skip to main content
research-article

A Branch-and-Cut Algorithm for Submodular Interdiction Games

Published: 01 September 2022 Publication History

Abstract

Many relevant applications from diverse areas such as marketing, wildlife conservation, and defending critical infrastructure can be modeled as interdiction games. In this work, we introduce interdiction games whose objective is a monotone and submodular set function. Given a ground set of items, the leader interdicts the usage of some of the items of the follower in order to minimize the objective value achievable by the follower, who seeks to maximize a submodular set function over the uninterdicted items subject to knapsack constraints. We propose an exact branch-and-cut algorithm for this kind of interdiction game. The algorithm is based on interdiction cuts, which allow the leader to capture the follower’s objective function value for a given interdiction decision of the leader and exploit the submodularity of the objective function. We also present extensions and liftings of these cuts and discuss additional preprocessing procedures. We test our solution framework on the weighted maximal covering interdiction game and the bipartite inference interdiction game. For both applications, the improved variants of our interdiction cut perform significantly better than the basic version. For the weighted maximal covering interdiction game for which a mixed-integer bilevel linear programming (MIBLP) formulation is available, we compare the results with those of a state-of-the-art MIBLP solver. Whereas the MIBLP solver yields a minimum of 54% optimality gap within one hour, our best branch-and-cut setting solves all but four of 108 instances to optimality with a maximum of 3% gap among unsolved ones.

References

[1]
Ahmed S, Atamtürk A (2011) Maximizing a class of submodular utility functions. Math. Programming 128(1–2):149–169.
[2]
Aksen D, Akca SŞ, Aras N (2014) A bilevel partial interdiction problem with capacitated facilities and demand outsourcing. Comput. Oper. Res. 41:346–358.
[3]
Aksen D, Piyade N, Aras N (2010) The budget constrained r-interdiction median problem with capacity expansion. Central Eur. J. Oper. Res. 18(3):269–291.
[4]
Alon N, Gamzu I, Tennenholtz M (2012) Optimizing budget allocation among channels and influencers. Mille A, Gandon F, Misselis J, Rabinovich M, Staab S, eds. Proc. 21st Internat. Conf. World Wide Web (Association for Computing Machinery, New York), 381–388.
[5]
Bayrak H, Bailey MD (2008) Shortest path network interdiction with asymmetric information. Networks 52(3):133–140.
[6]
Ben-Ayed O, Blair CE (1990) Computational difficulties of bilevel linear programming. Oper. Res. 38(3):556–560.
[7]
Bogunovic I, Mitrović S, Scarlett J, Cevher V (2017) Robust submodular maximization: A non-uniform partitioning approach. Precup D, Teh YW, eds. Internat. Conf. Machine Learn. (PMLR), 508–516.
[8]
Bonnet C, Simioni M (2001) Assessing consumer response to protected designation of origin labelling: A mixed multinomial logit approach. Eur. Rev. Agricultural Econom. 28(4):433–449.
[9]
Borrero JS, Lozano L (2021) Modeling defender-attacker problems as robust linear programs with mixed-integer uncertainty sets. INFORMS J. Comput. 33(4):1570–1589.
[10]
Brotcorne L, Hanafi S, Mansi R (2013) One-level reformulation of the bilevel knapsack problem using dynamic programming. Discrete Optim. 10(1):1–10.
[11]
Brown G, Carlyle M, Salmerón J, Wood K (2006) Defending critical infrastructure. Interfaces 36(6):530–544.
[12]
Calinescu G, Chekuri C, Pál M, Vondrák J (2007) Maximizing a submodular set function subject to a matroid constraint. Fischetti M, Williamson DP, eds. Internat. Conf. Integer Programming Combin. Optim. (Springer, Berlin, Heidelberg, Germany), 182–196.
[13]
Cappanera P, Scaparra MP (2011) Optimal allocation of protective resources in shortest-path networks. Transportation Sci. 45(1):64–80.
[14]
Caprara A, Carvalho M, Lodi A, Woeginger GJ (2016) Bilevel knapsack with interdiction constraints. INFORMS J. Comput. 28(2):319–333.
[15]
Church R, ReVelle C (1974) The maximal covering location problem. Papers Regional Sci. Assoc. 32:101–118.
[16]
Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: The median and covering facility interdiction problems. Ann. Assoc. Amer. Geographers 94(3):491–502.
[17]
Cochran JJ, Cox LA, Keskinocak P, Kharoufeh JP, Smith JC, Wood RK (2011) Bilevel network interdiction models: Formulations and solutions. Wiley Encyclopedia of Operations Research and Management Science (Wiley, Hoboken, NJ).
[18]
Coniglio S, Furini F, Ljubic I (2020) Maximizing submodular utility functions combined with a set-union operator over a discrete set Working paper, Mathematical Sciences, University of Southampton, England. http://www.optimization-online.org/DB_HTML/2020/04/7715.html.
[19]
Contardo C, Sefair JA (2021) A progressive approximation approach for the exact solution of sparse large-scale binary interdiction games. INFORMS J. Comput. 34(2):890–908.
[20]
Cormican KJ, Morton DP, Wood RK (1998) Stochastic network interdiction. Oper. Res. 46(2):184–197.
[21]
Cornuejols G, Fisher M, Nemhauser G (1977) Location of bank accounts to optimize float: An analytic study of exact and approximate algorithms. Management Sci. 23:789–810.
[22]
Della Croce F, Scatamacchia R (2020) An exact approach for the bilevel knapsack problem with interdiction constraints and extensions. Math. Programming 183(1):249–281.
[23]
Dempe S, Zemkoho A (2020) Bilevel optimization (Springer, Cham, Switzerland).
[24]
DeNegre S (2011) Interdiction and discrete bilevel linear programming. PhD thesis, Lehigh University, Bethlehem, PA.
[25]
Dong L, Xu-chen L, Xiang-tao Y, Fei W (2010) A model for allocating protection resources in military logistics distribution system based on maximal covering problem. 2010 Internat. Conf. Logist. Systems Intelligent Management (ICLSIM), vol. 1 (IEEE, New York), 98–101.
[26]
Du D, Ko KI, Hu X (2012) Design and Analysis of Approximation Algorithms, vol. 62 (Springer, New York).
[27]
Fischetti M, Ljubić I, Monaci M, Sinnl M (2017) A new general-purpose algorithm for mixed-integer bilevel linear programs. Oper. Res. 65(6):1615–1637.
[28]
Fischetti M, Ljubić I, Monaci M, Sinnl M (2019) Interdiction games and monotonicity, with application to knapsack problems. INFORMS J. Comput. 31(2):390–410.
[29]
Furini F, Ljubić I, Martin S, San Segundo P (2019) The maximum clique interdiction problem. Eur. J. Oper. Res. 277(1):112–127.
[30]
Furini F, Ljubić I, San Segundo P, Zhao Y (2021) A branch-and-cut algorithm for the edge interdiction clique problem. Eur. J. Oper. Res. 294(1):54–69.
[31]
Golden B (1978) A problem in network interdiction. Naval Res. Logist. Quart. 25(4):711–713.
[32]
Guestrin C, Krause A, Singh AP (2005) Near-optimal sensor placements in Gaussian processes. Dzeroski S, Raedt LD, Wrobel S, eds. Proc. 22nd Internat. Conf. Machine Learn. (Association for Computing Machinery, New York), 265–272.
[33]
Han, S, Gómez, A, Prokopyev, OA (2022) Fractional 0–1 programming and submodularity. J. Glob. Optim. https://doi.org/10.1007/s10898-022-01131-5.
[34]
Israeli E, Wood RK (2002) Shortest-path network interdiction. Networks 40(2):97–111.
[35]
Jeroslow RG (1985) The polynomial hierarchy and a simple model for competitive analysis. Math. Programming 32(2):146–164.
[36]
Kazemi E, Zadimoghaddam M, Karbasi A (2018) Scalable deletion-robust submodular maximization: Data summarization with privacy and fairness constraints. Dy J, Krause A, eds. Internat. Conf. Machine Learn. (PMLR), 2544–2553.
[37]
Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. Getoor L, Senator T, Domingos P, Faloutsos C, eds. Proc. 9th ACM SIGKDD Internat. Conf. Knowledge Discovery Data Mining (Association for Computing Machinery, New York), 137–146.
[38]
Krause A, Golovin D (2014) Submodular function maximization. Tractability 3:71–104.
[39]
Krause A, McMahan HB, Guestrin C, Gupta A (2008) Robust submodular observation selection. J. Machine Learn. Res. 9(12):2761–2801.
[40]
Kunnumkal S, Martínez-de Albéniz V (2019) Tractable approximations for assortment planning with product costs. Oper. Res. 67(2):436–452.
[41]
Laporte G, Nickel S, Saldanha da Gama F, eds. (2015) Location Science, 1st ed. (Springer, Cham, Switzerland).
[42]
Ljubić I, Moreno E (2018) Outer approximation and submodular cuts for maximum capture facility location problems with random utilities. Eur. J. Oper. Res. 266(1):46–56.
[43]
Lozano L, Smith JC (2017a) A backward sampling framework for interdiction problems with fortification. INFORMS J. Comput. 29(1):123–139.
[44]
Lozano L, Smith JC (2017b) A value-function-based exact approach for the bilevel mixed-integer programming problem. Oper. Res. 65(3):768–786.
[45]
Lozano L, Smith JC, Kurz ME (2017) Solving the traveling salesman problem with interdiction and fortification. Oper. Res. Lett. 45(3):210–216.
[46]
Mc Carthy SM, Tambe M, Kiekintveld C, Gore M, Killion A (2016) Preventing illegal logging: Simultaneous optimization of resource teams and tactics for security. Schuurmans D, Wellman M, eds. Proc. AAAI Conf. Artificial Intelligence (AAAI Press, Palo Alto, CA), vol. 30.
[47]
McFadden D, Train K (2000) Mixed MNL models for discrete response. J. Appl. Econometrics 15(5):447–470.
[48]
Morton DP, Pan F, Saeger KJ (2007) Models for nuclear smuggling interdiction. IIE Trans. 39(1):3–14.
[49]
Nemhauser GL, Wolsey LA, Fisher ML (1978) An analysis of approximations for maximizing submodular set functions—I. Math. Programming 14(1):265–294.
[50]
Orlin JB, Schulz AS, Udwani R (2016) Robust monotone submodular function maximization. Louveaux Q, Skutella M, eds. Integer Programming and Combinatorial Optimization (Springer International Publishing, Cham), 312–324.
[51]
ReVelle C, Scholssberg M, Williams J (2008) Solving the maximal covering location problem with heuristic concentration. Comput. Oper. Res. 35(2):427–435.
[52]
Roboredo MC, Aizemberg L, Pessoa AA (2019) An exact approach for the r-interdiction covering problem with fortification. Central Eur. J. Oper. Res. 27(1):111–131.
[53]
Sakaue S, Ishihata M (2018) Accelerated best-first search with upper-bound computation for submodular function maximization. McIlraith S, Weinberger K, eds. Proc. AAAI Conf. Artificial Intelligence (AAAI Press, Palo Alto, CA), vol. 32.
[54]
Salvagnin D (2019) Some experiments with submodular function maximization via integer programming. Rousseau L-M, Stergiou K, eds. Internat. Conf. Integration Constraint Programming Artificial Intelligence Oper Res. (Springer, Cham, Switzerland), 488–501.
[55]
Scaparra MP, Church RL (2008a) A bilevel mixed-integer program for critical infrastructure protection planning. Comput. Oper. Res. 35(6):1905–1923.
[56]
Scaparra MP, Church RL (2008b) An exact solution approach for the interdiction median problem with fortification. Eur. J. Oper. Res. 189(1):76–92.
[57]
Sefair JA, Smith JC, Acevedo MA, Fletcher RJ Jr (2017) A defender-attacker model and algorithm for maximizing weighted expected hitting time with application to conservation planning. IISE Trans. 49(12):1112–1128.
[58]
Shen S, Smith JC, Goli R (2012) Exact interdiction models and algorithms for disconnecting networks via node deletions. Discrete Optim. 9(3):172–188.
[59]
Smith JC (2010) Basic interdiction models. Cochran JJ, Cox LA, Keskinocak P, Kharoufeh JP, Smith JC, eds. Wiley Encyclopedia of Operations Research and Management Science (Wiley, Hoboken, NJ).
[60]
Smith JC, Song Y (2020) A survey of network interdiction models and algorithms. Eur. J. Oper. Res. 283(3):797–811.
[61]
Tahernejad S, Ralphs TK, DeNegre ST (2020) A branch-and-cut algorithm for mixed integer bilevel linear optimization problems and its implementation. Math. Programming Comput. 12(4):529–568.
[62]
Tang Y, Richard JPP, Smith JC (2016) A class of algorithms for mixed-integer bilevel min–max optimization. J. Global Optim. 66(2):225–262.
[63]
Tanınmış K, Aras N, Altınel İK (2021) Improved x-space algorithm for min-max bilevel problems with an application to misinformation spread in social networks. Eur. J. Oper. Res. 297(1):40–52.
[64]
Tawarmalani M, Ahmed S, Sahinidis NV (2002) Global optimization of 0-1 hyperbolic programs. J. Global Optim. 24(4):385–416.
[65]
Vohra RV, Hall NG (1993) A probabilistic analysis of the maximal covering location problem. Discrete Appl. Math. 43(2):175–183.
[66]
Von Stackelberg H (1952) The Theory of the Market Economy (Oxford University Press, New York).
[67]
Wollmer R (1964) Removing arcs from a network. Oper. Res. 12(6):934–940.
[68]
Wood RK (1993) Deterministic network interdiction. Math. Comput. Model. 17(2):1–18.
[69]
Xu P, Wang L (2014) An exact algorithm for the bilevel mixed integer linear programming problem under three simplifying assumptions. Comput. Oper. Res. 41:309–318.
[70]
Yue D, Gao J, Zeng B, You F (2019) A projection-based reformulation and decomposition algorithm for global optimization of a class of mixed integer bilevel linear programs. J. Global Optim. 73(1):27–57.
[71]
Zheng K, Albert LA (2018) An exact algorithm for solving the bilevel facility interdiction and fortification problem. Oper. Res. Lett. 46(6):573–578.

Cited By

View all

Index Terms

  1. A Branch-and-Cut Algorithm for Submodular Interdiction Games
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image INFORMS Journal on Computing
    INFORMS Journal on Computing  Volume 34, Issue 5
    September-October 2022
    484 pages
    ISSN:1526-5528
    DOI:10.1287/ijoc.2022.34.issue-5
    Issue’s Table of Contents

    Publisher

    INFORMS

    Linthicum, MD, United States

    Publication History

    Published: 01 September 2022
    Accepted: 30 March 2022
    Received: 29 March 2021

    Author Tags

    1. interdiction games
    2. submodular optimization
    3. bilevel optimization
    4. branch-and-cut

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 06 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media