{"id":"https://openalex.org/W2964493078","doi":"https://doi.org/10.24963/ijcai.2019/902","title":"Visionary Security: Using Uncertain Real-Time Information in Signaling Games","display_name":"Visionary Security: Using Uncertain Real-Time Information in Signaling Games","publication_year":2019,"publication_date":"2019-07-28","ids":{"openalex":"https://openalex.org/W2964493078","doi":"https://doi.org/10.24963/ijcai.2019/902","mag":"2964493078"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.24963/ijcai.2019/902","pdf_url":"https://www.ijcai.org/proceedings/2019/0902.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.ijcai.org/proceedings/2019/0902.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055892489","display_name":"Elizabeth Bondi","orcid":"https://orcid.org/0000-0002-8459-8403"},"institutions":[{"id":"https://openalex.org/I2801851002","display_name":"Harvard University Press","ror":"https://ror.org/006v7bf86","country_code":"US","type":"other","lineage":["https://openalex.org/I136199984","https://openalex.org/I2801851002"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Elizabeth Bondi","raw_affiliation_strings":["Harvard University"],"affiliations":[{"raw_affiliation_string":"Harvard University","institution_ids":["https://openalex.org/I2801851002"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5055892489"],"corresponding_institution_ids":["https://openalex.org/I2801851002"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":62},"biblio":{"volume":null,"issue":null,"first_page":"6426","last_page":"6427"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Deep Learning Models","score":0.9859,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Deep Learning Models","score":0.9859,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image Encryption Techniques","score":0.9748,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"Unmanned Aerial Vehicle Communications","score":0.9734,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.503623},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.46966183}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7166995},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.68791854},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6830657},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.46966183},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4614161},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.44297463},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.24963/ijcai.2019/902","pdf_url":"https://www.ijcai.org/proceedings/2019/0902.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.24963/ijcai.2019/902","pdf_url":"https://www.ijcai.org/proceedings/2019/0902.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.67,"display_name":"Life on land","id":"https://metadata.un.org/sdg/15"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W2222104665","https://openalex.org/W2763907668","https://openalex.org/W2789150541","https://openalex.org/W2806366847","https://openalex.org/W2809558942","https://openalex.org/W2891638642","https://openalex.org/W2904639101","https://openalex.org/W639708223"],"related_works":["https://openalex.org/W4386036939","https://openalex.org/W4379143281","https://openalex.org/W4327774218","https://openalex.org/W4312858960","https://openalex.org/W4247925126","https://openalex.org/W4229448053","https://openalex.org/W4210648132","https://openalex.org/W3200286695","https://openalex.org/W2605096541","https://openalex.org/W2059768187"],"abstract_inverted_index":{"In":[0,83],"important":[1],"domains":[2],"from":[3],"natural":[4],"resource":[5],"conservation":[6],"to":[7,51,78,81],"public":[8],"safety,":[9],"real-time":[10,29,74],"information":[11,75],"is":[12],"becoming":[13],"increasingly":[14],"important.":[15],"Strategic":[16],"deployment":[17],"of":[18,41,71],"security":[19,57,98,102],"cameras":[20],"and":[21,43,105],"mobile":[22],"sensors":[23,42],"such":[24,38],"as":[25,46,48],"drones":[26],"can":[27,60],"provide":[28],"updates":[30],"on":[31],"illegal":[32],"activities.":[33],"To":[34],"help":[35],"plan":[36],"for":[37],"strategic":[39],"deployments":[40],"human":[44],"patrollers,":[45],"well":[47],"warning":[49],"signals":[50],"ward":[52],"off":[53],"adversaries,":[54],"the":[55,68,96],"defender-attacker":[56],"games":[58],"framework":[59],"be":[61],"used.":[62],"Previous":[63],"works":[64],"do":[65],"not":[66,88],"consider":[67],"combined":[69],"situation":[70],"uncertainty":[72],"in":[73,76],"addition":[77],"strategically":[79],"signaling":[80],"adversaries.":[82],"this":[84,91],"thesis,":[85],"we":[86],"will":[87],"only":[89],"address":[90],"gap,":[92],"but":[93],"also":[94],"improve":[95],"overall":[97],"result":[99],"by":[100],"considering":[101],"game":[103],"models":[104],"computer":[106],"vision":[107],"algorithms":[108],"together.":[109]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2964493078","counts_by_year":[],"updated_date":"2024-10-17T14:17:06.276745","created_date":"2019-08-13"}