Research Intern at Alibaba (U.S.) | Ph.D. Candidate in Computer Science

Lou, Jian (娄健)



  1. Wei Huang, Lei Zhang, Yu Huang and Jian LouAllocating Indivisible Objects with a Parallel Method Insensitive to Identities. IEEE Access, 2017 (corresponding author).
  2. Jian Lou, Andrew Smith and Yevgeniy Vorobeychik. Multidefender Security Games.  IEEE Intelligent Systems, 2017. (alphabetic order)
  3. Jian Lou and Yevgeniy Vorobeychik. Decentralization and Security in Dynamic Traffic Light Control. Symposium and Bootcamp on the Science of Security (HotSoS-2016
  4. Aron Laszka, Jian Lou and Yevgeniy Vorobeychik. Multi-Defender Strategic Filtering Against Spear-Phishing Attacks.Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (AAAI-2016) [Presentation][Poster] (alphabetic order)
  5. Jian Lou and Yevgeniy Vorobeychik. Equilibrium analysis of multi-defender security games. Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI-2015) [Presentation] 
  6. Wei Huang, Jian Lou, Zhonghua Wen. A Parallel Elicitation-Free Protocol for Allocating Indivisible GoodsIJCAI-2013 Multidisci-plinary Workshop on Advances in Preference Handling [Presentation] 
  7. Wei Huang, Jian Lou, Zhonghua Wen. Allocating Indivisible Resources under Price Rigidities in Polynomial Time. IJCAI-2013 Multidisciplinary Workshop on Advances in Preference Handling [Presentation]