L ECTURE 28: G AME T HEORY 3 I NSTRUCTOR : G IANNI A. D I C ARO M - - PowerPoint PPT Presentation

β–Ά
l ecture 28 g ame t heory 3
SMART_READER_LITE
LIVE PREVIEW

L ECTURE 28: G AME T HEORY 3 I NSTRUCTOR : G IANNI A. D I C ARO M - - PowerPoint PPT Presentation

15-382 C OLLECTIVE I NTELLIGENCE S18 L ECTURE 28: G AME T HEORY 3 I NSTRUCTOR : G IANNI A. D I C ARO M IXED N ASH E QUILIBRIUM R P S 1 3 ,1 3 , 1 3 , 1 3 ,1 3 , 1 3 R 0,0 -1,1 1,-1 Finding ME: & , ' & , ( & ,


slide-1
SLIDE 1

LECTURE 28: GAME THEORY 3

INSTRUCTOR: GIANNI A. DI CARO

15-382 COLLECTIVE INTELLIGENCE – S18

slide-2
SLIDE 2

15781 Fall 2016: Lecture 22

MIXED NASH EQUILIBRIUM

0,0

  • 1,1

1,-1 1,-1 0,0

  • 1,1
  • 1,1

1,-1 0,0

2

1 3 ,1 3 , 1 3 , 1 3 ,1 3 , 1 3

Finding ME: § Let 𝜌%

& ,𝜌' & ,𝜌( &, be the probabilities of the pure

strategy mix for player 𝑗 = 1,2, 𝜌%

& + 𝜌' & + 𝜌( & = 1

Β§ A mixed strategy equilibrium needs to make player 𝑗 indifferent among all three of his strategies (i.e. same expected utility) Β§ Γ  Find player 𝑗 expected utilities as a function of the parameters of the mixed strategy and set the parameters in order to satisfy the previous requirement R S P R P S

0,0

  • 2,2

1,-1 2,-2 0,0

  • 1,1
  • 1,1

1,-1 0,0

R S P R P S Β§ In symmetric zero-sum games the expected utility of the players at equilibrium is zero Γ  This property can be used to rule out equilibrium candidates (just check if one player has a positive utility!)

slide-3
SLIDE 3

3

GAME OF CHICKEN

http://youtu.be/u7hZ9jKrwvo

Β§ Each player, in attempting to secure his best outcome, risks the worst Β§ Every player wants to dare, but only if the other chickens out! Β§ A mediator would help…

slide-4
SLIDE 4

4

GAME OF CHICKEN

Β§ Social welfare is the sum of utilities Β§ Optimal social welfare = 6 Β§ Pure NE: (C,D) and (D,C), social welfare = 5 Β§ Mixed NE: both (.

/, . /), social

welfare = 4 Β§ Can we do better? Players are independent so far …

Dare Chicken Dare

0,0 4,1

Chicken

1,4 3,3

slide-5
SLIDE 5

5

CORRELATED EQUILIBRIUM

Β§ A β€œtrusted” authority / mediator chooses a pair of strategies (𝑑1, 𝑑2) according to a probability distribution π‘ž over 𝑇2 (it can be generalized to π‘œ players)

Β§ The mediator β€œflips a coin” / draw according to the distribution π‘ž(𝑑., 𝑑/) and, based on the outcome, tells the players which pure strategy to use based

Robert Aumann Nobel prize, 2005

slide-6
SLIDE 6

6

CORRELATED EQUILIBRIUM

Β§ Γ  The trusted party only tells each player what to do, but it does not reveal what the other party is supposed to do! Β§ The distribution 𝒒 is known to the players: each player knows the probability of observing a strategy profile and assumes the other player will follow mediator’s instructions Β§ Γ  Posterior conditional probability is known: Pr [𝑑&|𝑑

;]

Β§ It is a Correlated Equilibrium (CE) if no player wants to deviate from the trusted party’s instructions, such that choices are correlated Β§ Γ  Find distribution π‘ž that guarantees a CE

slide-7
SLIDE 7

Dare Chicken Dare

0,0 7,2

Chicken

2,7 6,6

7

CORRELATED EQUILIBRIUM

Β§ Common knowledge: Distribution π‘ž (is CE)

  • (D,D): 0
  • (D,C): .

>

  • (C,D): .

>

  • (C,C): .

>

Β§ If Player 2 is told to play D, then P2 knows that the outcome must be (C,D) and that Player 1 will obey the instructions Γ  P1 plays C ΓΌ Based on this, Player 2 has no incentive to change from playing D, as given

slide-8
SLIDE 8

8

CORRELATED EQUILIBRIUM

Β§ Distribution π‘ž (is CE)

  • (D,D): 0
  • (D,C): .

>

  • (C,D): .

>

  • (C,C): .

>

0,0 7,2 2,7 6,6

Β§ If Player 2 is told to play C, then 2 knows that the outcome must be (D,C) or (C,C) with equal probability. Β§ Player’s 2 expected utility on playing C conditioned on the fact that he is told to play C (and Player 1 will obey instructions) is:

. / 𝑣/ 𝐸, 𝐷 + . / 𝑣/ 𝐷, 𝐷 = . / 2 + . / 6 = 4

Β§ If Player 2 deviates from instructions and plays D: 𝑣/ = 3.5 < 4 ΓΌ It’s better to follow the instructions!

Chicken Dare Dare Chicken

slide-9
SLIDE 9

9

CORRELATED EQUILIBRIUM

Β§ Distribution π‘ž (is CE)

  • (D,D): 0
  • (D,C): .

>

  • (C,D): .

>

  • (C,C): .

>

Β§ Player 2 does not have incentive to deviate Β§ Since the game is symmetric, also Player 1 does not have incentive to deviate Β§ β†’ Correlated equilibrium! Β§ Expected reward per player: (1/3)*7 + (1/3)*2 + (1/3)*6 = 5 Β§ Mixed strategy NE: 4*(2/3), which is < 5 Β§ Social welfare: 30/3

0,0 7,2 2,7 6,6

Chicken Dare Dare Chicken

slide-10
SLIDE 10

10

CORRELATED EQUILIBRIUM

Β§ Let 𝑂 = {1,2} for simplicity Β§ A mediator chooses a pair of strategies (𝑑.,𝑑/) according to a distribution π‘ž over 𝑇/ Β§ Reveals 𝑑. to player 1 and 𝑑/ to player 2 Β§ When player 1 gets 𝑑. ∈ 𝑇, he knows that the distribution

  • ver strategies of 2 is

Pr 𝑑/ 𝑑. = Pr 𝑑. ∧ 𝑑/ Pr 𝑑. = π‘ž 𝑑., 𝑑/ βˆ‘ π‘ž(𝑑., 𝑑/

M) NO

P∈(

slide-11
SLIDE 11

11

COMPUTING CE STRATEGY

Β§ Player’s 1 strategy 𝑑. is a best response if its expected utility cannot be unilaterally improved based on what he knows: Q Pr 𝑑/ 𝑑. 𝑣. 𝑑.,𝑑/ β‰₯ Q Pr 𝑑/ 𝑑. 𝑣.(𝑑.

M,𝑑/) NO∈( NO∈(

, βˆ€π‘‘.

M ∈ 𝑇

Β§ Equivalently, replacing using Bayes’ rule Q π‘ž 𝑑., 𝑑/ 𝑣. 𝑑.,𝑑/ β‰₯ Q π‘ž 𝑑.,𝑑/ 𝑣.(𝑑.

M,𝑑/) NO∈( NO∈(

Β§ π‘ž is a correlated equilibrium (CE) if both players are best responding

slide-12
SLIDE 12

12

CE AS LP

Β§ Can compute CE via linear programming in polynomial time!

find π‘ž 𝑑., 𝑑/ s.t. βˆ€π‘‘., 𝑑.

M, 𝑑/ ∈ 𝑇,

βˆ€π‘‘., 𝑑/, 𝑑/

M ∈ 𝑇,

Q π‘ž 𝑑., 𝑑/ = 1

NT,NO∈(

βˆ€π‘‘., 𝑑/ ∈ 𝑇, π‘ž 𝑑., 𝑑/ ∈ [0,1]

Q π‘ž 𝑑.,𝑑/ 𝑣. 𝑑.,𝑑/ β‰₯ Q π‘ž 𝑑.,𝑑/ 𝑣.(𝑑.

M,𝑑/) NO∈U NO∈U

Q π‘ž 𝑑.,𝑑/ 𝑣/ 𝑑.,𝑑/ β‰₯ Q π‘ž 𝑑.,𝑑/ 𝑣/(𝑑.,𝑑/

M) NT∈U NT∈U

slide-13
SLIDE 13

13

BEST WELFARE CE

Β§ Adding an objective (linear) function f, the best correlated equilibrium (e.g., max welfare) can be found

max 𝑔(π‘ž 𝑑., 𝑑/ ;𝑣., 𝑣/)

s.t. βˆ€π‘‘., 𝑑.

M, 𝑑/ ∈ 𝑇,

βˆ€π‘‘., 𝑑/, 𝑑/

M ∈ 𝑇,

Q π‘ž 𝑑., 𝑑/ = 1

NT,NO∈(

βˆ€π‘‘., 𝑑/ ∈ 𝑇, π‘ž 𝑑., 𝑑/ ∈ [0,1]

Q π‘ž 𝑑.,𝑑/ 𝑣. 𝑑.,𝑑/ β‰₯ Q π‘ž 𝑑.,𝑑/ 𝑣.(𝑑.

M,𝑑/) NO∈U NO∈U

Q π‘ž 𝑑.,𝑑/ 𝑣/ 𝑑.,𝑑/ β‰₯ Q π‘ž 𝑑.,𝑑/ 𝑣/(𝑑.,𝑑/

M) NT∈U NT∈U

slide-14
SLIDE 14

14

IMPLEMENTATION OF CE

Β§ Instead of a mediator, use a hat! Β§ Balls in hat are labeled with β€œchicken” or β€œdare”, each blindfolded player takes a ball Which balls implement the distribution π‘ž before ?

  • 1. 1 chicken, 1 dare
  • 2. 2 chicken, 1 dare
  • 3. 2 chicken, 2 dare
  • 4. 3 chicken, 2 dare

C D D C C C D C

E.g., An automatic trusting authority can be implemented using cryptographic algorithms

slide-15
SLIDE 15

15

CE VS. NE

What is the relation between CE and NE? 1. CE β‡’ NE 2. NE β‡’ CE 3. NE ⇔ CE 4. NE βˆ₯ CE

Β§ For any pure strategy NE, there is a corresponding correlated equilibrium yielding the same outcome. Β§ For any mixed strategy NE, there is a corresponding correlated equilibrium yielding the same distribution of outcomes. Β§ From Nash theorem, β€œall” games have a mixed strategies NE”. Since a NE implies a CE, a CE always exist

slide-16
SLIDE 16

16

A DIFFERENT TYPE OF GAMES: STACKELBERG GAMES

Β§ Playing up is a dominant strategy for row player Β§ Row player plays up Β§ Column player would then play left Β§ Therefore, (1,1) is the only Nash equilibrium outcome

1,1 3,0 0,0 2,1

L R U D

slide-17
SLIDE 17

17

COMMITMENT IS GOOD

Β§ Suppose the game is played sequentially as follows:

  • Row player commits to playing

a row

  • Column player observes the

commitment and chooses a column Β§ Row player can commit to playing Down: Column player will play Right and the Row player gets now a better reward!

1,1 3,0 0,0 2,1

L R U D

slide-18
SLIDE 18

1,1 3,0 0,0 2,1

18

COMMITMENT TO MIXED STRATEGY

Β§ By committing to a mixed strategy, row player can get even better and guarantee a reward of almost 2.5: 0.49Γ—3 + 0.51Γ—2 Β§ Stackelberg strategy (1934) Β§ Rooted in duopoly scenarios

𝜌] = 0.49

Β§ Player 1 (Leader) moves at the start of the game. Then use backward induction to find the subgame perfect equilibrium. Β§ First for any output of leader, find the strategy of Follower that maximizes its payoff (its expected best reply). Β§ Next, find the strategy of leader that maximizes leader player utility, given the strategy of follower

𝜌^ = 0.51 𝜌% = 1 𝜌_ = 0

slide-19
SLIDE 19

19

COMPUTING STACKELBERG

Β§ Theorem [Conitzer and Sandholm, 2006]: In 2-player normal form games, an optimal Stackelberg strategy can be found in polynomial time Β§ Theorem: The problem is NP-hard when the number of players is β‰₯ 3

slide-20
SLIDE 20

20

TRACTABILITY: 2 PLAYERS

Β§ For each pure strategy 𝑑/ of the follower, we compute via the LP below a mixed strategy 𝑦. for the leader such that:

  • Playing 𝑑/ is a best response for the follower
  • Under this constraint, 𝑦. is optimal (for follower)

Β§ Choose 𝑦.

βˆ— that maximizes leader’s utility

max βˆ‘

𝑦. 𝑑. 𝑣.(𝑑.,𝑑/)

NT∈(

s.t.

βˆ€π‘‘/

M ∈ 𝑇,

βˆ€π‘‘. ∈ 𝑇, 𝑦. 𝑑. ∈ [0,1] βˆ‘ 𝑦. 𝑑. 𝑣/ 𝑑

., 𝑑/ β‰₯ βˆ‘

𝑦. 𝑑. 𝑣/ 𝑑

., 𝑑/ M NT∈( NT∈(

βˆ‘ 𝑦. 𝑑. = 1

NT∈(

slide-21
SLIDE 21

21

APPLICATION: SECURITY

Β§ Airport security: deployed at LAX Β§ Federal Air Marshals Β§ Coast Guard Β§ Idea:

  • Defender commits to mixed strategy
  • Attacker observes and best responds

Β§ Attacker monitors defender and tries to maximize damage, while a defender deploys resources to minimize damage based on knowledge of what the attacker would like to obtain

slide-22
SLIDE 22

22

SECURITY GAMES

Β§ Set of targets π‘ˆ = {1,… ,π‘œ}

  • E.g., Entrance gates of an airport

Β§ Set Ξ© of 𝑠 security resources available to the defender (leader)

  • E.g., Video cameras looking at specific

directions

  • E.g., Air marshals flying on specific flights

Β§ Set Ξ£ of feasible partitions of target set: Ξ£ βŠ† 2π‘ˆ Β§ Resource πœ• ∈ Ξ© can be assigned to one of the partitions in 𝐡 πœ• βŠ† Ξ£ Γ  Schedule Β§ Defender (leader): how to deploy the resources

  • ver the target Γ  How to assign resources to

targets Β§ Attacker (follower) chooses targets to attack

resources targets

slide-23
SLIDE 23

23

SECURITY GAMES

Β§ For each target 𝑒, there are four numbers defining the payoffs of defender and attacker in case of successful and unsuccessful attack:

  • 𝑣𝑒

+ 𝑒 = Defender’s payoff when target 𝑒 is attacked and target

was covered by at least one resource

  • 𝑣𝑒

βˆ’ 𝑒 = Defender’s payoff when target 𝑒 is attacked and target

was not covered

  • 𝑣𝑏

βˆ’ 𝑒 = Attacker’s payoff when target 𝑒 is attacked and target

was not covered

  • 𝑣𝑏

+ 𝑒 = Attacker’s payoff when target 𝑒 is attacked and target

was covered by at least one resource Β§ 𝑣𝑒

+ 𝑒 β‰₯ 𝑣𝑒 βˆ’ 𝑒 , and 𝑣𝑏 + 𝑒 ≀ 𝑣𝑏 βˆ’ 𝑒

Β§ For each target 𝑒 there’s a coverage probability by the defender using the resources in Ξ©, such that the set of targets defines 𝒅 = (𝑑1,… , π‘‘π‘œ), a vector of coverage probabilities

slide-24
SLIDE 24

24

SECURITY GAMES

Β§ The expected utilities to the defender/attacker under coverage c if target 𝑒 is attacked are:

resources targets

𝑣q 𝑒,𝒅 = 𝑣q

r 𝑒 β‹… 𝑑t + 𝑣q u 𝑒

1 βˆ’ 𝑑t 𝑣v 𝑒, 𝒅 = 𝑣v

r 𝑒 β‹… 𝑑t + 𝑣v u 𝑒

1 βˆ’ 𝑑t

Payoffs example with two targets:

slide-25
SLIDE 25

25

BAYESIAN SECURITY GAMES

Β§ There are multiple types of potential attackers, each type with different payoffs Β§ The defender knows about their payoffs, as well as the distribution

  • f attacker types

Β§ Bayesian extensions are used to model uncertainty over the payoffs and preferences of the players, where more uncertainty can be expressed with increasing number of types. Payoffs example with two targets and two types of attackers:

slide-26
SLIDE 26

26

SOLVING SECURITY GAMES

Β§ It’s is a 2-player Stackelberg game, so we can compute an

  • ptimal strategy for the defender in polynomial time…?

Β§ Consider the case of Ξ£ = π‘ˆ, i.e., resources are assigned to individual targets, i.e., schedules have size 1 Β§ Nevertheless, number of leader strategies is exponential: 2𝑠 Β§ Γ  Representation of the linear program is exponential Β§ Theorem [Korzhyk et al. 2010]: Optimal leader strategy can be computed in poly time Β§ A number of smart algorithms have been developed …

Β§ Jain M., An B., Tambe M. (2013) Security Games Applied to Real-World: Research Contributions and Challenges. In: Jajodia S., Ghosh A., Subrahmanian V., Swarup V., Wang C., Wang X. (eds) Moving Target Defense II. Advances in Information Security, vol 100. Springer, New York, NY

slide-27
SLIDE 27

27

IN THE NEWS …