Adversarial Behavior in Network Games

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GANGs: Generative Adversarial Network Games

Generative Adversarial Networks (GAN) have become one of the most successful frameworks for unsupervised generative modeling. As GANs are difficult to train much research has focused on this. However, very little of this research has directly exploited gametheoretic techniques.We introduce Generative Adversarial Network Games (GANGs), which explicitly model a finite zero-sum game between a gene...

متن کامل

Adversarial Hierarchical-Task Network Planning for Real-Time Adversarial Games

Real-time strategy (RTS) games are hard from an AI point of view because they have enormous state spaces, combinatorial branching factors, allow simultaneous and durative actions, and players have very little time to choose actions. For these reasons, standard game tree search methods such as alphabeta search or Monte Carlo Tree Search (MCTS) are not sufficient by themselves to handle these gam...

متن کامل

Adversarial behavior in network mechanism design

ABSTRACT This paper studies the effects of and countermeasures against adversarial behavior in network resource allocation mechanisms such as pricing and auctions. It models the heterogeneous behavior of users, which ranges from altruistic to selfish and even to malicious, using game theory. The paper adopts a mechanism design approach to quantify the effect of adversarial behavior and modify t...

متن کامل

Adversarial Leakage in Games

While the minimax strategy has become the standard, and most agreed-upon solution for decision-making in adversarial settings, as discussed in game theory, computer science and other disciplines, its power arises from the use of mixed strategies, aka probabilistic algorithms. Nevertheless, in adversarial settings we face the risk of information leakage about the actual strategy instantiation. H...

متن کامل

Tracking Adversarial Behavior in Distributed Systems With Secure Network Provenance

This paper presents secure network provenance (SNP), a novel technique for tracking down compromised nodes in a distributed system and assessing the damage that they may have caused to other nodes. SNP enables operators to ask the system why it is in a certain state – for example, why a suspicious routing table entry is present on a certain router, or where a given cache entry originated. SNP i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Dynamic Games and Applications

سال: 2014

ISSN: 2153-0785,2153-0793

DOI: 10.1007/s13235-014-0120-4