pith. machine review for the scientific record. sign in

arxiv: 1609.09341 · v1 · submitted 2016-09-29 · 💻 cs.GT · cs.LG

Recognition: unknown

Machine Learning Techniques for Stackelberg Security Games: a Survey

Authors on Pith no claims yet
classification 💻 cs.GT cs.LG
keywords attackergameslearningsecuritytechniquesmachinemodelpresents
0
0 comments X
read the original abstract

The present survey aims at presenting the current machine learning techniques employed in security games domains. Specifically, we focused on papers and works developed by the Teamcore of University of Southern California, which deepened different directions in this field. After a brief introduction on Stackelberg Security Games (SSGs) and the poaching setting, the rest of the work presents how to model a boundedly rational attacker taking into account her human behavior, then describes how to face the problem of having attacker's payoffs not defined and how to estimate them and, finally, presents how online learning techniques have been exploited to learn a model of the attacker.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Beyond Local vs. External: A Game-Theoretic Framework for Trustworthy Knowledge Acquisition

    cs.CL 2026-04 unverdicted novelty 6.0

    GTKA uses adversarial game training to generate privacy-safe sub-queries for external LLMs, then integrates answers locally, reducing intent leakage while preserving answer quality on new biomedical and legal benchmarks.