Deceitful Attacks in Security Games
暂无分享,去创建一个
[1] Milind Tambe,et al. CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection , 2016, AAMAS.
[2] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[3] J. Morgan,et al. Cheap Talk , 2005 .
[4] Ariel D. Procaccia,et al. Learning Optimal Commitment to Overcome Insecurity , 2014, NIPS.
[5] Maria-Florina Balcan,et al. Commitment Without Regrets: Online Learning in Stackelberg Security Games , 2015, EC.
[6] Yevgeniy Vorobeychik,et al. Computing Randomized Security Strategies in Networked Domains , 2011, Applied Adversarial Reasoning and Risk Modeling.
[7] Kenneth Hendricks,et al. Feints , 2004 .
[8] Branislav Bosanský,et al. Comparing Strategic Secrecy and Stackelberg Commitment in Security Games , 2017, IJCAI.
[9] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[10] Gerald G. Brown,et al. A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..
[11] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[12] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[13] Milind Tambe,et al. Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data , 2017, AAMAS.
[14] Bo An,et al. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.
[15] Tobias Scheffer,et al. Static prediction games for adversarial learning problems , 2012, J. Mach. Learn. Res..
[16] Christopher Meek,et al. Adversarial learning , 2005, KDD '05.
[17] Milind Tambe,et al. Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test , 2017, ECML/PKDD.
[18] Tobias Scheffer,et al. Stackelberg games for adversarial prediction problems , 2011, KDD.
[19] Haifeng Xu,et al. Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.
[20] Milind Tambe,et al. Three Strategies to Success: Learning Adversary Models in Security Games , 2016, IJCAI.
[21] V. Bier,et al. Secrecy and Deception in Anti-Terrorism Resource Allocation and Policy Implication , 2008 .
[22] Haifeng Xu,et al. Information Disclosure as a Means to Security , 2015, AAMAS.