"A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games
暂无分享,去创建一个
Milind Tambe | Fei Fang | Francesco Maria Delle Fave | Debarun Kar | Nicole D. Sintov | Milind Tambe | Fei Fang | F. D. Fave | Debarun Kar
[1] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[2] H. Zank,et al. Separating curvature and elevation: A parametric probability weighting function , 2010 .
[3] William D. Moreto. To conserve and protect: examining law enforcement ranger culture and operations in Queen Elizabeth National Park, Uganda , 2013 .
[4] Jon Elster,et al. Social Mechanisms: A plea for mechanisms , 1998 .
[5] Michael H. Bowling,et al. Data Biased Robust Counter Strategies , 2009, AISTATS.
[6] Gerald Tesauro,et al. Playing repeated Stackelberg games with unknown opponents , 2012, AAMAS.
[7] Peter McCracken,et al. Safe Strategies for Agent Modelling in Games , 2004, AAAI Technical Report.
[8] P. Hedström,et al. Social Mechanisms: An Analytical Approach to Social Theory. , 1999 .
[9] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[10] Rong Yang,et al. Computing optimal strategy against quantal response in security games , 2012, AAMAS.
[11] A. Verschoor,et al. The probability weighting function: experimental evidence from Uganda, India and Ethiopia , 2004 .
[12] D. McFadden. Quantal Choice Analysis: A Survey , 1976 .
[13] Milind Tambe,et al. Robust Protection of Fisheries with COmPASS , 2014, AAAI.
[14] Scott Menard,et al. Handbook of Longitudinal Research , 1991 .
[15] Sahibsingh A. Dudani. The Distance-Weighted k-Nearest-Neighbor Rule , 1976, IEEE Transactions on Systems, Man, and Cybernetics.
[16] Vincent Conitzer,et al. Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.
[17] Rong Yang,et al. Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..
[18] Krzysztof Z. Gajos,et al. TurkServer: Enabling Synchronous and Longitudinal Online Experiments , 2012, HCOMP@AAAI.
[19] Jeannette M. Wing,et al. An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.
[20] A. Tversky,et al. Advances in prospect theory: Cumulative representation of uncertainty , 1992 .
[21] Richard Gonzalez,et al. On the Shape of the Probability Weighting Function , 1999, Cognitive Psychology.
[22] P. Hedström,et al. Social mechanisms : an analytical approach to social theory , 1999 .
[23] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[24] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[25] Rolf Loeber,et al. Contacting participants for follow-up: how much effort is required to retain participants in longitudinal studies? , 2005 .
[26] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[27] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[28] Marc Lanctot,et al. Computing Approximate Nash Equilibria and Robust Best-Responses Using Sampling , 2011, J. Artif. Intell. Res..
[29] Georges Dionne,et al. Lottery Decisions and Probability Weighting Function , 2001 .
[30] Michael H. Bowling,et al. Computing Robust Counter-Strategies , 2007, NIPS.
[31] Ariel D. Procaccia,et al. Learning Optimal Commitment to Overcome Insecurity , 2014, NIPS.
[32] Nathalie Etchart-Vincent. Probability weighting and the ‘level’ and ‘spacing’ of outcomes: An experimental study over losses , 2009 .
[33] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.
[34] Scott Menard,et al. Handbook of longitudinal research : design, measurement, and analysis , 2008 .
[35] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[36] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.