[PDF][PDF] Comparing Strategic Secrecy and Stackelberg Commitment in Security Games.

Q Guo, B An, B Bosanský, C Kiekintveld - IJCAI, 2017 - ijcai.org
Abstract The Strong Stackelberg Equilibrium (SSE) has drawn extensive attention recently in
several security domains. However, the SSE concept neglects the advantage of defender's …

Strategic coordination of human patrollers and mobile sensors with signaling for security games

H Xu, K Wang, P Vayanos, M Tambe - Proceedings of the AAAI …, 2018 - ojs.aaai.org
Traditional security games concern the optimal randomized allocation of human patrollers,
who can directly catch attackers or interdict attacks. Motivated by the emerging application of …

Pretty Good Strategies for Benaloh Challenge

W Jamroga - International Joint Conference on Electronic Voting, 2023 - Springer
Benaloh challenge allows the voter to audit the encryption of her vote, and in particular to
check whether the vote has been represented correctly. An interesting analysis of the …

[PDF][PDF] Protecting election from bribery: New approach and computational complexity characterization

L Chen, L Xu, S Xu, Z Gao, N Shah… - Proceedings of the …, 2018 - aamas.csc.liv.ac.uk
The bribery problem in elections has received a considerable amount of attention. In this
paper, we initiate the study of a related, but new problem, the protection problem, namely …

Optimal defense against election control by deleting voter groups

Y Yin, Y Vorobeychik, B An, N Hazon - Artificial Intelligence, 2018 - Elsevier
Election control encompasses attempts from an external agent to alter the structure of an
election in order to change its outcome. This problem is both a fundamental theoretical …

Preventing coercion in e-voting: Be open and commit

W Jamroga, M Tabatabaei - … Voting: First International Joint Conference, E …, 2017 - Springer
We present a game-theoretic approach to coercion-resistance from the point of view of an
honest election authority that chooses between various protection methods with different …

Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving

Y Jie, CZ Liu, M Li, KKR Choo, L Chen… - Applied Mathematics and …, 2020 - Elsevier
To reduce the number of deaths and injuries due to drunk driving (also referred to as drink
driving, driving while intoxicated, and driving under the influence of alcohol in the literature) …

[HTML][HTML] A parameterized perspective on protecting elections

P Dey, N Misra, S Nath, G Shakya - Theoretical Computer Science, 2021 - Elsevier
We study the parameterized complexity of the Optimal Defense and Optimal Attack problems
in voting. In both the problems, the input is a set of voter groups (every voter group is a …

Defending with shared resources on a network

M Li, L Tran-Thanh, X Wu - Proceedings of the AAAI Conference on …, 2020 - aaai.org
In this paper we consider a defending problem on a network. In the model, the defender
holds a total defending resource of R, which can be distributed to the nodes of the network …

The game among bribers in a smart contract system

L Chen, L Xu, Z Gao, N Shah, TC Le, Y Lu… - … Cryptography and Data …, 2019 - Springer
Blockchain has been used to build various applications, and the introduction of smart
contracts further extends its impacts. Most of existing works consider the positive usage of …