Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game...
Transcript of Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game...
![Page 1: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/1.jpg)
Data-Aware Game Theory and Mechanism Design
for Security, Sustainability and Mobility
Fei Fang
Wean Hall 4126
![Page 2: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/2.jpg)
Societal Challenges: Security and Sustainability
9/12/20172
![Page 3: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/3.jpg)
Societal Challenges: Security and Sustainability
Today
≈ 3,200
100 years ago
≈ 60,000
9/12/20173
![Page 4: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/4.jpg)
Societal Challenges: Security and Sustainability
Physical Infrastructure Transportation Networks Cyber Systems
Environmental Resources Endangered Wildlife Fisheries
9/12/20174
![Page 5: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/5.jpg)
Societal Challenges: Security and Sustainability
Improve tactics of patrol, inspection, screening etc
9/12/2017
Game Theoretic
Reasoning
Attacker
Defender
5
![Page 6: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/6.jpg)
Game Theoretic Reasoning
Limited resource allocation
Adversary surveillance
Target #1 Target #2
Target #1 5, -3 -1, 1
Target #2 -5, 4 2, -1
Adversary
Defender
9/12/20176/64
![Page 7: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/7.jpg)
Game Theoretic Reasoning
Limited resource allocation
Adversary surveillance
Target #1 Target #2
Target #1 5, -3 -1, 1
Target #2 -5, 4 2, -1
Adversary
Defender
9/12/20177/64
![Page 8: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/8.jpg)
Game Theoretic Reasoning
Randomization make defender unpredictable
Stackelberg Security game
Defender: Commits to mixed strategy
Adversary: Conduct surveillance and best responds
Target #1 Target #2
Target #1 5, -3 -1, 1
Target #2 -5, 4 2, -1
Adversary
Defender
55.6%
44.4%
9/12/20178/72
![Page 9: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/9.jpg)
Game Theoretic Reasoning
Strong Stackelberg Equilibrium Attacker break tie in favor of defender
AttEU1=0.556*(-3)+0.444*4=0.11
AttEU2=0.556*1+0.444*(-1)=0.11
DefEU1=0.556*5+0.444*(-5)=0.56
DefEU2=0.556*(-1)+0.444*2=0.332
Equilibrium: DefStrat=(0.556,0.444), AttStrat=(1,0)
9/12/20179
Target #1 Target #2
Target #1 5, -3 -1, 1
Target #2 -5, 4 2, -1
Adversary
Defender
55.6%
44.4%
![Page 10: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/10.jpg)
Computing SSE
General-sum
Multiple LP or MILP
Assume attacks target 𝑖∗
9/12/201710
Target #1 Target #2
Target #1 5, -3 -1, 1
Target #2 -5, 4 2, -1
Adversary
Defender
55.6%
44.4%
min𝑝1,𝑝2,…,𝑝𝑁
𝑣
s.t. 𝑣 ≥ 𝐴𝑡𝑡𝐸𝑈 𝑖 , ∀𝑖 = 1…𝑁
𝑖
𝑝𝑖 ≤ 1
min𝑝1,𝑝2,…,𝑝𝑁
𝐴𝑡𝑡𝐸𝑈 𝑖∗
s.t.𝐴𝑡𝑡𝐸𝑈 𝑖∗ ≥ 𝐴𝑡𝑡𝐸𝑈 𝑖 , ∀𝑖 = 1…𝑁
𝑖
𝑝𝑖 ≤ 1
𝐴𝑡𝑡𝐸𝑈 𝑖 = 𝑝𝑖𝑃𝑖𝑎 + (1 − 𝑝𝑖)𝑅𝑖
𝑎
Zero-sum
Single LP
SSE=NE
![Page 11: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/11.jpg)
Game Theoretic Reasoning
Compute optimal defender strategy
Polynomial time solvable in games with finite actions and
simple structures [Conitzer06]
NP-Hard in general settings [Korzhyk10]
SSE=NE for zero-sum games, SSE⊂NE for games with
special properties [Yin10]
Research Challenges
Massive scale games with constraints
Plan/reason under uncertainty
Repeated interaction
9/12/201711/67
![Page 12: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/12.jpg)
Game Theoretic Reasoning
9/12/201712/67
Attempt to address the research challenges
![Page 13: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/13.jpg)
Problem
Optimize the use of patrol resources
Moving targets: Fixed schedule
Potential attacks: Any time
Continuous time
9/12/201713/64
![Page 14: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/14.jpg)
Model
Attacker: Which target, when to attack
Defender: Choose a route for patrol boat
Payoff value for attacker: 𝑢𝑖(𝑡) if not protected, 0 if protected
Minimax: Minimize attacker’s expected utility assume attacker best responds
10:00:00 AM
Target 1
10:00:01 AM
Target 1…
10:30:00 AM
Target 3…
Purple Route
Orange Route
Blue Route
……
Def
end
er
Adversary
30%
40%
20%
5 4-5, -4, 00,
Attacker’s Expected Utility = Target Utility × Probability of Success
9/12/201714/64
![Page 15: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/15.jpg)
HOW TO FIND OPTIMAL DEFENDER STRATEGY
Step I: Compact representation for defender
10:00:00 AM
Target 1
10:00:01 AM
Target 1…
10:30:00 AM
Target 3…
Purple Route
Orange Route
Blue Route
……
Def
end
er
Adversary
5 4-5, -4, 00,
9/12/201715/64
![Page 16: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/16.jpg)
STEP I: COMPACT REPRESENTATION FOR DEFENDER
A, 10 minA
B
C
0 min 10 min 20 min
A, 0 min A, 20 min
B, 10 minB, 0 min B, 20 min
C, 10 minC, 0 min C, 20 min
Ferry 1
Attack
Attack
A B C
ManhattanStaten Island
9/12/201716/64
![Page 17: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/17.jpg)
STEP I: COMPACT REPRESENTATION FOR DEFENDER
Full representation: Focus on routes (𝑁𝑇)
Prob(Orange Route) = 0.37 Prob(Green Route) = 0.33
Prob(Blue Route) = 0.17 Prob(Purple Route) = 0.13
A, 10 minA
B
C
0 min 10 min 20 min
A, 0 min A, 20 min
B, 10 minB, 0 min B, 20 min
C, 10 minC, 0 min C, 20 min
Patroller
9/12/201717/64
![Page 18: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/18.jpg)
STEP I: COMPACT REPRESENTATION FOR DEFENDER
Full representation: Focus on routes (𝑁𝑇)
Prob(Orange Route) = 0.37 Prob(Green Route) = 0.33
Prob(Blue Route) = 0.17 Prob(Purple Route) = 0.13
Linear program
min𝑝1,𝑝2,…,𝑝𝑅
𝑣
s.t. 𝑣 ≥ 𝐴𝑡𝑡𝐸𝑈 𝑖, 𝑡 ,For all target 𝑖, time point 𝑡
Best response
Probability of route
(𝑁𝑇 variables)
9/12/201718/64
![Page 19: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/19.jpg)
STEP I: COMPACT REPRESENTATION FOR DEFENDER
Compact representation: Focus on edges (𝑁2𝑇)
Probability flow over each edge
A, 10 minA
B
C
0 min 10 min 20 min
A, 0 min A, 20 min
B, 10 minB, 0 min B, 20 min
C, 10 minC, 0 min C, 20 min
p(Blue) = 0.17
p(Purple) = 0.13
0.3
Patroller
9/12/201719/64
![Page 20: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/20.jpg)
STEP I: COMPACT REPRESENTATION FOR DEFENDER
Theorem 1: Let 𝑝, 𝑝′ be two defender strategies in
full representation, and the compact representation
for both strategies is 𝑓, then 𝐴𝑡𝑡𝐸𝑈𝑝𝑖 𝑡 =
𝐴𝑡𝑡𝐸𝑈𝑝′𝑖 𝑡 , and 𝐷𝑒𝑓𝐸𝑈𝑝
𝑖 𝑡 = 𝐷𝑒𝑓𝐸𝑈𝑝′𝑖 𝑡 , ∀𝑡
Compact representation does not lead to any loss
𝑁𝑇 → 𝑁2𝑇
9/12/201720/64
![Page 21: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/21.jpg)
HOW TO FIND OPTIMAL DEFENDER STRATEGY
Step I: Compact representation for defender
Step II: Compact representation for attacker
10:00:00 AM
Target 1
10:00:01 AM
Target 1…
10:30:00 AM
Target 3…
Purple Route
Orange Route
Blue Route
……
Def
end
er 5 4-5, -4, 00,
Adversary
9/12/201721/64
![Page 22: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/22.jpg)
STEP II: COMPACT REPRESENTATION FOR ATTACKER
Partition attacker action set
Only need to reason about a few attacker actions
A, 10 minA
B
C
0 min 10 min 20 min
A, 0 min A, 20 min
B, 10 minB, 0 min B, 20 min
C, 10 minC, 0 min C, 20 min
Ferry 1
Attack
9 min
9/12/201722/64
![Page 23: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/23.jpg)
STEP II: COMPACT REPRESENTATION FOR ATTACKER
Partition points 𝜃𝑘: When protection status changes
Unprotected
Enter
Protected
Leave
Unprotected
𝜃1
𝜃2
9/12/201723/64
![Page 24: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/24.jpg)
STEP II: COMPACT REPRESENTATION FOR ATTACKER
Partition points 𝜃𝑘: When protection status changes
A, 10 minA
B
C
0 min 10 min 20 min
A, 0 min A, 20 min
B, 10 minB, 0 min B, 20 min
C, 10 minC, 0 min C, 20 min
𝜃1 𝜃2
9/12/201724/64
![Page 25: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/25.jpg)
STEP II: COMPACT REPRESENTATION FOR ATTACKER
𝐴𝑡𝑡𝐸𝑈 = Target Utility(t) ×Probability of Success
One best time point in each zone
A, 10 minA
B
C
0 min 10 min 20 min
A, 0 min A, 20 min
B, 10 minB, 0 min B, 20 min
C, 10 minC, 0 min C, 20 min
𝜃1 𝜃2
Fixed
9/12/201725/64
![Page 26: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/26.jpg)
STEP II: COMPACT REPRESENTATION FOR ATTACKER
𝐴𝑡𝑡𝐸𝑈 = Target Utility(t) ×Probability of Success
One best time point in each zone
0 min 10 min𝜃1 𝜃2
Target Utility(t)
Fixed
9/12/201726/64
![Page 27: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/27.jpg)
STEP II: COMPACT REPRESENTATION FOR ATTACKER
𝐴𝑡𝑡𝐸𝑈 = Target Utility(t) ×Probability of Success
One best time point in each zone
A, 10 minA
B
C
0 min 10 min 20 min
A, 0 min A, 20 min
B, 10 minB, 0 min B, 20 min
C, 10 minC, 0 min C, 20 min0.3
Fixed
0.1
9/12/201727/64
![Page 28: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/28.jpg)
STEP II: COMPACT REPRESENTATION FOR ATTACKER
Theorem 2: Given target utility function 𝑢𝑖 𝑡 , assume the defender’s pure strategy is restricted to
be a mapping from 𝒕 to 𝒅 , then in the attacker’s best response, attacking time 𝑡∗ ∈ 𝒕∗ ={𝑡|∃𝑖, 𝑗 such that 𝑡 = 𝑎𝑟𝑔 max
𝑡′∈ 𝜃𝑗,𝜃𝑗+1𝑢𝑖 𝑡
′ }
Only considering the best time points does not lead to any loss when attacker best responds
∞ → 𝑂(𝑁2𝑇)
9/12/201728/64
![Page 29: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/29.jpg)
HOW TO FIND OPTIMAL DEFENDER STRATEGY
Step I: Compact representation for defender
Step II: Compact representation for attacker
Step III: Consider infinite defender action set
Step IV: Equilibrium refinement
9/12/201729/64
![Page 30: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/30.jpg)
EVALUATION: SIMULATION RESULTS
Randomly chosen utility function
Attacker’s expected utility (lower is better)
0
1
2
3
4
5
6
7
Att
acke
r EU
Previous USCG Game-theoretic
9/12/201730/64
![Page 31: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/31.jpg)
EVALUATION: FEEDBACK FROM REAL-WORLD
US Coast Guard evaluation Point defense to zone defense
Increased randomness
Mock attacker
Patrollers feedback More dynamic (speed change, U-turn)
Professional mariners’ observation Apparent increase in Coast Guard patrols
Used by USCG (without being forced)
9/12/201731/64
![Page 32: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/32.jpg)
PUBLIC FEEDBACK
9/12/201732/64
![Page 33: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/33.jpg)
EXTEND TO 2-D NETWORK
Complex ferry system: Seattle, San Francisco
Calculate partition points in 3D space
9/12/201733/64
![Page 34: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/34.jpg)
Societal Challenges: Security and Sustainability
Improve tactics of patrol, inspection, screening etc
9/12/201734/67
Machine Learning
Fine-Grained
Planning
Game Theoretic
Reasoning
![Page 35: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/35.jpg)
Machine Learning
Learn from data
Predict threat: Classification / Regression
Build and learn behavioral model
Source of data
Human subject experiments
Real-world data
Research Challenges
Sparsity
Class imbalance
Uncertainty / noise
9/12/201735
![Page 36: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/36.jpg)
Machine Learning
Attempt to address the research
challenges
Queen Elizabeth National Park
Features
Terrain (e.g., forest, slope)
Distance to {Town, Water, Outpost}
Monthly Ranger Coverage
Labels
Crime Observations
Real-world deployment
1-month trial test
8-month controlled test
9/12/2017
High Low
Catch Per
Unit Effort0.12 0.01
36
![Page 37: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/37.jpg)
Behind the Scene
Hybrid spatio-temporal models
Decision Trees, Bagging
Markov Random Fields
Behavioral game theory
Quantal response-based models
9/12/201737
![Page 38: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/38.jpg)
Societal Challenges: Security and Sustainability
Improve tactics of patrol, inspection, screening etc
9/12/2017
Machine Learning
Fine-Grained
Planning
Game Theoretic
Reasoning
38
![Page 39: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/39.jpg)
Fine-Grained Planning
9/12/201739
![Page 40: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/40.jpg)
Fine-Grained Planning
9/12/201740
![Page 41: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/41.jpg)
(Not) Fine-Grained Planning
9/12/201741
Animal density (utility)
represented by color
Max patrol length=10
Attack two cells
1 2 3 4
Cell1&2 Cell 2&3 … Cell 3&4 …
Purple Route
Orange Route
Blue Route
……
Def
end
er
Adversary
30%
40%
20%
2 0-2, 0, 5-5,
![Page 42: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/42.jpg)
(Not) Fine-Grained Planning
Option 1: Go back to time-location graph
Only apply to integer-valued distance
Generalizable to general-sum games
9/12/201742
A, 1A
B
(Base)
C
T=0 T=1 T=2
A, 0 A, 2
B, 10B, 0 B, 2
C, 10 minC, 0 C, 2 Ranger
Attack
![Page 43: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/43.jpg)
(Not) Fine-Grained Planning
Option 1: Go back to time-location graph
Only apply to integer-valued distance
Generalizable to general-sum games
Option 2: Incremental strategy generation
Generalizable to fine-grained planning
Only apply to zero-sum games
9/12/201743
![Page 44: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/44.jpg)
Incremental Strategy Generation
Start with a subset of actions for each player
Compute NE strategy for both players In zero-sum games, SSE=NE for defender
Fix attacker strategy, compute best route for defender among all possible routes (coin collection problem), add to the matrix
Fix defender strategy, compute best cells for attacker among all possible choices (greedy), add to the matrix
Re-compute NE
Repeat until best responses already in the matrix
9/12/201744
Cell1&2 Cell 2&3
Purple Route
Orange Route
Def
end
er
Adversary
30%
70%
2 0-2, 0,
60% 40%
1 2 3 4
19 20
Blue Route
Cell 18&19
![Page 45: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/45.jpg)
(Not) Fine-Grained Planning
Option 1: Go back to time-location graph
Only apply to integer-valued distance
Generalizable to general-sum games
Option 2: Incremental strategy generation
Generalizable to fine-grained planning
Only apply to zero-sum games
Option 3: Cutting plane
Generalizable to fine-grained planning
Generalizable to general-sum games
9/12/201745
![Page 46: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/46.jpg)
Cutting Plane
Focus on the coverage probability
𝑐1 = 0, 𝑐2 = 0.3, 𝑐7 = 0.3 + 0.7 = 1, …
9/12/201746
Cell1&2 Cell 2&3
Purple Route
Orange Route
Def
end
er
Adversary
30%
70%
2 0-2, 0,
60% 40%
1 2 3 4
7
![Page 47: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/47.jpg)
Cutting Plane
Calculate coverage prob. 𝑐
Is 𝑐 implementable?
Yes
Solution Found
No Find a constraint
𝑔 𝑐 ≤ 0
with constraint 𝑔 𝑐 ≤ 0
2/14/201647/45 RongYang, Albert Xin Jiang, Milind Tambe, Fernando Ordonez. Scaling-up Security Games
with Boundedly Rational Adversaries: A Cutting-plane Approach. IJCAI'13
![Page 48: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/48.jpg)
Cutting Plane
Is 𝑐 implementable?No Find a constraint
𝑔 𝑐 ≤ 0
∃𝑝, such that 𝑐𝑖 = 𝑗 𝑝𝑗𝐴𝑗𝑖 𝑧 = min𝑝
𝑐 − 𝐴𝑇𝑝 1
if 𝑧 = 0, implementable
if 𝑧 > 0, found 𝑝∗ and 𝑔
Prob. of taking each route
2/14/201648/45
0.1 0.3 0.1 0.05 0
0 0.05 0 0.1 0.05
0.1 0.15 0.2 0.18 0.15
0.03 0.03 0.3 0.03 0.18
0.05 0.2 0.18 0.03 0.05
![Page 49: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/49.jpg)
Cutting Plane
𝑧 = min𝑝
𝑐 − 𝐴𝑇𝑝 1
Prob. of taking each route
Not enumerate all routes?
Column generation!
Master: solve relaxed problem with a
small set of patrol routes
Slave: find new route to add to set
2/14/201649/45
![Page 50: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/50.jpg)
Cutting Plane
Calculate coverage prob.
Check feasibility with a subset of
routes
Find routes that can help match the
coverage prob.
Check feasibility of coverage prob.,
return linear constraint
2/14/201650/45
![Page 51: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/51.jpg)
Behind the Scene
Hierarchical Modeling
Find implementable game-theoretic solutions
Incremental strategy generation
Cutting plane
9/12/201751
![Page 52: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/52.jpg)
PAWS (Protection Assistant for Wildlife Security)
9/12/2017
Protected Area Information
Past Patrolling and Poaching Information
Patrol RoutesPoaching Data Collected
Machine Learning
Game-theoretic Reasoning
Fine-Grained Planning
52
![Page 53: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/53.jpg)
Real-World Deployment
In collaboration with Panthera, Rimba
Regular deployment since July 2015 (Malaysia)
9/12/201753
![Page 54: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/54.jpg)
Real-World Deployment
Animal Footprint
Tiger Sign
Tree Mark
Lighter
Camping Sign
9/12/201754
![Page 55: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/55.jpg)
Societal Challenges: Mobility
New modes of transportation
9/12/2017
Image from: http://lighthouse-sf.org/ Image from: http://transitized.com/
57
![Page 56: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/56.jpg)
Societal Challenges: Mobility
Ensure efficiency of on-demand ridesharing through
scheduling and pricing
9/12/201758
Scheduling
Mechanism Design
Pricing
![Page 57: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/57.jpg)
Mechanism Design
9/12/201759
![Page 58: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/58.jpg)
Societal Challenges: Mobility
Ensure efficiency of on-demand ridesharing through
scheduling and pricing (Future Directions)
9/12/201761
Machine Learning
Predict demand/supply
Learn behavioral models
Scheduling
Mechanism Design
Pricing
![Page 59: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017 · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu](https://reader034.fdocuments.net/reader034/viewer/2022042222/5ec8bdb2af942b1df87af081/html5/thumbnails/59.jpg)
AI for Social Good
AI research that can deliver societal benefits now and
in the near future
Artificial Intelligence Methods for Social Good
Spring 2018: 08-537 (9-unit) and 08-737 (12-unit)
Machine Learning
Game Theory and Mechanism Design
Sequential Decision Making
Planning and Optimization
(i) healthcare, (ii) social welfare, (iii) security and privacy, (iv)
environmental sustainability
http://aiandsocialgood.org
9/12/201763