Proceedings of the 13th ACM Conference on Electronic Commerce 2012
DOI: 10.1145/2229012.2229056
|View full text |Cite
|
Sign up to set email alerts
|

Safe opponent exploitation

Abstract: We consider the problem of playing a finitely-repeated two-player zero-sum game safely-that is, guaranteeing at least the value of the game per period in expectation regardless of the strategy used by the opponent. Playing a stage-game equilibrium strategy at each time step clearly guarantees safety, and prior work has conjectured that it is impossible to simultaneously deviate from a stage-game equilibrium (in hope of exploiting a suboptimal opponent) and to guarantee safety. We show that such profitable devi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
13
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 10 publications
2
13
0
Order By: Relevance
“…Despite major breakthroughs in artificial intelligence approaches to poker, there remains surprisingly little understanding of how human experts play, or of how human expertise might better inform algorithm design. Our results on the encrypting function of synergistic information may constitute behavioral evidence for the use of “safe” strategies, a type of non‐equilibrium but still non‐exploitable behavior that was recently introduced by computational game theorists to help algorithms respond more adaptively to irrational play (Ganzfried & Sandholm, ).…”
Section: Discussionmentioning
confidence: 68%
“…Despite major breakthroughs in artificial intelligence approaches to poker, there remains surprisingly little understanding of how human experts play, or of how human expertise might better inform algorithm design. Our results on the encrypting function of synergistic information may constitute behavioral evidence for the use of “safe” strategies, a type of non‐equilibrium but still non‐exploitable behavior that was recently introduced by computational game theorists to help algorithms respond more adaptively to irrational play (Ganzfried & Sandholm, ).…”
Section: Discussionmentioning
confidence: 68%
“…It is not possible to exploit an opponent's strategy, by deviating from the equilibrium strategy, without creating the possibility of being exploited oneself. Although exceptions were later discovered (Ganzfried & Sandholm, 2015), this general tradeoff between exploitation and safety is sometimes called the "get-taught-and-exploited problem" (Sandholm, 2007), and has been applied in spirit to non-game-theoretic domains as well (Biswas et al, 2014). The concept of agent misdirection has also spawned interest in strategies for counter-misdirection (Chen & Arkin, 2021).…”
Section: Policy Approximationmentioning
confidence: 99%
“…In other words, every affine equilibrium is an NE of the restricted game Γ ′ in which ⊖ can only play her NE strategies in Γ. That is, affine equilibria are not exploitable by NE strategies of the opponent, not even by safe exploitation techniques [10]. So, the only way for the opponent to exploit an affine equilibrium is to open herself up to counter-exploitation.…”
Section: Knowledge-limited Subgame Solvingmentioning
confidence: 99%