Strategic Coordination of Human Patrollers and Mobile Sensors With Signaling for Security Games
暂无分享,去创建一个
Haifeng Xu | Kai Wang | Milind Tambe | Phebe Vayanos | Milind Tambe | Kai Wang | Haifeng Xu | P. Vayanos
[1] Haifeng Xu,et al. Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.
[2] Sarit Kraus,et al. When Security Games Hit Traffic: Optimal Traffic Enforcement Under One Sided Uncertainty , 2017, IJCAI.
[3] Yoav Shoham,et al. Run the GAMUT: a comprehensive approach to evaluating game-theoretic algorithms , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[4] Haifeng Xu,et al. Information Disclosure as a Means to Security , 2015, AAMAS.
[5] Bo An,et al. Deploying PAWS to Combat Poaching: Game-Theoretic Patrolling in Areas with Complex Terrain (Demonstration) , 2016, AAAI.
[6] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[7] Nicholas R. Jennings,et al. Near-optimal continuous patrolling with teams of mobile information gathering agents , 2013, Artif. Intell..
[8] Noa Agmon,et al. On the Power and Limitations of Deception in Multi-Robot Adversarial Patrolling , 2017, IJCAI.
[9] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[10] Milind Tambe,et al. VIOLA: Video Labeling Application for Security Domains , 2017, GameSec.
[11] Milind Tambe,et al. Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security , 2016, AAAI.
[12] Martin W. P. Savelsbergh,et al. Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..
[13] Branislav Bosanský,et al. Comparing Strategic Secrecy and Stackelberg Commitment in Security Games , 2017, IJCAI.
[14] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[15] Emir Kamenica,et al. Bayesian Persuasion , 2009 .
[16] Bo An,et al. Optimally Protecting Elections , 2016, IJCAI.
[17] Fernando Ordóñez,et al. Building Real Stackelberg Security Games for Border Patrols , 2017, GameSec.
[18] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[19] Jan Vondrák,et al. Maximizing a Monotone Submodular Function Subject to a Matroid Constraint , 2011, SIAM J. Comput..
[20] Nicola Basilico,et al. Adversarial patrolling with spatially uncertain alarm signals , 2015, Artif. Intell..
[21] Klaudia Frankfurter. Computers And Intractability A Guide To The Theory Of Np Completeness , 2016 .
[22] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[23] Nicola Basilico,et al. Coordinating Multiple Defensive Resources in Patrolling Games with Alarm Systems , 2017, AAMAS.
[24] Gerhard Friedrich,et al. Multi-UAV Monitoring with Priorities and Limited Energy Resources , 2015, ICAPS.