Scalable Game-Focused Learning of Adversary Models: Data-to-Decisions in Network Security Games
暂无分享,去创建一个
Milind Tambe | Kai Wang | Andrew Perrault | Aditya Mate | Milind Tambe | Kai Wang | A. Perrault | Aditya Mate
[1] Kathryn B. Laskey,et al. Stochastic blockmodels: First steps , 1983 .
[2] Dieter Kraft,et al. On Converting Optimal Control Problems into Nonlinear Programming Problems , 1985 .
[3] BERNARD M. WAXMAN,et al. Routing of multipoint connections , 1988, IEEE J. Sel. Areas Commun..
[4] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[5] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[6] P. Tseng. Convergence of a Block Coordinate Descent Method for Nondifferentiable Minimization , 2001 .
[7] John Morgan,et al. An Experimental Study of Commitment and Observability in Stackelberg Games , 2001 .
[8] David P. Morton,et al. A Stochastic Program for Interdicting Smuggled Nuclear Material , 2003 .
[9] David P. Morton,et al. Models for nuclear smuggling interdiction , 2007 .
[10] Jana Arsovska,et al. Illicit arms trafficking and the limits of rational choice theory: the case of the Balkans , 2008 .
[11] Iuliana Teodorescu,et al. Maximum Likelihood Estimation for Markov Chains , 2009, 0905.4131.
[12] Feng Pan,et al. Optimal Interdiction of Unreactive Markovian Evaders , 2009, CPAIOR.
[13] P. Ferrier. The economics of agricultural and wildlife smuggling , 2009 .
[14] Vincent Conitzer,et al. Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.
[15] M. Nehme. Two-person games for stochastic network interdiction : models, methods, and complexities , 2009 .
[16] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS.
[17] Katherine F. Smith,et al. Summarizing the Evidence on the International Trade in Illegal Wildlife , 2010, EcoHealth.
[18] Feng Pan,et al. Interdiction of a Markovian Evader , 2010, ICS 2011.
[19] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[20] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[21] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[22] Rong Yang,et al. Designing better strategies against human adversaries in network security games , 2012, AAMAS.
[23] Steven Okamoto,et al. Solving non-zero sum multiagent network flow security games with attack costs , 2012, AAMAS.
[24] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[25] Dominique Orban,et al. Bounds on Eigenvalues of Matrices Arising from Interior-Point Methods , 2012, SIAM J. Optim..
[26] P. Murugan,et al. Factors Contributing to Human Trafficking, Contexts of Vulnerability and Patterns of Victimization: The case of stranded victims in Metema , Ethiopia , 2014 .
[27] Ion Necoara,et al. Efficient random coordinate descent algorithms for large-scale structured nonconvex optimization , 2013, Journal of Global Optimization.
[28] Nicole D. Sintov,et al. Human Adversaries in Opportunistic Crime Security Games: Evaluating Competing Bounded Rationality Models , 2015 .
[29] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[30] Bo An,et al. Security Games with Protection Externalities , 2015, AAAI.
[31] Milind Tambe,et al. Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games , 2015, GameSec.
[32] Milind Tambe,et al. Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals , 2015, AAMAS.
[33] Milind Tambe,et al. Learning Adversary Behavior in Security Games: A PAC Model Perspective , 2015, AAMAS.
[34] Milind Tambe,et al. Know Your Adversary: Insights for a Better Adversarial Behavioral Model , 2016, CogSci.
[35] Sailik Sengupta,et al. Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract) , 2016, AAMAS.
[36] Milind Tambe,et al. Three Strategies to Success: Learning Adversary Models in Security Games , 2016, IJCAI.
[37] M. Fischetti,et al. Interdiction Games and Monotonicity , 2016 .
[38] Milind Tambe,et al. Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security , 2016, AAAI.
[39] J. Zico Kolter,et al. OptNet: Differentiable Optimization as a Layer in Neural Networks , 2017, ICML.
[40] Max Welling,et al. Semi-Supervised Classification with Graph Convolutional Networks , 2016, ICLR.
[41] Jure Leskovec,et al. Inductive Representation Learning on Large Graphs , 2017, NIPS.
[42] Priya L. Donti,et al. Task-based End-to-end Model Learning in Stochastic Optimization , 2017, NIPS.
[43] Martin Grohe,et al. Weisfeiler and Leman Go Neural: Higher-order Graph Neural Networks , 2018, AAAI.
[44] Stephen P. Boyd,et al. Differentiable Convex Optimization Layers , 2019, NeurIPS.
[45] Milind Tambe,et al. Learning to Signal in the Goldilocks Zone: Improving Adversary Compliance in Security Games , 2019, ECML/PKDD.
[46] Matteo Fischetti,et al. Interdiction Games and Monotonicity, with Application to Knapsack Problems , 2019, INFORMS J. Comput..
[47] Milind Tambe,et al. End-to-End Game-Focused Learning of Adversary Behavior in Security Games , 2019, AAAI.