Adversarial Behavior in Network Games
نویسندگان
چکیده
منابع مشابه
GANGs: Generative Adversarial Network Games
Generative Adversarial Networks (GAN) have become one of the most successful frameworks for unsupervised generative modeling. As GANs are difficult to train much research has focused on this. However, very little of this research has directly exploited gametheoretic techniques.We introduce Generative Adversarial Network Games (GANGs), which explicitly model a finite zero-sum game between a gene...
متن کاملAdversarial Hierarchical-Task Network Planning for Real-Time Adversarial Games
Real-time strategy (RTS) games are hard from an AI point of view because they have enormous state spaces, combinatorial branching factors, allow simultaneous and durative actions, and players have very little time to choose actions. For these reasons, standard game tree search methods such as alphabeta search or Monte Carlo Tree Search (MCTS) are not sufficient by themselves to handle these gam...
متن کاملAdversarial behavior in network mechanism design
ABSTRACT This paper studies the effects of and countermeasures against adversarial behavior in network resource allocation mechanisms such as pricing and auctions. It models the heterogeneous behavior of users, which ranges from altruistic to selfish and even to malicious, using game theory. The paper adopts a mechanism design approach to quantify the effect of adversarial behavior and modify t...
متن کاملAdversarial Leakage in Games
While the minimax strategy has become the standard, and most agreed-upon solution for decision-making in adversarial settings, as discussed in game theory, computer science and other disciplines, its power arises from the use of mixed strategies, aka probabilistic algorithms. Nevertheless, in adversarial settings we face the risk of information leakage about the actual strategy instantiation. H...
متن کاملTracking Adversarial Behavior in Distributed Systems With Secure Network Provenance
This paper presents secure network provenance (SNP), a novel technique for tracking down compromised nodes in a distributed system and assessing the damage that they may have caused to other nodes. SNP enables operators to ask the system why it is in a certain state – for example, why a suspicious routing table entry is present on a certain router, or where a given cache entry originated. SNP i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Dynamic Games and Applications
سال: 2014
ISSN: 2153-0785,2153-0793
DOI: 10.1007/s13235-014-0120-4