[HTML][HTML] A survey on mixed-integer programming techniques in bilevel optimization

T Kleinert, M Labbé, I Ljubić, M Schmidt - EURO Journal on Computational …, 2021 - Elsevier
Bilevel optimization is a field of mathematical programming in which some variables are
constrained to be the solution of another optimization problem. As a consequence, bilevel …

Review of major approaches to analyze vulnerability in power system

A Abedi, L Gaudard, F Romerio - Reliability Engineering & System Safety, 2019 - Elsevier
The failure of a power system as a critical infrastructure causes considerable damage to
society. Hence, the vulnerabilities of such facilities should be minimized to cope with several …

Open problems in cooperative ai

A Dafoe, E Hughes, Y Bachrach, T Collins… - arxiv preprint arxiv …, 2020 - arxiv.org
Problems of cooperation--in which agents seek ways to jointly improve their welfare--are
ubiquitous and important. They can be found at scales ranging from our daily routines--such …

Strategic classification

M Hardt, N Megiddo, C Papadimitriou… - Proceedings of the 2016 …, 2016 - dl.acm.org
Machine learning relies on the assumption that unseen test instances of a classification
problem follow the same distribution as observed training data. However, this principle can …

Stackelberg security games: Looking beyond a decade of success

A Sinha, F Fang, B An, C Kiekintveld, M Tambe - 2018 - ink.library.smu.edu.sg
Abstract The Stackelberg Security Game (SSG) model has been immensely influential in
security research since it was introduced roughly a decade ago. Furthermore, deployed SSG …

[HTML][HTML] Decision support approaches for cyber security investment

A Fielder, E Panaousis, P Malacaria, C Hankin… - Decision support …, 2016 - Elsevier
When investing in cyber security resources, information security managers have to follow
effective decision-making strategies. We refer to this as the cyber security investment …

Protecting location privacy: optimal strategy against localization attacks

R Shokri, G Theodorakopoulos, C Troncoso… - Proceedings of the …, 2012 - dl.acm.org
The mainstream approach to protecting the location-privacy of mobile users in location-
based services (LBSs) is to alter the users' actual locations in order to reduce the location …

Sample-efficient learning of stackelberg equilibria in general-sum games

Y Bai, C **, H Wang, C **ong - Advances in Neural …, 2021 - proceedings.neurips.cc
Real world applications such as economics and policy making often involve solving multi-
agent games with two unique features:(1) The agents are inherently asymmetric and …

False data injection attacks on networked control systems: A Stackelberg game analysis

Y Li, D Shi, T Chen - IEEE Transactions on Automatic Control, 2018 - ieeexplore.ieee.org
In this paper, a security problem in networked control systems (NCS) is studied. In a
standard linear quadratic Gaussian (LQG) control scenario in NCS, a so-called false data …

A review of attacker-defender games: Current state and paths forward

K Hunt, J Zhuang - European Journal of Operational Research, 2024 - Elsevier
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …