Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterMay 2023
Two-phase Security Games
AAMAS '23: Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent SystemsPages 2910–2912A standard model of a security game assumes a one-off assault during which the attacker cannot update their strategy even if new actionable insights are gained in the process. In this paper, we propose a version of a security game that takes into account ...
- posterMay 2023
An Adversarial Strategic Game for Machine Learning as a Service using System Features
AAMAS '23: Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent SystemsPages 2508–2510Machine-learning-as-a-service (MLaaS) dramatically decreases the barrier of entry to machine learning through accessible, externally trained model building and deployment. However, numerous studies have shown that MLaaS models are vulnerable to ...
- posterMay 2023
Strategic Play By Resource-Bounded Agents in Security Games
AAMAS '23: Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent SystemsPages 2478–2480Many studies have shown that humans are "predictably irrational'': they do not act in a fully rational way, but their deviations from rational behavior are quite systematic. Our goal is to see the extent to which we can explain and justify these ...
- extended-abstractJuly 2022
Learning in Stackelberg Games with Non-myopic Agents
EC '22: Proceedings of the 23rd ACM Conference on Economics and ComputationPages 917–918https://doi.org/10.1145/3490486.3538308Stackelberg games are a canonical model for strategic principal-agent interactions. Consider, for instance, a defense system that distributes its security resources across high-risk targets prior to attacks being executed; or a tax policymaker who sets ...
- extended-abstractMay 2022
Minimizing Expected Intrusion Detection Time in Adversarial Patrolling
AAMAS '22: Proceedings of the 21st International Conference on Autonomous Agents and Multiagent SystemsPages 1660–1662In adversarial patrolling games, a mobile Defender strives to discover intrusions at vulnerable targets initiated by an Attacker.The Attacker's utility is traditionally defined as the probability of completing an attack, possibly weighted by target ...
-
- research-articleJune 2021
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems
- Mustafa Abdallah,
- Daniel Woods,
- Parinaz Naghizadeh,
- Issa Khalil,
- Timothy Cason,
- Shreyas Sundaram,
- Saurabh Bagchi
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityPages 378–392https://doi.org/10.1145/3433210.3437534We model the behavioral biases of human decision-making in securing interdependent systems and show that such behavioral decision-making leads to a suboptimal pattern of resource allocation compared to non-behavioral (rational) decision-making. We ...
- research-articleMay 2021
Evolution of Strategies in Sequential Security Games
AAMAS '21: Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent SystemsPages 1434–1442In this paper we introduce a generic approach to solving Sequential Security Games (SGs) based on Evolutionary Algorithms. The method (named EASG) is general and largely game-independent, which allows for its application to a wide range of SGs with only ...
- research-articleMay 2020
Vision for Decisions: Utilizing Uncertain Real-Time Information and Signaling for Conservation
AAMAS '20: Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent SystemsPages 2179–2181Recent advances in fields such as computer vision and natural language processing have created new opportunities for developing agents that can automatically interpret their environment. Concurrently, advances in artificial intelligence have made the ...
- extended-abstractMay 2020
A Generic Metaheuristic Approach to Sequential Security Games
AAMAS '20: Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent SystemsPages 2089–2091The paper introduces a generic approach to solving Sequential Security Games (SGs) which utilizes Evolutionary Algorithms (EAs). Formulation of the method (named EASG) is general and largely game-independent, which allows for its application to a wide ...
- research-articleNovember 2019
MalPro: A Learning-based Malware Propagation and Containment Modeling
CCSW'19: Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security WorkshopPages 45–56https://doi.org/10.1145/3338466.3358920In this paper, we investigate the importance of a defense system's learning rates to fight against the self-propagating class of malware such as worms and bots. To this end, we introduce a new propagation model based on the interactions between an ...
- research-articleJune 2019
Iterated Deep Reinforcement Learning in Games: History-Aware Training for Improved Stability
EC '19: Proceedings of the 2019 ACM Conference on Economics and ComputationPages 617–636https://doi.org/10.1145/3328526.3329634Deep reinforcement learning (RL) is a powerful method for generating policies in complex environments, and recent breakthroughs in game-playing have leveraged deep RL as part of an iterative multiagent search process. We build on such developments and ...
- research-articleMay 2019
Bridging the Gap Between High-Level Reasoning in Strategic Agent Coordination and Low-Level Agent Development
AAMAS '19: Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent SystemsPages 2402–2404Recent advances in fields such as computer vision and natural language processing have paved the way for developing agents capable of automatically interpreting their surrounding environment. Concurrently, advances in artificial intelligence have made ...
- research-articleMay 2019
Using Game Theory in Real Time in the Real World: A Conservation Case Study
AAMAS '19: Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent SystemsPages 2336–2338In the real world, real-time data are now widely available, especially in security domains. Security cameras, aerial imagery, and even social media keep defenders informed when protecting important events, locations, and people. Further, advances in ...
- research-articleMay 2019
Broken Signals in Security Games: Coordinating Patrollers and Sensors in the Real World
AAMAS '19: Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent SystemsPages 1838–1840Mobile sensors, e.g., unmanned aerial vehicles (UAVs), are becoming increasingly important in security domains and can be used for tasks such as searching for poachers in conservation areas. Such mobile sensors augment human patrollers by assisting in ...
- research-articleJuly 2018
Mitigating the Curse of Correlation in Security Games by Entropy Maximization
AAMAS '18: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent SystemsPages 2127–2129In Stackelberg security games, a defender seeks to randomly allocate limited security resources to protect critical targets from an attack. In this paper, we study a fundamental, yet underexplored, phenomenon in security games, which we term the Curse ...
- research-articleJuly 2018
Inducible Equilibrium for Security Games
AAMAS '18: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent SystemsPages 1947–1949Strong Stackelberg equilibrium (SSE) is the standard solution concept of Stackelberg security games. The SSE assumes that the follower breaks ties in favor of the leader and this is widely acknowledged and justified by the assertion that the defender ...
- research-articleJuly 2018
Equilibrium Refinement in Security Games with Arbitrary Scheduling Constraints
AAMAS '18: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent SystemsPages 919–927Significant research effort in security games has focused in devising strategies that perform well even when the attacker deviates from optimal (rational) behavior. In most of these frameworks, a price needs to be paid to ensure robustness against this ...
- research-articleJuly 2018
Deceiving Cyber Adversaries: A Game Theoretic Approach
- Aaron Schlenker,
- Omkar Thakoor,
- Haifeng Xu,
- Fei Fang,
- Milind Tambe,
- Long Tran-Thanh,
- Phebe Vayanos,
- Yevgeniy Vorobeychik
AAMAS '18: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent SystemsPages 892–900An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance, in which they attempt to identify configuration specifics of network hosts. To increase uncertainty of adversarial reconnaissance, the network ...
- research-articleJuly 2018
Stackelberg Security Games with Multiple Uncoordinated Defenders
AAMAS '18: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent SystemsPages 703–711Stackelberg security games have received much attention in recent years. While most existing work focuses on single-defender settings, there are many real-world scenarios that involve multiple defenders (e.g., multi-national anti-crime actions in ...
- research-articleJuly 2018
Adversarial Classification on Social Networks
AAMAS '18: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent SystemsPages 211–219The spread of unwanted or malicious content through social media has become a major challenge. Traditional examples of this include social network spam, but an important new concern is the propagation of fake news through social media. A common approach ...