Learning to Play Stackelberg Security Games

作者: Ariel D. Procaccia , Nika Haghtalab , Avrim Blum

DOI:

关键词:

摘要: As discussed in previous chapters, algorithmic research on Stackelberg Security Games has had a striking real-world impact. But an algorithm that computes optimal strategy for the defender can only be as good game it receives input, and if is inaccurate model of reality then output will likewise flawed. Consequently, researchers have introduced Bayesian frameworks capture uncertainty using probability distribution over possible games. Others assumed unknown parameters lie within known intervals. These approaches are Chapter 17 this book [17]. In chapter, we present alternative, learning-theoretic approach dealing with security order to paint cohesive picture, focus one type uncertainty: attacker utilities. Learning take place repeated game, where gathers information about purely by observing attacker’s responses mixed strategies played defender. more detail, wish learn without any initial utility function (Section 1); when given types 2); faced sequence attackers 3). each section present, some generality, relevant techniques: optimization membership queries, Monte Carlo tree search, no-regret learning, respectively. Section 4 briefly discuss additional work at intersection machine learning

参考文章(473)
Yoshio Kajitani, Hirokazu Tatano, Estimation of Lifeline Resilience Factors Based on Surveys of Japanese Industries Earthquake Spectra. ,vol. 25, pp. 755- 776 ,(2009) , 10.1193/1.3240354
Daphne Koller, Brian Milch, Multi-agent influence diagrams for representing and solving games international joint conference on artificial intelligence. ,vol. 45, pp. 1027- 1034 ,(2001) , 10.1016/S0899-8256(02)00544-4
Peter Borm, Herbert Hamers, Ruud Hendrickx, Operations Research Games: a Survey Top. ,vol. 9, pp. 139- 199 ,(2001) , 10.1007/BF02579075
M. Breton, A. Alj, A. Haurie, Sequential Stackelberg equilibria in two-person games Journal of Optimization Theory and Applications. ,vol. 59, pp. 71- 97 ,(1988) , 10.1007/BF00939867
Mark Gehlhar, Agapi Somwaru, Peter B Dixon, Maureen T Rimmer, Ashley R Winston, Economywide Implications from US Bioenergy Expansion American Economic Review. ,vol. 100, pp. 172- 177 ,(2010) , 10.1257/AER.100.2.172
James G. March, Lee S. Sproull, Michal Tamuz, Learning from Samples of One or Fewer Organization Science. ,vol. 2, pp. 1- 13 ,(1991) , 10.1287/ORSC.2.1.1
Ronald Howard, Information Value Theory IEEE Transactions on Systems Science and Cybernetics. ,vol. 2, pp. 22- 26 ,(1966) , 10.1109/TSSC.1966.300074
Roger Frost, International Organization for Standardization (ISO) Quality Assurance Journal. ,vol. 8, pp. 198- 206 ,(2004) , 10.1002/QAJ.287
Roberto Diéguez Galvão, Charles ReVelle, A Lagrangean heuristic for the maximal covering location problem European Journal of Operational Research. ,vol. 88, pp. 114- 123 ,(1996) , 10.1016/0377-2217(94)00159-6
JAMES YETMAN *, SUICIDAL TERRORISM AND DISCRIMINATORY SCREENING: AN EFFICIENCY‐EQUITY TRADE‐OFF Defence and Peace Economics. ,vol. 15, pp. 221- 230 ,(2004) , 10.1080/1024269042000189264