Game Theor y for Security: New Domains, New Challenges

[1]  Milind Tambe,et al.  Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals , 2015, AAMAS.

[2]  Milind Tambe,et al.  A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.

[3]  Leandro Soriano Marcolino,et al.  Preventing HIV Spread in Homeless Populations Using PSINET , 2015, AAAI.

[4]  Rong Yang,et al.  Designing better strategies against human adversaries in network security games , 2012, AAMAS.

[5]  Milind Tambe,et al.  Robust Strategy against Unknown Risk-averse Attackers in Security Games , 2015, AAMAS.

[6]  Rong Yang,et al.  A robust approach to addressing human adversaries in security games , 2012, AAMAS.

[7]  Rong Yang,et al.  Computing optimal strategy against quantal response in security games , 2012, AAMAS.

[8]  Milind Tambe,et al.  Security Games for Controlling Contagion , 2012, AAAI.

[10]  Milind Tambe,et al.  Security Games on Social Networks , 2012, AAAI Fall Symposium: Social Networks and Social Contagion.

[11]  Haifeng Xu,et al.  Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.

[12]  Milind Tambe,et al.  When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.

[13]  Bo An,et al.  A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard , 2013, Interfaces.

[14]  Milind Tambe,et al.  "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.

[15]  Bo An,et al.  Security Games with Limited Surveillance , 2012, AAAI.

[16]  Rong Yang,et al.  Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..

[17]  Bo An,et al.  PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.

[18]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[19]  Milind Tambe,et al.  Effectiveness of Probability Perception Modeling and Defender Strategy Generation Algorithms in Repeated Stackelberg Games: An Initial Report , 2015, AAAI Workshop: Computational Sustainability.

[20]  Bo An,et al.  An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety , 2012, AI Mag..

[21]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[22]  Milind Tambe,et al.  Analysis of Heuristic Techniques for Controlling Contagion , 2012, AAAI Fall Symposium: Social Networks and Social Contagion.

[23]  Milind Tambe,et al.  The Deployment-to-Saturation Ratio in Security Games , 2012, AAAI.

[24]  Milind Tambe,et al.  One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats , 2016, AAAI.

[25]  Milind Tambe,et al.  Patrol Strategies to Maximize Pristine Forest Area , 2012, AAAI.

[26]  Milind Tambe,et al.  Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries , 2014, GameSec.

[27]  Manish Jain,et al.  Game theory for security: Key algorithmic principles, deployed systems, lessons learned , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[28]  Haifeng Xu,et al.  Security Games with Information Leakage: Modeling and Computation , 2015, IJCAI.

[29]  Milind Tambe,et al.  Deployed Security Games for Patrol Planning , 2013 .

[30]  Milind Tambe,et al.  Empirical evaluation of computational fear contagion models in crowd dispersions , 2013, Autonomous Agents and Multi-Agent Systems.