Viliam Lisý
Viliam Lisý
Czech Technical University in Prague & DelagAIte
Verified email at - Homepage
Cited by
Cited by
DeepStack: Expert-level artificial intelligence in heads-up no-limit poker
M Moravčík, M Schmid, N Burch, V Lisý, D Morrill, N Bard, T Davis, ...
Science 356 (6337), 508-513, 2017
Optimal network security hardening using attack graph games
K Durkota, V Lisý, B Bošanský, C Kiekintveld
Proceedings of IJCAI, 7-14, 2015
Classification with costly features using deep reinforcement learning
J Janisch, T Pevný, V Lisý
Proceedings of the AAAI Conference on Artificial Intelligence 33, 3959-3966, 2019
An exact double-oracle algorithm for zero-sum extensive-form games with imperfect information
B Bosansky, C Kiekintveld, V Lisy, M Pechoucek
Journal of Artificial Intelligence Research 51, 829-866, 2014
Game Theoretic Model of Strategic Honeypot Selection in Computer Networks
R Píbil, V Lisý, C Kiekintveld, B Bošanský, M Pěchouček
Decision and Game Theory for Security, 201-220, 2012
Affective man-machine interface: unveiling human emotions through biosignals
EL van den Broek, V Lisý, JH Janssen, JHDM Westerink, MH Schut, ...
Biomedical Engineering Systems and Technologies, 21-47, 2010
Computing time-dependent policies for patrolling games with mobile targets
B Bošanský, V Lisý, M Jakob, M Pechoucek
Proc. of 10th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS …, 2011
Game-theoretic foundations for the strategic use of honeypots in network security
C Kiekintveld, V Lisý, R Píbil
Cyber Warfare: Building the Scientific Foundation, 81-101, 2015
Monte Carlo Tree Search in Continuous Action Spaces with Execution Uncertainty.
T Yee, V Lisý, MH Bowling
IJCAI, 690-697, 2016
Rethinking formal models of partially observable multiagent decision making
V Kovařík, M Schmid, N Burch, M Bowling, V Lisý
Artificial Intelligence, 103645, 2021
Online Monte Carlo Counterfactual Regret Minimization for Search in Imperfect Information Games
V Lisý, M Lanctot, M Bowling
Proceedings of the 2015 International Conference on Autonomous Agents and …, 2015
Approximate Solutions for Attack Graph Games with Imperfect Information
K Durkota, V Lisý, B Bošanský, C Kiekintveld
Using correlated strategies for computing stackelberg equilibria in extensive-form games
J Cermák, B Bošanský, K Durkota, V Lisý, C Kiekintveld
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 439-445, 2016
Algorithms for computing strategies in two-player simultaneous move games
B Bošanský, V Lisý, M Lanctot, J Čermák, MHM Winands
Artificial Intelligence 237, 1-40, 2016
Computing optimal policies for attack graphs with action failures and costs
K Durkota, V Lisý
STAIRS 2014: Proceedings of the 7th European Starting AI Researcher …, 2014
Case Studies of Network Defense with Attack Graph Games
K Durkota, V Lisy, C Kiekintveld, B Bosansky, M Pechoucek
IEEE Intelligent Systems 31 (5), 24 - 30, 2016
Classification with costly features as a sequential decision-making problem
J Janisch, T Pevný, V Lisý
Machine Learning 109 (8), 1587-1615, 2020
Hardening networks against strategic attackers using attack graph games
K Durkota, V Lisý, B Bošanský, C Kiekintveld, M Pěchouček
Computers & Security 87, 101578, 2019
Game-theoretic Approach to Adversarial Plan Recognition.
V Lisý, R Píbil, J Stiborek, B Bosanský, M Pechoucek
ECAI, 546-551, 2012
Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs
K Durkota, V Lisy, C Kiekintveld, B Bosansky
Proceedings of the 2015 International Conference on Autonomous Agents and …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20