Computing optimal nash equilibria in multiplayer games
Designing efficient algorithms to compute a Nash Equilibrium (NE) in multiplayer games is
still an open challenge. In this paper, we focus on computing an NE that optimizes a given …
still an open challenge. In this paper, we focus on computing an NE that optimizes a given …
A VNS-based metaheuristic approach for escape interdiction on transportation networks
Containment of dynamic crimes such as kidnapping, bank robbery, hit-and-run, etc., is a
challenging issue for law enforcement agencies as the criminal changes his location with …
challenging issue for law enforcement agencies as the criminal changes his location with …
Research progress of opponent modeling based on deep reinforcement learning
H Xu, L Qin, J Zeng, Y Hu… - Journal of …, 2023 - dc-china-simulation …
Deep reinforcement learning is an agent modeling method with both deep learning feature
extraction ability and reinforcement learning sequence decision-making ability, which can …
extraction ability and reinforcement learning sequence decision-making ability, which can …
Optimal interdiction of urban criminals with the aid of real-time information
Most violent crimes happen in urban and suburban cities. With emerging tracking
techniques, law enforcement officers can have real-time location information of the escaping …
techniques, law enforcement officers can have real-time location information of the escaping …
Solving large-scale extensive-form network security games via neural fictitious self-play
Securing networked infrastructures is important in the real world. The problem of deploying
security resources to protect against an attacker in networked domains can be modeled as …
security resources to protect against an attacker in networked domains can be modeled as …
Grasper: A Generalist Pursuer for Pursuit-Evasion Problems
Pursuit-evasion games (PEGs) model interactions between a team of pursuers and an
evader in graph-based environments such as urban street networks. Recent advancements …
evader in graph-based environments such as urban street networks. Recent advancements …
On dynamic recovery of cloud storage system under advanced persistent threats
Advanced persistent threat (APT) for data theft poses a severe threat to cloud storage
systems (CSSs). An APT actor may steal valuable data from the target CSS even in a …
systems (CSSs). An APT actor may steal valuable data from the target CSS even in a …
Assessing vehicle interdiction strategies on a complex transportation network: A simulation-based study
The escape interdiction problem within the context of attacker activities on a transportation
network is addressed in this study. In the absence of traffic within the network, the attacker …
network is addressed in this study. In the absence of traffic within the network, the attacker …
CFR-MIX: Solving imperfect information extensive-form games with combinatorial action space
In many real-world scenarios, a team of agents coordinate with each other to compete
against an opponent. The challenge of solving this type of game is that the team's joint …
against an opponent. The challenge of solving this type of game is that the team's joint …
NSGZero: Efficiently learning non-exploitable policy in large-scale network security games with neural monte carlo tree search
How resources are deployed to secure critical targets in networks can be modelled by
Network Security Games (NSGs). While recent advances in deep learning (DL) provide a …
Network Security Games (NSGs). While recent advances in deep learning (DL) provide a …