{"id":"https://openalex.org/W4404088813","doi":"https://doi.org/10.48550/arxiv.2410.15600","title":"Patrol Security Game: Defending Against Adversary with Freedom in Attack\n Timing, Location, and Duration","display_name":"Patrol Security Game: Defending Against Adversary with Freedom in Attack\n Timing, Location, and Duration","publication_year":2024,"publication_date":"2024-10-20","ids":{"openalex":"https://openalex.org/W4404088813","doi":"https://doi.org/10.48550/arxiv.2410.15600"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2410.15600","pdf_url":"http://arxiv.org/pdf/2410.15600","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://arxiv.org/pdf/2410.15600","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060610248","display_name":"Hao-Tsung Yang","orcid":"https://orcid.org/0000-0003-4463-1616"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Hao-Tsung","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114534433","display_name":"Ting-Kai Weng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Weng, Ting-Kai","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075065797","display_name":"Ting-Yu Chang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chang, Ting-Yu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102019297","display_name":"Kun Liu","orcid":"https://orcid.org/0000-0002-6676-8165"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Kin Sum","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021443603","display_name":"Shan Lin","orcid":"https://orcid.org/0000-0001-8898-6481"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lin, Shan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064844404","display_name":"Jie Gao","orcid":"https://orcid.org/0000-0003-2823-2682"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gao, Jie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5069244818","display_name":"Sang\u2010Bing Tsai","orcid":"https://orcid.org/0000-0001-6988-5829"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tsai, Shih-Yu","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":77},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9925,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9925,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9596,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9343,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.81802297},{"id":"https://openalex.org/C112758219","wikidata":"https://www.wikidata.org/wiki/Q16038819","display_name":"Duration (music)","level":2,"score":0.74084926},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.700199},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4902797},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0585033},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2410.15600","pdf_url":"http://arxiv.org/pdf/2410.15600","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2410.15600","pdf_url":"http://arxiv.org/pdf/2410.15600","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W746329893","https://openalex.org/W4391375266","https://openalex.org/W4388150944","https://openalex.org/W4387985143","https://openalex.org/W4362599004","https://openalex.org/W2899084033","https://openalex.org/W2808242528","https://openalex.org/W2748952813","https://openalex.org/W2348837382","https://openalex.org/W1567638270"],"abstract_inverted_index":{"We":[0,47,165],"explored":[1],"the":[2,18,21,44,66,76,89,100,109,125,128,132,140,180,187,192,203,211],"Patrol":[3],"Security":[4],"Game":[5],"(PSG),":[6],"a":[7,34,55,60,70,153],"robotic":[8],"patrolling":[9,35],"problem":[10,58,142,156],"modeled":[11],"as":[12],"an":[13,38],"extensive-form":[14],"Stackelberg":[15],"game,":[16],"where":[17],"attacker":[19,110],"determines":[20],"timing,":[22],"location,":[23],"and":[24,112,163,170,213,228],"duration":[25],"of":[26,94,205,215],"their":[27,83],"attack.":[28],"Our":[29],"objective":[30,62],"is":[31],"to":[32,69,177],"devise":[33],"schedule":[36,130],"with":[37,59,202],"infinite":[39],"time":[40,103],"horizon":[41],"that":[42,49,88,113,123,219],"minimizes":[43],"attacker's":[45,133],"payoff.":[46],"demonstrated":[48],"PSG":[50],"can":[51,116,190],"be":[52,117],"transformed":[53],"into":[54],"combinatorial":[56],"minimax":[57,141],"closed-form":[61],"function.":[63],"By":[64],"constraining":[65],"defender's":[67],"strategy":[68],"time-homogeneous":[71],"first-order":[72],"Markov":[73],"chain":[74],"(i.e.,":[75],"patroller's":[77],"next":[78],"move":[79],"depends":[80],"solely":[81],"on":[82,108,225],"current":[84],"location),":[85],"we":[86,121,151],"proved":[87],"optimal":[90,193],"solution":[91],"in":[92,127,136,145],"cases":[93],"zero":[95],"penalty":[96],"involves":[97],"either":[98],"minimizing":[99],"expected":[101,134,160],"hitting":[102],"or":[104],"return":[105],"time,":[106],"depending":[107],"model,":[111,175],"these":[114,183],"solutions":[115],"computed":[118],"efficiently.":[119],"Additionally,":[120],"observed":[122],"increasing":[124],"randomness":[126],"patrol":[129,195,206],"reduces":[131],"payoff":[135],"high-penalty":[137],"cases.":[138],"However,":[139],"becomes":[143],"non-convex":[144],"other":[146],"scenarios.":[147],"To":[148],"address":[149],"this,":[150],"formulated":[152],"bi-criteria":[154],"optimization":[155],"incorporating":[157],"two":[158,184],"objectives:":[159],"maximum":[161],"reward":[162],"entropy.":[164],"proposed":[166],"three":[167],"graph-based":[168],"algorithms":[169],"one":[171],"deep":[172],"reinforcement":[173],"learning":[174],"designed":[176],"efficiently":[178],"balance":[179],"trade-off":[181],"between":[182],"objectives.":[185],"Notably,":[186],"third":[188],"algorithm":[189],"identify":[191],"deterministic":[194],"schedule,":[196],"though":[197],"its":[198],"runtime":[199],"grows":[200],"exponentially":[201],"number":[204],"spots.":[207],"Experimental":[208],"results":[209],"validate":[210],"effectiveness":[212],"scalability":[214],"our":[216,220],"solutions,":[217],"demonstrating":[218],"approaches":[221],"outperform":[222],"state-of-the-art":[223],"baselines":[224],"both":[226],"synthetic":[227],"real-world":[229],"crime":[230],"datasets.":[231]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4404088813","counts_by_year":[],"updated_date":"2025-04-16T03:33:54.717212","created_date":"2024-11-06"}