首页 > 最新文献

Artificial Intelligence最新文献

英文 中文
Adversarial analysis of similarity-based sign prediction 基于相似性的符号预测的对抗分析
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-27 DOI: 10.1016/j.artint.2024.104173

Adversarial social network analysis explores how social links can be altered or otherwise manipulated to hinder unwanted information collection. To date, however, problems of this kind have not been studied in the context of signed networks in which links have positive and negative labels. Such formalism is often used to model social networks with positive links indicating friendship or support and negative links indicating antagonism or opposition.

In this work, we present a computational analysis of the problem of attacking sign prediction in signed networks, whereby the aim of the attacker (a network member) is to hide from the defender (an analyst) the signs of a target set of links by removing the signs of some other, non-target, links. While the problem turns out to be NP-hard if either local or global similarity measures are used for sign prediction, we provide a number of positive computational results, including an FPT-algorithm for eliminating common signed neighborhood and heuristic algorithms for evading local similarity-based link prediction in signed networks.

对抗性社交网络分析探讨了如何改变或以其他方式操纵社交链接,以阻止不必要的信息收集。然而,迄今为止,这类问题还没有在链接有正负标签的签名网络中进行过研究。在这项工作中,我们对签名网络中的符号预测攻击问题进行了计算分析,攻击者(网络成员)的目的是通过删除其他一些非目标链接的符号来向防御者(分析师)隐藏目标链接集的符号。如果使用局部或全局相似性度量进行符号预测,这个问题就会变成 NP-hard,但我们提供了一些积极的计算结果,包括消除共同符号邻域的 FPT 算法,以及在符号网络中躲避基于局部相似性的链接预测的启发式算法。
{"title":"Adversarial analysis of similarity-based sign prediction","authors":"","doi":"10.1016/j.artint.2024.104173","DOIUrl":"10.1016/j.artint.2024.104173","url":null,"abstract":"<div><p>Adversarial social network analysis explores how social links can be altered or otherwise manipulated to hinder unwanted information collection. To date, however, problems of this kind have not been studied in the context of signed networks in which links have positive and negative labels. Such formalism is often used to model social networks with positive links indicating friendship or support and negative links indicating antagonism or opposition.</p><p>In this work, we present a computational analysis of the problem of attacking sign prediction in signed networks, whereby the aim of the attacker (a network member) is to hide from the defender (an analyst) the signs of a target set of links by removing the signs of some other, non-target, links. While the problem turns out to be NP-hard if either local or global similarity measures are used for sign prediction, we provide a number of positive computational results, including an FPT-algorithm for eliminating common signed neighborhood and heuristic algorithms for evading local similarity-based link prediction in signed networks.</p></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":5.1,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141638643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyper-heuristics for personnel scheduling domains 人员调度领域的超启发式方法
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-25 DOI: 10.1016/j.artint.2024.104172

In real-life applications problems can frequently change or require small adaptations. Manually creating and tuning algorithms for different problem domains or different versions of a problem can be cumbersome and time-consuming. In this paper we consider several important problems with high practical relevance, which are Rotating Workforce Scheduling, Minimum Shift Design, and Bus Driver Scheduling. Instead of designing very specific solution methods, we propose to use the more general approach based on hyper-heuristics which take a set of simpler low-level heuristics and combine them to automatically create a fitting heuristic for the problem at hand. This paper presents a major study on applying hyper-heuristics to these domains, which contributes in four different ways: First, it defines new low-level heuristics for these scheduling domains, allowing to apply hyper-heuristics to them for the first time. Second, it provides a comparison of several state-of-the-art hyper-heuristics on those domains. Third, new best solutions for several instances of the different problem domains are found. Finally, a detailed investigation of the use of low-level heuristics by the hyper-heuristics gives insights in the way hyper-heuristics apply to different domains and the importance of different low-level heuristics. The results show that hyper-heuristics are able to perform well even on very complex practical problem domains in the area of scheduling and, while being more general and requiring less problem-specific adaptation, can in several cases compete with specialized algorithms for the specific problems. Several hyper-heuristics with very good performance across different real-life domains are identified. They can efficiently select low-level heuristics to apply for each domain, but for repeated application they benefit from evaluating and selecting the most useful subset of these heuristics. These results help to improve industrial systems in use for solving different scheduling scenarios by allowing faster and easier adaptation to new problem variants.

在实际应用中,问题会经常发生变化或需要进行微小的调整。针对不同的问题领域或问题的不同版本手动创建和调整算法既麻烦又耗时。在本文中,我们考虑了几个具有高度实际意义的重要问题,即轮换劳动力调度、最短班次设计和公交司机调度。我们建议使用基于超启发式的通用方法,而不是设计非常具体的求解方法。超启发式采用一组较简单的低层次启发式,并将它们组合起来,自动为手头的问题创建一个合适的启发式。本文介绍了将超启发式应用于这些领域的一项重要研究,它在四个不同方面做出了贡献:首先,本文为这些调度领域定义了新的低级启发式,首次将超启发式应用于这些领域。其次,它对这些领域的几种最先进的超启发式方法进行了比较。第三,为不同问题域的若干实例找到了新的最佳解决方案。最后,通过详细研究超启发式算法对低层启发式算法的使用,深入了解了超启发式算法应用于不同领域的方式以及不同低层启发式算法的重要性。研究结果表明,超启发式算法即使在调度领域非常复杂的实际问题上也能表现出色,而且具有更强的通用性,对特定问题的适应性要求较低,在某些情况下可以与针对特定问题的专门算法相抗衡。在不同的现实生活领域中,我们发现了几种性能非常好的超启发式算法。它们可以有效地为每个领域选择低级启发式算法,但对于重复应用,它们可以通过评估和选择这些启发式算法中最有用的子集来获益。这些结果有助于改进用于解决不同调度方案的工业系统,使其能够更快、更容易地适应新的问题变体。
{"title":"Hyper-heuristics for personnel scheduling domains","authors":"","doi":"10.1016/j.artint.2024.104172","DOIUrl":"10.1016/j.artint.2024.104172","url":null,"abstract":"<div><p>In real-life applications problems can frequently change or require small adaptations. Manually creating and tuning algorithms for different problem domains or different versions of a problem can be cumbersome and time-consuming. In this paper we consider several important problems with high practical relevance, which are Rotating Workforce Scheduling, Minimum Shift Design, and Bus Driver Scheduling. Instead of designing very specific solution methods, we propose to use the more general approach based on hyper-heuristics which take a set of simpler low-level heuristics and combine them to automatically create a fitting heuristic for the problem at hand. This paper presents a major study on applying hyper-heuristics to these domains, which contributes in four different ways: First, it defines new low-level heuristics for these scheduling domains, allowing to apply hyper-heuristics to them for the first time. Second, it provides a comparison of several state-of-the-art hyper-heuristics on those domains. Third, new best solutions for several instances of the different problem domains are found. Finally, a detailed investigation of the use of low-level heuristics by the hyper-heuristics gives insights in the way hyper-heuristics apply to different domains and the importance of different low-level heuristics. The results show that hyper-heuristics are able to perform well even on very complex practical problem domains in the area of scheduling and, while being more general and requiring less problem-specific adaptation, can in several cases compete with specialized algorithms for the specific problems. Several hyper-heuristics with very good performance across different real-life domains are identified. They can efficiently select low-level heuristics to apply for each domain, but for repeated application they benefit from evaluating and selecting the most useful subset of these heuristics. These results help to improve industrial systems in use for solving different scheduling scenarios by allowing faster and easier adaptation to new problem variants.</p></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":5.1,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0004370224001085/pdfft?md5=4b18a79ac0a3f1adc46a5f873b25eac7&pid=1-s2.0-S0004370224001085-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting optimal symbolic planning: Operator-potential heuristics 提升最佳符号规划:运算器潜能启发式
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-21 DOI: 10.1016/j.artint.2024.104174

Heuristic search guides the exploration of states via heuristic functions h estimating remaining cost. Symbolic search instead replaces the exploration of individual states with that of state sets, compactly represented using binary decision diagrams (BDDs). In cost-optimal planning, heuristic explicit search performs best overall, but symbolic search performs best in many individual domains, so both approaches together constitute the state of the art. Yet combinations of the two have so far not been an unqualified success, because (i) h must be applicable to sets of states rather than individual ones, and (ii) the different state partitioning induced by h may be detrimental for BDD size. Many competitive heuristic functions in planning do not qualify for (i), and it has been shown that even extremely informed heuristics can deteriorate search performance due to (ii).

Here we show how to achieve (i) for a state-of-the-art family of heuristic functions, namely potential heuristics. These assign a fixed potential value to each state-variable/value pair, ensuring by LP constraints that the sum over these values, for any state, yields an admissible and consistent heuristic function. Our key observation is that we can express potential heuristics through fixed potential values for operators instead, capturing the change of heuristic value induced by each operator. These reformulated heuristics satisfy (i) because we can express the heuristic value change as part of the BDD transition relation in symbolic search steps. We run exhaustive experiments on IPC benchmarks, evaluating several different instantiations of potential heuristics in forward, backward, and bi-directional symbolic search. Our operator-potential heuristics turn out to be highly beneficial, in particular they hardly ever suffer from (ii). Our best configurations soundly beat previous optimal symbolic planning algorithms, bringing them on par with the state of the art in optimal heuristic explicit search planning in overall performance.

启发式搜索通过估计剩余成本的启发式函数来引导对状态的探索。而符号搜索则用状态集代替了对单个状态的探索,状态集使用二元决策图(BDD)紧凑表示。在成本最优规划中,启发式显式搜索的整体表现最佳,但符号搜索在许多单个领域表现最佳,因此这两种方法共同构成了最先进的技术。然而,迄今为止,这两种方法的组合并没有取得绝对的成功,原因在于:(i) 必须适用于状态集而非单个状态;(ii) 不同的状态划分可能不利于 BDD 的大小。在规划中,许多有竞争力的启发式函数都不符合(i)的条件,而且事实证明,即使是极为明智的启发式函数,也会因为(ii)而降低搜索性能。
{"title":"Boosting optimal symbolic planning: Operator-potential heuristics","authors":"","doi":"10.1016/j.artint.2024.104174","DOIUrl":"10.1016/j.artint.2024.104174","url":null,"abstract":"<div><p>Heuristic search guides the exploration of states via heuristic functions <em>h</em> estimating remaining cost. Symbolic search instead replaces the exploration of individual states with that of state sets, compactly represented using binary decision diagrams (BDDs). In cost-optimal planning, heuristic explicit search performs best overall, but symbolic search performs best in many individual domains, so both approaches together constitute the state of the art. Yet combinations of the two have so far not been an unqualified success, because (i) <em>h</em> must be applicable to sets of states rather than individual ones, and (ii) the different state partitioning induced by <em>h</em> may be detrimental for BDD size. Many competitive heuristic functions in planning do not qualify for (i), and it has been shown that even extremely informed heuristics can deteriorate search performance due to (ii).</p><p>Here we show how to achieve (i) for a state-of-the-art family of heuristic functions, namely potential heuristics. These assign a fixed potential value to each state-variable/value pair, ensuring by LP constraints that the sum over these values, for any state, yields an admissible and consistent heuristic function. Our key observation is that we can express potential heuristics through fixed potential values for operators instead, capturing the change of heuristic value induced by each operator. These reformulated heuristics satisfy (i) because we can express the heuristic value change as part of the BDD transition relation in symbolic search steps. We run exhaustive experiments on IPC benchmarks, evaluating several different instantiations of potential heuristics in forward, backward, and bi-directional symbolic search. Our operator-potential heuristics turn out to be highly beneficial, in particular they hardly ever suffer from (ii). Our best configurations soundly beat previous optimal symbolic planning algorithms, bringing them on par with the state of the art in optimal heuristic explicit search planning in overall performance.</p></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":5.1,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0004370224001103/pdfft?md5=e96bd05f57c63e29d7f7ad8ddd65c0e0&pid=1-s2.0-S0004370224001103-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delegated online search 委托在线搜索
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-20 DOI: 10.1016/j.artint.2024.104171
Pirmin Braun , Niklas Hahn , Martin Hoefer , Conrad Schecker

In a delegation problem, a principal P with commitment power tries to pick one out of n options. Each option is drawn independently from a known distribution. Instead of inspecting the options herself, P delegates the information acquisition to a rational and self-interested agent A. After inspection, A proposes one of the options, and P can accept or reject.

Delegation is a classic setting in economic information design with many prominent applications, but the computational problems are only poorly understood. In this paper, we study a natural online variant of delegation, in which the agent searches through the options in an online fashion. For each option, he has to irrevocably decide if he wants to propose the current option or discard it, before seeing information on the next option(s). How can we design algorithms for P that approximate the utility of her best option in hindsight?

We show that in general P can obtain a Θ(1/n)-approximation and extend this result to ratios of Θ(k/n) in case (1) A has a lookahead of k rounds, or (2) A can propose up to k different options. We provide fine-grained bounds independent of n based on three parameters. If the ratio of maximum and minimum utility for A is bounded by a factor α, we obtain an Ω(loglogα/logα)-approximation algorithm, and we show that this is best possible. Additionally, if P cannot distinguish options with the same value for herself, we show that ratios polynomial in 1/α cannot be avoided. If there are at most β different utility values for A, we show a Θ(1/β)-approximation. If the utilities of P and A for each option are related by a factor γ, we obtain an Ω(1/logγ)-approximation, where O(loglogγ/logγ) is best possible.

在委托问题中,具有承诺权的委托人 P 试图从 n 个选项中选出一个。每个选项都是从已知分布中独立抽取的。委托是经济信息设计中的一个经典设置,有许多突出的应用,但对其计算问题的理解却很有限。在本文中,我们研究了委托的一个自然在线变体,即代理人以在线方式搜索选项。对于每个选项,在看到下一个或多个选项的信息之前,他必须不可逆转地决定是提出当前选项还是放弃当前选项。我们的研究表明,一般情况下,P 可以获得 Θ(1/n)-xapproximation 并将这一结果扩展到 Θ(k/n) 的比率,即 (1) A 有 k 轮的前瞻性,或 (2) A 最多可以提出 k 个不同的选项。我们根据三个参数提供了与 n 无关的细粒度界限。如果 A 的最大效用和最小效用之比以系数 α 为界,我们就能得到一个 Ω(logα/logα)近似算法,并证明这是最好的算法。此外,如果 P 无法区分自身具有相同价值的选项,我们将证明无法避免 1/α 多项式的比率。如果 A 至多有 β 个不同的效用值,我们将展示一个 Θ(1/β)- 近似值。如果每个选项中 P 和 A 的效用值的相关系数为 γ,我们可以得到 Ω(1/logγ)-近似值,其中 O(loglogγ/logγ)是最佳值。
{"title":"Delegated online search","authors":"Pirmin Braun ,&nbsp;Niklas Hahn ,&nbsp;Martin Hoefer ,&nbsp;Conrad Schecker","doi":"10.1016/j.artint.2024.104171","DOIUrl":"https://doi.org/10.1016/j.artint.2024.104171","url":null,"abstract":"<div><p>In a delegation problem, a <em>principal</em> <span><math><mi>P</mi></math></span> with commitment power tries to pick one out of <em>n</em> options. Each option is drawn independently from a known distribution. Instead of inspecting the options herself, <span><math><mi>P</mi></math></span> delegates the information acquisition to a rational and self-interested <em>agent</em> <span><math><mi>A</mi></math></span>. After inspection, <span><math><mi>A</mi></math></span> proposes one of the options, and <span><math><mi>P</mi></math></span> can accept or reject.</p><p>Delegation is a classic setting in economic information design with many prominent applications, but the computational problems are only poorly understood. In this paper, we study a natural <em>online</em> variant of delegation, in which the agent searches through the options in an online fashion. For each option, he has to irrevocably decide if he wants to propose the current option or discard it, before seeing information on the next option(s). How can we design algorithms for <span><math><mi>P</mi></math></span> that approximate the utility of her best option in hindsight?</p><p>We show that in general <span><math><mi>P</mi></math></span> can obtain a <span><math><mi>Θ</mi><mo>(</mo><mn>1</mn><mo>/</mo><mi>n</mi><mo>)</mo></math></span>-approximation and extend this result to ratios of <span><math><mi>Θ</mi><mo>(</mo><mi>k</mi><mo>/</mo><mi>n</mi><mo>)</mo></math></span> in case (1) <span><math><mi>A</mi></math></span> has a lookahead of <em>k</em> rounds, or (2) <span><math><mi>A</mi></math></span> can propose up to <em>k</em> different options. We provide fine-grained bounds independent of <em>n</em> based on three parameters. If the ratio of maximum and minimum utility for <span><math><mi>A</mi></math></span> is bounded by a factor <em>α</em>, we obtain an <span><math><mi>Ω</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>log</mi><mo>⁡</mo><mi>α</mi><mo>/</mo><mi>log</mi><mo>⁡</mo><mi>α</mi><mo>)</mo></math></span>-approximation algorithm, and we show that this is best possible. Additionally, if <span><math><mi>P</mi></math></span> cannot distinguish options with the same value for herself, we show that ratios polynomial in <span><math><mn>1</mn><mo>/</mo><mi>α</mi></math></span> cannot be avoided. If there are at most <em>β</em> different utility values for <span><math><mi>A</mi></math></span>, we show a <span><math><mi>Θ</mi><mo>(</mo><mn>1</mn><mo>/</mo><mi>β</mi><mo>)</mo></math></span>-approximation. If the utilities of <span><math><mi>P</mi></math></span> and <span><math><mi>A</mi></math></span> for each option are related by a factor <em>γ</em>, we obtain an <span><math><mi>Ω</mi><mo>(</mo><mn>1</mn><mo>/</mo><mi>log</mi><mo>⁡</mo><mi>γ</mi><mo>)</mo></math></span>-approximation, where <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>log</mi><mo>⁡</mo><mi>γ</mi><mo>/</mo><mi>log</mi><mo>⁡</mo><mi>γ</mi><mo>)</mo></math></span> is best possible.</p></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":5.1,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0004370224001073/pdfft?md5=2d7a00808c733af9db17db5a21fc73fe&pid=1-s2.0-S0004370224001073-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141487482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An extensive study of security games with strategic informants 对有战略线人的安全博弈的广泛研究
IF 14.4 2区 计算机科学 Q1 Arts and Humanities Pub Date : 2024-06-12 DOI: 10.1016/j.artint.2024.104162
Weiran Shen , Minbiao Han , Weizhe Chen , Taoan Huang , Rohit Singh , Haifeng Xu , Fei Fang

Over the past years, game-theoretic modeling for security and public safety issues (also known as security games) have attracted intensive research attention and have been successfully deployed in many real-world applications for fighting, e.g., illegal poaching, fishing and urban crimes. However, few existing works consider how information from local communities would affect the structure of these games. In this paper, we systematically investigate how a new type of players – strategic informants who are from local communities and may observe and report upcoming attacks – affects the classic defender-attacker security interactions. Characterized by a private type, each informant has a utility structure that drives their strategic behaviors.

For situations with a single informant, we capture the problem as a 3-player extensive-form game and develop a novel solution concept, Strong Stackelberg-perfect Bayesian equilibrium, for the game. To find an optimal defender strategy, we establish that though the informant can have infinitely many types in general, there always exists an optimal defense plan using only a linear number of patrol strategies; this succinct characterization then enables us to efficiently solve the game via linear programming. For situations with multiple informants, we show that there is also an optimal defense plan with only a linear number of patrol strategies that admits a simple structure based on plurality voting among multiple informants.

Finally, we conduct extensive experiments to study the effect of the strategic informants and demonstrate the efficiency of our algorithm. Our experiments show that the existence of such informants significantly increases the defender's utility. Even though the informants exhibit strategic behaviors, the information they supply holds great value as defensive resources. Compared to existing works, our study leads to a deeper understanding on the role of informants in such defender-attacker interactions.

在过去几年中,针对安全和公共安全问题的博弈论建模(也称为安全博弈)吸引了大量研究人员的关注,并已成功应用于许多现实世界中打击非法偷猎、捕鱼和城市犯罪的应用中。然而,现有研究很少考虑来自当地社区的信息会如何影响这些游戏的结构。在本文中,我们系统地研究了一种新型参与者--来自当地社区并可能观察和报告即将发生的攻击的战略线人--如何影响经典的防御者-攻击者安全互动。对于只有一个线人的情况,我们将问题视为一个三人广泛形式博弈,并为博弈提出了一个新的解决概念--强斯塔克尔伯格完美贝叶斯均衡。为了找到最佳防御策略,我们确定,虽然告密者一般可以有无限多种类型,但总是存在一个只使用线性数量的巡逻策略的最佳防御计划;这种简洁的表征使我们能够通过线性规划有效地解决博弈问题。最后,我们进行了大量实验来研究策略线人的影响,并证明了我们算法的效率。我们的实验表明,这些线人的存在大大增加了防御者的效用。即使线人表现出战略行为,他们提供的信息作为防御资源也具有巨大价值。与现有研究相比,我们的研究让人们更深入地了解了线人在这种防御者与攻击者互动中的作用。
{"title":"An extensive study of security games with strategic informants","authors":"Weiran Shen ,&nbsp;Minbiao Han ,&nbsp;Weizhe Chen ,&nbsp;Taoan Huang ,&nbsp;Rohit Singh ,&nbsp;Haifeng Xu ,&nbsp;Fei Fang","doi":"10.1016/j.artint.2024.104162","DOIUrl":"10.1016/j.artint.2024.104162","url":null,"abstract":"<div><p>Over the past years, game-theoretic modeling for security and public safety issues (also known as <em>security games</em>) have attracted intensive research attention and have been successfully deployed in many real-world applications for fighting, e.g., illegal poaching, fishing and urban crimes. However, few existing works consider how information from local communities would affect the structure of these games. In this paper, we systematically investigate how a new type of players – <em>strategic informants</em> who are from local communities and may observe and report upcoming attacks – affects the classic defender-attacker security interactions. Characterized by a private type, each informant has a utility structure that drives their strategic behaviors.</p><p>For situations with a single informant, we capture the problem as a 3-player extensive-form game and develop a novel solution concept, Strong Stackelberg-perfect Bayesian equilibrium, for the game. To find an optimal defender strategy, we establish that though the informant can have infinitely many types in general, there always exists an optimal defense plan using only a linear number of patrol strategies; this succinct characterization then enables us to efficiently solve the game via linear programming. For situations with multiple informants, we show that there is also an optimal defense plan with only a linear number of patrol strategies that admits a simple structure based on plurality voting among multiple informants.</p><p>Finally, we conduct extensive experiments to study the effect of the strategic informants and demonstrate the efficiency of our algorithm. Our experiments show that the existence of such informants significantly increases the defender's utility. Even though the informants exhibit strategic behaviors, the information they supply holds great value as defensive resources. Compared to existing works, our study leads to a deeper understanding on the role of informants in such defender-attacker interactions.</p></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":14.4,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141410791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A domain-independent agent architecture for adaptive operation in evolving open worlds 在不断进化的开放世界中实现自适应运行的独立于领域的代理架构
IF 14.4 2区 计算机科学 Q1 Arts and Humanities Pub Date : 2024-06-06 DOI: 10.1016/j.artint.2024.104161
Shiwali Mohan , Wiktor Piotrowski , Roni Stern , Sachin Grover , Sookyung Kim , Jacob Le , Yoni Sher , Johan de Kleer

Model-based reasoning agents are ill-equipped to act in novel situations in which their model of the environment no longer sufficiently represents the world. We propose HYDRA, a framework for designing model-based agents operating in mixed discrete-continuous worlds that can autonomously detect when the environment has evolved from its canonical setup, understand how it has evolved, and adapt the agents' models to perform effectively. HYDRA is based upon PDDL+, a rich modeling language for planning in mixed, discrete-continuous environments. It augments the planning module with visual reasoning, task selection, and action execution modules for closed-loop interaction with complex environments. HYDRA implements a novel meta-reasoning process that enables the agent to monitor its own behavior from a variety of aspects. The process employs a diverse set of computational methods to maintain expectations about the agent's own behavior in an environment. Divergences from those expectations are useful in detecting when the environment has evolved and identifying opportunities to adapt the underlying models. HYDRA builds upon ideas from diagnosis and repair and uses a heuristics-guided search over model changes such that they become competent in novel conditions. The HYDRA framework has been used to implement novelty-aware agents for three diverse domains - CartPole++ (a higher dimension variant of a classic control problem), Science Birds (an IJCAI competition problem1), and PogoStick (a specific problem domain in Minecraft). We report empirical observations from these domains to demonstrate the efficacy of various components in the novelty meta-reasoning process.

基于模型的推理代理没有能力在其环境模型不再充分代表世界的新情况下采取行动。我们提出的 HYDRA 是一个用于设计在离散-连续混合世界中运行的基于模型的代理的框架,它可以自主检测环境何时从其典型设置中演变出来,了解环境是如何演变的,并调整代理的模型以有效地执行任务。HYDRA 基于 PDDL+,这是一种在离散-连续混合环境中进行规划的丰富建模语言。它通过视觉推理、任务选择和行动执行模块来增强规划模块,从而实现与复杂环境的闭环互动。HYDRA 实现了一种新颖的元推理过程,使代理能够从多个方面监控自己的行为。该过程采用了一系列不同的计算方法,以保持对环境中代理自身行为的预期。与这些预期的偏差有助于检测环境何时发生了变化,并确定调整底层模型的机会。HYDRA 建立在诊断和修复的基础上,使用启发式方法引导搜索模型变化,使其能够胜任新的条件。HYDRA 框架已被用于在三个不同领域实现新颖性感知代理--CartPole++(经典控制问题的高维变体)、Science Birds(IJCAI 竞赛问题1)和 PogoStick(Minecraft 中的特定问题领域)。我们报告了这些领域的经验观察结果,以证明新颖性元推理过程中各种组件的功效。
{"title":"A domain-independent agent architecture for adaptive operation in evolving open worlds","authors":"Shiwali Mohan ,&nbsp;Wiktor Piotrowski ,&nbsp;Roni Stern ,&nbsp;Sachin Grover ,&nbsp;Sookyung Kim ,&nbsp;Jacob Le ,&nbsp;Yoni Sher ,&nbsp;Johan de Kleer","doi":"10.1016/j.artint.2024.104161","DOIUrl":"https://doi.org/10.1016/j.artint.2024.104161","url":null,"abstract":"<div><p> Model-based reasoning agents are ill-equipped to act in novel situations in which their model of the environment no longer sufficiently represents the world. We propose HYDRA, a framework for designing model-based agents operating in mixed discrete-continuous worlds that can autonomously detect when the environment has evolved from its canonical setup, understand how it has evolved, and adapt the agents' models to perform effectively. HYDRA is based upon PDDL+, a rich modeling language for planning in mixed, discrete-continuous environments. It augments the planning module with visual reasoning, task selection, and action execution modules for closed-loop interaction with complex environments. HYDRA implements a novel meta-reasoning process that enables the agent to monitor its own behavior from a variety of aspects. The process employs a diverse set of computational methods to maintain expectations about the agent's own behavior in an environment. Divergences from those expectations are useful in detecting when the environment has evolved and identifying opportunities to adapt the underlying models. HYDRA builds upon ideas from diagnosis and repair and uses a heuristics-guided search over model changes such that they become competent in novel conditions. The HYDRA framework has been used to implement <em>novelty-aware</em> agents for three diverse domains - CartPole++ (a higher dimension variant of a classic control problem), Science Birds (an IJCAI competition problem<span><sup>1</sup></span>), and PogoStick (a specific problem domain in Minecraft). We report empirical observations from these domains to demonstrate the efficacy of various components in the novelty meta-reasoning process.</p></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":14.4,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141303042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional Relation Field: A Model-Agnostic Framework for Multivariate Time Series Forecasting 功能关系场:多变量时间序列预测的模型诊断框架
IF 14.4 2区 计算机科学 Q1 Arts and Humanities Pub Date : 2024-06-05 DOI: 10.1016/j.artint.2024.104158
Ting Li , Bing Yu , Jianguo Li , Zhanxing Zhu

In multivariate time series forecasting, the most popular strategy for modeling the relationship between multiple time series is the construction of graph, where each time series is represented as a node and related nodes are connected by edges. However, the relationship between multiple time series is typically complicated, e.g. the sum of outflows from upstream nodes may be equal to the inflows of downstream nodes. Such relations widely exist in many real-world scenarios for multivariate time series forecasting, yet are far from well studied. In these cases, graph might be insufficient for modeling the complex dependency between nodes. To this end, we explore a new framework to model the inter-node relationship in a more precise way based our proposed inductive bias, Functional Relation Field, where a group of functions parameterized by neural networks are learned to characterize the dependency between multiple time series. Essentially, these learned functions then form a “field”, i.e. a particular set of constraints, to regularize the training loss of the backbone prediction network and enforce the inference process to satisfy these constraints. Since our framework introduces the relationship bias in a data-driven manner, it is flexible and model-agnostic such that it can be applied to any existing multivariate time series prediction networks for boosting performance. The experiment is conducted on one toy dataset to show our approach can well recover the true constraint relationship between nodes. And various real-world datasets are also considered with different backbone prediction networks. Results show that the prediction error can be reduced remarkably with the aid of the proposed framework.

在多变量时间序列预测中,最常用的多时间序列关系建模策略是构建图,其中每个时间序列表示为一个节点,相关节点由边连接。然而,多个时间序列之间的关系通常比较复杂,例如上游节点的流出量之和可能等于下游节点的流入量。这种关系广泛存在于现实世界的许多多变量时间序列预测场景中,但却远未得到深入研究。在这种情况下,图形可能不足以模拟节点之间的复杂依赖关系。为此,我们探索了一种新的框架,在我们提出的归纳偏置--函数关系场--的基础上,以更精确的方式对节点间的关系进行建模。从本质上讲,这些学习到的函数会形成一个 "场",即一组特定的约束条件,用于规范骨干预测网络的训练损耗,并强制推理过程满足这些约束条件。由于我们的框架是以数据驱动的方式引入关系偏差的,因此它既灵活又与模型无关,可以应用于任何现有的多变量时间序列预测网络以提高性能。我们在一个玩具数据集上进行了实验,以证明我们的方法能很好地恢复节点之间的真实约束关系。此外,我们还考虑了现实世界中的各种数据集和不同的主干预测网络。结果表明,借助所提出的框架,预测误差可以显著减少。
{"title":"Functional Relation Field: A Model-Agnostic Framework for Multivariate Time Series Forecasting","authors":"Ting Li ,&nbsp;Bing Yu ,&nbsp;Jianguo Li ,&nbsp;Zhanxing Zhu","doi":"10.1016/j.artint.2024.104158","DOIUrl":"https://doi.org/10.1016/j.artint.2024.104158","url":null,"abstract":"<div><p>In multivariate time series forecasting, the most popular strategy for modeling the relationship between multiple time series is the construction of graph, where each time series is represented as a node and related nodes are connected by edges. However, the relationship between multiple time series is typically complicated, e.g. the sum of outflows from upstream nodes may be equal to the inflows of downstream nodes. Such relations widely exist in many real-world scenarios for multivariate time series forecasting, yet are far from well studied. In these cases, graph might be insufficient for modeling the complex dependency between nodes. To this end, we explore a new framework to model the inter-node relationship in a more precise way based our proposed inductive bias, <em>Functional Relation Field</em>, where a group of functions parameterized by neural networks are learned to characterize the dependency between multiple time series. Essentially, these learned functions then form a “field”, i.e. a particular set of constraints, to regularize the training loss of the backbone prediction network and enforce the inference process to satisfy these constraints. Since our framework introduces the relationship bias in a data-driven manner, it is flexible and model-agnostic such that it can be applied to any existing multivariate time series prediction networks for boosting performance. The experiment is conducted on one toy dataset to show our approach can well recover the true constraint relationship between nodes. And various real-world datasets are also considered with different backbone prediction networks. Results show that the prediction error can be reduced remarkably with the aid of the proposed framework.</p></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":14.4,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0004370224000948/pdfft?md5=1e0e8c2dca5cc80e5c38837feded9d5f&pid=1-s2.0-S0004370224000948-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141308373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability based on single-agent deviations in additively separable hedonic games 基于可加可分对冲博弈中单代理偏差的稳定性
IF 14.4 2区 计算机科学 Q1 Arts and Humanities Pub Date : 2024-05-31 DOI: 10.1016/j.artint.2024.104160
Felix Brandt , Martin Bullinger , Leo Tappe

Coalition formation is a central concern in multiagent systems. A common desideratum for coalition structures is stability, defined by the absence of beneficial deviations of single agents. Such deviations require an agent to improve her utility by joining another coalition. On top of that, the feasibility of deviations may also be restricted by demanding consent of agents in the welcoming and/or the abandoned coalition. While most of the literature focuses on deviations constrained by unanimous consent, we also study consent decided by majority vote and introduce two new stability notions that can be seen as local variants of another solution concept called popularity. We investigate stability in additively separable hedonic games by pinpointing boundaries to computational complexity depending on the type of consent and friend-oriented utility restrictions. The latter restrictions shed new light on well-studied classes of games based on the appreciation of friends or the aversion to enemies. Many of our positive results follow from a new combinatorial observation that we call the Deviation Lemma and that we leverage to prove the convergence of simple and natural single-agent dynamics under fairly general conditions. Our negative results, in particular, resolve the complexity of contractual Nash stability in additively separable hedonic games.

联盟的形成是多代理系统的核心问题。联盟结构的一个共同要求是稳定性,即单个代理不出现有益偏差。这种偏离要求代理通过加入另一个联盟来提高其效用。此外,偏离的可行性还可能受到限制,因为它需要得到欢迎联盟和/或放弃联盟中的代理的同意。虽然大多数文献都关注一致同意限制的偏离,但我们也研究了由多数票决定的同意,并引入了两个新的稳定性概念,这两个概念可以看作是另一个叫做 "受欢迎程度 "的解决方案概念的局部变体。我们根据同意的类型和以朋友为导向的效用限制,指出计算复杂性的边界,从而研究可加可分对冲博弈的稳定性。后一种限制为基于对朋友的欣赏或对敌人的厌恶而研究得很透彻的博弈类别带来了新的启示。我们的许多正面结果都来自于一个新的组合观察,我们称之为偏差谬误,我们利用它来证明在相当普遍的条件下简单而自然的单个代理动力学的收敛性。我们的负面结果尤其解决了可加可分对冲博弈中契约纳什稳定性的复杂性。
{"title":"Stability based on single-agent deviations in additively separable hedonic games","authors":"Felix Brandt ,&nbsp;Martin Bullinger ,&nbsp;Leo Tappe","doi":"10.1016/j.artint.2024.104160","DOIUrl":"https://doi.org/10.1016/j.artint.2024.104160","url":null,"abstract":"<div><p>Coalition formation is a central concern in multiagent systems. A common desideratum for coalition structures is stability, defined by the absence of beneficial deviations of single agents. Such deviations require an agent to improve her utility by joining another coalition. On top of that, the feasibility of deviations may also be restricted by demanding consent of agents in the welcoming and/or the abandoned coalition. While most of the literature focuses on deviations constrained by unanimous consent, we also study consent decided by majority vote and introduce two new stability notions that can be seen as local variants of another solution concept called popularity. We investigate stability in additively separable hedonic games by pinpointing boundaries to computational complexity depending on the type of consent and friend-oriented utility restrictions. The latter restrictions shed new light on well-studied classes of games based on the appreciation of friends or the aversion to enemies. Many of our positive results follow from a new combinatorial observation that we call the <em>Deviation Lemma</em> and that we leverage to prove the convergence of simple and natural single-agent dynamics under fairly general conditions. Our negative results, in particular, resolve the complexity of contractual Nash stability in additively separable hedonic games.</p></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":14.4,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0004370224000961/pdfft?md5=e987438fd09ba66fd8cb7e8db197482a&pid=1-s2.0-S0004370224000961-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141244960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint learning of reward machines and policies in environments with partially known semantics 在部分已知语义的环境中联合学习奖赏机和策略
IF 14.4 2区 计算机科学 Q1 Arts and Humanities Pub Date : 2024-05-23 DOI: 10.1016/j.artint.2024.104146
Christos K. Verginis , Cevahir Koprulu , Sandeep Chinchali , Ufuk Topcu

We study the problem of reinforcement learning for a task encoded by a reward machine. The task is defined over a set of properties in the environment, called atomic propositions, and represented by Boolean variables. One unrealistic assumption commonly used in the literature is that the truth values of these propositions are accurately known. In real situations, however, these truth values are uncertain since they come from sensors that suffer from imperfections. At the same time, reward machines can be difficult to model explicitly, especially when they encode complicated tasks. We develop a reinforcement-learning algorithm that infers a reward machine that encodes the underlying task while learning how to execute it, despite the uncertainties of the propositions' truth values. In order to address such uncertainties, the algorithm maintains a probabilistic estimate about the truth value of the atomic propositions; it updates this estimate according to new sensory measurements that arrive from exploration of the environment. Additionally, the algorithm maintains a hypothesis reward machine, which acts as an estimate of the reward machine that encodes the task to be learned. As the agent explores the environment, the algorithm updates the hypothesis reward machine according to the obtained rewards and the estimate of the atomic propositions' truth value. Finally, the algorithm uses a Q-learning procedure for the states of the hypothesis reward machine to determine an optimal policy that accomplishes the task. We prove that the algorithm successfully infers the reward machine and asymptotically learns a policy that accomplishes the respective task.

我们研究的是奖励机编码任务的强化学习问题。任务由环境中的一组属性定义,这些属性被称为原子命题,由布尔变量表示。文献中常用的一个不切实际的假设是,这些命题的真值是准确已知的。然而,在实际情况中,这些真值是不确定的,因为它们来自于存在缺陷的传感器。同时,奖励机器也很难明确建模,尤其是当它们编码复杂任务时。我们开发了一种强化学习算法,它可以推导出一个奖励机制,该奖励机制在学习如何执行任务的同时对底层任务进行编码,尽管命题真值存在不确定性。为了解决这种不确定性,该算法对原子命题的真值保持一种概率估计,并根据探索环境时获得的新感官测量结果更新这种估计。此外,该算法还维护一个假设奖励机,作为对编码待学习任务的奖励机的估计。当代理探索环境时,算法会根据获得的奖励和对原子命题真值的估计更新假设奖励机。最后,算法对假设奖励机的状态使用 Q 学习程序,以确定完成任务的最优策略。我们证明,该算法成功地推断出了奖励机,并渐进地学习到了能完成相应任务的策略。
{"title":"Joint learning of reward machines and policies in environments with partially known semantics","authors":"Christos K. Verginis ,&nbsp;Cevahir Koprulu ,&nbsp;Sandeep Chinchali ,&nbsp;Ufuk Topcu","doi":"10.1016/j.artint.2024.104146","DOIUrl":"10.1016/j.artint.2024.104146","url":null,"abstract":"<div><p>We study the problem of reinforcement learning for a task encoded by a reward machine. The task is defined over a set of properties in the environment, called atomic propositions, and represented by Boolean variables. One unrealistic assumption commonly used in the literature is that the truth values of these propositions are accurately known. In real situations, however, these truth values are uncertain since they come from sensors that suffer from imperfections. At the same time, reward machines can be difficult to model explicitly, especially when they encode complicated tasks. We develop a reinforcement-learning algorithm that infers a reward machine that encodes the underlying task while learning how to execute it, despite the uncertainties of the propositions' truth values. In order to address such uncertainties, the algorithm maintains a probabilistic estimate about the truth value of the atomic propositions; it updates this estimate according to new sensory measurements that arrive from exploration of the environment. Additionally, the algorithm maintains a hypothesis reward machine, which acts as an estimate of the reward machine that encodes the task to be learned. As the agent explores the environment, the algorithm updates the hypothesis reward machine according to the obtained rewards and the estimate of the atomic propositions' truth value. Finally, the algorithm uses a Q-learning procedure for the states of the hypothesis reward machine to determine an optimal policy that accomplishes the task. We prove that the algorithm successfully infers the reward machine and asymptotically learns a policy that accomplishes the respective task.</p></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":14.4,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0004370224000821/pdfft?md5=00403f012b025daac195daf945ec2715&pid=1-s2.0-S0004370224000821-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141178018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credulous acceptance in high-order argumentation frameworks with necessities: An incremental approach 有必然性的高阶论证框架中的可信接受:渐进方法
IF 14.4 2区 计算机科学 Q1 Arts and Humanities Pub Date : 2024-05-22 DOI: 10.1016/j.artint.2024.104159
Gianvincenzo Alfano , Andrea Cohen , Sebastian Gottifredi , Sergio Greco , Francesco Parisi , Guillermo R. Simari

Argumentation is an important research area in the field of AI. There is a substantial amount of work on different aspects of Dung's abstract Argumentation Framework (AF). Two relevant aspects considered separately so far are: i) extending the framework to account for recursive attacks and supports, and ii) considering dynamics, i.e., AFs evolving over time. In this paper, we jointly deal with these two aspects. We focus on High-Order Argumentation Frameworks with Necessities (HOAFNs) which allow for attack and support relations (interpreted as necessity) not only between arguments but also targeting attacks and supports at any level. We propose an approach for the incremental evaluation of the credulous acceptance problem in HOAFNs, by “incrementally” computing an extension (a set of accepted arguments, attacks and supports), if it exists, containing a given goal element in an updated HOAFN. In particular, we are interested in monitoring the credulous acceptance of a given argument, attack or support (goal) in an evolving HOAFN. Thus, our approach assumes to have a HOAFN Δ, a goal ϱ occurring in Δ, an extension E for Δ containing ϱ, and an update u establishing some changes in the original HOAFN, and uses the extension for first checking whether the update is relevant; for relevant updates, an extension of the updated HOAFN containing the goal is computed by translating the problem to the AF domain and leveraging on AF solvers. We provide formal results for our incremental approach and empirically show that it outperforms the evaluation from scratch of the credulous acceptance problem for an updated HOAFN.

论证是人工智能领域的一个重要研究领域。在 Dung 的抽象论证框架 (AF) 的不同方面已经开展了大量工作。迄今为止,分别考虑的两个相关方面是:i) 扩展该框架以考虑递归攻击和支持;ii) 考虑动态性,即论证框架随时间演变。在本文中,我们将联合处理这两个方面。我们将重点放在具有必要性的高阶论证框架(HOAFNs)上,它不仅允许论据之间存在攻击和支持关系(解释为必要性),而且还允许针对任何层次的攻击和支持。我们提出了一种在 HOAFNs 中增量评估可信接受问题的方法,即在更新的 HOAFN 中 "增量 "计算包含给定目标元素的扩展(一组已接受的论据、攻击和支持)(如果存在的话)。具体来说,我们感兴趣的是监控不断演化的 HOAFN 中给定论据、攻击或支持(目标)的可信接受度。因此,我们的方法假定有一个 HOAFN Δ、一个出现在 Δ 中的目标 ϱ、一个包含 ϱ 的 Δ 扩展 E 和一个在原始 HOAFN 中建立某些变化的更新 u,并使用扩展首先检查更新是否相关;对于相关更新,通过将问题转换到 AF 领域并利用 AF 求解器,计算出包含目标的更新 HOAFN 扩展。我们提供了增量方法的正式结果,并通过经验证明,该方法优于从头开始评估更新 HOAFN 的可信接受问题。
{"title":"Credulous acceptance in high-order argumentation frameworks with necessities: An incremental approach","authors":"Gianvincenzo Alfano ,&nbsp;Andrea Cohen ,&nbsp;Sebastian Gottifredi ,&nbsp;Sergio Greco ,&nbsp;Francesco Parisi ,&nbsp;Guillermo R. Simari","doi":"10.1016/j.artint.2024.104159","DOIUrl":"10.1016/j.artint.2024.104159","url":null,"abstract":"<div><p>Argumentation is an important research area in the field of AI. There is a substantial amount of work on different aspects of Dung's abstract Argumentation Framework (AF). Two relevant aspects considered separately so far are: <em>i</em>) extending the framework to account for recursive attacks and supports, and <span><math><mi>i</mi><mi>i</mi><mo>)</mo></math></span> considering dynamics, <em>i.e.</em>, AFs evolving over time. In this paper, we jointly deal with these two aspects. We focus on High-Order Argumentation Frameworks with Necessities (HOAFNs) which allow for attack and support relations (interpreted as <em>necessity</em>) not only between arguments but also targeting attacks and supports at any level. We propose an approach for the incremental evaluation of the credulous acceptance problem in HOAFNs, by “incrementally” computing an extension (a set of accepted arguments, attacks and supports), if it exists, containing a given goal element in an updated HOAFN. In particular, we are interested in monitoring the credulous acceptance of a given argument, attack or support (goal) in an evolving HOAFN. Thus, our approach assumes to have a HOAFN Δ, a goal <em>ϱ</em> occurring in Δ, an extension <em>E</em> for Δ containing <em>ϱ</em>, and an update <em>u</em> establishing some changes in the original HOAFN, and uses the extension for first checking whether the update is relevant; for relevant updates, an extension of the updated HOAFN containing the goal is computed by translating the problem to the AF domain and leveraging on AF solvers. We provide formal results for our incremental approach and empirically show that it outperforms the evaluation from scratch of the credulous acceptance problem for an updated HOAFN.</p></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":14.4,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141136689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Artificial Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1