<p>In a Stackelberg Security Game, a defender commits to a randomized deployment of security resources, and an attacker bestresponds by attacking a target that maximizes his utility. While algorithms for computing an optimal strategy for the defender to commit to have had a striking real-world impact, deployed applications require significant information about potential attackers, leading to inefficiencies. We address this problem via an online learning approach. We are interested in algorithms that prescribe a randomized strategy for the defender at each step against an adversarially chosen sequence of attackers, and obtain feedback on their choices (observing either the current attacker type or merely which target was attacked). We design...
Online learning algorithms are designed to learn even when their input is generated by an adversary....
Stackelberg Security Games (SSG) have been widely applied for solving real-world security problems—w...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...
In a Stackelberg Security Game, a defender commits to a randomized deployment of security resources,...
In a Stackelberg Security Game, a defender commits to a randomized deployment of security resources,...
In a Stackelberg Security Game, a defender commits to a randomized deployment of security resources,...
In this chapter, we present an alternative, learning-theoretic approach for dealing with uncertainty...
had a striking real-world impact. But an algorithm that computes an optimal strategy for the defende...
This paper investigates repeated security games with unknown (to the defender) game payoffs and atta...
We study repeated network interdiction games with no prior knowledge of the adversary and the enviro...
This paper investigates repeated security games with unknown (to the defender) game payoffs and atta...
Abstract. Game-theoretic security resource allocation problems have generated significant interest i...
Several competing human behavior models have been proposed to model and protect against boundedly ra...
UnrestrictedSecurity is one of the biggest concerns all around the world. There are only a limited n...
This dissertation considers a problem of online learning and online decision making where an agent o...
Online learning algorithms are designed to learn even when their input is generated by an adversary....
Stackelberg Security Games (SSG) have been widely applied for solving real-world security problems—w...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...
In a Stackelberg Security Game, a defender commits to a randomized deployment of security resources,...
In a Stackelberg Security Game, a defender commits to a randomized deployment of security resources,...
In a Stackelberg Security Game, a defender commits to a randomized deployment of security resources,...
In this chapter, we present an alternative, learning-theoretic approach for dealing with uncertainty...
had a striking real-world impact. But an algorithm that computes an optimal strategy for the defende...
This paper investigates repeated security games with unknown (to the defender) game payoffs and atta...
We study repeated network interdiction games with no prior knowledge of the adversary and the enviro...
This paper investigates repeated security games with unknown (to the defender) game payoffs and atta...
Abstract. Game-theoretic security resource allocation problems have generated significant interest i...
Several competing human behavior models have been proposed to model and protect against boundedly ra...
UnrestrictedSecurity is one of the biggest concerns all around the world. There are only a limited n...
This dissertation considers a problem of online learning and online decision making where an agent o...
Online learning algorithms are designed to learn even when their input is generated by an adversary....
Stackelberg Security Games (SSG) have been widely applied for solving real-world security problems—w...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...