Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
From MaRDI portal
Publication:3009017
DOI10.1613/jair.3269zbMath1219.91032arXiv1401.3888OpenAlexW3102219781WikidataQ129519734 ScholiaQ129519734MaRDI QIDQ3009017
Christopher Kiekintveld, Dmytro Korzhyk, Zhengyu Yin, Milind Tambe, Vincent Conitzer
Publication date: 23 June 2011
Published in: Journal of Artificial Intelligence Research (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1401.3888
Related Items (28)
Entropic regularization in hierarchical games ⋮ Learning Machiavellian strategies for manipulation in Stackelberg security games ⋮ Backward induction algorithm for a class of closed-loop Stackelberg games ⋮ Game-Theoretic Resource Allocation with Real-Time Probabilistic Surveillance Information ⋮ Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments ⋮ Optimal defense against election control by deleting voter groups ⋮ Making friends on the fly: cooperating with new teammates ⋮ A continuous-time Markov Stackelberg security game approach for reasoning about real patrol strategies ⋮ Solution for a class of closed-loop leader-follower games with convexity conditions on the payoffs ⋮ Adversarial patrolling with spatially uncertain alarm signals ⋮ Robust solutions to Stackelberg games: addressing bounded rationality and limited observations in human cognition ⋮ A game‐theoretic approach for the location of terror response facilities with both disruption risk and hidden information ⋮ A game-theoretical approach for policing decision support ⋮ A survey on mixed-integer programming techniques in bilevel optimization ⋮ Equalizer zero-determinant strategy in discounted repeated Stackelberg asymmetric game ⋮ Computing Equilibria with Partial Commitment ⋮ A new feedback form of open-loop Stackelberg strategy in a general linear-quadratic differential game ⋮ Game Theory and Cyber Defense ⋮ On Stackelberg mixed strategies ⋮ Game theoretic security of quantum bit commitment ⋮ Counterfactual regret minimization for integrated cyber and air defense resource allocation ⋮ Critical infrastructure protection using secrecy -- a discrete simultaneous game ⋮ Secure analysis of dynamic networks under pinning attacks against synchronization ⋮ Handling a Kullback--Leibler divergence random walk for scheduling effective patrol strategies in Stackelberg security games ⋮ On the characterization of saddle point equilibrium for security games with additive utility ⋮ Dynamic signaling games with quadratic criteria under Nash and Stackelberg equilibria ⋮ Augmented probability simulation methods for sequential games ⋮ Optimally Deceiving a Learning Leader in Stackelberg Games
This page was built for publication: Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness