Game Theory for Safety and Security. Arunesh Sinha
|
|
- Jared Sherman
- 5 years ago
- Views:
Transcription
1 Game Theory for Safety and Security Arunesh Sinha
2 Motivation: Real World Security Issues 2
3 Central Problem Allocating limited security resources against an adaptive, intelligent adversary 3
4 Prior Work Stackelberg Games have been very successful in practice 4
5 Defender-Adversary Interaction: Stackelberg Game Defender moves first laying out defense Adversary knows the defender s mixed strategy Does not know the coin flips Stackelberg Equilibrium: Optimal randomization Day: p 1 =0.75 p 2 =0.25 1,0 3,3 9,9 1,0 5
6 Outline Threat Screening Games Audit games Crime Prediction using Learning in Games 6
7 Threat Screening Games Screening for Threats 7
8 Airport Passenger Screening Problem Threat Screening Games Transport Security Administration (TSA) screens 800 million passengers Dynamics Aviation Risk Management Solution (DARMS) [with USC/CREATE and Milind Tambe] An intelligent approach to screening passengers Screening Effectiveness Timely Screening 8
9 Actors Threat Screening Games Screener (TSA) Adversary (e.g., terrorist) Benign Screenees 9
10 Current Screening Approach Two broad passengers categories TSA Pre and general Same type of screening in each category (some exceptions, e.g. children) Long queues Lot of screening time spent on benign passengers 10
11 Proposed Solution Threat Screening Games Finer categories for passengers: risk levels and flight Randomized screening Low High Risk, Domestic International X-Ray + Metal Detector X-Ray + AIT X-Ray Metal Detector 11
12 Actions of Players Threat Screening Games Defender: Allocation of screening teams to passengers Resource capacity constraints: For example, X-ray can be used only 40 times/ hour Passenger flow constraints: All passengers in all categories must be screened Adversary: Choose a passenger category to arrive in 12
13 Payoffs of Players Defender payoff: Measures the loss incurred from a successful attack Probability of attack is a function of the defender and adversary strategy Adversary payoff: Measures the gain from a successful attack Probability of attack is a function of the defender and adversary strategy 13
14 Optimization Problem Threat Screening Games Maximize defender payoff (i.e., minimize loss) Function of defender randomized strategy and adversary best response Subject to The adversary plays a best response 14
15 Technical Challenges Threat Screening Games Very large game: ~ defender actions The equilibrium computation is NP Hard Current large scale optimization approaches like Column Generation (CG) fail Invalid solution with compact representation (CR) approach 15
16 Technical Contribution Threat Screening Games We propose the Marginal Guided Algorithm (MGA) Brown, Sinha, Schlenker, Tambe; One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats [AAAI 2016] Runtime (seconds) Flights MGA CG Screener Utility Flights MGA CG 16
17 General Model for Screening Threat Screening Games 17
18 Outline Threat Screening Games Audit games Crime Prediction using Learning in Games 18
19 Privacy Concern in HealthCare Audit Games 19
20 What s Going On? Audit Games } Permissive access control regime } Trust employees to do the right thing } Malicious insiders can cause breaches 20
21 Auditing Audit Games Post-hoc inspection of employee accesses to patient health records Detect violations Punish violators Auditing is ubiquitous and effective against insider threat Financial auditing, computer security auditing 21
22 Audit Game Model Audit Games Auditors k Inspections, k n n suspicious cases Adversary 22
23 Actions of Players Audit Games Defender chooses a randomized allocation of limited resources Also, chooses a punishment level Adversary plays his best response: chooses a misdeed to commit Adversary gets punished if the misdeed is caught 23
24 Payoff of Players Defender payoff includes the loss incurred from a successful breach Probability of breach is a function of the defender and adversary strategy Defender payoff includes loss from a high punishment level (Punishment is not free) High punishment level Negative work environment -> loss for organization Immediate loss from punishment -> Suspension/Firing means loss for org. Adversary payoff includes the gain from a successful breach Probability of attack is a function of the defender and adversary strategy Adversary payoff includes the loss due to punishment when caught 24
25 Optimization Problem Audit Games Maximize defender payoff (i.e., minimize loss) Function of defender randomized strategy, punishment level and adversary best response Subject to The adversary plays a best response (non-linear) Used techniques like Second Order Cone Programs for fast computation [IJCAI 2013, AAAI 2015] 25
26 General Model for Auditing Punishment costs lead to tradeoff between deterrence and loss due to misdeed Optimal inspection allocation and punishment policy can be computed efficiently 26
27 Outline Threat Screening Games Audit games Crime Prediction using Learning in Games 27
28 A Big Problem Crime Prediction In ,857,000 crime $10,994,562,000 Urban Crime 28
29 Challenges Model behavior of criminals What is their utility? Criminals are not homogenous Crime has spatial aspects Opportunity Real world data about frequent defender-adversary interaction available 29
30 Predictive Policing Solution Crime Prediction Our contribution [AAMAS 2015, 2016] Learn crime and crime evolution in response to patrolling Then, design optimal patrols Distinct from crime predicts crime philosophy in criminology [Chen 2004; McCue 2015] Deployment: Licensed to a start-up ArmorWay; deployment in University of Southern California Accuracy EMC2 Crime predicts crime Random 30
31 The Role of Learning in Stackelberg Games Data about past interaction Learn Adversary Behavior Adversary Model Plan Optimal Defender Strategy Defender Strategy 31
32 Domain Description Crime Prediction Five patrol areas Eight hour shifts Crime data: number of crimes/shift/area Patrol data: number of officers/shift/area 32
33 Learning Model Crime Prediction Dynamic Bayesian Network (AAMAS 15) Captures interaction between officers and criminals D: Number of defenders (known) X: Number of criminals (hidden) Y: Number of crimes (known) T: Step = Shift Expectation-Maximization with intelligent factoring T T+1 33
34 Crime Prediction Input Defender Strategy Planning Search problem Search space grows exponentially with the number of steps that are planned ahead DBN (Criminal Model) DOGS algorithm (AAMAS 2015) Output Crime Number Apply Dynamic Programming in the search problem 34
35 Experimental Results Crime heat map without patrol Crime heat map with random patrol Crime heat map with optimal patrol 35
36 Data Enables Learning in Games Data about past interaction Learn Adversary Behavior Adversary Model Plan Optimal Defender Strategy Defender Strategy 36
37 Takeaway Game theory enables intelligent randomized allocation of limited security resources against an adaptive adversary 37
38 Thank You 38
Research Statement Arunesh Sinha aruneshs/
Research Statement Arunesh Sinha aruneshs@usc.edu http://www-bcf.usc.edu/ aruneshs/ Research Theme My research lies at the intersection of Artificial Intelligence and Security 1 and Privacy. Security and
More informationModeling Security Decisions as Games
Modeling Security Decisions as Games Chris Kiekintveld University of Texas at El Paso.. and MANY Collaborators Decision Making and Games Research agenda: improve and justify decisions Automated intelligent
More informationScalable Randomized Patrolling for Securing Rapid Transit Networks
Scalable Randomized Patrolling for Securing Rapid Transit Networks Pradeep Varakantham, Hoong Chuin Lau, Zhi Yuan School of Information Systems, Singapore Management University, Singapore {pradeepv,hclau,zhiyuan}@smu.edu.sg
More informationExploring Information Asymmetry in Two-Stage Security Games
Exploring Information Asymmetry in Two-Stage Security Games Haifeng Xu 1, Zinovi Rabinovich 2, Shaddin Dughmi 1, Milind Tambe 1 1 University of Southern California 2 Independent Researcher Security Games
More informationA short introduction to Security Games
Game Theoretic Foundations of Multiagent Systems: Algorithms and Applications A case study: Playing Games for Security A short introduction to Security Games Nicola Basilico Department of Computer Science
More informationComputational Game Theory for Security: Progress and Challenges
Computational Game Theory for Security: Progress and Challenges Milind Tambe, Albert Xin Jiang Computer Science Department University of Southern California Los Angeles, CA 90089 {tambe, jiangx}@usc.edu
More informationCPS 570: Artificial Intelligence Game Theory
CPS 570: Artificial Intelligence Game Theory Instructor: Vincent Conitzer What is game theory? Game theory studies settings where multiple parties (agents) each have different preferences (utility functions),
More informationStochastic Game Models for Homeland Security
CREATE Research Archive Research Project Summaries 2008 Stochastic Game Models for Homeland Security Erim Kardes University of Southern California, kardes@usc.edu Follow this and additional works at: http://research.create.usc.edu/project_summaries
More informationGame Theory for Security:
Game Theory for Security: Key Algorithmic Principles, Deployed Systems, Research Challenges Milind Tambe University of Southern California with: Current/former PhD students/postdocs: Matthew Brown, Francesco
More informationAnavilhanas Natural Reserve (about 4000 Km 2 )
Anavilhanas Natural Reserve (about 4000 Km 2 ) A control room receives this alarm signal: what to do? adversarial patrolling with spatially uncertain alarm signals Nicola Basilico, Giuseppe De Nittis,
More informationGame Theoretic Analysis of Security and Sustainability
Game Theoretic Analysis of Security and Sustainability Bo An boan@ntu.edu.sg School of Computer Science and Engineering Nanyang Technological University August 22, 2017@IJCAI 17, Early Career Spotlight
More informationPROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States
PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States Eric Shieh +, Bo An +, Rong Yang +, Milind Tambe +, Craig Baldwin*, Joseph DiRenzo*, Ben Maule*, Garrett Meyer* + University
More informationIntel Labs, Hillsboro, OR, June 2013 Aug 2013 Research Intern: Machine learning based detection of activity of mobile-phone users.
ARUNESH SINHA University of Michigan Cell Phone: 412-420-9628 Department of Computer Science Official Email: arunesh@umich.edu 2709 Beyster, 2260 Hayward St, Alternate Email: aruneshsinha@gmail.com Ann
More informationRandomizing Regression Tests Using Game Theory
Randomizing Regression Tests Using Game Theory Nupul Kukreja, William G.J. Halfond, Milind Tambe University of Southern California Los Angeles, California, USA Email: {nkukreja, halfond, tambe}@usc.edu
More informationGet Your Workload in Order: Game Theoretic Prioritization of Database Auditing
Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing Chao Yan 1, Bo Li 2, Yevgeniy Vorobeychik 1,4, Aron Laszka 3, Daniel Fabbri 1,4, Bradley Malin 1,4 1 Department of Electrical
More informationMilind Tambe on game theory in security applications Machine...
Milind Tambe on game theory in security applications Machine... https://intelligence.org/2014/05/30/milind-tambe/ Milind Tambe on game theory in security applications Tweet 0 Like 0 1 May 30, 2014 Luke
More informationDesign of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan
Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Introduction Intelligent security for physical infrastructures Our objective:
More informationDatabase Audit Workload Prioritization via Game Theory
Database Audit Workload Prioritization via Game Theory CHAO YAN, Vanderbilt University, USA BO LI, University of Illinois at Urbana Champaign, USA YEVGENIY VOROBEYCHIK, Washington University in St. Louis,
More informationTechnology Evolutionary Games in Complex Transportation Systems in the Face of Adaptive Adversaries
CREATE Research Archive Non-published Research Reports 2011 Technology Evolutionary Games in Complex Transportation Systems in the Face of Adaptive Adversaries Jun Zhuang University of Buffalo, The State
More informationSurveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan
Surveillance strategies for autonomous mobile robots Nicola Basilico Department of Computer Science University of Milan Intelligence, surveillance, and reconnaissance (ISR) with autonomous UAVs ISR defines
More informationS&T Stakeholders Conference
S&T Stakeholders Conference May 21-24, 2007 Future Attribute Screening Technology Mobile Module (FAST M 2 ) Innovation/HSARPA HIP Bob Burns Program Manager Office of Innovation/Human Factors Division Science
More informationGuidetti Translates Thesis Into Profession
Calhoun: The NPS Institutional Archive News Center News Articles Collection 2009-11 Guidetti Translates Thesis Into Profession Center for Homeland Defense and Security Naval Postgraduate School, Monterey,
More informationThanh H. Nguyen. Research Interests: Artificial Intelligence, Multi-Agent Systems, Game Theory, Machine Learning, Operations Research, Optimization.
Thanh H. Nguyen Assistant Professor Deschutes Hall Computer & Information Sciene Eugene, OR 97403-1202 University of Oregon Phone: +1 (217) 904 5864 https://ix.cs.uoregon.edu/ thanhhng/ Email: thanhhng@cs.uoregon.edu
More informationGame Theory. Department of Electronics EL-766 Spring Hasan Mahmood
Game Theory Department of Electronics EL-766 Spring 2011 Hasan Mahmood Email: hasannj@yahoo.com Course Information Part I: Introduction to Game Theory Introduction to game theory, games with perfect information,
More informationDesign of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan
Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Outline Introduction to Game Theory and solution concepts Game definition
More informationDeployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport
Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport James Pita, Manish Jain, Janusz Marecki, Fernando Ordóñez, Christopher Portway,
More informationAlternation in the repeated Battle of the Sexes
Alternation in the repeated Battle of the Sexes Aaron Andalman & Charles Kemp 9.29, Spring 2004 MIT Abstract Traditional game-theoretic models consider only stage-game strategies. Alternation in the repeated
More informationS&T Stakeholders Conference
S&T Stakeholders Conference The Way Ahead: Bodies Dr. Sharla Rausch Division Director uman Factors Division Science and Technology Directorate June 2-5, 2008 PARTNERING FOR A SAFER NATION uman Factors
More informationCognitive Radios Games: Overview and Perspectives
Cognitive Radios Games: Overview and Yezekael Hayel University of Avignon, France Supélec 06/18/07 1 / 39 Summary 1 Introduction 2 3 4 5 2 / 39 Summary Introduction Cognitive Radio Technologies Game Theory
More informationA Game Theoretic Approach on Addressing Cooperation among Human Adversaries
A Game Theoretic Approach on Addressing Cooperation among Human Adversaries Shahrzad Gholami, Bryan Wilder, Matthew Brown, Arunesh Sinha, Nicole Sintov, Milind Tambe University of Southern California,
More informationA Game Theoretic Approach on Addressing Collusion among Human Adversaries
A Game Theoretic Approach on Addressing Collusion among Human Adversaries Shahrzad Gholami, Bryan Wilder, Matthew Brown, Arunesh Sinha, Nicole Sintov, Milind Tambe University of Southern California, USA,
More informationWhat Do You Expect? Concepts
Important Concepts What Do You Expect? Concepts Examples Probability A number from 0 to 1 that describes the likelihood that an event will occur. Theoretical Probability A probability obtained by analyzing
More informationFive-In-Row with Local Evaluation and Beam Search
Five-In-Row with Local Evaluation and Beam Search Jiun-Hung Chen and Adrienne X. Wang jhchen@cs axwang@cs Abstract This report provides a brief overview of the game of five-in-row, also known as Go-Moku,
More informationPractice Session 2. HW 1 Review
Practice Session 2 HW 1 Review Chapter 1 1.4 Suppose we extend Evans s Analogy program so that it can score 200 on a standard IQ test. Would we then have a program more intelligent than a human? Explain.
More informationChapter 3 Learning in Two-Player Matrix Games
Chapter 3 Learning in Two-Player Matrix Games 3.1 Matrix Games In this chapter, we will examine the two-player stage game or the matrix game problem. Now, we have two players each learning how to play
More informationSelfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory
Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Suchita S. Potdar 1, Dr. Mallikarjun M. Math 1 Department of Compute Science & Engineering, KLS, Gogte
More informationIntroduction to Industrial Organization Professor: Caixia Shen Fall 2014 Lecture Note 6 Games and Strategy (ch.4)-continue
Introduction to Industrial Organization Professor: Caixia Shen Fall 014 Lecture Note 6 Games and Strategy (ch.4)-continue Outline: Modeling by means of games Normal form games Dominant strategies; dominated
More informationCentral Bank Intervention in Large Value Payment Systems: An experimental approach
Central Bank Intervention in Large Value Payment Systems: An experimental approach Peter Heemeijer, Ronald Heijmans Simulator seminar Helsinki Finland 28-29 August 2014 Heemeijer and Heijmans 2014 (DNB,
More information/13/$ IEEE
A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract
More informationStanford Center for AI Safety
Stanford Center for AI Safety Clark Barrett, David L. Dill, Mykel J. Kochenderfer, Dorsa Sadigh 1 Introduction Software-based systems play important roles in many areas of modern life, including manufacturing,
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More informationSTEVE TARANI PROFESSIONAL EDUCATION PRESENTATION TOPICS
Active Shooter Management It s now part of our reality that we must consider what to do if we were to be caught in an active shooter event. Although knowing how to run, hide or fight might be quite useful
More information1 Game Theory and Strategic Analysis
Page 1 1 Game Theory and Strategic Analysis 11. 12. 13. 14. Static Games and Nash Equilibrium Imperfect Competition Explicit and Implicit Cooperation Strategic Commitment (a) Sequential games and backward
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like
More informationSafety and Security. Pieter van Gelder. KIVI Jaarccongres 30 November 2016
Safety and Security Pieter van Gelder Professor of Safety Science and TU Safety and Security Institute KIVI Jaarccongres 30 November 2016 1/50 Outline The setting Innovations in monitoring of, and dealing
More informationArtificial Intelligence. What is AI?
2 Artificial Intelligence What is AI? Some Definitions of AI The scientific understanding of the mechanisms underlying thought and intelligent behavior and their embodiment in machines American Association
More informationBackward Induction and Stackelberg Competition
Backward Induction and Stackelberg Competition Economics 302 - Microeconomic Theory II: Strategic Behavior Shih En Lu Simon Fraser University (with thanks to Anke Kessler) ECON 302 (SFU) Backward Induction
More informationGame Theory and Randomized Algorithms
Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international
More informationAdvanced Techniques for Mobile Robotics Location-Based Activity Recognition
Advanced Techniques for Mobile Robotics Location-Based Activity Recognition Wolfram Burgard, Cyrill Stachniss, Kai Arras, Maren Bennewitz Activity Recognition Based on L. Liao, D. J. Patterson, D. Fox,
More informationMIMO-aware Cooperative Cognitive Radio Networks. Hang Liu
MIMO-aware Cooperative Cognitive Radio Networks Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact [2] Motivation & Relevance
More informationControl of the Contract of a Public Transport Service
Control of the Contract of a Public Transport Service Andrea Lodi, Enrico Malaguti, Nicolás E. Stier-Moses Tommaso Bonino DEIS, University of Bologna Graduate School of Business, Columbia University SRM
More informationAdversarial Attacks on Face Detectors using Neural Net based Constrained Optimization
Adversarial Attacks on Face Detectors using Neural Net based Constrained Optimization Joey Bose University of Toronto joey.bose@mail.utoronto.ca September 26, 2018 Joey Bose (UofT) GeekPwn Las Vegas September
More informationCSC304 Lecture 3. Game Theory (More examples, PoA, PoS) CSC304 - Nisarg Shah 1
CSC304 Lecture 3 Game Theory (More examples, PoA, PoS) CSC304 - Nisarg Shah 1 Recap Normal form games Domination among strategies Weak/strict domination Hope 1: Find a weakly/strictly dominant strategy
More informationMEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009
MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS Justin Becker, Hao Chen UC Davis May 2009 1 Motivating example College admission Kaplan surveyed 320 admissions offices in 2008 1 in 10 admissions officers
More informationSurveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK
Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK Outline How does one justify the use by police of surveillance technology in a liberal democracy?
More informationArpita Biswas. Speaker. PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore
Speaker Arpita Biswas PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore Email address: arpita.biswas@live.in OUTLINE Game Theory Basic Concepts and Results
More information100 Year Study on AI: 1st Study Panel Report
Artificial Intelligence and Life in 2030 100 Year Study on AI: 1st Study Panel Report Prof. Peter Stone* Study Panel Chair Department of Computer Science The University of Texas at Austin *Also Cogitai,
More informationGame theory attempts to mathematically. capture behavior in strategic situations, or. games, in which an individual s success in
Game Theory Game theory attempts to mathematically capture behavior in strategic situations, or games, in which an individual s success in making choices depends on the choices of others. A game Γ consists
More informationEnhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks Sneha Thankachan M.E 1, M.Jebakumari M.
Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks Sneha Thankachan M.E 1, M.Jebakumari M.E, 2 1 Department of Computer Science and Engineering, Nehru Institute
More informationIdentifying Materials using Radio Frequency
Identifying Materials using Radio Frequency Group Members: Cuong Trinh/ trinhcuonglouis@yahoo.com Chi Huynh/ chihuynh2005@yahoo.com Khanh Truong/ khtruong89@yahoo.com Advisor: Ray Kwok Date: December 07,
More informationAdvisor: Professor Frank Y.S. Lin Present by Tim Q.T. Chen
Advisor: Professor Frank Y.S. Lin Present by Tim Q.T. Chen 1 Introduction Game Theory Attack Graph A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy Optimal Network
More informationThe extensive form representation of a game
The extensive form representation of a game Nodes, information sets Perfect and imperfect information Addition of random moves of nature (to model uncertainty not related with decisions of other players).
More informationGame Theory ( nd term) Dr. S. Farshad Fatemi. Graduate School of Management and Economics Sharif University of Technology.
Game Theory 44812 (1393-94 2 nd term) Dr. S. Farshad Fatemi Graduate School of Management and Economics Sharif University of Technology Spring 2015 Dr. S. Farshad Fatemi (GSME) Game Theory Spring 2015
More informationNEXTOR Symposium November 2000 Robert Hoffman Metron, Inc.
A Vision for Collaborative Routing NEXTOR Symposium November 2000 Robert Hoffman Metron, Inc. The Goal of Collaborative Routing z To Apply GDP concepts and paradigms to the management of en-route airspace
More informationChapter 1 Introduction
Chapter 1 Introduction 1.1Motivation The past five decades have seen surprising progress in computing and communication technologies that were stimulated by the presence of cheaper, faster, more reliable
More informationSelf-Organising, Open and Cooperative P2P Societies From Tags to Networks
Self-Organising, Open and Cooperative P2P Societies From Tags to Networks David Hales www.davidhales.com Department of Computer Science University of Bologna Italy Project funded by the Future and Emerging
More informationMachine Learning and Data Mining Course Summary
Machine Learning and Data Mining Course Summary Outline Data Mining and Society Discrimination, Privacy, and Security Hype Curve Future Directions Course Summary 2 Controversial Issues Data mining (or
More informationECON 282 Final Practice Problems
ECON 282 Final Practice Problems S. Lu Multiple Choice Questions Note: The presence of these practice questions does not imply that there will be any multiple choice questions on the final exam. 1. How
More informationDominant and Dominated Strategies
Dominant and Dominated Strategies Carlos Hurtado Department of Economics University of Illinois at Urbana-Champaign hrtdmrt2@illinois.edu Junel 8th, 2016 C. Hurtado (UIUC - Economics) Game Theory On the
More informationBadri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004
Secure Localization Services Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 24 badri@cs.rutgers.edu Importance of localization
More informationGame Theoretic Resistance to DoS Attacks Using Hidden Difficul
Game Theoretic Resistance to DoS Attacks Using Hidden Difficulty Puzzles Harikrishna 1, Venkatanathan 1 and Pandu Rangan 2 1 College of Engineering Guindy, Anna University Chennai,Tamil Nadu, India 2 Indian
More informationExtensive Form Games. Mihai Manea MIT
Extensive Form Games Mihai Manea MIT Extensive-Form Games N: finite set of players; nature is player 0 N tree: order of moves payoffs for every player at the terminal nodes information partition actions
More informationCopyright 2008, Yan Chen
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution Non-Commercial 3.0 License. http://creativecommons.org/licenses/by-nc/3.0/ Copyright 2008, Yan
More informationOnline Resource to The evolution of sanctioning institutions: an experimental approach to the social contract
Online Resource to The evolution of sanctioning institutions: an experimental approach to the social contract Boyu Zhang, Cong Li, Hannelore De Silva, Peter Bednarik and Karl Sigmund * The experiment took
More informationElements of Artificial Intelligence and Expert Systems
Elements of Artificial Intelligence and Expert Systems Master in Data Science for Economics, Business & Finance Nicola Basilico Dipartimento di Informatica Via Comelico 39/41-20135 Milano (MI) Ufficio
More informationArtificial Intelligence. Minimax and alpha-beta pruning
Artificial Intelligence Minimax and alpha-beta pruning In which we examine the problems that arise when we try to plan ahead to get the best result in a world that includes a hostile agent (other agent
More informationMohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2
AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant
More informationDependable AI Systems
Dependable AI Systems Homa Alemzadeh University of Virginia In collaboration with: Kush Varshney, IBM Research 2 Artificial Intelligence An intelligent agent or system that perceives its environment and
More informationReport to Congress regarding the Terrorism Information Awareness Program
Report to Congress regarding the Terrorism Information Awareness Program In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, 111(b) Executive Summary May 20, 2003
More informationImperfect Monitoring in Multi-agent Opportunistic Channel Access
Imperfect Monitoring in Multi-agent Opportunistic Channel Access Ji Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements
More informationTRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes
TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes Wade Trappe Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Talk Overview Motivation TRIESTE overview Spectrum
More informationn-person Games in Normal Form
Chapter 5 n-person Games in rmal Form 1 Fundamental Differences with 3 Players: the Spoilers Counterexamples The theorem for games like Chess does not generalize The solution theorem for 0-sum, 2-player
More informationHedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,
More informationCrime Prediction and Prevention using Agent-Based Modeling
Crime Prediction and Prevention using Agent-Based Modeling Computational Social Science Seminar - 17.10.2016 PhD Student, Chair of Information Management Prof. Elgar Fleisch, D-MTEC Raquel Rosés Brüngger
More informationsystem design & management
system design & management Applying Systems-Based Methods to Challenges in Product Development, Management, and Organizational Dynamics 15+ Years Later - SDM in the Real World. Why Is This Topic Important?
More informationSocial Identity Theory
Part II Social Identity Theory Henri Tajfel s social identity theory assumes that individuals strive to improve their self-image by trying to enhance their self-esteem, based on either personal identity
More informationSituational Awareness Object (SAO), A Simple, Yet Powerful Tool for Operational C2 Systems
2006 CCRTS The State of the Art and the State of the Practice Situational Awareness Object (SAO), A Simple, Yet Powerful Tool for Operational C2 Systems Cognitive Domain Issues C2 Experimentation C2 Modeling
More informationDISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song
DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS by Yi Song A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment
More informationFOSS in Military Computing
FOSS in Military Computing Life-Cycle Support for FOSS-Based Information Systems By Robert Charpentier Richard Carbone R et D pour la défense Canada Defence R&D Canada Canada FOSS Project History Overview
More informationEngineered Resilient Systems DoD Science and Technology Priority
Engineered Resilient Systems DoD Science and Technology Priority Mr. Scott Lucero Deputy Director, Strategic Initiatives Office of the Deputy Assistant Secretary of Defense (Systems Engineering) Scott.Lucero@osd.mil
More informationMachine Learning in Iterated Prisoner s Dilemma using Evolutionary Algorithms
ITERATED PRISONER S DILEMMA 1 Machine Learning in Iterated Prisoner s Dilemma using Evolutionary Algorithms Department of Computer Science and Engineering. ITERATED PRISONER S DILEMMA 2 OUTLINE: 1. Description
More informationExecutive Summary. Chapter 1. Overview of Control
Chapter 1 Executive Summary Rapid advances in computing, communications, and sensing technology offer unprecedented opportunities for the field of control to expand its contributions to the economic and
More informationFictitious Play applied on a simplified poker game
Fictitious Play applied on a simplified poker game Ioannis Papadopoulos June 26, 2015 Abstract This paper investigates the application of fictitious play on a simplified 2-player poker game with the goal
More information1\2 L m R M 2, 2 1, 1 0, 0 B 1, 0 0, 0 1, 1
Chapter 1 Introduction Game Theory is a misnomer for Multiperson Decision Theory. It develops tools, methods, and language that allow a coherent analysis of the decision-making processes when there are
More informationAn Introduction to Poker Opponent Modeling
An Introduction to Poker Opponent Modeling Peter Chapman Brielin Brown University of Virginia 1 March 2011 It is not my aim to surprise or shock you-but the simplest way I can summarize is to say that
More informationThis one-day event is open to all licensed. law-enforcement professionals, specialty investigators and criminal justice students.
2015 IAPI Professional Investigators Conference Informative and relevant topics for professional investigators The Professional Investigators (IAPI) cordially invites you to our annual training and education
More informationChapter 1 The Field of Computing. Slides Modified by Vicky Seno
Chapter 1 The Field of Computing Slides Modified by Vicky Seno Outline Computing is a natural science The five disciplines of computing Related fields Careers in computing Myths about computing Resources
More informationTexas Hold em Inference Bot Proposal. By: Brian Mihok & Michael Terry Date Due: Monday, April 11, 2005
Texas Hold em Inference Bot Proposal By: Brian Mihok & Michael Terry Date Due: Monday, April 11, 2005 1 Introduction One of the key goals in Artificial Intelligence is to create cognitive systems that
More informationCSCI 699: Topics in Learning and Game Theory Fall 2017 Lecture 3: Intro to Game Theory. Instructor: Shaddin Dughmi
CSCI 699: Topics in Learning and Game Theory Fall 217 Lecture 3: Intro to Game Theory Instructor: Shaddin Dughmi Outline 1 Introduction 2 Games of Complete Information 3 Games of Incomplete Information
More informationComplex DNA and Good Genes for Snakes
458 Int'l Conf. Artificial Intelligence ICAI'15 Complex DNA and Good Genes for Snakes Md. Shahnawaz Khan 1 and Walter D. Potter 2 1,2 Institute of Artificial Intelligence, University of Georgia, Athens,
More information