Analyzing the Effectiveness of Adversary Modeling in Security Games
暂无分享,去创建一个
Amos Azaria | Sarit Kraus | Rong Yang | Milind Tambe | Thanh Hong Nguyen | Milind Tambe | Sarit Kraus | T. Nguyen | Rong Yang | A. Azaria
[1] Baruch Fischhoff,et al. Subjective expected utility: A model of decision-making , 1981, J. Am. Soc. Inf. Sci..
[3] Sarit Kraus,et al. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..
[4] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[5] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[6] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[7] Philip A. Haile,et al. On the Empirical Content of Quantal Response Equilibrium , 2003 .
[8] Syngjoo Choi,et al. Social learning in networks: a Quantal Response Equilibrium analysis of experimental data , 2012 .
[9] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[10] Yoav Shoham,et al. Run the GAMUT: a comprehensive approach to evaluating game-theoretic algorithms , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[11] J. Conlisk. Conlisk : Why Bounded Rationality ? 671 , 2000 .
[12] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[13] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[14] Colin Camerer. Behavioral Game Theory: Experiments in Strategic Interaction , 2003 .
[15] Yevgeniy Vorobeychik,et al. Computing Randomized Security Strategies in Networked Domains , 2011, Applied Adversarial Reasoning and Risk Modeling.
[16] L. J. Savage,et al. The Foundations of Statistics , 1955 .
[17] J. March. Bounded rationality, ambiguity, and the engineering of choice , 1978 .
[18] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[19] R. Dawes. Judgment under uncertainty: The robust beauty of improper linear models in decision making , 1979 .
[20] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[21] Rong Yang,et al. A robust approach to addressing human adversaries in security games , 2012, AAMAS.
[22] Milind Tambe,et al. Patrol Strategies to Maximize Pristine Forest Area , 2012, AAAI.
[23] L. J. Savage,et al. The Foundations of Statistics , 1955 .
[24] Paul E. Meehl,et al. Clinical Versus Statistical Prediction: A Theoretical Analysis and a Review of the Evidence , 1996 .
[25] R. Wilcox. Applying Contemporary Statistical Techniques , 2003 .
[26] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .