Computing optimal nash equilibria in multiplayer games

Y Zhang, B An… - Advances in Neural …, 2024 - proceedings.neurips.cc
Designing efficient algorithms to compute a Nash Equilibrium (NE) in multiplayer games is
still an open challenge. In this paper, we focus on computing an NE that optimizes a given …

A VNS-based metaheuristic approach for escape interdiction on transportation networks

S Samanta, T Mohandass, G Sen, SK Ghosh - Computers & Industrial …, 2022 - Elsevier
Containment of dynamic crimes such as kidnapping, bank robbery, hit-and-run, etc., is a
challenging issue for law enforcement agencies as the criminal changes his location with …

Research progress of opponent modeling based on deep reinforcement learning

H Xu, L Qin, J Zeng, Y Hu… - Journal of …, 2023 - dc-china-simulation …
Deep reinforcement learning is an agent modeling method with both deep learning feature
extraction ability and reinforcement learning sequence decision-making ability, which can …

Optimal interdiction of urban criminals with the aid of real-time information

Y Zhang, Q Guo, B An, L Tran-Thanh… - Proceedings of the AAAI …, 2019 - aaai.org
Most violent crimes happen in urban and suburban cities. With emerging tracking
techniques, law enforcement officers can have real-time location information of the escaping …

Solving large-scale extensive-form network security games via neural fictitious self-play

W Xue, Y Zhang, S Li, X Wang, B An… - arXiv preprint arXiv …, 2021 - arxiv.org
Securing networked infrastructures is important in the real world. The problem of deploying
security resources to protect against an attacker in networked domains can be modeled as …

Grasper: A Generalist Pursuer for Pursuit-Evasion Problems

P Li, S Li, X Wang, J Cerny, Y Zhang, S McAleer… - arXiv preprint arXiv …, 2024 - arxiv.org
Pursuit-evasion games (PEGs) model interactions between a team of pursuers and an
evader in graph-based environments such as urban street networks. Recent advancements …

On dynamic recovery of cloud storage system under advanced persistent threats

P Li, X Yang - IEEE Access, 2019 - ieeexplore.ieee.org
Advanced persistent threat (APT) for data theft poses a severe threat to cloud storage
systems (CSSs). An APT actor may steal valuable data from the target CSS even in a …

Assessing vehicle interdiction strategies on a complex transportation network: A simulation-based study

S Samanta, G Sen, J Uniyal, SK Ghosh - Socio-Economic Planning …, 2024 - Elsevier
The escape interdiction problem within the context of attacker activities on a transportation
network is addressed in this study. In the absence of traffic within the network, the attacker …

CFR-MIX: Solving imperfect information extensive-form games with combinatorial action space

S Li, Y Zhang, X Wang, W Xue, B An - arXiv preprint arXiv:2105.08440, 2021 - arxiv.org
In many real-world scenarios, a team of agents coordinate with each other to compete
against an opponent. The challenge of solving this type of game is that the team's joint …

NSGZero: Efficiently learning non-exploitable policy in large-scale network security games with neural monte carlo tree search

W Xue, B An, CK Yeo - Proceedings of the AAAI Conference on Artificial …, 2022 - ojs.aaai.org
How resources are deployed to secure critical targets in networks can be modelled by
Network Security Games (NSGs). While recent advances in deep learning (DL) provide a …