Empirical game-theoretic methods for adaptive cyber-defense

MP Wellman, TH Nguyen, and M Wright in S Jajodia et al. (Eds.): Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, LNCS 11830, pages 112–128, 2019. Abstract Game-theoretic applications in cyber-security are often restricted…

Cap-and-trade emissions regulation: A strategic analysis

F Cheng , Y Engel, and MP Wellman Proceedings of the 28th International Joint Conference on Artificial Intelligence, pages 187–193, August 2019. Abstract Cap-and-trade schemes are designed to achieve target levels of regulated emissions…

Probably almost-stable strategy profiles in simulation-based games

M Wright and MP Wellman AAMAS-19 Workshop on Games, Agents and Incentives, May 2019. Abstract Empirical studies of strategic settings commonly model player interactions under supposed game-theoretic equilibrium behavior, to predict what…

Iterated Deep Reinforcement Learning in Games: History-Aware Training for Improved Stability

M Wright, Y Wang, and MP Wellman Proceedings of the 20th ACM Conference on Economics and Computation, pages 617-636, June 2019. Abstract Deep reinforcement learning (RL) is a powerful method for generating policies in complex environments,…

Machine Behaviour

I Rahwan, M Cebrian, N Obradovich, J Bongard, 18 others, and MP Wellman Nature, 568:477–486, 2019. Abstract Machines powered by artificial intelligence increasingly mediate our social, cultural, economic and political interactions. Understanding…

Incentivizing Collaboration in a Competition

A Sinha and MP Wellman Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 556–564, May 2019. Abstract Research and design competitions aim to promote innovation or creative production,…

Deception in Finitely Repeated Security Games

TH Nguyen, Y Wang, A Sinha, and MP Wellman 33rd AAAI Conference on Artificial Intelligence, Jan/Feb 2019. Abstract Allocating resources to defend targets from attack is often complicated by uncertainty about the attacker’s capabilities,…