| Time | Day 1 -- Oct 25 | |
| SGT (UTC+8) | CEST (UTC+2) | EDT (UTC−4) | | |
| 8:45pm - 9pm | 2:45pm - 3pm | 8:45am - 9am | Opening | |
| 9pm - 10pm | 3pm - 4pm | 9am - 10am | Keynote talk -- Lorrie Cranor | |
| 10pm - 10:15pm | 4pm - 4:15pm | 10am - 10:15am | Coffee Break | |
| 10:15pm - 11pm | 4:15pm - 5pm | 10:15am - 11am | Session 1: Theoretical Foundations in Equilibrium Computation- Sam Ganzfried. Computing Nash Equilibria in Multiplayer DAG-Structured Stochastic Games with Persistent Imperfect Information
- Jianzong Pi, Joseph Heyman and Abhishek Gupta. Two Algorithms for Computing Exact and Approximate Nash Equilibria in Bimatrix Games
- Tomas Kroupa, Sara Vannucci and Tomáš Votroubek. Separable Network Games With Compact Strategy Sets
| |
| 11pm - 11:15pm | 5pm - 5:15pm | 11am - 11:15am | Coffee Break | |
| 11:15pm - 12am | 5:15pm - 6pm | 11:15am - 12pm | Session 2: Machine Learning and Game Theory 1- Ryan Butler, Thanh Nguyen and Arunesh Sinha. Countering Attacker Data Manipulation in Security Games
- Benjamin Roussillon and Patrick Loiseau. Scalable Optimal Classifiers for Adversarial Settings under Uncertainty
- Junlin Wu, Charles Kamhoua, Murat Kantarcioglu and Yevgeniy Vorobeychik. Learning Generative Deception Strategies in Combinatorial Masking Games
| |
| | | | |
| | | | |
| Time | Day 2 -- Oct 26 | |
| SGT (UTC+8) | CEST (UTC+2) | EDT (UTC−4) | | |
| 8:45pm - 9pm | 2:45pm - 3pm | 8:45am - 9am | Opening | |
| 9pm - 10pm | 3pm - 4pm | 9am - 10am | Keynote talk -- Vincent Conitzer | |
| 10pm - 10:15pm | 4pm - 4:15pm | 10am - 10:15am | Coffee Break | |
| 10:15pm - 11pm | 4:15pm - 5pm | 10:15am - 11am | Session 3: Machine Learning and Game Theory 2- Kun Jin, Tongxin Yin, Charles Kamhoua and Mingyan Liu. Network Games with Strategic Machine Learning
- Mark Bilinski, Ryan Gabrys, Justin Mauger, Kimberly Ferguson-Walter, Sunny Fugate, Brian Souza and Joseph Divita. No Time To Lie: Bounds on the Learning Rate of a Defender for Inferring Attacker Target Preferences
- Maximilian Samsinger, Florian Merkle, Pascal Schoettle and Tomas Pevny. When Should You Defend Your Classifier? -- A Game-theoretical Analysis of Countermeasures against Adversarial Examples
| |
| 11pm - 11:15pm | 5pm - 5:15pm | 11am - 11:15am | Coffee Break | |
| 11:15pm - 12am | 5:15pm - 6pm | 11:15am - 12pm | Session 4: Ransomware- Iman Vakilinia, Mohammad Mahdi Khalili and Ming Li. A Mechanism Design Approach to Solve Ransomware Dilemmas
- Erick Galinkin. Winning the Ransomware Lottery
- Yuhan Zhao, Yunfei Ge and Quanyan Zhu. Combating Ransomware in Internet of Things: A Games-in-Games Approach for Cross-Layer Cyber Defense and Security Investment
| |
| | | | |
| | | | |
| Time | Day 3 -- Oct 27 | |
| SGT (UTC+8) | CEST (UTC+2) | EDT (UTC−4) | | |
| 8:45pm - 9pm | 2:45pm - 3pm | 8:45am - 9am | Opening | |
| 9pm - 9:45pm | 3pm - 3:45pm | 9am - 9:45am | Session 5: Cyber-Physical Systems Security- Luyao Niu, Dinuka Sahabandu, Andrew Clark and Radha Poovendran. A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries
- Swastik Brahma, Laurent Njilla and Satyaki Nan. Game Theoretic Hardware Trojan Testing under Cost Consideration
- Shanto Roy, Salah Kadir, Yevgeniy Vorobeychik and Aron Laszka. Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies
| |
| 9:45pm - 10pm | 3:45pm - 4pm | 9:45am - 10am | Coffee Break | |
| 10pm - 10:45pm | 4pm - 4:45pm | 10am - 10:45am | Session 6: Innovations in Attacks and Defenses 1- Zahra Motaqy, Ghada Almashaqbeh, Behnam Bahrak and Naser Yazdani. Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart Contracts
- Linan Huang and Quanyan Zhu. Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability
- Wenjie Bai, Jeremiah Blocki and Ben Harsha. Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking
| |
| 10:45pm - 11pm | 4:45pm - 5pm | 10:45am - 11am | Coffee Break | |
| 11pm - 11:30pm | 5pm - 5:30pm | 11am - 11:30am | Session 7: Innovations in Attacks and Defenses 2- Erick Galinkin, John Carter and Spiros Mancoridis. Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem
- Brandon Collins, Shouhuai Xu and Philip Brown. Paying Firms to Share Cyber Threat Intelligence
| |
11:30pm - 11:45pm | 5:30pm - 5:45pm | 11:30am - 11:45am | Closing and Best Paper Award | |