{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T13:14:06Z","timestamp":1723814046182},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T00:00:00Z","timestamp":1560729600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,17]]},"DOI":"10.1145\/3328526.3329629","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T12:45:07Z","timestamp":1561121107000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Imitative Follower Deception in Stackelberg Games"],"prefix":"10.1145","author":[{"given":"Jiarui","family":"Gan","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Haifeng","family":"Xu","sequence":"additional","affiliation":[{"name":"Harvard University, Boston, MA, USA"}]},{"given":"Qingyu","family":"Guo","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Long","family":"Tran-Thanh","sequence":"additional","affiliation":[{"name":"University of Southampton, Southampton, United Kingdom"}]},{"given":"Zinovi","family":"Rabinovich","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Michael","family":"Wooldridge","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,6,17]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the 27th International Conference on Neural Information Processing Systems (NIPS'14). 1826","author":"Blum Avrim","year":"1834","unstructured":"Avrim Blum , Nika Haghtalab , and Ariel D. Procaccia . 2014. Learning Optimal Commitment to Overcome Insecurity . In Proceedings of the 27th International Conference on Neural Information Processing Systems (NIPS'14). 1826 -- 1834 . Avrim Blum, Nika Haghtalab, and Ariel D. Procaccia. 2014. Learning Optimal Commitment to Overcome Insecurity. In Proceedings of the 27th International Conference on Neural Information Processing Systems (NIPS'14). 1826--1834."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1050.0231"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1561\/0200000075"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134717"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940781"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3172077.3172405"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3237383.3238033"},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI'16)","author":"Haghtalab Nika","year":"2016","unstructured":"Nika Haghtalab , Fei Fang , Thanh H. Nguyen , Arunesh Sinha , Ariel D. Procaccia , and Milind Tambe . 2016 . Three Strategies to Success: Learning Adversary Models in Security Games . In Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI'16) . 308--314. Nika Haghtalab, Fei Fang, Thanh H. Nguyen, Arunesh Sinha, Ariel D. Procaccia, and Milind Tambe. 2016. Three Strategies to Success: Learning Adversary Models in Security Games. In Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI'16) . 308--314."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1399589.1399599"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of The 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'13)","author":"Kiekintveld Christopher","year":"2013","unstructured":"Christopher Kiekintveld , Towhidul Islam , and Vladik Kreinovich . 2013 . Security games with interval uncertainty . In Proceedings of The 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'13) . International Foundation for Autonomous Agents and Multiagent Systems, 231--238. Christopher Kiekintveld, Towhidul Islam, and Vladik Kreinovich. 2013. Security games with interval uncertainty. In Proceedings of The 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'13). International Foundation for Autonomous Agents and Multiagent Systems, 231--238."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04645-2_23"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3176788.3176798"},{"key":"e_1_3_2_2_13_1","volume-title":"Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI'14)","author":"Nguyen Thanh Hong","year":"2014","unstructured":"Thanh Hong Nguyen , Amulya Yadav , Bo An , Milind Tambe , and Craig Boutilier . 2014 . Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty .. In Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI'14) . 756--762. Thanh Hong Nguyen, Amulya Yadav, Bo An, Milind Tambe, and Craig Boutilier. 2014. Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty.. In Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI'14). 756--762."},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems-Volume 2. IEEE Computer Society, 880--887","author":"Nudelman Eugene","year":"2004","unstructured":"Eugene Nudelman , Jennifer Wortman , Yoav Shoham , and Kevin Leyton-Brown . 2004 . Run the GAMUT: A comprehensive approach to evaluating game-theoretic algorithms . In Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems-Volume 2. IEEE Computer Society, 880--887 . Eugene Nudelman, Jennifer Wortman, Yoav Shoham, and Kevin Leyton-Brown. 2004. Run the GAMUT: A comprehensive approach to evaluating game-theoretic algorithms. In Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems-Volume 2. IEEE Computer Society, 880--887."},{"key":"e_1_3_2_2_15_1","volume-title":"A course in game theory","author":"Osborne Martin J","unstructured":"Martin J Osborne and Ariel Rubinstein . 1994. A course in game theory . MIT press . Martin J Osborne and Ariel Rubinstein. 1994. A course in game theory .MIT press."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01229312"},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'08)","author":"Paruchuri Praveen","year":"2008","unstructured":"Praveen Paruchuri , Jonathan P Pearce , Janusz Marecki , Milind Tambe , Fernando Ordonez , and Sarit Kraus . 2008 . Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games . In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'08) . 895--902. Praveen Paruchuri, Jonathan P Pearce, Janusz Marecki, Milind Tambe, Fernando Ordonez, and Sarit Kraus. 2008. Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games. In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'08) . 895--902."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33012149"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2010.07.002"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055407070530"},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'15)","author":"Rabinovich Zinovi","year":"2015","unstructured":"Zinovi Rabinovich , Albert Xin Jiang , Manish Jain , and Haifeng Xu . 2015 . Information Disclosure as a Means to Security . In Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'15) . 645--653. Zinovi Rabinovich, Albert Xin Jiang, Manish Jain, and Haifeng Xu. 2015. Information Disclosure as a Means to Security. In Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'15) . 645--653."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897579"},{"key":"e_1_3_2_2_23_1","volume-title":"Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS'18)","author":"Schlenker Aaron","year":"2018","unstructured":"Aaron Schlenker , Omkar Thakoor , Haifeng Xu , Fei Fang , Milind Tambe , Long Tran-Thanh , Phebe Vayanos , and Yevgeniy Vorobeychik . 2018 . Deceiving cyber adversaries: A game theoretic approach . In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS'18) . 892--900. Aaron Schlenker, Omkar Thakoor, Haifeng Xu, Fei Fang, Milind Tambe, Long Tran-Thanh, Phebe Vayanos, and Yevgeniy Vorobeychik. 2018. Deceiving cyber adversaries: A game theoretic approach. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS'18) . 892--900."},{"key":"e_1_3_2_2_24_1","volume-title":"Security and game theory: algorithms, deployed systems, lessons learned","author":"Tambe Milind","unstructured":"Milind Tambe . 2011. Security and game theory: algorithms, deployed systems, lessons learned . Cambridge University Press . Milind Tambe. 2011. Security and game theory: algorithms, deployed systems, lessons learned .Cambridge University Press."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10100-010-0172-5"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2936924.2936950"},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI'15)","author":"Xu Haifeng","year":"2015","unstructured":"Haifeng Xu , Zinovi Rabinovich , Shaddin Dughmi , and Milind Tambe . 2015 . Exploring Information Asymmetry in Two-Stage Security Games . In Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI'15) . 1057--1063. Haifeng Xu, Zinovi Rabinovich, Shaddin Dughmi, and Milind Tambe. 2015. Exploring Information Asymmetry in Two-Stage Security Games. In Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI'15) . 1057--1063."},{"key":"e_1_3_2_2_28_1","unstructured":"Yue Yin Bo An Yevgeniy Vorobeychik and Jun Zhuang. 2013. Optimal Deceptive Strategies in Security Games: A Preliminary Study. (2013). Yue Yin Bo An Yevgeniy Vorobeychik and Jun Zhuang. 2013. Optimal Deceptive Strategies in Security Games: A Preliminary Study. (2013)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01455.x"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132516.1132612"}],"event":{"name":"EC '19: ACM Conference on Economics and Computation","location":"Phoenix AZ USA","acronym":"EC '19","sponsor":["SIGecom Special Interest Group on Economics and Computation"]},"container-title":["Proceedings of the 2019 ACM Conference on Economics and Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3328526.3329629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T01:55:27Z","timestamp":1673229327000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328526.3329629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,17]]},"references-count":30,"alternative-id":["10.1145\/3328526.3329629","10.1145\/3328526"],"URL":"https:\/\/doi.org\/10.1145\/3328526.3329629","relation":{},"subject":[],"published":{"date-parts":[[2019,6,17]]},"assertion":[{"value":"2019-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}