When Players Affect Target Values: Modeling and Solving Dynamic Partially Observable Security Games
暂无分享,去创建一个
[1] Bo An,et al. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.
[2] Milind Tambe,et al. Robust Protection of Fisheries with COmPASS , 2014, AAAI.
[3] Avrim Blum,et al. Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.
[4] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[5] Ariel D. Procaccia,et al. Learning Optimal Commitment to Overcome Insecurity , 2014, NIPS.
[6] Sarit Kraus,et al. Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..
[7] Gerald Tesauro,et al. Playing repeated Stackelberg games with unknown opponents , 2012, AAMAS.
[8] Milind Tambe,et al. Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data , 2017, AAMAS.
[9] Branislav Bosanský,et al. Heuristic Search Value Iteration for One-Sided Partially Observable Stochastic Games , 2017, AAAI.
[10] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[11] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[12] Michael Wooldridge,et al. Stackelberg Security Games with Multiple Uncoordinated Defenders , 2018, AAMAS.
[13] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[14] Bo An,et al. Game-Theoretic Resource Allocation for Protecting Large Public Events , 2014, AAAI.
[15] Zhi Yuan,et al. Scalable Randomized Patrolling for Securing Rapid Transit Networks , 2013, IAAI.
[16] Bo An,et al. Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games , 2014, ICAPS.
[17] Milind Tambe,et al. Protecting Moving Targets with Multiple Mobile Resources , 2013, J. Artif. Intell. Res..
[18] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[19] Vincent Conitzer,et al. Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.
[20] S. Shankar Sastry,et al. Probabilistic pursuit-evasion games: theory, implementation, and experimental evaluation , 2002, IEEE Trans. Robotics Autom..
[21] Branislav Bosanský,et al. A Point-Based Approximate Algorithm for One-Sided Partially Observable Pursuit-Evasion Games , 2016, GameSec.
[22] Geoffrey A. Hollinger,et al. Search and pursuit-evasion in mobile robotics , 2011, Auton. Robots.
[23] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[24] Vincent Conitzer,et al. Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.
[25] Fernando Ordóñez,et al. Building Real Stackelberg Security Games for Border Patrols , 2017, GameSec.
[26] Bo An,et al. Security Games on a Plane , 2017, AAAI.
[27] Milind Tambe,et al. Patrol Strategies to Maximize Pristine Forest Area , 2012, AAAI.