Stackelberg Security Games: Looking Beyond a Decade of Success
暂无分享,去创建一个
Bo An | Milind Tambe | Christopher Kiekintveld | Fei Fang | Arunesh Sinha | Milind Tambe | Fei Fang | Bo An | Christopher Kiekintveld | Arunesh Sinha
[1] Milind Tambe,et al. Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals , 2015, AAMAS.
[2] Yevgeniy Vorobeychik,et al. Equilibrium Analysis of Multi-Defender Security Games , 2015, IJCAI.
[3] Bo An,et al. Coalitional Security Games , 2016, AAMAS.
[4] Haifeng Xu,et al. Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.
[5] Rong Yang,et al. Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach , 2013, IJCAI.
[6] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[7] Branislav Bosanský,et al. Comparing Strategic Secrecy and Stackelberg Commitment in Security Games , 2017, IJCAI.
[8] Marcus Gutierrez,et al. Adapting with Honeypot Configurations to Detect Evolving Exploits , 2017, AAMAS.
[9] Milind Tambe,et al. Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data , 2017, AAMAS.
[10] Fei Fang,et al. Green security games: apply game theory to addressing green security challenges , 2016, SECO.
[11] Anjon Basak,et al. Abstraction Methods for Solving Graph-Based Security Games , 2016, AAMAS Workshops.
[12] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[13] Milind Tambe,et al. Stop the compartmentalization: unified robust algorithms for handling uncertainties in security games , 2014, AAMAS.
[14] Nicola Basilico,et al. Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder , 2012, Artif. Intell..
[15] Nicolas Christin,et al. Audit Games , 2013, IJCAI.
[16] Bo An,et al. Security Games with Protection Externalities , 2015, AAAI.
[17] Yevgeniy Vorobeychik,et al. Optimal interdiction of attack plans , 2013, AAMAS.
[18] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[19] Milind Tambe,et al. Towards a science of security games , 2016 .
[20] Milind Tambe,et al. One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats , 2016, AAAI.
[21] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[22] Haifeng Xu,et al. The Mysteries of Security Games: Equilibrium Computation Becomes Combinatorial Algorithm Design , 2016, EC.
[23] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..
[24] Ramakant Nevatia,et al. SPOT Poachers in Action: Augmenting Conservation Drones With Automatic Detection in Near Real Time , 2018, AAAI.
[25] Vincent Conitzer,et al. Catcher-Evader Games , 2016, IJCAI.
[26] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[27] Milind Tambe,et al. Learning Adversary Behavior in Security Games: A PAC Model Perspective , 2015, AAMAS.
[28] Ariel D. Procaccia,et al. Learning Optimal Commitment to Overcome Insecurity , 2014, NIPS.
[29] Nicola Basilico,et al. A Security Game Combining Patrolling and Alarm-Triggered Responses Under Spatial and Detection Uncertainties , 2016, AAAI.
[30] Yevgeniy Vorobeychik,et al. Near-Optimal Interdiction of Factored MDPs , 2017, UAI.
[31] Nicolas Christin,et al. Audit Games with Multiple Defender Resources , 2014, AAAI.
[32] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[33] Bo An,et al. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.
[34] Bo An,et al. Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks , 2016, AAAI.
[35] Vincent Conitzer,et al. Security Games with Multiple Attacker Resources , 2011, IJCAI.
[36] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[37] Branislav Bosanský,et al. Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games , 2016, AAAI.
[38] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.