Algorithms for a risk-averse Stackelberg game with multiple adversaries

[1]  E. Delage,et al.  A double-oracle, logic-based Benders decomposition approach to solve the K-adaptability problem , 2022, Comput. Oper. Res..

[2]  Ali Muffak,et al.  A Benders decomposition algorithm for the maximum availability service facility location problem , 2022, Comput. Oper. Res..

[3]  Tien Mai,et al.  Choices Are Not Independent: Stackelberg Security Games with Nested Quantal Response Models , 2022, AAAI.

[4]  D. Z. Wang,et al.  Global optimization method for network design problem with stochastic user equilibrium , 2015 .

[5]  Andrea Lodi,et al.  Optimistic MILP modeling of non-linear optimization problems , 2014, Eur. J. Oper. Res..

[6]  Sarit Kraus,et al.  Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..

[7]  Bo An,et al.  A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard , 2013, Interfaces.

[8]  Deniz Aksen,et al.  A bilevel fixed charge location model for facilities under imminent attack , 2012, Comput. Oper. Res..

[9]  Rong Yang,et al.  Computing optimal strategy against quantal response in security games , 2012, AAMAS.

[10]  Rong Yang,et al.  Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.

[11]  Sarit Kraus,et al.  Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..

[12]  J. R. Wright,et al.  Beyond Equilibrium: Predicting Human Behavior in Normal-Form Games , 2010, AAAI.

[13]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[14]  Richard L. Church,et al.  A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..

[15]  George L. Nemhauser,et al.  Modeling disjunctive constraints with a logarithmic number of binary variables and constraints , 2008, Math. Program..

[16]  V. Bier Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[17]  Gabriel R. Bitran,et al.  On Pricing and Composition of Bundles , 2007 .

[18]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[19]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[20]  Colin Camerer,et al.  A Cognitive Hierarchy Model of Games , 2004 .

[21]  M. Hellwig Risk Aversion in the Small and in the Large. When Outcomes are Multidimensional , 2004 .

[22]  Philip A. Haile,et al.  On the Empirical Content of Quantal Response Equilibrium , 2003 .

[23]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[24]  D. Stahl,et al.  Experimental evidence on players' models of other players , 1994 .

[25]  Wilfred W. Recker,et al.  The Multinomial, Multiattribute Logit Choice Model , 1979 .

[26]  Lakshman S. Thakur,et al.  Error Analysis for Convex Separable Programs: The Piecewise Linear Approximation and The Bounds on The Optimal Objective Value , 1978 .

[27]  J. F. Benders Partitioning procedures for solving mixed-variables programming problems , 1962 .

[28]  E. Gilbert Gray codes and paths on the N-cube , 1958 .

[29]  Milind Tambe,et al.  Trends and Applications in Stackelberg Security Games , 2018 .