Game Theoretic Analysis of Security and Sustainability

Computational game theory has become a powerful tool to address critical issues in security and sustainability. Casting the security resource allocation problem as a Stackelberg game, novel algorithms have been developed to provide randomized security resource allocations. These algorithms have led to deployed security-game based decision aids for many real-world security domains including infrastructure security and wildlife protection. We contribute to this community by addressing several major research challenges in complex security resource allocation, including dynamic payoffs, uncertainty, protection externality, games on networks, and strategic secrecy. We also analyze optimal security resource allocation in many potential application domains including cyber security. Furthermore, we apply game theory to reasoning optimal policy in deciding taxi pricing scheme and EV charging placement and pricing.

[1]  Bo An,et al.  Security Games on a Plane , 2017, AAAI.

[2]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[3]  Bo An,et al.  Optimizing Efficiency of Taxi Systems: Scaling-up and Handling Arbitrary Constraints , 2015, AAMAS.

[4]  Bo An,et al.  Defending Against Man-In-The-Middle Attack in Repeated Games , 2017, IJCAI.

[5]  Bo An,et al.  Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.

[6]  Bo An,et al.  PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.

[7]  Nicholas R. Jennings,et al.  Optimal Escape Interdiction on Transportation Networks , 2017, IJCAI.

[8]  Bo An,et al.  Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks , 2016, AAAI.

[9]  Timothy J. Leonard,et al.  Security challenges in United States sea ports: an overview , 2015 .

[10]  Singiresu S. Rao,et al.  Optimization Theory and Applications , 1980, IEEE Transactions on Systems, Man, and Cybernetics.

[11]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[12]  Bo An,et al.  Efficient Resource Allocation for Protecting Coral Reef Ecosystems , 2016, IJCAI.

[13]  Zhen Wang,et al.  Computing Optimal Monitoring Strategy for Detecting Terrorist Plots , 2016, AAAI.

[14]  Milind Tambe,et al.  Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms , 2014, GameSec.

[15]  Milind Tambe,et al.  Stackelberg Security Games ( SSG ) Basics and Application Overview , 2018 .

[16]  Bo An,et al.  Efficient Label Contamination Attacks Against Black-Box Learning Models , 2017, IJCAI.

[17]  Bo An,et al.  Optimally Protecting Elections , 2016, IJCAI.

[18]  Bo An,et al.  GUARDS and PROTECT: next generation applications of security games , 2011, SECO.

[19]  Bo An,et al.  Playing Repeated Network Interdiction Games with Semi-Bandit Feedback , 2017, IJCAI.

[20]  Branislav Bosanský,et al.  Comparing Strategic Secrecy and Stackelberg Commitment in Security Games , 2017, IJCAI.