Information Disclosure as a Means to Security
暂无分享,去创建一个
Haifeng Xu | Zinovi Rabinovich | Manish Jain | Albert Xin Jiang | A. Jiang | Manish Jain | Haifeng Xu | Zinovi Rabinovich
[1] Manish Jain,et al. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.
[2] Moshe Tennenholtz,et al. Signaling Schemes for Revenue Maximization , 2012, TEAC.
[3] Noa Agmon. On events in multi-robot patrol in adversarial environments , 2010, AAMAS.
[4] Robert Powell,et al. Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.
[5] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[6] Ariel D. Procaccia,et al. Lazy Defenders Are Almost Optimal against Diligent Attackers , 2014, AAAI.
[7] Milind Tambe,et al. Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers , 2013, GameSec.
[8] Haifeng Xu,et al. Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.
[9] Emir Kamenica,et al. Bayesian Persuasion , 2009 .
[10] V. S. Subrahmanian,et al. A Survey of Quantitative Models of Terror Group Behavior and an Analysis of Strategic Disclosure of Behavioral Models , 2014, IEEE Transactions on Computational Social Systems.
[11] Amos Azaria,et al. Strategic Information Disclosure to People with Multiple Alternatives , 2011, AAAI.
[12] Vincent Conitzer,et al. Solving Security Games on Graphs via Marginal Probabilities , 2013, AAAI.
[13] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[14] I. Csiszár. $I$-Divergence Geometry of Probability Distributions and Minimization Problems , 1975 .
[15] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.
[16] Milind Tambe,et al. Protecting Moving Targets with Multiple Mobile Resources , 2013, J. Artif. Intell. Res..
[17] Vincent Conitzer,et al. Commitment to Correlated Strategies , 2011, AAAI.
[18] Yoav Shoham,et al. Run the GAMUT: a comprehensive approach to evaluating game-theoretic algorithms , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[19] Mingyu Guo,et al. Revenue Maximization via Hiding Item Attributes , 2013, IJCAI.
[20] Sarit Kraus,et al. The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.
[21] Milind Tambe,et al. Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.
[22] Emir Kamenica,et al. A Rothschild-Stiglitz Approach to Bayesian Persuasion , 2016 .
[23] V. Bier,et al. Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[24] Shu-Cherng Fang. LINEAR PROGRAMMING WITH INEQUALITY CONSTRAINTS VIA ENTROPIC PERTURBATION , 1996 .
[25] Sarit Kraus,et al. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..
[26] Nicole Immorlica,et al. Constrained Signaling in Auction Design , 2013, SODA.
[27] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.