This paper proposes a procedure for the optimal siting and sizing of energy storage systems (ESSs) within active distribution networks (ADNs) hosting a large amount of stochastic distributed renewable energy resources. The optimization objective is to mini ...
This thesis develops models for three problems of liquidity under asymmetric information.
In the chapter "Disclosures, Rollover Risk, and Debt Runs" I build a model of dynamic debt
runs without perfect information in order to understand the impact of asset ...
We study minimal single-task peer prediction mechanisms that have limited knowledge about agents' beliefs. Without knowing what agents' beliefs are or eliciting additional information, it is not possible to design a truthful mechanism in a Bayesian-Nash se ...
At COP21, about 160 countries proposed the so-called INDCs that define GHG abatement objectives by 2030. While encouraging, these commitments are not ambitious enough to achieve the 2°C threshold by 2100, and further negotiations are needed for sharing the ...
We analyze resource allocation problems where N independent agents want to access C resources. Each resource can be only accessed by one agent at a time. In order to use the resources efficiently, the agents need to coordinate their access. We focus on dec ...
This paper tackles the problem of adversarial examples from a game theoretic point of view. We study the open question of the existence of mixed Nash equilibria in the zero-sum game formed by the attacker and the classifier. While previous works usually al ...
Research on Web credibility assessment can significantly benefit from new models that are better suited for evaluation and study of adversary strategies. Currently employed models lack several important aspects, such as the explicit modeling of Web content ...
We reconsider the training objective of Generative Adversarial Networks (GANs) from the mixed Nash Equilibria (NE) perspective. Inspired by the classical prox methods, we develop a novel algorithmic framework for GANs via an infinite-dimensional two-player ...
This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in ad ...
In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location pri ...