Addressing uncertainty in stackelberg games for security: models and algorithms
暂无分享,去创建一个
[1] Andreas Krause,et al. Randomized Sensing in Adversarial Environments , 2011, IJCAI.
[2] Bernhard von Stengel,et al. Fast algorithms for finding randomized strategies in game trees , 1994, STOC '94.
[3] Rong Yang,et al. A robust approach to addressing human adversaries in security games , 2012, AAMAS.
[4] Bo An,et al. Security Games with Limited Surveillance: An Initial Report , 2012, AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health.
[5] J. Harsanyi. Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .
[6] Branislav Bosanský,et al. Iterative game-theoretic route selection for hostile area transit and patrolling , 2011, AAMAS.
[7] Sarit Kraus,et al. A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.
[8] Milind Tambe,et al. GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.
[9] David P. Morton,et al. Monte Carlo bounding techniques for determining solution quality in stochastic programs , 1999, Oper. Res. Lett..
[10] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[11] Vincent Conitzer,et al. Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.
[12] Nicola Gatti,et al. Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.
[13] Milind Tambe,et al. Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties , 2009, AAMAS 2009.
[14] R. Selten. Reexamination of the perfectness concept for equilibrium points in extensive games , 1975, Classics in Game Theory.
[15] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[16] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[17] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.
[18] G. Leitmann. On generalized Stackelberg strategies , 1978 .
[19] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[20] Yevgeniy Vorobeychik,et al. Computing Stackelberg Equilibria in Discounted Stochastic Games , 2012, AAAI.
[21] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[22] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[23] Jean-Philippe Vial,et al. Robust Optimization , 2021, ICORES.
[24] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[25] W. A. Wagenaar. Generation of random sequences by human subjects: A critical survey of literature. , 1972 .
[26] Branislav Bosanský,et al. Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.
[27] Egon Balas,et al. Disjunctive Programming: Properties of the Convex Hull of Feasible Points , 1998, Discret. Appl. Math..
[28] Milind Tambe,et al. Patrol Strategies to Maximize Pristine Forest Area , 2012, AAAI.
[29] Wieland Müller,et al. Perfect versus Imperfect Observability - An Experimental Test of Bagwell's Result , 2000, Games Econ. Behav..
[30] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[31] Andrea L. Bertozzi,et al. Nonlinear Patterns in Urban Crime: Hotspots, Bifurcations, and Suppression , 2010, SIAM J. Appl. Dyn. Syst..
[32] Vincent Conitzer,et al. Computing Optimal Strategies to Commit to in Stochastic Games , 2012, AAAI.
[33] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[34] Sarit Kraus,et al. Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.
[35] Sarit Kraus,et al. The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.
[36] Milind Tambe,et al. Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.
[37] Sarit Kraus,et al. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..
[38] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[39] A. Tversky,et al. Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .
[40] J. Vial,et al. Strategically zero-sum games: The class of games whose completely mixed equilibria cannot be improved upon , 1978 .
[41] Michael Wooldridge,et al. Does Game Theory Work? , 2012, IEEE Intelligent Systems.
[42] William M. Landes,et al. Essays in the Economics of Crime and Punishment. Edited by G.S. Becker and W.M. Landes, New York, National Bureau of Economics Research, 1974, XVII p. 268 p. , 1979, Recherches économiques de Louvain.
[43] J. Morgan,et al. The Value of Commitment in Contests and Tournaments When Observation is Costly , 2004 .
[44] J. Birge,et al. A multicut algorithm for two-stage stochastic linear programs , 1988 .
[45] Rong Yang,et al. Computing optimal strategy against quantal response in security games , 2012, AAMAS.
[46] E.E.C. van Damme,et al. Games with imperfectly observable commitment , 1997 .
[47] Manish Jain,et al. Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.
[48] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[49] Christopher Archibald,et al. Hustling in Repeated Zero-Sum Games with Imperfect Execution , 2011, IJCAI.
[50] S. Sorin,et al. The LP formulation of finite zero-sum games with incomplete information , 1980 .
[51] Vincent Conitzer,et al. Security Games with Multiple Attacker Resources , 2011, IJCAI.
[52] Milind Tambe,et al. Security Games for Controlling Contagion , 2012, AAAI.
[53] Vincent Conitzer,et al. Computing optimal strategies to commit to in extensive-form games , 2010, EC '10.
[54] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[55] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[56] S. Gal. Search Games with Mobile and Immobile Hider , 1979 .
[57] Milind Tambe,et al. A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.
[58] Claudia V. Goldman,et al. Transition-independent decentralized markov decision processes , 2003, AAMAS '03.
[59] Jonathan F. Bard,et al. Practical Bilevel Optimization: Algorithms and Applications (Nonconvex Optimization and Its Applications) , 2006 .
[60] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[61] Tuomas Sandholm,et al. Information-theoretic approaches to branching in search , 2011, Discret. Optim..
[62] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[63] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[64] Rong Yang,et al. Improved computational models of human behavior in security games , 2011, AAMAS.
[65] K. Bagwell. Commitment and observability in games , 1995 .
[66] A. Shapiro,et al. The Sample Average Approximation Method for Stochastic Programs with Integer Recourse , 2002 .
[67] H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
[68] Manish Jain,et al. Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.
[69] Milind Tambe,et al. Towards Optimal Patrol Strategies for Fare Inspection in Transit Systems , 2012, AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health.
[70] Laurent El Ghaoui,et al. Chapter Fourteen. Robust Adjustable Multistage Optimization , 2009 .
[71] Vincent Conitzer,et al. Solving Stackelberg games with uncertain observability , 2011, AAMAS.
[72] A. Haurie,et al. Sequential Stackelberg equilibria in two-person games , 1985 .
[73] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[74] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[75] S. Alpern. Infiltration games on arbitrary graphs , 1992 .
[76] Bo An,et al. Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.