Dynamic games in cyber-physical security: An overview

SR Etesami, T Başar - Dynamic Games and Applications, 2019 - Springer
Due to complex dependencies between multiple layers and components of emerging cyber-
physical systems, security and vulnerability of such systems have become a major challenge …

Deploying paws: Field optimization of the protection assistant for wildlife security

F Fang, T Nguyen, R Pickles, W Lam… - Proceedings of the …, 2016 - ojs.aaai.org
Poaching is a serious threat to the conservation of key species and whole ecosystems.
While conducting foot patrols is the most commonly used approach in many countries to …

PAWS—A deployed game-theoretic application to combat poaching

F Fang, TH Nguyen, R Pickles, WY Lam, GR Clements… - AI Magazine, 2017 - ojs.aaai.org
Poaching is considered a major driver for the population drop of key species such as tigers,
elephants, and rhinos, which can be detrimental to whole ecosystems. While conducting foot …

Stackelberg security games (ssg) basics and application overview

B An, M Tambe, A Sinha - Improving Homeland Security …, 2017 - books.google.com
Security is a critical concern around the world that arises in protecting our ports, airports,
transportation or other critical national infrastructure, curtailing the illegal flow of drugs …

Imitative follower deception in stackelberg games

J Gan, H Xu, Q Guo, L Tran-Thanh… - Proceedings of the …, 2019 - dl.acm.org
Information uncertainty is one of the major challenges facing applications of game theory. In
the context of Stackelberg games, various approaches have been proposed to deal with the …

Coevolutionary Algorithm for Building Robust Decision Trees under Minimax Regret

A Żychowski, A Perrault, J Mańdziuk - Proceedings of the AAAI …, 2024 - ojs.aaai.org
In recent years, there has been growing interest in develo** robust machine learning (ML)
models that can withstand adversarial attacks, including one of the most widely adopted …

Cyber camouflage games for strategic deception

O Thakoor, M Tambe, P Vayanos, H Xu… - Decision and Game …, 2019 - Springer
The rapid increase in cybercrime, causing a reported annual economic loss of $600 billion
(Lewis 2018), has prompted a critical need for effective cyber defense. Strategic criminals …

Robust Stackelberg equilibria in extensive-form games and extension to limited lookahead

C Kroer, G Farina, T Sandholm - … of the AAAI Conference on Artificial …, 2018 - ojs.aaai.org
Stackelberg equilibria have become increasingly important as a solution concept in
computational game theory, largely inspired by practical problems such as security settings …

Making the most of our regrets: Regret-based solutions to handle payoff uncertainty and elicitation in green security games

TH Nguyen, FMD Fave, D Kar… - Decision and Game …, 2015 - Springer
Abstract Recent research on Green Security Games (GSG), ie, security games for the
protection of wildlife, forest and fisheries, relies on the promise of an abundance of available …

Workload factoring and resource sharing via joint vertical and horizontal cloud federation networks

H Chen, B An, D Niyato, YC Soh… - IEEE Journal on …, 2017 - ieeexplore.ieee.org
In cloud computing, a private (secondary) cloud can: 1) outsource workload to public
(primary) clouds via vertical federation or 2) share resources with other secondary clouds …