[PDF][PDF] A double oracle algorithm for zero-sum security games on graphs

M Jain, D Korzhyk, O Vaněk, V Conitzer… - The 10th International …, 2011 - Citeseer
In response to the Mumbai attacks of 2008, the Mumbai police have started to schedule a
limited number of inspection checkpoints on the road network throughout the city. Algorithms …

Individual calibration with randomized forecasting

S Zhao, T Ma, S Ermon - International Conference on …, 2020 - proceedings.mlr.press
Abstract Machine learning applications often require calibrated predictions, eg a 90%
credible interval should contain the true outcome 90% of the times. However, typical …

Trusts: Scheduling randomized patrols for fare inspection in transit systems

Z Yin, A Jiang, M Johnson, M Tambe… - Proceedings of the …, 2012 - ojs.aaai.org
In proof-of-payment transit systems, passengers are legally required to purchase tickets
before entering but are not physically forced to do so. Instead, patrol units move about the …

TRUSTS: Scheduling randomized patrols for fare inspection in transit systems using game theory

Z Yin, AX Jiang, M Tambe, C Kiekintveld… - AI magazine, 2012 - ojs.aaai.org
In proof-of-payment transit systems, passengers are legally required to purchase tickets
before entering but are not physically forced to do so. Instead, patrol units move about the …

Improving resource allocation strategies against human adversaries in security games: An extended study

R Yang, C Kiekintveld, F Ordónez, M Tambe, R John - Artificial Intelligence, 2013 - Elsevier
Stackelberg games have garnered significant attention in recent years given their
deployment for real world security. Most of these systems, such as ARMOR, IRIS and …

[PDF][PDF] Security scheduling for real-world networks

M Jain, V Conitzer, M Tambe - Proceedings of the …, 2013 - teamcore.seas.harvard.edu
Network based security games, where a defender strategically places security measures on
the edges of a graph to protect against an adversary, who chooses a path through a graph is …

A cybersecurity insurance model for power system reliability considering optimal defense resource allocation

P Lau, W Wei, L Wang, Z Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the increasing application of Information and Communication Technologies (ICTs),
cyberattacks have become more prevalent against Cyber-Physical Systems (CPSs) such as …

Integrated resource allocation and strategy synthesis in safety games on graphs with deception

AN Kulkarni, MS Cohen, CA Kamhoua, J Fu - ar** an online cooperative police patrol routing strategy
H Chen, T Cheng, S Wise - Computers, Environment and Urban Systems, 2017 - Elsevier
A cooperative routing strategy for daily operations is necessary to maintain the effects of
hotspot policing and to reduce crime and disorder. Existing robot patrol routing strategies …