Learning Bounded Rationality Models of the Adversary in Repeated Stackelberg Security Games
暂无分享,去创建一个
Milind Tambe | Bo An | Fei Fang | Aram Galstyan | Francesco Maria Delle Fave | Arunesh Sinha | Debarun Kar | Nicole D. Sintov | Nicole Sintov | Milind Tambe | Fei Fang | F. D. Fave | A. Galstyan | Arunesh Sinha | Bo An | Debarun Kar
[1] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[2] Marc Lanctot,et al. Computing Approximate Nash Equilibria and Robust Best-Responses Using Sampling , 2011, J. Artif. Intell. Res..
[3] Georges Dionne,et al. Lottery Decisions and Probability Weighting Function , 2001 .
[4] A. Lemieux. Situational prevention of poaching , 2014 .
[5] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[6] Milind Tambe. Security and Game Theory: EFFICIENT ALGORITHMS FOR MASSIVE SECURITY GAMES , 2011 .
[7] Jeannette M. Wing,et al. An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.
[8] Peter McCracken,et al. Safe Strategies for Agent Modelling in Games , 2004, AAAI Technical Report.
[9] William D. Moreto. To conserve and protect: examining law enforcement ranger culture and operations in Queen Elizabeth National Park, Uganda , 2013 .
[10] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[11] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[12] Milind Tambe,et al. Robust Protection of Fisheries with COmPASS , 2014, AAAI.
[13] Rong Yang,et al. Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..
[14] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[15] Ariel D. Procaccia,et al. Learning Optimal Commitment to Overcome Insecurity , 2014, NIPS.
[16] Nathalie Etchart-Vincent. Probability weighting and the ‘level’ and ‘spacing’ of outcomes: An experimental study over losses , 2009 .
[17] A. Tversky,et al. Advances in prospect theory: Cumulative representation of uncertainty , 1992 .
[18] Gerald Tesauro,et al. Playing repeated Stackelberg games with unknown opponents , 2012, AAMAS.
[19] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[20] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[21] Rong Yang,et al. Computing optimal strategy against quantal response in security games , 2012, AAMAS.
[22] Richard Gonzalez,et al. On the Shape of the Probability Weighting Function , 1999, Cognitive Psychology.
[23] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.
[24] Krzysztof Z. Gajos,et al. TurkServer: Enabling Synchronous and Longitudinal Online Experiments , 2012, HCOMP@AAAI.
[25] Michael H. Bowling,et al. Data Biased Robust Counter Strategies , 2009, AISTATS.
[26] Vincent Conitzer,et al. Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.
[27] Sahibsingh A. Dudani. The Distance-Weighted k-Nearest-Neighbor Rule , 1976, IEEE Transactions on Systems, Man, and Cybernetics.
[28] Michael H. Bowling,et al. Computing Robust Counter-Strategies , 2007, NIPS.
[29] A. Verschoor,et al. The probability weighting function: experimental evidence from Uganda, India and Ethiopia , 2004 .