Abstract
Inspired by successful deployments of Stackelberg Security Game in real life, researchers are working hard to optimize the game models to make them more practical. Recent security game work on wildlife protection makes a step forward by taking the possible cooperation among attackers into consideration. However, it models attackers to have complete rationality, which is not always possible in practice given they are human beings. We aim to tackle attackers’ bounded rationality in the complicated, cooperation-enabled and multi-round security game for wildlife protection. Specifically, we construct a repeated Stackelberg game, and propose a novel adaptive human behavior model for attackers based on it. Despite generating defender’s optimal strategy requires to solve a non-linear and non-convex optimization problem, we are able to propose an efficient algorithm that approximately solve this problem. We perform extensive real-life experiments, and results from over 25,000 game plays show our solution effectively helps the defender to deal with attackers who might cooperate.








Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abbasi YD, Short M, Sinha A, Sintov N, Zhang C, Tambe M (2015) Human adversaries in opportunistic crime security games: Evaluating competing bounded rationality models. In: Proceedings of the third annual conference on advances in cognitive systems ACS, p 2
Breton M, Alj A, Haurie A (1988) Sequential stackelberg equilibria in two-person games. J Optim Theory Appl 59(1):71–97
Camerer CF, Ho TH, Chong JK (2004) A cognitive hierarchy model of games. Q J Econ 119(3):861–898
Conitzer V, Sandholm T (2006) Computing the optimal strategy to commit to. In: Proceedings of the 7th ACM conference on electronic commerce. ACM, pp 82–90
Costa-Gomes M, Crawford VP, Broseta B (2001) Cognition and behavior in normal-form games: an experimental study. Econometrica 69(5):1193–1235
Fang F, Nguyen TH, Pickles R, Lam WY, Clements GR, An B, Singh A, Tambe M, Lemieux A (2016) Deploying paws: Field optimization of the protection assistant for wildlife security. In: Proceedings of the twenty-eighth innovative applications of artificial intelligence conference, pp 3966–3973
Fang F, Stone P, Tambe M (2015) When security games go green: Designing defender strategies to prevent poaching and illegal fishing. In: Proceedings of the 24th international conference on artificial intelligence, pp 2589–2595
Gholami S, Wilder B, Brown M, Sinha A, Sintov N, Tambe M (2016) A game theoretic approach on addressing cooperation among human adversaries. In: Proceedings of the 15th international conference on autonomous agents and multiagent systems
Haskell WB, Kar D, Fang F, Tambe M, Cheung S, Denicola E (2014) Robust protection of fisheries with compass. In: AAAI, pp 2978–2983
Huw D (2001) Some thoughts on artificial intelligence and economic theory. In: Surfing economics: essays for the enquiring economist. Palgrave
Kahneman D (2003) Maps of bounded rationality: psychology for behavioral economics. Amer Econ Rev 93 (5):1449–1475
Kar D, Fang F, Delle Fave F, Sintov N, Tambe M (2015) A game of thrones: when human behavior models compete in repeated stackelberg security games. In: Proceedings of the 2015 international conference on autonomous agents and multiagent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp 1381–1390
Leitmann G (1978) On generalized Stackelberg strategies. J Optim Theory Appl 26(4):637–643
Letchford J, Conitzer V, Munagala K (2009) Learning and approximating the optimal strategy to commit to. In: International symposium on algorithmic game theory. Springer, pp 250– 262
Marecki J, Tesauro G, Segal R (2012) Playing repeated stackelberg games with unknown opponents. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems-volume 2. International Foundation for Autonomous Agents and Multiagent Systems, pp 821–828
McFadden DL (1976) Quantal choice analaysis: a survey. In: Annals of economic and social measurement, vol 5, no 4. NBER, pp 363–390
Misener R, Floudas CA (2013) Glomiqo: global mixed-integer quadratic optimizer. J Glob Optim 57(1):3–50
Montesh M (2013) Rhino poaching: a new form of organised crime. Technical report, College of Law Research and Innovation Committee of the University of South Africa
Nguyen TH, Yang R, Azaria A, Kraus S, Tambe M (2013) Analyzing the effectiveness of adversary modeling in security games. In: Proceedings of the twenty-seventh AAAI conference on artificial intelligence, pp 718–724
Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S (2008) Playing games for security: an efficient exact algorithm for solving bayesian stackelberg games. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems-volume 2. International Foundation for Autonomous Agents and Multiagent Systems, pp 895– 902
Payne JW, Bettman JR, Johnson EJ (1992) Behavioral decision research: a constructive processing perspective. Ann Rev Psychol 43(1):87–131
Rubinstein A (1998) Modeling bounded rationality. MIT press, Cambridge
Secretariat GTI (2013) Global tiger recovery program implementation plan: 2013–14. Report, The World Bank, Washington
Simon HA (1955) A behavioral model of rational choice. Quart J Econ 69(1):99–118
Simon HA (1979) Rational decision making in business organizations. Amer Econ Rev 69(4):493–513
Tambe M (2011) Security and game theory: algorithms, deployed systems, lessons learned. University Press, Cambridge
Vigerske S, Gleixner A (2016) Scip: global optimization of mixed-integer nonlinear programs in a branch-and-cut framework. Technical Report, Technical Report 16-24, ZIB, Takustr. 7, Berlin, p 14195
Wyler LS, Sheikh PA (2013) International illegal trade in wildlife: Threats and US policy. BiblioGov
Yang R, Ford B, Tambe M, Lemieux A (2014) Adaptive resource allocation for wildlife protection against illegal poachers. In: Proceedings of the 2014 international conference on autonomous agents and multi-agent systems, pp 453–460
Yang R, Ordonez F, Tambe M (2012) Computing optimal strategy against quantal response in security games. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems-volume 2. International Foundation for Autonomous Agents and Multiagent Systems, pp 847–854
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was supported in part by National Key R&D Program of China (2018YFB1004301), NSFC-61321491, NSFC-61425024, NSFC-61872176, and NSFC-61872179.
Rights and permissions
About this article
Cite this article
Wang, B., Zhang, Y., Zhou, ZH. et al. On repeated stackelberg security game with the cooperative human behavior model for wildlife protection. Appl Intell 49, 1002–1015 (2019). https://doi.org/10.1007/s10489-018-1307-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-018-1307-y