• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

识别和评估迭代囚徒困境中的敲诈行为的有效性。

Recognising and evaluating the effectiveness of extortion in the Iterated Prisoner's Dilemma.

机构信息

School of Mathematics, Cardiff University, Cardiff, United Kingdom.

Google Inc., Mountain View, CA, United States of America.

出版信息

PLoS One. 2024 Jul 26;19(7):e0304641. doi: 10.1371/journal.pone.0304641. eCollection 2024.

DOI:10.1371/journal.pone.0304641
PMID:39058703
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11280246/
Abstract

Establishing and maintaining mutual cooperation in agent-to-agent interactions can be viewed as a question of direct reciprocity and readily applied to the Iterated Prisoner's Dilemma. Agents cooperate, at a small cost to themselves, in the hope of obtaining a future benefit. Zero-determinant strategies, introduced in 2012, have a subclass of strategies that are provably extortionate. In the established literature, most of the studies of the effectiveness or lack thereof, of zero-determinant strategies is done by placing some zero-determinant strategy in a specific scenario (collection of agents) and evaluating its performance either numerically or theoretically. Extortionate strategies are algebraically rigid and memory-one by definition, and requires complete knowledge of a strategy (the memory-one cooperation probabilities). The contribution of this work is a method to detect extortionate behaviour from the history of play of an arbitrary strategy. This inverts the paradigm of most studies: instead of observing the effectiveness of some theoretically extortionate strategies, the largest known collection of strategies will be observed and their intensity of extortion quantified empirically. Moreover, we show that the lack of adaptability of extortionate strategies extends via this broader definition.

摘要

在代理间交互中建立和维护相互合作,可以被视为直接互惠的问题,并可以很容易地应用于重复囚徒困境。代理以较小的自身成本进行合作,希望获得未来的利益。2012 年引入的零行列式策略,有一个策略子类是可证明的敲诈勒索的。在已建立的文献中,对零行列式策略的有效性或缺乏有效性的大部分研究,都是通过在特定场景(代理集合)中放置一些零行列式策略,并通过数值或理论评估其性能来完成的。敲诈勒索策略从定义上讲是代数刚性和记忆一的,并且需要完全了解策略(记忆一合作概率)。这项工作的贡献是一种从任意策略的历史记录中检测敲诈勒索行为的方法。这颠覆了大多数研究的范例:不是观察某些理论上敲诈勒索策略的有效性,而是观察最大的已知策略集合,并从经验上量化它们的敲诈勒索强度。此外,我们还表明,敲诈勒索策略的缺乏适应性通过这个更广泛的定义扩展了。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/b7c3635fcae4/pone.0304641.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/f4f8f9776364/pone.0304641.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/6bdd4239e058/pone.0304641.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/a4744bbd4350/pone.0304641.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/9d59a0958ce1/pone.0304641.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/425166be86f9/pone.0304641.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/c873108fb0ff/pone.0304641.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/fa3e9db7aa57/pone.0304641.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/b7c3635fcae4/pone.0304641.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/f4f8f9776364/pone.0304641.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/6bdd4239e058/pone.0304641.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/a4744bbd4350/pone.0304641.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/9d59a0958ce1/pone.0304641.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/425166be86f9/pone.0304641.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/c873108fb0ff/pone.0304641.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/fa3e9db7aa57/pone.0304641.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e379/11280246/b7c3635fcae4/pone.0304641.g008.jpg

相似文献

1
Recognising and evaluating the effectiveness of extortion in the Iterated Prisoner's Dilemma.识别和评估迭代囚徒困境中的敲诈行为的有效性。
PLoS One. 2024 Jul 26;19(7):e0304641. doi: 10.1371/journal.pone.0304641. eCollection 2024.
2
Extortion can outperform generosity in the iterated prisoner's dilemma.在重复囚徒困境中,敲诈策略可能比慷慨策略表现得更好。
Nat Commun. 2016 Apr 12;7:11125. doi: 10.1038/ncomms11125.
3
Autocratic strategies for iterated games with arbitrary action spaces.具有任意行动空间的重复博弈的独裁策略。
Proc Natl Acad Sci U S A. 2016 Mar 29;113(13):3573-8. doi: 10.1073/pnas.1520163113. Epub 2016 Mar 14.
4
Evolutionary dynamics of zero-determinant strategies in repeated multiplayer games.重复多人博弈中零行列式策略的进化动力学。
J Theor Biol. 2022 Sep 21;549:111209. doi: 10.1016/j.jtbi.2022.111209. Epub 2022 Jun 30.
5
Human players manage to extort more than the mutual cooperation payoff in repeated social dilemmas.人类玩家在重复的社会困境中设法获得的收益超过了相互合作的收益。
Sci Rep. 2021 Aug 19;11(1):16820. doi: 10.1038/s41598-021-96061-9.
6
Strategies that enforce linear payoff relationships under observation errors in Repeated Prisoner's Dilemma game.在重复囚徒困境博弈中观察误差下强制线性收益关系的策略。
J Theor Biol. 2019 Sep 21;477:63-76. doi: 10.1016/j.jtbi.2019.06.009. Epub 2019 Jun 12.
7
Iterated Prisoner's Dilemma contains strategies that dominate any evolutionary opponent.迭代囚徒困境包含了能够支配任何进化对手的策略。
Proc Natl Acad Sci U S A. 2012 Jun 26;109(26):10409-13. doi: 10.1073/pnas.1206569109. Epub 2012 May 21.
8
Win-Stay-Lose-Shift as a self-confirming equilibrium in the iterated Prisoner's Dilemma.在重复囚徒困境中,赢留输走是一种自我确认的均衡。
Proc Biol Sci. 2021 Jun 30;288(1953):20211021. doi: 10.1098/rspb.2021.1021.
9
Collapse of cooperation in evolving games.进化博弈中合作的瓦解。
Proc Natl Acad Sci U S A. 2014 Dec 9;111(49):17558-63. doi: 10.1073/pnas.1408618111. Epub 2014 Nov 24.
10
Natural selection of memory-one strategies for the iterated prisoner's dilemma.重复囚徒困境中记忆一策略的自然选择
J Theor Biol. 2000 Apr 21;203(4):335-55. doi: 10.1006/jtbi.2000.1089.

引用本文的文献

1
Properties of winning Iterated Prisoner's Dilemma strategies.获胜的重复囚徒困境策略的属性。
PLoS Comput Biol. 2024 Dec 26;20(12):e1012644. doi: 10.1371/journal.pcbi.1012644. eCollection 2024 Dec.
2
Outlearning extortioners: unbending strategies can foster reciprocal fairness and cooperation.战胜敲诈者:坚定的策略能够促进互惠公平与合作。
PNAS Nexus. 2023 May 25;2(6):pgad176. doi: 10.1093/pnasnexus/pgad176. eCollection 2023 Jun.
3
Using a theory of mind to find best responses to memory-one strategies.运用心理理论寻找对记忆策略的最佳反应。

本文引用的文献

1
Outlearning extortioners: unbending strategies can foster reciprocal fairness and cooperation.战胜敲诈者:坚定的策略能够促进互惠公平与合作。
PNAS Nexus. 2023 May 25;2(6):pgad176. doi: 10.1093/pnasnexus/pgad176. eCollection 2023 Jun.
2
Partners and rivals in direct reciprocity.直接互惠的伙伴和对手。
Nat Hum Behav. 2018 Jul;2(7):469-477. doi: 10.1038/s41562-018-0320-9. Epub 2018 Mar 19.
3
Extortion strategies resist disciplining when higher competitiveness is rewarded with extra gain.当更高的竞争力得到额外收益的回报时,敲诈策略就会抵制纪律约束。
Sci Rep. 2020 Oct 14;10(1):17287. doi: 10.1038/s41598-020-74181-y.
Nat Commun. 2019 Feb 15;10(1):783. doi: 10.1038/s41467-019-08671-7.
4
Evolution reinforces cooperation with the emergence of self-recognition mechanisms: An empirical study of strategies in the Moran process for the iterated prisoner's dilemma.进化通过自我识别机制的出现来加强合作:对迭代囚徒困境中 Moran 过程策略的实证研究。
PLoS One. 2018 Oct 25;13(10):e0204981. doi: 10.1371/journal.pone.0204981. eCollection 2018.
5
Reinforcement learning produces dominant strategies for the Iterated Prisoner's Dilemma.强化学习为重复囚徒困境产生了占优策略。
PLoS One. 2017 Dec 11;12(12):e0188046. doi: 10.1371/journal.pone.0188046. eCollection 2017.
6
Zero-determinant strategies in finitely repeated games.有限重复博弈中的零行列式策略。
J Theor Biol. 2018 Feb 7;438:61-77. doi: 10.1016/j.jtbi.2017.11.002. Epub 2017 Nov 14.
7
Partners or rivals? Strategies for the iterated prisoner's dilemma.合作伙伴还是竞争对手?重复囚徒困境的策略
Games Econ Behav. 2015 Jul;92:41-52. doi: 10.1016/j.geb.2015.05.005.
8
The art of war: beyond memory-one strategies in population games.战争的艺术:超越记忆——群体博弈中的一种策略
PLoS One. 2015 Mar 24;10(3):e0120625. doi: 10.1371/journal.pone.0120625. eCollection 2015.
9
Best practices for scientific computing.科学计算的最佳实践。
PLoS Biol. 2014 Jan;12(1):e1001745. doi: 10.1371/journal.pbio.1001745. Epub 2014 Jan 7.
10
Adaptive dynamics of extortion and compliance.敲诈与服从的适应动态。
PLoS One. 2013 Nov 1;8(11):e77886. doi: 10.1371/journal.pone.0077886. eCollection 2013.