Three strategies to success: Learning adversary models in security games
State-of-the-art applications of Stackelberg security games -- including wildlife protection -- offer a wealth of data, which can be used to learn the behavior of the adversary. But existing approaches either make strong assumptions about the structure of the data, or gather new data through online...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4663 https://ink.library.smu.edu.sg/context/sis_research/article/5666/viewcontent/ijcai16_full_1_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-5666 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-56662020-01-02T07:17:16Z Three strategies to success: Learning adversary models in security games HAGHTALAB, Nika FANG, Fei NGUYEN, Thanh Hong SINHA, Arunesh PROCACCIA, Ariel D. TAMBE, Milind State-of-the-art applications of Stackelberg security games -- including wildlife protection -- offer a wealth of data, which can be used to learn the behavior of the adversary. But existing approaches either make strong assumptions about the structure of the data, or gather new data through online algorithms that are likely to play severely suboptimal strategies. We develop a new approach to learning the parameters of the behavioral model of a bounded rational attacker (thereby pinpointing a near optimal strategy), by observing how the attacker responds to only three defender strategies. We also validate our approach using experiments on real and synthetic data 2016-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4663 https://ink.library.smu.edu.sg/context/sis_research/article/5666/viewcontent/ijcai16_full_1_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Databases and Information Systems |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Databases and Information Systems |
spellingShingle |
Databases and Information Systems HAGHTALAB, Nika FANG, Fei NGUYEN, Thanh Hong SINHA, Arunesh PROCACCIA, Ariel D. TAMBE, Milind Three strategies to success: Learning adversary models in security games |
description |
State-of-the-art applications of Stackelberg security games -- including wildlife protection -- offer a wealth of data, which can be used to learn the behavior of the adversary. But existing approaches either make strong assumptions about the structure of the data, or gather new data through online algorithms that are likely to play severely suboptimal strategies. We develop a new approach to learning the parameters of the behavioral model of a bounded rational attacker (thereby pinpointing a near optimal strategy), by observing how the attacker responds to only three defender strategies. We also validate our approach using experiments on real and synthetic data |
format |
text |
author |
HAGHTALAB, Nika FANG, Fei NGUYEN, Thanh Hong SINHA, Arunesh PROCACCIA, Ariel D. TAMBE, Milind |
author_facet |
HAGHTALAB, Nika FANG, Fei NGUYEN, Thanh Hong SINHA, Arunesh PROCACCIA, Ariel D. TAMBE, Milind |
author_sort |
HAGHTALAB, Nika |
title |
Three strategies to success: Learning adversary models in security games |
title_short |
Three strategies to success: Learning adversary models in security games |
title_full |
Three strategies to success: Learning adversary models in security games |
title_fullStr |
Three strategies to success: Learning adversary models in security games |
title_full_unstemmed |
Three strategies to success: Learning adversary models in security games |
title_sort |
three strategies to success: learning adversary models in security games |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2016 |
url |
https://ink.library.smu.edu.sg/sis_research/4663 https://ink.library.smu.edu.sg/context/sis_research/article/5666/viewcontent/ijcai16_full_1_.pdf |
_version_ |
1770574956388679680 |