Signaling in Bayesian Stackelberg Games

Algorithms for solving Stackelberg games are used in an ever-growing variety of real-world domains. Previous work has extended this framework to allow the leader to commit not only to a distribution over actions, but also to a scheme for stochastically signaling information about these actions to the follower. This can result in higher utility for the leader. In this paper, we extend this methodology to Bayesian games, in which either the leader or the follower has payoff-relevant private information or both. This leads to novel variants of the model, for example by imposing an incentive compatibility constraint for each type to listen to the signal intended for it. We show that, in contrast to previous hardness results for the case without signaling, we can solve unrestricted games in time polynomial in their natural representation. For security games, we obtain hardness results as well as efficient algorithms, depending on the settings. We show the benefits of our approach in experimental evaluations of our algorithms.

[1]  Emir Kamenica,et al.  Bayesian Persuasion , 2009 .

[2]  Haifeng Xu,et al.  Algorithmic Bayesian persuasion , 2015, STOC.

[3]  Yoav Shoham,et al.  Run the GAMUT: a comprehensive approach to evaluating game-theoretic algorithms , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[4]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[5]  Milind Tambe Security and Game Theory: EFFICIENT ALGORITHMS FOR MASSIVE SECURITY GAMES , 2011 .

[6]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[7]  Haifeng Xu,et al.  Information Disclosure as a Means to Security , 2015, AAMAS.

[8]  Federico Etro Stackelberg, Heinrich von: Market Structure and Equilibrium , 2013 .

[9]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[10]  Peter Bro Miltersen,et al.  Send mixed signals: earn more, work less , 2012, EC '12.

[11]  Kevin Leyton-Brown,et al.  Polynomial-time computation of exact correlated equilibrium in compact games , 2010, EC '11.

[12]  Vincent Conitzer,et al.  Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains , 2014, AAAI.

[13]  L. Lovász,et al.  Geometric Algorithms and Combinatorial Optimization , 1981 .

[14]  Heinrich von Stackelberg Market Structure and Equilibrium , 2010 .

[15]  Vincent Conitzer,et al.  Commitment to Correlated Strategies , 2011, AAAI.

[16]  Christos H. Papadimitriou,et al.  Computing correlated equilibria in multi-player games , 2005, STOC '05.

[17]  Mingyu Guo,et al.  Revenue Maximization via Hiding Item Attributes , 2013, IJCAI.

[18]  Paul W. Goldberg,et al.  The Complexity of Computing a Nash Equilibrium , 2009, SIAM J. Comput..

[19]  Xiaotie Deng,et al.  Settling the complexity of computing two-player Nash equilibria , 2007, JACM.

[20]  Milind Tambe,et al.  When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.

[21]  Emir Kamenica,et al.  A Rothschild-Stiglitz Approach to Bayesian Persuasion , 2016 .

[22]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[23]  Moshe Tennenholtz,et al.  Signaling Schemes for Revenue Maximization , 2012, TEAC.

[24]  Haifeng Xu,et al.  Security Games with Information Leakage: Modeling and Computation , 2015, IJCAI.

[25]  Vincent Conitzer,et al.  Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.

[26]  Andriy Zapechelnyuk,et al.  Persuasion of a Privately Informed Receiver , 2016 .

[27]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[28]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[29]  Sarit Kraus,et al.  Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications , 2008, AAAI.

[30]  Vincent Conitzer,et al.  Catcher-Evader Games , 2016, IJCAI.

[31]  Haifeng Xu,et al.  Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.