Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
173 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Generation of Games for Opponent Model Differentiation (2311.16781v1)

Published 28 Nov 2023 in cs.AI

Abstract: Protecting against adversarial attacks is a common multiagent problem. Attackers in the real world are predominantly human actors, and the protection methods often incorporate opponent models to improve the performance when facing humans. Previous results show that modeling human behavior can significantly improve the performance of the algorithms. However, modeling humans correctly is a complex problem, and the models are often simplified and assume humans make mistakes according to some distribution or train parameters for the whole population from which they sample. In this work, we use data gathered by psychologists who identified personality types that increase the likelihood of performing malicious acts. However, in the previous work, the tests on a handmade game could not show strategic differences between the models. We created a novel model that links its parameters to psychological traits. We optimized over parametrized games and created games in which the differences are profound. Our work can help with automatic game generation when we need a game in which some models will behave differently and to identify situations in which the models do not align.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (23)
  1. M. Amini and Z. Bozorgasl. A game theory method to cyber-threat information sharing in cloud computing technology. International Journal of Computer Science and Engineering Research, 11(4-2023), 2023.
  2. A deployed quantal response-based patrol planning system for the us coast guard. Interfaces, 43(5):400–420, 2013.
  3. An initial study of targeted personality models in the flipit game. In International Conference on Decision and Game Theory for Security, pages 623–636. Springer, 2018.
  4. A distributional perspective on reinforcement learning. In International conference on machine learning, pages 449–458. PMLR, 2017.
  5. Somatic markers and response reversal: Is there orbitofrontal cortex dysfunction in boys with psychopathic tendencies? Journal of abnormal child psychology, 29:499–511, 2001.
  6. The dark triad and strategic resource control in a competitive computer game. Personality and Individual Differences, 168:110343, 2021.
  7. Game-theoretic patrolling with dynamic execution uncertainty and a case study on a real transit system. Journal of Artificial Intelligence Research, 50:321–367, 2014.
  8. Paws-a deployed game-theoretic application to combat poaching. AI Magazine, 38(1):23–36, 2017.
  9. A meta-analysis of the dark triad and work behavior: a social exchange perspective. Journal of applied psychology, 97(3):557, 2012.
  10. D. Fudenberg and J. Tirole. Game theory. MIT press, 1991.
  11. Game theory in defence applications: A review. Sensors, 22(3):1032, 2022.
  12. Software assistants for randomized patrol planning for the lax airport police and the federal air marshal service. Interfaces, 40(4):267–290, 2010.
  13. Introducing the short dark triad (sd3) a brief measure of dark personality traits. Assessment, 21(1):28–41, 2014.
  14. Cloudy with a chance of poaching: Adversary behavior modeling and forecasting with real-world poaching data. International Conference on Autonomous Agents and Multiagent Systems, 2017.
  15. Rethinking formal models of partially observable multiagent decision making. Artificial Intelligence, 303:103645, 2022.
  16. Capture: A new predictive anti-poaching tool for wildlife protection. In Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, pages 767–775, 2016.
  17. Analyzing the effectiveness of adversary modeling in security games. In Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013.
  18. Provably efficient online hyperparameter optimization with population-based bandits. Advances in neural information processing systems, 33:17200–17211, 2020.
  19. Deployed ARMOR protection: The application of a game theoretic model for security at the Los Angeles International Airport. In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, pages 125–132, 2008.
  20. U. Schmidt and H. Zank. What is loss aversion? Journal of risk and uncertainty, 30:157–167, 2005.
  21. C. J. Watkins and P. Dayan. Q-learning. Machine learning, 8:279–292, 1992.
  22. Improving resource allocation strategy against human adversaries in security games. In Twenty-Second International Joint Conference on Artificial Intelligence, 2011.
  23. Computing optimal strategy against quantal response in security games. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 2, pages 847–854, 2012.

Summary

We haven't generated a summary for this paper yet.