{"title":"逃生感应游戏:安全应用中的检测与入侵","authors":"Niclas Boehmer, Minbiao Han, Haifeng Xu, Milind Tambe","doi":"arxiv-2407.20981","DOIUrl":null,"url":null,"abstract":"Traditional game-theoretic research for security applications primarily\nfocuses on the allocation of external protection resources to defend targets.\nThis work puts forward the study of a new class of games centered around\nstrategically arranging targets to protect them against a constrained\nadversary, with motivations from varied domains such as peacekeeping resource\ntransit and cybersecurity. Specifically, we introduce Escape Sensing Games\n(ESGs). In ESGs, a blue player manages the order in which targets pass through\na channel, while her opponent tries to capture the targets using a set of\nsensors that need some time to recharge after each activation. We present a\nthorough computational study of ESGs. Among others, we show that it is NP-hard\nto compute best responses and equilibria. Nevertheless, we propose a variety of\neffective (heuristic) algorithms whose quality we demonstrate in extensive\ncomputational experiments.","PeriodicalId":501316,"journal":{"name":"arXiv - CS - Computer Science and Game Theory","volume":"2 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Escape Sensing Games: Detection-vs-Evasion in Security Applications\",\"authors\":\"Niclas Boehmer, Minbiao Han, Haifeng Xu, Milind Tambe\",\"doi\":\"arxiv-2407.20981\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Traditional game-theoretic research for security applications primarily\\nfocuses on the allocation of external protection resources to defend targets.\\nThis work puts forward the study of a new class of games centered around\\nstrategically arranging targets to protect them against a constrained\\nadversary, with motivations from varied domains such as peacekeeping resource\\ntransit and cybersecurity. Specifically, we introduce Escape Sensing Games\\n(ESGs). In ESGs, a blue player manages the order in which targets pass through\\na channel, while her opponent tries to capture the targets using a set of\\nsensors that need some time to recharge after each activation. We present a\\nthorough computational study of ESGs. Among others, we show that it is NP-hard\\nto compute best responses and equilibria. Nevertheless, we propose a variety of\\neffective (heuristic) algorithms whose quality we demonstrate in extensive\\ncomputational experiments.\",\"PeriodicalId\":501316,\"journal\":{\"name\":\"arXiv - CS - Computer Science and Game Theory\",\"volume\":\"2 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Computer Science and Game Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2407.20981\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Computer Science and Game Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2407.20981","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Escape Sensing Games: Detection-vs-Evasion in Security Applications
Traditional game-theoretic research for security applications primarily
focuses on the allocation of external protection resources to defend targets.
This work puts forward the study of a new class of games centered around
strategically arranging targets to protect them against a constrained
adversary, with motivations from varied domains such as peacekeeping resource
transit and cybersecurity. Specifically, we introduce Escape Sensing Games
(ESGs). In ESGs, a blue player manages the order in which targets pass through
a channel, while her opponent tries to capture the targets using a set of
sensors that need some time to recharge after each activation. We present a
thorough computational study of ESGs. Among others, we show that it is NP-hard
to compute best responses and equilibria. Nevertheless, we propose a variety of
effective (heuristic) algorithms whose quality we demonstrate in extensive
computational experiments.