Sciweavers

179 search results - page 10 / 36
» Adversarial Leakage in Games
Sort
View
ICRA
2009
IEEE
126views Robotics» more  ICRA 2009»
14 years 4 months ago
Finding the optimal strategies for robotic patrolling with adversaries in topologically-represented environments
Abstract— Using autonomous mobile robots to patrol environments for detecting intruders is a topic of increasing relevance for its possible applications. A large part of strategi...
Francesco Amigoni, Nicola Basilico, Nicola Gatti
GAMESEC
2010
139views Game Theory» more  GAMESEC 2010»
13 years 7 months ago
Design of Network Topology in an Adversarial Environment
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
Assane Gueye, Jean C. Walrand, Venkat Anantharam
AAAI
2008
14 years 4 days ago
Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications
In a class of games known as Stackelberg games, one agent (the leader) must commit to a strategy that can be observed by the other agent (the adversary/follower) before the advers...
Praveen Paruchuri, Jonathan P. Pearce, Janusz Mare...
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 10 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
COMMA
2008
13 years 11 months ago
Investigating Stories in a Formal Dialogue Game
In this paper we propose a formal dialogue game in which two players aim to determine the best explanation for a set of observations. By assuming an adversarial setting, we force t...
Floris Bex, Henry Prakken