A study of general and security Stackelberg game formulations

In this paper, we analyze different mathematical formulations for general Stackelberg games (GSGs) and Stackelberg security games (SSGs). We consider GSGs in which a single leader commits to a utility maximizing strategy knowing that one of p possible followers optimizes its own utility taking this leader strategy into account. SSGs are a type of GSG that arise in security applications where the strategies of the leader consist in protecting subsets of targets and the strategies of the p followers consist in attacking a single target. We compare existing mixed integer linear programming (MILP) formulations for GSGs, sorting them according to the tightness of their linear programming (LP) relaxations. We show that SSG formulations are projections of GSG formulations and exploit this link to derive a new SSG MILP formulation that i) has the tightest LP relaxation known among SSG MILP formulations and ii) its LP relaxation coincides with the convex hull of feasible solutions in the case of a single follower. We present computational experiments empirically comparing the difficulty of solving the formulations in the general and security settings. The new SSG MILP formulation is computationally efficient, in particular as the problem size increases.

[1]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[2]  J. Farkas Theorie der einfachen Ungleichungen. , 1902 .

[3]  J. Jiang,et al.  Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information , 2018, Eur. J. Oper. Res..

[4]  Antonio Bort,et al.  Principios de teoría económica , 1989 .

[5]  Matteo Fischetti,et al.  Interdiction Games and Monotonicity, with Application to Knapsack Problems , 2019, INFORMS J. Comput..

[6]  Heinrich von Stackelberg Market Structure and Equilibrium , 2010 .

[7]  Martine Labbé Bilevel Programming and Price Setting Problems , 2006, OR.

[8]  Rong Yang,et al.  Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.

[9]  Hanif D. Sherali,et al.  A Hierarchy of Relaxations and Convex Hull Characterizations for Mixed-integer Zero-one Programming Problems , 1994, Discret. Appl. Math..

[10]  George B. Dantzig,et al.  Fourier-Motzkin Elimination and Its Dual , 1973, J. Comb. Theory, Ser. A.

[11]  Alan W. McMasters,et al.  Optimal interdiction of a supply network , 1970 .

[12]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[13]  P. Marcotte,et al.  A bilevel model of taxation and its application to optimal highway pricing , 1996 .

[14]  Milind Tambe,et al.  A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.

[15]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[16]  Manish Jain,et al.  Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.

[17]  Bo An,et al.  Optimal defense against election control by deleting voter groups , 2018, Artif. Intell..

[18]  Laurence A. Wolsey,et al.  Production Planning by Mixed Integer Programming , 2010 .

[19]  Alexandre M. Bayen,et al.  On Stackelberg routing on parallel networks with horizontal queues , 2014, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[20]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[21]  Vincent Conitzer,et al.  Commitment to Correlated Strategies , 2011, AAAI.

[22]  Jerome Bracken,et al.  Mathematical Programs with Optimization Problems in the Constraints , 1973, Oper. Res..

[23]  Rong Yang,et al.  Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach , 2013, IJCAI.

[24]  Churlzu Lim,et al.  Algorithms for Network Interdiction and Fortification Games , 2008 .

[25]  Gilles Savard,et al.  Contribution à la programmation mathématique à deux niveaux , 1989 .

[26]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[27]  Jun Wu,et al.  Stackelberg game in critical infrastructures from a network science perspective , 2019, Physica A: Statistical Mechanics and its Applications.

[28]  Laurence A. Wolsey,et al.  Production Planning by Mixed Integer Programming (Springer Series in Operations Research and Financial Engineering) , 2006 .

[29]  Matteo Fischetti,et al.  A dynamic reformulation heuristic for Generalized Interdiction Problems , 2017, Eur. J. Oper. Res..

[30]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[31]  Jacek Mandziuk,et al.  A Monte Carlo Tree Search approach to finding efficient patrolling schemes on graphs , 2019, Eur. J. Oper. Res..

[32]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[33]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[34]  Patrice Marcotte,et al.  An overview of bilevel optimization , 2007, Ann. Oper. Res..

[35]  R. Selten,et al.  A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .

[36]  Amanda J. Schmitt,et al.  OR/MS models for supply chain disruptions: a review , 2014 .

[37]  Terry L. Friesz,et al.  Hierarchical optimization: An introduction , 1992, Ann. Oper. Res..