Game Theory for Safety and Security. Arunesh Sinha

Size: px
Start display at page:

Download "Game Theory for Safety and Security. Arunesh Sinha"

Transcription

1 Game Theory for Safety and Security Arunesh Sinha

2 Motivation: Real World Security Issues 2

3 Central Problem Allocating limited security resources against an adaptive, intelligent adversary 3

4 Prior Work Stackelberg Games have been very successful in practice 4

5 Defender-Adversary Interaction: Stackelberg Game Defender moves first laying out defense Adversary knows the defender s mixed strategy Does not know the coin flips Stackelberg Equilibrium: Optimal randomization Day: p 1 =0.75 p 2 =0.25 1,0 3,3 9,9 1,0 5

6 Outline Threat Screening Games Audit games Crime Prediction using Learning in Games 6

7 Threat Screening Games Screening for Threats 7

8 Airport Passenger Screening Problem Threat Screening Games Transport Security Administration (TSA) screens 800 million passengers Dynamics Aviation Risk Management Solution (DARMS) [with USC/CREATE and Milind Tambe] An intelligent approach to screening passengers Screening Effectiveness Timely Screening 8

9 Actors Threat Screening Games Screener (TSA) Adversary (e.g., terrorist) Benign Screenees 9

10 Current Screening Approach Two broad passengers categories TSA Pre and general Same type of screening in each category (some exceptions, e.g. children) Long queues Lot of screening time spent on benign passengers 10

11 Proposed Solution Threat Screening Games Finer categories for passengers: risk levels and flight Randomized screening Low High Risk, Domestic International X-Ray + Metal Detector X-Ray + AIT X-Ray Metal Detector 11

12 Actions of Players Threat Screening Games Defender: Allocation of screening teams to passengers Resource capacity constraints: For example, X-ray can be used only 40 times/ hour Passenger flow constraints: All passengers in all categories must be screened Adversary: Choose a passenger category to arrive in 12

13 Payoffs of Players Defender payoff: Measures the loss incurred from a successful attack Probability of attack is a function of the defender and adversary strategy Adversary payoff: Measures the gain from a successful attack Probability of attack is a function of the defender and adversary strategy 13

14 Optimization Problem Threat Screening Games Maximize defender payoff (i.e., minimize loss) Function of defender randomized strategy and adversary best response Subject to The adversary plays a best response 14

15 Technical Challenges Threat Screening Games Very large game: ~ defender actions The equilibrium computation is NP Hard Current large scale optimization approaches like Column Generation (CG) fail Invalid solution with compact representation (CR) approach 15

16 Technical Contribution Threat Screening Games We propose the Marginal Guided Algorithm (MGA) Brown, Sinha, Schlenker, Tambe; One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats [AAAI 2016] Runtime (seconds) Flights MGA CG Screener Utility Flights MGA CG 16

17 General Model for Screening Threat Screening Games 17

18 Outline Threat Screening Games Audit games Crime Prediction using Learning in Games 18

19 Privacy Concern in HealthCare Audit Games 19

20 What s Going On? Audit Games } Permissive access control regime } Trust employees to do the right thing } Malicious insiders can cause breaches 20

21 Auditing Audit Games Post-hoc inspection of employee accesses to patient health records Detect violations Punish violators Auditing is ubiquitous and effective against insider threat Financial auditing, computer security auditing 21

22 Audit Game Model Audit Games Auditors k Inspections, k n n suspicious cases Adversary 22

23 Actions of Players Audit Games Defender chooses a randomized allocation of limited resources Also, chooses a punishment level Adversary plays his best response: chooses a misdeed to commit Adversary gets punished if the misdeed is caught 23

24 Payoff of Players Defender payoff includes the loss incurred from a successful breach Probability of breach is a function of the defender and adversary strategy Defender payoff includes loss from a high punishment level (Punishment is not free) High punishment level Negative work environment -> loss for organization Immediate loss from punishment -> Suspension/Firing means loss for org. Adversary payoff includes the gain from a successful breach Probability of attack is a function of the defender and adversary strategy Adversary payoff includes the loss due to punishment when caught 24

25 Optimization Problem Audit Games Maximize defender payoff (i.e., minimize loss) Function of defender randomized strategy, punishment level and adversary best response Subject to The adversary plays a best response (non-linear) Used techniques like Second Order Cone Programs for fast computation [IJCAI 2013, AAAI 2015] 25

26 General Model for Auditing Punishment costs lead to tradeoff between deterrence and loss due to misdeed Optimal inspection allocation and punishment policy can be computed efficiently 26

27 Outline Threat Screening Games Audit games Crime Prediction using Learning in Games 27

28 A Big Problem Crime Prediction In ,857,000 crime $10,994,562,000 Urban Crime 28

29 Challenges Model behavior of criminals What is their utility? Criminals are not homogenous Crime has spatial aspects Opportunity Real world data about frequent defender-adversary interaction available 29

30 Predictive Policing Solution Crime Prediction Our contribution [AAMAS 2015, 2016] Learn crime and crime evolution in response to patrolling Then, design optimal patrols Distinct from crime predicts crime philosophy in criminology [Chen 2004; McCue 2015] Deployment: Licensed to a start-up ArmorWay; deployment in University of Southern California Accuracy EMC2 Crime predicts crime Random 30

31 The Role of Learning in Stackelberg Games Data about past interaction Learn Adversary Behavior Adversary Model Plan Optimal Defender Strategy Defender Strategy 31

32 Domain Description Crime Prediction Five patrol areas Eight hour shifts Crime data: number of crimes/shift/area Patrol data: number of officers/shift/area 32

33 Learning Model Crime Prediction Dynamic Bayesian Network (AAMAS 15) Captures interaction between officers and criminals D: Number of defenders (known) X: Number of criminals (hidden) Y: Number of crimes (known) T: Step = Shift Expectation-Maximization with intelligent factoring T T+1 33

34 Crime Prediction Input Defender Strategy Planning Search problem Search space grows exponentially with the number of steps that are planned ahead DBN (Criminal Model) DOGS algorithm (AAMAS 2015) Output Crime Number Apply Dynamic Programming in the search problem 34

35 Experimental Results Crime heat map without patrol Crime heat map with random patrol Crime heat map with optimal patrol 35

36 Data Enables Learning in Games Data about past interaction Learn Adversary Behavior Adversary Model Plan Optimal Defender Strategy Defender Strategy 36

37 Takeaway Game theory enables intelligent randomized allocation of limited security resources against an adaptive adversary 37

38 Thank You 38

Research Statement Arunesh Sinha aruneshs/

Research Statement Arunesh Sinha  aruneshs/ Research Statement Arunesh Sinha aruneshs@usc.edu http://www-bcf.usc.edu/ aruneshs/ Research Theme My research lies at the intersection of Artificial Intelligence and Security 1 and Privacy. Security and

More information

Modeling Security Decisions as Games

Modeling Security Decisions as Games Modeling Security Decisions as Games Chris Kiekintveld University of Texas at El Paso.. and MANY Collaborators Decision Making and Games Research agenda: improve and justify decisions Automated intelligent

More information

Scalable Randomized Patrolling for Securing Rapid Transit Networks

Scalable Randomized Patrolling for Securing Rapid Transit Networks Scalable Randomized Patrolling for Securing Rapid Transit Networks Pradeep Varakantham, Hoong Chuin Lau, Zhi Yuan School of Information Systems, Singapore Management University, Singapore {pradeepv,hclau,zhiyuan}@smu.edu.sg

More information

Exploring Information Asymmetry in Two-Stage Security Games

Exploring Information Asymmetry in Two-Stage Security Games Exploring Information Asymmetry in Two-Stage Security Games Haifeng Xu 1, Zinovi Rabinovich 2, Shaddin Dughmi 1, Milind Tambe 1 1 University of Southern California 2 Independent Researcher Security Games

More information

A short introduction to Security Games

A short introduction to Security Games Game Theoretic Foundations of Multiagent Systems: Algorithms and Applications A case study: Playing Games for Security A short introduction to Security Games Nicola Basilico Department of Computer Science

More information

Computational Game Theory for Security: Progress and Challenges

Computational Game Theory for Security: Progress and Challenges Computational Game Theory for Security: Progress and Challenges Milind Tambe, Albert Xin Jiang Computer Science Department University of Southern California Los Angeles, CA 90089 {tambe, jiangx}@usc.edu

More information

CPS 570: Artificial Intelligence Game Theory

CPS 570: Artificial Intelligence Game Theory CPS 570: Artificial Intelligence Game Theory Instructor: Vincent Conitzer What is game theory? Game theory studies settings where multiple parties (agents) each have different preferences (utility functions),

More information

Stochastic Game Models for Homeland Security

Stochastic Game Models for Homeland Security CREATE Research Archive Research Project Summaries 2008 Stochastic Game Models for Homeland Security Erim Kardes University of Southern California, kardes@usc.edu Follow this and additional works at: http://research.create.usc.edu/project_summaries

More information

Game Theory for Security:

Game Theory for Security: Game Theory for Security: Key Algorithmic Principles, Deployed Systems, Research Challenges Milind Tambe University of Southern California with: Current/former PhD students/postdocs: Matthew Brown, Francesco

More information

Anavilhanas Natural Reserve (about 4000 Km 2 )

Anavilhanas Natural Reserve (about 4000 Km 2 ) Anavilhanas Natural Reserve (about 4000 Km 2 ) A control room receives this alarm signal: what to do? adversarial patrolling with spatially uncertain alarm signals Nicola Basilico, Giuseppe De Nittis,

More information

Game Theoretic Analysis of Security and Sustainability

Game Theoretic Analysis of Security and Sustainability Game Theoretic Analysis of Security and Sustainability Bo An boan@ntu.edu.sg School of Computer Science and Engineering Nanyang Technological University August 22, 2017@IJCAI 17, Early Career Spotlight

More information

PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States

PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States Eric Shieh +, Bo An +, Rong Yang +, Milind Tambe +, Craig Baldwin*, Joseph DiRenzo*, Ben Maule*, Garrett Meyer* + University

More information

Intel Labs, Hillsboro, OR, June 2013 Aug 2013 Research Intern: Machine learning based detection of activity of mobile-phone users.

Intel Labs, Hillsboro, OR, June 2013 Aug 2013 Research Intern: Machine learning based detection of activity of mobile-phone users. ARUNESH SINHA University of Michigan Cell Phone: 412-420-9628 Department of Computer Science Official Email: arunesh@umich.edu 2709 Beyster, 2260 Hayward St, Alternate Email: aruneshsinha@gmail.com Ann

More information

Randomizing Regression Tests Using Game Theory

Randomizing Regression Tests Using Game Theory Randomizing Regression Tests Using Game Theory Nupul Kukreja, William G.J. Halfond, Milind Tambe University of Southern California Los Angeles, California, USA Email: {nkukreja, halfond, tambe}@usc.edu

More information

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing Chao Yan 1, Bo Li 2, Yevgeniy Vorobeychik 1,4, Aron Laszka 3, Daniel Fabbri 1,4, Bradley Malin 1,4 1 Department of Electrical

More information

Milind Tambe on game theory in security applications Machine...

Milind Tambe on game theory in security applications Machine... Milind Tambe on game theory in security applications Machine... https://intelligence.org/2014/05/30/milind-tambe/ Milind Tambe on game theory in security applications Tweet 0 Like 0 1 May 30, 2014 Luke

More information

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Introduction Intelligent security for physical infrastructures Our objective:

More information

Database Audit Workload Prioritization via Game Theory

Database Audit Workload Prioritization via Game Theory Database Audit Workload Prioritization via Game Theory CHAO YAN, Vanderbilt University, USA BO LI, University of Illinois at Urbana Champaign, USA YEVGENIY VOROBEYCHIK, Washington University in St. Louis,

More information

Technology Evolutionary Games in Complex Transportation Systems in the Face of Adaptive Adversaries

Technology Evolutionary Games in Complex Transportation Systems in the Face of Adaptive Adversaries CREATE Research Archive Non-published Research Reports 2011 Technology Evolutionary Games in Complex Transportation Systems in the Face of Adaptive Adversaries Jun Zhuang University of Buffalo, The State

More information

Surveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan

Surveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan Surveillance strategies for autonomous mobile robots Nicola Basilico Department of Computer Science University of Milan Intelligence, surveillance, and reconnaissance (ISR) with autonomous UAVs ISR defines

More information

S&T Stakeholders Conference

S&T Stakeholders Conference S&T Stakeholders Conference May 21-24, 2007 Future Attribute Screening Technology Mobile Module (FAST M 2 ) Innovation/HSARPA HIP Bob Burns Program Manager Office of Innovation/Human Factors Division Science

More information

Guidetti Translates Thesis Into Profession

Guidetti Translates Thesis Into Profession Calhoun: The NPS Institutional Archive News Center News Articles Collection 2009-11 Guidetti Translates Thesis Into Profession Center for Homeland Defense and Security Naval Postgraduate School, Monterey,

More information

Thanh H. Nguyen. Research Interests: Artificial Intelligence, Multi-Agent Systems, Game Theory, Machine Learning, Operations Research, Optimization.

Thanh H. Nguyen. Research Interests: Artificial Intelligence, Multi-Agent Systems, Game Theory, Machine Learning, Operations Research, Optimization. Thanh H. Nguyen Assistant Professor Deschutes Hall Computer & Information Sciene Eugene, OR 97403-1202 University of Oregon Phone: +1 (217) 904 5864 https://ix.cs.uoregon.edu/ thanhhng/ Email: thanhhng@cs.uoregon.edu

More information

Game Theory. Department of Electronics EL-766 Spring Hasan Mahmood

Game Theory. Department of Electronics EL-766 Spring Hasan Mahmood Game Theory Department of Electronics EL-766 Spring 2011 Hasan Mahmood Email: hasannj@yahoo.com Course Information Part I: Introduction to Game Theory Introduction to game theory, games with perfect information,

More information

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Outline Introduction to Game Theory and solution concepts Game definition

More information

Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport

Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport James Pita, Manish Jain, Janusz Marecki, Fernando Ordóñez, Christopher Portway,

More information

Alternation in the repeated Battle of the Sexes

Alternation in the repeated Battle of the Sexes Alternation in the repeated Battle of the Sexes Aaron Andalman & Charles Kemp 9.29, Spring 2004 MIT Abstract Traditional game-theoretic models consider only stage-game strategies. Alternation in the repeated

More information

S&T Stakeholders Conference

S&T Stakeholders Conference S&T Stakeholders Conference The Way Ahead: Bodies Dr. Sharla Rausch Division Director uman Factors Division Science and Technology Directorate June 2-5, 2008 PARTNERING FOR A SAFER NATION uman Factors

More information

Cognitive Radios Games: Overview and Perspectives

Cognitive Radios Games: Overview and Perspectives Cognitive Radios Games: Overview and Yezekael Hayel University of Avignon, France Supélec 06/18/07 1 / 39 Summary 1 Introduction 2 3 4 5 2 / 39 Summary Introduction Cognitive Radio Technologies Game Theory

More information

A Game Theoretic Approach on Addressing Cooperation among Human Adversaries

A Game Theoretic Approach on Addressing Cooperation among Human Adversaries A Game Theoretic Approach on Addressing Cooperation among Human Adversaries Shahrzad Gholami, Bryan Wilder, Matthew Brown, Arunesh Sinha, Nicole Sintov, Milind Tambe University of Southern California,

More information

A Game Theoretic Approach on Addressing Collusion among Human Adversaries

A Game Theoretic Approach on Addressing Collusion among Human Adversaries A Game Theoretic Approach on Addressing Collusion among Human Adversaries Shahrzad Gholami, Bryan Wilder, Matthew Brown, Arunesh Sinha, Nicole Sintov, Milind Tambe University of Southern California, USA,

More information

What Do You Expect? Concepts

What Do You Expect? Concepts Important Concepts What Do You Expect? Concepts Examples Probability A number from 0 to 1 that describes the likelihood that an event will occur. Theoretical Probability A probability obtained by analyzing

More information

Five-In-Row with Local Evaluation and Beam Search

Five-In-Row with Local Evaluation and Beam Search Five-In-Row with Local Evaluation and Beam Search Jiun-Hung Chen and Adrienne X. Wang jhchen@cs axwang@cs Abstract This report provides a brief overview of the game of five-in-row, also known as Go-Moku,

More information

Practice Session 2. HW 1 Review

Practice Session 2. HW 1 Review Practice Session 2 HW 1 Review Chapter 1 1.4 Suppose we extend Evans s Analogy program so that it can score 200 on a standard IQ test. Would we then have a program more intelligent than a human? Explain.

More information

Chapter 3 Learning in Two-Player Matrix Games

Chapter 3 Learning in Two-Player Matrix Games Chapter 3 Learning in Two-Player Matrix Games 3.1 Matrix Games In this chapter, we will examine the two-player stage game or the matrix game problem. Now, we have two players each learning how to play

More information

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Suchita S. Potdar 1, Dr. Mallikarjun M. Math 1 Department of Compute Science & Engineering, KLS, Gogte

More information

Introduction to Industrial Organization Professor: Caixia Shen Fall 2014 Lecture Note 6 Games and Strategy (ch.4)-continue

Introduction to Industrial Organization Professor: Caixia Shen Fall 2014 Lecture Note 6 Games and Strategy (ch.4)-continue Introduction to Industrial Organization Professor: Caixia Shen Fall 014 Lecture Note 6 Games and Strategy (ch.4)-continue Outline: Modeling by means of games Normal form games Dominant strategies; dominated

More information

Central Bank Intervention in Large Value Payment Systems: An experimental approach

Central Bank Intervention in Large Value Payment Systems: An experimental approach Central Bank Intervention in Large Value Payment Systems: An experimental approach Peter Heemeijer, Ronald Heijmans Simulator seminar Helsinki Finland 28-29 August 2014 Heemeijer and Heijmans 2014 (DNB,

More information

/13/$ IEEE

/13/$ IEEE A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract

More information

Stanford Center for AI Safety

Stanford Center for AI Safety Stanford Center for AI Safety Clark Barrett, David L. Dill, Mykel J. Kochenderfer, Dorsa Sadigh 1 Introduction Software-based systems play important roles in many areas of modern life, including manufacturing,

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

STEVE TARANI PROFESSIONAL EDUCATION PRESENTATION TOPICS

STEVE TARANI PROFESSIONAL EDUCATION PRESENTATION TOPICS Active Shooter Management It s now part of our reality that we must consider what to do if we were to be caught in an active shooter event. Although knowing how to run, hide or fight might be quite useful

More information

1 Game Theory and Strategic Analysis

1 Game Theory and Strategic Analysis Page 1 1 Game Theory and Strategic Analysis 11. 12. 13. 14. Static Games and Nash Equilibrium Imperfect Competition Explicit and Implicit Cooperation Strategic Commitment (a) Sequential games and backward

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Safety and Security. Pieter van Gelder. KIVI Jaarccongres 30 November 2016

Safety and Security. Pieter van Gelder. KIVI Jaarccongres 30 November 2016 Safety and Security Pieter van Gelder Professor of Safety Science and TU Safety and Security Institute KIVI Jaarccongres 30 November 2016 1/50 Outline The setting Innovations in monitoring of, and dealing

More information

Artificial Intelligence. What is AI?

Artificial Intelligence. What is AI? 2 Artificial Intelligence What is AI? Some Definitions of AI The scientific understanding of the mechanisms underlying thought and intelligent behavior and their embodiment in machines American Association

More information

Backward Induction and Stackelberg Competition

Backward Induction and Stackelberg Competition Backward Induction and Stackelberg Competition Economics 302 - Microeconomic Theory II: Strategic Behavior Shih En Lu Simon Fraser University (with thanks to Anke Kessler) ECON 302 (SFU) Backward Induction

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Advanced Techniques for Mobile Robotics Location-Based Activity Recognition

Advanced Techniques for Mobile Robotics Location-Based Activity Recognition Advanced Techniques for Mobile Robotics Location-Based Activity Recognition Wolfram Burgard, Cyrill Stachniss, Kai Arras, Maren Bennewitz Activity Recognition Based on L. Liao, D. J. Patterson, D. Fox,

More information

MIMO-aware Cooperative Cognitive Radio Networks. Hang Liu

MIMO-aware Cooperative Cognitive Radio Networks. Hang Liu MIMO-aware Cooperative Cognitive Radio Networks Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact [2] Motivation & Relevance

More information

Control of the Contract of a Public Transport Service

Control of the Contract of a Public Transport Service Control of the Contract of a Public Transport Service Andrea Lodi, Enrico Malaguti, Nicolás E. Stier-Moses Tommaso Bonino DEIS, University of Bologna Graduate School of Business, Columbia University SRM

More information

Adversarial Attacks on Face Detectors using Neural Net based Constrained Optimization

Adversarial Attacks on Face Detectors using Neural Net based Constrained Optimization Adversarial Attacks on Face Detectors using Neural Net based Constrained Optimization Joey Bose University of Toronto joey.bose@mail.utoronto.ca September 26, 2018 Joey Bose (UofT) GeekPwn Las Vegas September

More information

CSC304 Lecture 3. Game Theory (More examples, PoA, PoS) CSC304 - Nisarg Shah 1

CSC304 Lecture 3. Game Theory (More examples, PoA, PoS) CSC304 - Nisarg Shah 1 CSC304 Lecture 3 Game Theory (More examples, PoA, PoS) CSC304 - Nisarg Shah 1 Recap Normal form games Domination among strategies Weak/strict domination Hope 1: Find a weakly/strictly dominant strategy

More information

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009 MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS Justin Becker, Hao Chen UC Davis May 2009 1 Motivating example College admission Kaplan surveyed 320 admissions offices in 2008 1 in 10 admissions officers

More information

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK Outline How does one justify the use by police of surveillance technology in a liberal democracy?

More information

Arpita Biswas. Speaker. PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore

Arpita Biswas. Speaker. PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore Speaker Arpita Biswas PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore Email address: arpita.biswas@live.in OUTLINE Game Theory Basic Concepts and Results

More information

100 Year Study on AI: 1st Study Panel Report

100 Year Study on AI: 1st Study Panel Report Artificial Intelligence and Life in 2030 100 Year Study on AI: 1st Study Panel Report Prof. Peter Stone* Study Panel Chair Department of Computer Science The University of Texas at Austin *Also Cogitai,

More information

Game theory attempts to mathematically. capture behavior in strategic situations, or. games, in which an individual s success in

Game theory attempts to mathematically. capture behavior in strategic situations, or. games, in which an individual s success in Game Theory Game theory attempts to mathematically capture behavior in strategic situations, or games, in which an individual s success in making choices depends on the choices of others. A game Γ consists

More information

Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks Sneha Thankachan M.E 1, M.Jebakumari M.

Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks Sneha Thankachan M.E 1, M.Jebakumari M. Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks Sneha Thankachan M.E 1, M.Jebakumari M.E, 2 1 Department of Computer Science and Engineering, Nehru Institute

More information

Identifying Materials using Radio Frequency

Identifying Materials using Radio Frequency Identifying Materials using Radio Frequency Group Members: Cuong Trinh/ trinhcuonglouis@yahoo.com Chi Huynh/ chihuynh2005@yahoo.com Khanh Truong/ khtruong89@yahoo.com Advisor: Ray Kwok Date: December 07,

More information

Advisor: Professor Frank Y.S. Lin Present by Tim Q.T. Chen

Advisor: Professor Frank Y.S. Lin Present by Tim Q.T. Chen Advisor: Professor Frank Y.S. Lin Present by Tim Q.T. Chen 1 Introduction Game Theory Attack Graph A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy Optimal Network

More information

The extensive form representation of a game

The extensive form representation of a game The extensive form representation of a game Nodes, information sets Perfect and imperfect information Addition of random moves of nature (to model uncertainty not related with decisions of other players).

More information

Game Theory ( nd term) Dr. S. Farshad Fatemi. Graduate School of Management and Economics Sharif University of Technology.

Game Theory ( nd term) Dr. S. Farshad Fatemi. Graduate School of Management and Economics Sharif University of Technology. Game Theory 44812 (1393-94 2 nd term) Dr. S. Farshad Fatemi Graduate School of Management and Economics Sharif University of Technology Spring 2015 Dr. S. Farshad Fatemi (GSME) Game Theory Spring 2015

More information

NEXTOR Symposium November 2000 Robert Hoffman Metron, Inc.

NEXTOR Symposium November 2000 Robert Hoffman Metron, Inc. A Vision for Collaborative Routing NEXTOR Symposium November 2000 Robert Hoffman Metron, Inc. The Goal of Collaborative Routing z To Apply GDP concepts and paradigms to the management of en-route airspace

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction 1.1Motivation The past five decades have seen surprising progress in computing and communication technologies that were stimulated by the presence of cheaper, faster, more reliable

More information

Self-Organising, Open and Cooperative P2P Societies From Tags to Networks

Self-Organising, Open and Cooperative P2P Societies From Tags to Networks Self-Organising, Open and Cooperative P2P Societies From Tags to Networks David Hales www.davidhales.com Department of Computer Science University of Bologna Italy Project funded by the Future and Emerging

More information

Machine Learning and Data Mining Course Summary

Machine Learning and Data Mining Course Summary Machine Learning and Data Mining Course Summary Outline Data Mining and Society Discrimination, Privacy, and Security Hype Curve Future Directions Course Summary 2 Controversial Issues Data mining (or

More information

ECON 282 Final Practice Problems

ECON 282 Final Practice Problems ECON 282 Final Practice Problems S. Lu Multiple Choice Questions Note: The presence of these practice questions does not imply that there will be any multiple choice questions on the final exam. 1. How

More information

Dominant and Dominated Strategies

Dominant and Dominated Strategies Dominant and Dominated Strategies Carlos Hurtado Department of Economics University of Illinois at Urbana-Champaign hrtdmrt2@illinois.edu Junel 8th, 2016 C. Hurtado (UIUC - Economics) Game Theory On the

More information

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004 Secure Localization Services Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 24 badri@cs.rutgers.edu Importance of localization

More information

Game Theoretic Resistance to DoS Attacks Using Hidden Difficul

Game Theoretic Resistance to DoS Attacks Using Hidden Difficul Game Theoretic Resistance to DoS Attacks Using Hidden Difficulty Puzzles Harikrishna 1, Venkatanathan 1 and Pandu Rangan 2 1 College of Engineering Guindy, Anna University Chennai,Tamil Nadu, India 2 Indian

More information

Extensive Form Games. Mihai Manea MIT

Extensive Form Games. Mihai Manea MIT Extensive Form Games Mihai Manea MIT Extensive-Form Games N: finite set of players; nature is player 0 N tree: order of moves payoffs for every player at the terminal nodes information partition actions

More information

Copyright 2008, Yan Chen

Copyright 2008, Yan Chen Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution Non-Commercial 3.0 License. http://creativecommons.org/licenses/by-nc/3.0/ Copyright 2008, Yan

More information

Online Resource to The evolution of sanctioning institutions: an experimental approach to the social contract

Online Resource to The evolution of sanctioning institutions: an experimental approach to the social contract Online Resource to The evolution of sanctioning institutions: an experimental approach to the social contract Boyu Zhang, Cong Li, Hannelore De Silva, Peter Bednarik and Karl Sigmund * The experiment took

More information

Elements of Artificial Intelligence and Expert Systems

Elements of Artificial Intelligence and Expert Systems Elements of Artificial Intelligence and Expert Systems Master in Data Science for Economics, Business & Finance Nicola Basilico Dipartimento di Informatica Via Comelico 39/41-20135 Milano (MI) Ufficio

More information

Artificial Intelligence. Minimax and alpha-beta pruning

Artificial Intelligence. Minimax and alpha-beta pruning Artificial Intelligence Minimax and alpha-beta pruning In which we examine the problems that arise when we try to plan ahead to get the best result in a world that includes a hostile agent (other agent

More information

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant

More information

Dependable AI Systems

Dependable AI Systems Dependable AI Systems Homa Alemzadeh University of Virginia In collaboration with: Kush Varshney, IBM Research 2 Artificial Intelligence An intelligent agent or system that perceives its environment and

More information

Report to Congress regarding the Terrorism Information Awareness Program

Report to Congress regarding the Terrorism Information Awareness Program Report to Congress regarding the Terrorism Information Awareness Program In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, 111(b) Executive Summary May 20, 2003

More information

Imperfect Monitoring in Multi-agent Opportunistic Channel Access

Imperfect Monitoring in Multi-agent Opportunistic Channel Access Imperfect Monitoring in Multi-agent Opportunistic Channel Access Ji Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements

More information

TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes

TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes Wade Trappe Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Talk Overview Motivation TRIESTE overview Spectrum

More information

n-person Games in Normal Form

n-person Games in Normal Form Chapter 5 n-person Games in rmal Form 1 Fundamental Differences with 3 Players: the Spoilers Counterexamples The theorem for games like Chess does not generalize The solution theorem for 0-sum, 2-player

More information

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,

More information

Crime Prediction and Prevention using Agent-Based Modeling

Crime Prediction and Prevention using Agent-Based Modeling Crime Prediction and Prevention using Agent-Based Modeling Computational Social Science Seminar - 17.10.2016 PhD Student, Chair of Information Management Prof. Elgar Fleisch, D-MTEC Raquel Rosés Brüngger

More information

system design & management

system design & management system design & management Applying Systems-Based Methods to Challenges in Product Development, Management, and Organizational Dynamics 15+ Years Later - SDM in the Real World. Why Is This Topic Important?

More information

Social Identity Theory

Social Identity Theory Part II Social Identity Theory Henri Tajfel s social identity theory assumes that individuals strive to improve their self-image by trying to enhance their self-esteem, based on either personal identity

More information

Situational Awareness Object (SAO), A Simple, Yet Powerful Tool for Operational C2 Systems

Situational Awareness Object (SAO), A Simple, Yet Powerful Tool for Operational C2 Systems 2006 CCRTS The State of the Art and the State of the Practice Situational Awareness Object (SAO), A Simple, Yet Powerful Tool for Operational C2 Systems Cognitive Domain Issues C2 Experimentation C2 Modeling

More information

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS by Yi Song A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment

More information

FOSS in Military Computing

FOSS in Military Computing FOSS in Military Computing Life-Cycle Support for FOSS-Based Information Systems By Robert Charpentier Richard Carbone R et D pour la défense Canada Defence R&D Canada Canada FOSS Project History Overview

More information

Engineered Resilient Systems DoD Science and Technology Priority

Engineered Resilient Systems DoD Science and Technology Priority Engineered Resilient Systems DoD Science and Technology Priority Mr. Scott Lucero Deputy Director, Strategic Initiatives Office of the Deputy Assistant Secretary of Defense (Systems Engineering) Scott.Lucero@osd.mil

More information

Machine Learning in Iterated Prisoner s Dilemma using Evolutionary Algorithms

Machine Learning in Iterated Prisoner s Dilemma using Evolutionary Algorithms ITERATED PRISONER S DILEMMA 1 Machine Learning in Iterated Prisoner s Dilemma using Evolutionary Algorithms Department of Computer Science and Engineering. ITERATED PRISONER S DILEMMA 2 OUTLINE: 1. Description

More information

Executive Summary. Chapter 1. Overview of Control

Executive Summary. Chapter 1. Overview of Control Chapter 1 Executive Summary Rapid advances in computing, communications, and sensing technology offer unprecedented opportunities for the field of control to expand its contributions to the economic and

More information

Fictitious Play applied on a simplified poker game

Fictitious Play applied on a simplified poker game Fictitious Play applied on a simplified poker game Ioannis Papadopoulos June 26, 2015 Abstract This paper investigates the application of fictitious play on a simplified 2-player poker game with the goal

More information

1\2 L m R M 2, 2 1, 1 0, 0 B 1, 0 0, 0 1, 1

1\2 L m R M 2, 2 1, 1 0, 0 B 1, 0 0, 0 1, 1 Chapter 1 Introduction Game Theory is a misnomer for Multiperson Decision Theory. It develops tools, methods, and language that allow a coherent analysis of the decision-making processes when there are

More information

An Introduction to Poker Opponent Modeling

An Introduction to Poker Opponent Modeling An Introduction to Poker Opponent Modeling Peter Chapman Brielin Brown University of Virginia 1 March 2011 It is not my aim to surprise or shock you-but the simplest way I can summarize is to say that

More information

This one-day event is open to all licensed. law-enforcement professionals, specialty investigators and criminal justice students.

This one-day event is open to all licensed. law-enforcement professionals, specialty investigators and criminal justice students. 2015 IAPI Professional Investigators Conference Informative and relevant topics for professional investigators The Professional Investigators (IAPI) cordially invites you to our annual training and education

More information

Chapter 1 The Field of Computing. Slides Modified by Vicky Seno

Chapter 1 The Field of Computing. Slides Modified by Vicky Seno Chapter 1 The Field of Computing Slides Modified by Vicky Seno Outline Computing is a natural science The five disciplines of computing Related fields Careers in computing Myths about computing Resources

More information

Texas Hold em Inference Bot Proposal. By: Brian Mihok & Michael Terry Date Due: Monday, April 11, 2005

Texas Hold em Inference Bot Proposal. By: Brian Mihok & Michael Terry Date Due: Monday, April 11, 2005 Texas Hold em Inference Bot Proposal By: Brian Mihok & Michael Terry Date Due: Monday, April 11, 2005 1 Introduction One of the key goals in Artificial Intelligence is to create cognitive systems that

More information

CSCI 699: Topics in Learning and Game Theory Fall 2017 Lecture 3: Intro to Game Theory. Instructor: Shaddin Dughmi

CSCI 699: Topics in Learning and Game Theory Fall 2017 Lecture 3: Intro to Game Theory. Instructor: Shaddin Dughmi CSCI 699: Topics in Learning and Game Theory Fall 217 Lecture 3: Intro to Game Theory Instructor: Shaddin Dughmi Outline 1 Introduction 2 Games of Complete Information 3 Games of Incomplete Information

More information

Complex DNA and Good Genes for Snakes

Complex DNA and Good Genes for Snakes 458 Int'l Conf. Artificial Intelligence ICAI'15 Complex DNA and Good Genes for Snakes Md. Shahnawaz Khan 1 and Walter D. Potter 2 1,2 Institute of Artificial Intelligence, University of Georgia, Athens,

More information