Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2936924.2936957acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

Simplifying Urban Network Security Games with Cut-Based Graph Contraction

Published: 09 May 2016 Publication History

Abstract

The scalability of the algorithm for solving urban network security games, which is an important challenge concerning security game problems, was improved. State-of-the-art solvers have been scaled up to handle real-world networks with tens of thousands of edges; however, it can take days or more when the inputs are varied. Since they do not essentially overcome exponential growth of the strategy space with increasing graph size, an approach, which can be combined with previous ones, is proposed. In particular, a practical approach of simplifying the graphs so that they can be handled within a realistic time is devised and tested. The key idea behind this approach is to restrict the defender's pure strategies to potential ones before calculating an equilibrium solution. The restriction can be tightened for faster computation and loosened for better solution. The following three techniques for computing an optimal solution to the restricted game are proposed and evaluated: (i) contraction of the network based on the restriction, (ii) compact formulation of the optimization problem using weighted edges in place of multiple edges, and (iii) efficient solution using a mixed-integer quadratic programming oracle. They can naturally cope with an extension of the game to one taking width of the roads into account. Furthermore, a heuristic algorithm of finding effective restriction of the game is also proposed.

References

[1]
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms, Third Edition. MIT press, 2009.
[2]
J. Edmonds and R. M. Karp. Theoretical improvements in algorithmic efficiency for network flow problems. Journal of the ACM (JACM), 19(2):248--264, 1972.
[3]
D. Eppstein and M. T. Goodrich. Studying (non-planar) road networks through an algorithmic lens. In Proceedings of the 16th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS '08, pages 16:1--16:10, 2008.
[4]
F. Fang, A. X. Jiang, and M. Tambe. Optimal patrol strategy for protecting moving targets with multiple mobile resources. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 957--964, 2013.
[5]
M. Haklay and P. Weber. Openstreetmap: User-generated street maps. Pervasive Computing, IEEE, 7(4):12--18, 2008.
[6]
M. Jain, V. Conitzer, and M. Tambe. Security scheduling for real-world networks. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 215--222, 2013.
[7]
M. Jain, D. Korzhyk, O. Vaněk, V. Conitzer, M. Pěchouček, and M. Tambe. A double oracle algorithm for zero-sum security games on graphs. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 327--334, 2011.
[8]
M. Jain, K. Leyton-Brown, and M. Tambe. The deployment-to-saturation ratio in security games. In Conference on Artificial Intelligence (AAAI), pages 1362--1370, 2012.
[9]
C. Kiekintveld, M. Jain, J. Tsai, J. Pita, F. Ordóñez, and M. Tambe. Computing optimal randomized resource allocations for massive security games. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 689--696, 2009.
[10]
H. B. McMahan, G. J. Gordon, and A. Blum. Planning in the presence of cost functions controlled by an adversary. In International Conference on Machine Learning, pages 536--543, 2003.
[11]
W. Peng, G. Dong, K. Yang, and J. Su. A random road network model and its effects on topological characteristics of mobile delay-tolerant networks. IEEE Transactions on Mobile Computing, 13(12):2706--2718, 2014.
[12]
J. Pita, M. Jain, J. Marecki, F. Ordóñez, C. Portway, M. Tambe, C. Western, P. Paruchuri, and S. Kraus. Deployed armor protection: the application of a game theoretic model for security at the los angeles international airport. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 125--132, 2008.
[13]
D. A. Schult and P. Swart. Exploring network structure, dynamics, and function using networkx. In Proceedings of the 7th Python in Science Conferences (SciPy 2008), volume 2008, pages 11--16, 2008.
[14]
E. Shieh, B. An, R. Yang, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule, and G. Meyer. Protect: A deployed game theoretic system to protect the ports of the united states. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 13--20, 2012.
[15]
M. Tambe, A. X. Jiang, B. An, and M. Jain. Computational game theory for security: Progress and challenges. In AAAI Spring Symposium on Applied Computational Game Theory, 2014.
[16]
J. Tsai, S. Rathi, C. Kiekintveld, F. Ordonez, and M. Tambe. Iris-a tool for strategic security allocation in transportation networks. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009.
[17]
J. Tsai, Z. Yin, J.-y. Kwak, D. Kempe, C. Kiekintveld, and M. Tambe. Urban security: Game-theoretic resource allocation in networked physical domains. In Conference on Artificial Intelligence (AAAI), pages 881--886, 2010.
[18]
H. Von Stackelberg. Marktform und Gleichgewicht. J. Springer, 1934.
[19]
A. Washburn and K. Wood. Two-person zero-sum games for network interdiction. Operations Research, 43(2):243--251, 1995.
[20]
Z. Yin, D. Korzhyk, C. Kiekintveld, V. Conitzer, and M. Tambe. Stackelberg vs. Nash in security games: Interchangeability, equivalence, and uniqueness. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 1139--1146, 2010.

Cited By

View all
  • (2020)Converging to team-maxmin equilibria in zero-sum multiplayer gamesProceedings of the 37th International Conference on Machine Learning10.5555/3524938.3525961(11033-11043)Online publication date: 13-Jul-2020
  • (2019)Robust Peer-Monitoring on Graphs with an Application to Suicide Prevention in Social NetworksProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3332046(2168-2170)Online publication date: 8-May-2019
  • (2017)Optimal escape interdiction on transportation networksProceedings of the 26th International Joint Conference on Artificial Intelligence10.5555/3172077.3172439(3936-3944)Online publication date: 19-Aug-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AAMAS '16: Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems
May 2016
1580 pages
ISBN:9781450342391

Sponsors

  • IFAAMAS

In-Cooperation

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 09 May 2016

Check for updates

Author Tags

  1. game theory
  2. graph contraction
  3. optimization
  4. security

Qualifiers

  • Research-article

Funding Sources

  • Japan Society for the Promotion of Science

Conference

AAMAS '16
Sponsor:

Acceptance Rates

AAMAS '16 Paper Acceptance Rate 137 of 550 submissions, 25%;
Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Converging to team-maxmin equilibria in zero-sum multiplayer gamesProceedings of the 37th International Conference on Machine Learning10.5555/3524938.3525961(11033-11043)Online publication date: 13-Jul-2020
  • (2019)Robust Peer-Monitoring on Graphs with an Application to Suicide Prevention in Social NetworksProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3332046(2168-2170)Online publication date: 8-May-2019
  • (2017)Optimal escape interdiction on transportation networksProceedings of the 26th International Joint Conference on Artificial Intelligence10.5555/3172077.3172439(3936-3944)Online publication date: 19-Aug-2017
  • (2016)Combining Graph Contraction and Strategy Generation for Green Security Games7th International Conference on Decision and Game Theory for Security - Volume 999610.1007/978-3-319-47413-7_15(251-271)Online publication date: 2-Nov-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media