Security games with contagion: Handling asymmetric information

  • Jason Tsai
  • , Yundi Qian
  • , Milind Tambe
  • , Yevgeniy Vorobeychik
  • , Christopher Kiekintveld

Research output: Contribution to conferencePaperpeer-review

Abstract

Counterinsurgency, which is the effort to mitigate support for an opposing organization, is one such domain that has been studied recently and past work has modeled the problem as an influence blocking maximization that features an influencer and a mitigator. While past work has introduced scalable heuristic techniques for generating effective strategies using a double oracle algorithm, it has not addressed the issue of uncertainty and asymmetric information, which is the topic of this paper.

Original languageEnglish
Pages1185-1186
Number of pages2
StatePublished - 2013
Event12th International Conference on Autonomous Agents and Multiagent Systems 2013, AAMAS 2013 - Saint Paul, MN, United States
Duration: May 6 2013May 10 2013

Conference

Conference12th International Conference on Autonomous Agents and Multiagent Systems 2013, AAMAS 2013
Country/TerritoryUnited States
CitySaint Paul, MN
Period05/6/1305/10/13

Keywords

  • Game theory
  • Influence maximization
  • Social contagion

Fingerprint

Dive into the research topics of 'Security games with contagion: Handling asymmetric information'. Together they form a unique fingerprint.

Cite this