctot, J Čermák, MHM Winands Artificial Intelligence 237, 1-40, 2016 | 48 | 2016 |
Computing optimal policies for attack graphs with action failures and costs K Durkota, V Lisý STAIRS 2014: Proceedings of the 7th European Starting AI Researcher …, 2014 | 48 | 2014 |
Case Studies of Network Defense with Attack Graph Games K Durkota, V Lisy, C Kiekintveld, B Bosansky, M Pechoucek IEEE Intelligent Systems 31 (5), 24 - 30, 2016 | 45 | 2016 |
Classification with costly features as a sequential decision-making problem J Janisch, T Pevný, V Lisý Machine Learning 109 (8), 1587-1615, 2020 | 39 | 2020 |
Game-theoretic Approach to Adversarial Plan Recognition. V Lisý, R Píbil, J Stiborek, B Bosanský, M Pechoucek ECAI, 546-551, 2012 | 34 | 2012 |
Hardening networks against strategic attackers using attack graph games K Durkota, V Lisý, B Bošanský, C Kiekintveld, M Pěchouček Computers & Security 87, 101578, 2019 | 33 | 2019 |
Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs K Durkota, V Lisy, C Kiekintveld, B Bosansky Proceedings of the 2015 International Conference on Autonomous Agents and …, 2015 | 32 | 2015 |