59
Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang [email protected] Wean Hall 4126

Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang [email protected]

  • Upload
    others

  • View
    10

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Data-Aware Game Theory and Mechanism Design

for Security, Sustainability and Mobility

Fei Fang

[email protected]

Wean Hall 4126

Page 2: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Societal Challenges: Security and Sustainability

9/12/20172

Page 3: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Societal Challenges: Security and Sustainability

Today

≈ 3,200

100 years ago

≈ 60,000

9/12/20173

Page 4: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Societal Challenges: Security and Sustainability

Physical Infrastructure Transportation Networks Cyber Systems

Environmental Resources Endangered Wildlife Fisheries

9/12/20174

Page 5: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Societal Challenges: Security and Sustainability

Improve tactics of patrol, inspection, screening etc

9/12/2017

Game Theoretic

Reasoning

Attacker

Defender

5

Page 6: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Game Theoretic Reasoning

Limited resource allocation

Adversary surveillance

Target #1 Target #2

Target #1 5, -3 -1, 1

Target #2 -5, 4 2, -1

Adversary

Defender

9/12/20176/64

Page 7: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Game Theoretic Reasoning

Limited resource allocation

Adversary surveillance

Target #1 Target #2

Target #1 5, -3 -1, 1

Target #2 -5, 4 2, -1

Adversary

Defender

9/12/20177/64

Page 8: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Game Theoretic Reasoning

Randomization make defender unpredictable

Stackelberg Security game

Defender: Commits to mixed strategy

Adversary: Conduct surveillance and best responds

Target #1 Target #2

Target #1 5, -3 -1, 1

Target #2 -5, 4 2, -1

Adversary

Defender

55.6%

44.4%

9/12/20178/72

Page 9: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Game Theoretic Reasoning

Strong Stackelberg Equilibrium Attacker break tie in favor of defender

AttEU1=0.556*(-3)+0.444*4=0.11

AttEU2=0.556*1+0.444*(-1)=0.11

DefEU1=0.556*5+0.444*(-5)=0.56

DefEU2=0.556*(-1)+0.444*2=0.332

Equilibrium: DefStrat=(0.556,0.444), AttStrat=(1,0)

9/12/20179

Target #1 Target #2

Target #1 5, -3 -1, 1

Target #2 -5, 4 2, -1

Adversary

Defender

55.6%

44.4%

Page 10: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Computing SSE

General-sum

Multiple LP or MILP

Assume attacks target 𝑖∗

9/12/201710

Target #1 Target #2

Target #1 5, -3 -1, 1

Target #2 -5, 4 2, -1

Adversary

Defender

55.6%

44.4%

min𝑝1,𝑝2,…,𝑝𝑁

𝑣

s.t. 𝑣 ≥ 𝐴𝑡𝑡𝐸𝑈 𝑖 , ∀𝑖 = 1…𝑁

𝑖

𝑝𝑖 ≤ 1

min𝑝1,𝑝2,…,𝑝𝑁

𝐴𝑡𝑡𝐸𝑈 𝑖∗

s.t.𝐴𝑡𝑡𝐸𝑈 𝑖∗ ≥ 𝐴𝑡𝑡𝐸𝑈 𝑖 , ∀𝑖 = 1…𝑁

𝑖

𝑝𝑖 ≤ 1

𝐴𝑡𝑡𝐸𝑈 𝑖 = 𝑝𝑖𝑃𝑖𝑎 + (1 − 𝑝𝑖)𝑅𝑖

𝑎

Zero-sum

Single LP

SSE=NE

Page 11: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Game Theoretic Reasoning

Compute optimal defender strategy

Polynomial time solvable in games with finite actions and

simple structures [Conitzer06]

NP-Hard in general settings [Korzhyk10]

SSE=NE for zero-sum games, SSE⊂NE for games with

special properties [Yin10]

Research Challenges

Massive scale games with constraints

Plan/reason under uncertainty

Repeated interaction

9/12/201711/67

Page 12: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Game Theoretic Reasoning

9/12/201712/67

Attempt to address the research challenges

Page 13: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Problem

Optimize the use of patrol resources

Moving targets: Fixed schedule

Potential attacks: Any time

Continuous time

9/12/201713/64

Page 14: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Model

Attacker: Which target, when to attack

Defender: Choose a route for patrol boat

Payoff value for attacker: 𝑢𝑖(𝑡) if not protected, 0 if protected

Minimax: Minimize attacker’s expected utility assume attacker best responds

10:00:00 AM

Target 1

10:00:01 AM

Target 1…

10:30:00 AM

Target 3…

Purple Route

Orange Route

Blue Route

……

Def

end

er

Adversary

30%

40%

20%

5 4-5, -4, 00,

Attacker’s Expected Utility = Target Utility × Probability of Success

9/12/201714/64

Page 15: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

HOW TO FIND OPTIMAL DEFENDER STRATEGY

Step I: Compact representation for defender

10:00:00 AM

Target 1

10:00:01 AM

Target 1…

10:30:00 AM

Target 3…

Purple Route

Orange Route

Blue Route

……

Def

end

er

Adversary

5 4-5, -4, 00,

9/12/201715/64

Page 16: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

STEP I: COMPACT REPRESENTATION FOR DEFENDER

A, 10 minA

B

C

0 min 10 min 20 min

A, 0 min A, 20 min

B, 10 minB, 0 min B, 20 min

C, 10 minC, 0 min C, 20 min

Ferry 1

Attack

Attack

A B C

ManhattanStaten Island

9/12/201716/64

Page 17: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

STEP I: COMPACT REPRESENTATION FOR DEFENDER

Full representation: Focus on routes (𝑁𝑇)

Prob(Orange Route) = 0.37 Prob(Green Route) = 0.33

Prob(Blue Route) = 0.17 Prob(Purple Route) = 0.13

A, 10 minA

B

C

0 min 10 min 20 min

A, 0 min A, 20 min

B, 10 minB, 0 min B, 20 min

C, 10 minC, 0 min C, 20 min

Patroller

9/12/201717/64

Page 18: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

STEP I: COMPACT REPRESENTATION FOR DEFENDER

Full representation: Focus on routes (𝑁𝑇)

Prob(Orange Route) = 0.37 Prob(Green Route) = 0.33

Prob(Blue Route) = 0.17 Prob(Purple Route) = 0.13

Linear program

min𝑝1,𝑝2,…,𝑝𝑅

𝑣

s.t. 𝑣 ≥ 𝐴𝑡𝑡𝐸𝑈 𝑖, 𝑡 ,For all target 𝑖, time point 𝑡

Best response

Probability of route

(𝑁𝑇 variables)

9/12/201718/64

Page 19: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

STEP I: COMPACT REPRESENTATION FOR DEFENDER

Compact representation: Focus on edges (𝑁2𝑇)

Probability flow over each edge

A, 10 minA

B

C

0 min 10 min 20 min

A, 0 min A, 20 min

B, 10 minB, 0 min B, 20 min

C, 10 minC, 0 min C, 20 min

p(Blue) = 0.17

p(Purple) = 0.13

0.3

Patroller

9/12/201719/64

Page 20: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

STEP I: COMPACT REPRESENTATION FOR DEFENDER

Theorem 1: Let 𝑝, 𝑝′ be two defender strategies in

full representation, and the compact representation

for both strategies is 𝑓, then 𝐴𝑡𝑡𝐸𝑈𝑝𝑖 𝑡 =

𝐴𝑡𝑡𝐸𝑈𝑝′𝑖 𝑡 , and 𝐷𝑒𝑓𝐸𝑈𝑝

𝑖 𝑡 = 𝐷𝑒𝑓𝐸𝑈𝑝′𝑖 𝑡 , ∀𝑡

Compact representation does not lead to any loss

𝑁𝑇 → 𝑁2𝑇

9/12/201720/64

Page 21: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

HOW TO FIND OPTIMAL DEFENDER STRATEGY

Step I: Compact representation for defender

Step II: Compact representation for attacker

10:00:00 AM

Target 1

10:00:01 AM

Target 1…

10:30:00 AM

Target 3…

Purple Route

Orange Route

Blue Route

……

Def

end

er 5 4-5, -4, 00,

Adversary

9/12/201721/64

Page 22: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

STEP II: COMPACT REPRESENTATION FOR ATTACKER

Partition attacker action set

Only need to reason about a few attacker actions

A, 10 minA

B

C

0 min 10 min 20 min

A, 0 min A, 20 min

B, 10 minB, 0 min B, 20 min

C, 10 minC, 0 min C, 20 min

Ferry 1

Attack

9 min

9/12/201722/64

Page 23: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

STEP II: COMPACT REPRESENTATION FOR ATTACKER

Partition points 𝜃𝑘: When protection status changes

Unprotected

Enter

Protected

Leave

Unprotected

𝜃1

𝜃2

9/12/201723/64

Page 24: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

STEP II: COMPACT REPRESENTATION FOR ATTACKER

Partition points 𝜃𝑘: When protection status changes

A, 10 minA

B

C

0 min 10 min 20 min

A, 0 min A, 20 min

B, 10 minB, 0 min B, 20 min

C, 10 minC, 0 min C, 20 min

𝜃1 𝜃2

9/12/201724/64

Page 25: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

STEP II: COMPACT REPRESENTATION FOR ATTACKER

𝐴𝑡𝑡𝐸𝑈 = Target Utility(t) ×Probability of Success

One best time point in each zone

A, 10 minA

B

C

0 min 10 min 20 min

A, 0 min A, 20 min

B, 10 minB, 0 min B, 20 min

C, 10 minC, 0 min C, 20 min

𝜃1 𝜃2

Fixed

9/12/201725/64

Page 26: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

STEP II: COMPACT REPRESENTATION FOR ATTACKER

𝐴𝑡𝑡𝐸𝑈 = Target Utility(t) ×Probability of Success

One best time point in each zone

0 min 10 min𝜃1 𝜃2

Target Utility(t)

Fixed

9/12/201726/64

Page 27: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

STEP II: COMPACT REPRESENTATION FOR ATTACKER

𝐴𝑡𝑡𝐸𝑈 = Target Utility(t) ×Probability of Success

One best time point in each zone

A, 10 minA

B

C

0 min 10 min 20 min

A, 0 min A, 20 min

B, 10 minB, 0 min B, 20 min

C, 10 minC, 0 min C, 20 min0.3

Fixed

0.1

9/12/201727/64

Page 28: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

STEP II: COMPACT REPRESENTATION FOR ATTACKER

Theorem 2: Given target utility function 𝑢𝑖 𝑡 , assume the defender’s pure strategy is restricted to

be a mapping from 𝒕 to 𝒅 , then in the attacker’s best response, attacking time 𝑡∗ ∈ 𝒕∗ ={𝑡|∃𝑖, 𝑗 such that 𝑡 = 𝑎𝑟𝑔 max

𝑡′∈ 𝜃𝑗,𝜃𝑗+1𝑢𝑖 𝑡

′ }

Only considering the best time points does not lead to any loss when attacker best responds

∞ → 𝑂(𝑁2𝑇)

9/12/201728/64

Page 29: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

HOW TO FIND OPTIMAL DEFENDER STRATEGY

Step I: Compact representation for defender

Step II: Compact representation for attacker

Step III: Consider infinite defender action set

Step IV: Equilibrium refinement

9/12/201729/64

Page 30: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

EVALUATION: SIMULATION RESULTS

Randomly chosen utility function

Attacker’s expected utility (lower is better)

0

1

2

3

4

5

6

7

Att

acke

r EU

Previous USCG Game-theoretic

9/12/201730/64

Page 31: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

EVALUATION: FEEDBACK FROM REAL-WORLD

US Coast Guard evaluation Point defense to zone defense

Increased randomness

Mock attacker

Patrollers feedback More dynamic (speed change, U-turn)

Professional mariners’ observation Apparent increase in Coast Guard patrols

Used by USCG (without being forced)

9/12/201731/64

Page 32: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

PUBLIC FEEDBACK

9/12/201732/64

Page 33: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

EXTEND TO 2-D NETWORK

Complex ferry system: Seattle, San Francisco

Calculate partition points in 3D space

9/12/201733/64

Page 34: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Societal Challenges: Security and Sustainability

Improve tactics of patrol, inspection, screening etc

9/12/201734/67

Machine Learning

Fine-Grained

Planning

Game Theoretic

Reasoning

Page 35: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Machine Learning

Learn from data

Predict threat: Classification / Regression

Build and learn behavioral model

Source of data

Human subject experiments

Real-world data

Research Challenges

Sparsity

Class imbalance

Uncertainty / noise

9/12/201735

Page 36: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Machine Learning

Attempt to address the research

challenges

Queen Elizabeth National Park

Features

Terrain (e.g., forest, slope)

Distance to {Town, Water, Outpost}

Monthly Ranger Coverage

Labels

Crime Observations

Real-world deployment

1-month trial test

8-month controlled test

9/12/2017

High Low

Catch Per

Unit Effort0.12 0.01

36

Page 37: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Behind the Scene

Hybrid spatio-temporal models

Decision Trees, Bagging

Markov Random Fields

Behavioral game theory

Quantal response-based models

9/12/201737

Page 38: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Societal Challenges: Security and Sustainability

Improve tactics of patrol, inspection, screening etc

9/12/2017

Machine Learning

Fine-Grained

Planning

Game Theoretic

Reasoning

38

Page 39: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Fine-Grained Planning

9/12/201739

Page 40: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Fine-Grained Planning

9/12/201740

Page 41: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

(Not) Fine-Grained Planning

9/12/201741

Animal density (utility)

represented by color

Max patrol length=10

Attack two cells

1 2 3 4

Cell1&2 Cell 2&3 … Cell 3&4 …

Purple Route

Orange Route

Blue Route

……

Def

end

er

Adversary

30%

40%

20%

2 0-2, 0, 5-5,

Page 42: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

(Not) Fine-Grained Planning

Option 1: Go back to time-location graph

Only apply to integer-valued distance

Generalizable to general-sum games

9/12/201742

A, 1A

B

(Base)

C

T=0 T=1 T=2

A, 0 A, 2

B, 10B, 0 B, 2

C, 10 minC, 0 C, 2 Ranger

Attack

Page 43: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

(Not) Fine-Grained Planning

Option 1: Go back to time-location graph

Only apply to integer-valued distance

Generalizable to general-sum games

Option 2: Incremental strategy generation

Generalizable to fine-grained planning

Only apply to zero-sum games

9/12/201743

Page 44: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Incremental Strategy Generation

Start with a subset of actions for each player

Compute NE strategy for both players In zero-sum games, SSE=NE for defender

Fix attacker strategy, compute best route for defender among all possible routes (coin collection problem), add to the matrix

Fix defender strategy, compute best cells for attacker among all possible choices (greedy), add to the matrix

Re-compute NE

Repeat until best responses already in the matrix

9/12/201744

Cell1&2 Cell 2&3

Purple Route

Orange Route

Def

end

er

Adversary

30%

70%

2 0-2, 0,

60% 40%

1 2 3 4

19 20

Blue Route

Cell 18&19

Page 45: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

(Not) Fine-Grained Planning

Option 1: Go back to time-location graph

Only apply to integer-valued distance

Generalizable to general-sum games

Option 2: Incremental strategy generation

Generalizable to fine-grained planning

Only apply to zero-sum games

Option 3: Cutting plane

Generalizable to fine-grained planning

Generalizable to general-sum games

9/12/201745

Page 46: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Cutting Plane

Focus on the coverage probability

𝑐1 = 0, 𝑐2 = 0.3, 𝑐7 = 0.3 + 0.7 = 1, …

9/12/201746

Cell1&2 Cell 2&3

Purple Route

Orange Route

Def

end

er

Adversary

30%

70%

2 0-2, 0,

60% 40%

1 2 3 4

7

Page 47: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Cutting Plane

Calculate coverage prob. 𝑐

Is 𝑐 implementable?

Yes

Solution Found

No Find a constraint

𝑔 𝑐 ≤ 0

with constraint 𝑔 𝑐 ≤ 0

2/14/201647/45 RongYang, Albert Xin Jiang, Milind Tambe, Fernando Ordonez. Scaling-up Security Games

with Boundedly Rational Adversaries: A Cutting-plane Approach. IJCAI'13

Page 48: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Cutting Plane

Is 𝑐 implementable?No Find a constraint

𝑔 𝑐 ≤ 0

∃𝑝, such that 𝑐𝑖 = 𝑗 𝑝𝑗𝐴𝑗𝑖 𝑧 = min𝑝

𝑐 − 𝐴𝑇𝑝 1

if 𝑧 = 0, implementable

if 𝑧 > 0, found 𝑝∗ and 𝑔

Prob. of taking each route

2/14/201648/45

0.1 0.3 0.1 0.05 0

0 0.05 0 0.1 0.05

0.1 0.15 0.2 0.18 0.15

0.03 0.03 0.3 0.03 0.18

0.05 0.2 0.18 0.03 0.05

Page 49: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Cutting Plane

𝑧 = min𝑝

𝑐 − 𝐴𝑇𝑝 1

Prob. of taking each route

Not enumerate all routes?

Column generation!

Master: solve relaxed problem with a

small set of patrol routes

Slave: find new route to add to set

2/14/201649/45

Page 50: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Cutting Plane

Calculate coverage prob.

Check feasibility with a subset of

routes

Find routes that can help match the

coverage prob.

Check feasibility of coverage prob.,

return linear constraint

2/14/201650/45

Page 51: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Behind the Scene

Hierarchical Modeling

Find implementable game-theoretic solutions

Incremental strategy generation

Cutting plane

9/12/201751

Page 52: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

PAWS (Protection Assistant for Wildlife Security)

9/12/2017

Protected Area Information

Past Patrolling and Poaching Information

Patrol RoutesPoaching Data Collected

Machine Learning

Game-theoretic Reasoning

Fine-Grained Planning

52

Page 53: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Real-World Deployment

In collaboration with Panthera, Rimba

Regular deployment since July 2015 (Malaysia)

9/12/201753

Page 54: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Real-World Deployment

Animal Footprint

Tiger Sign

Tree Mark

Lighter

Camping Sign

9/12/201754

Page 55: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Societal Challenges: Mobility

New modes of transportation

9/12/2017

Image from: http://lighthouse-sf.org/ Image from: http://transitized.com/

57

Page 56: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Societal Challenges: Mobility

Ensure efficiency of on-demand ridesharing through

scheduling and pricing

9/12/201758

Scheduling

Mechanism Design

Pricing

Page 57: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Mechanism Design

9/12/201759

Page 58: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

Societal Challenges: Mobility

Ensure efficiency of on-demand ridesharing through

scheduling and pricing (Future Directions)

9/12/201761

Machine Learning

Predict demand/supply

Learn behavioral models

Scheduling

Mechanism Design

Pricing

Page 59: Data-Aware Game Theory and Mechanism Design for Security ... · 9/12/2017  · Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu

AI for Social Good

AI research that can deliver societal benefits now and

in the near future

Artificial Intelligence Methods for Social Good

Spring 2018: 08-537 (9-unit) and 08-737 (12-unit)

Machine Learning

Game Theory and Mechanism Design

Sequential Decision Making

Planning and Optimization

(i) healthcare, (ii) social welfare, (iii) security and privacy, (iv)

environmental sustainability

http://aiandsocialgood.org

9/12/201763