2013 International Conference on Social Computing 2013
DOI: 10.1109/socialcom.2013.11
|View full text |Cite
|
Sign up to set email alerts
|

Bayesian Security Games for Controlling Contagion

Abstract: Influence blocking games have been used to model adversarial domains with a social component, such as counterinsurgency. In these games, a mitigator attempts to minimize the efforts of an influencer to spread his agenda across a social network. Previous work has assumed that the influence graph structure is known with certainty by both players. However, in reality, there is often significant information asymmetry between the mitigator and the influencer. We introduce a model of this information asymmetry as a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
34
0
2

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 46 publications
(36 citation statements)
references
References 19 publications
0
34
0
2
Order By: Relevance
“…Moreover, multiple intelligent parties attempt to leverage the same social network to spread their message, necessitating an adversary-aware approach to strategy generation. Game-theoretic approaches can be used to generate resource allocations strategies for such large-scale, real world networks [36], [37]. This interaction can be modeled as a graph with one player attempting to spread influence while another player attempts to stop the probabilistic propagation of that influence by spreading their own influence.…”
Section: Emerging Applications In Networked Domainsmentioning
confidence: 99%
“…Moreover, multiple intelligent parties attempt to leverage the same social network to spread their message, necessitating an adversary-aware approach to strategy generation. Game-theoretic approaches can be used to generate resource allocations strategies for such large-scale, real world networks [36], [37]. This interaction can be modeled as a graph with one player attempting to spread influence while another player attempts to stop the probabilistic propagation of that influence by spreading their own influence.…”
Section: Emerging Applications In Networked Domainsmentioning
confidence: 99%
“…DOPL requires more time than DOLP because of the fact that the defender PAGERANK oracle explicitly adapts to the attacker's strategy (only uses nodes adjacent to attacker nodes), while the attacker PAGERANK oracle does not. Previous work explored scaling to larger graphs with more resources, but since this is not the focus of our work, we refer the interested reader to Tsai et al [30]. Figure 8b shows the impact on solution quality as the graph size is scaled up.…”
Section: Graph Size Scale-upmentioning
confidence: 99%
“…[66] introduce an important restricted class of Stackelberg games specifically targeted at security settings; they refer to these as Stackelberg security games, and demonstrate that extremely scalable algorithms can be devised for this class of games. Since then, a number of follow-up papers have emerged, studying, for the most part, computational aspects of the problem and aiming to scale the algorithms to larger and larger instances [75,106,109,61,69,62,38,105], as well as illustrating their actual deployment in the field, such as the LAX airport [94], Federal Air Marshall Service [63], and the US Coast Guard [101]. Of these approaches, [105] presents the most similar model to ours.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Since then, a number of follow-up papers have emerged, studying, for the most part, computational aspects of the problem and aiming to scale the algorithms to larger and larger instances [75,106,109,61,69,62,38,105], as well as illustrating their actual deployment in the field, such as the LAX airport [94], Federal Air Marshall Service [63], and the US Coast Guard [101]. Of these approaches, [105] presents the most similar model to ours. The principal difference is in the game structure and motivation: Tsai et al model both the defender and attacker as agents who aim to influence contagion of ideas in a simultaneous move game; thus, the two players actually have symmetric roles.…”
Section: Literature Reviewmentioning
confidence: 99%