{"id":"https://openalex.org/W3206895809","doi":"https://doi.org/10.1109/access.2021.3120700","title":"Adversarial Online Learning With Variable Plays in the Pursuit-Evasion Game: Theoretical Foundations and Application in Connected and Automated Vehicle Cybersecurity","display_name":"Adversarial Online Learning With Variable Plays in the Pursuit-Evasion Game: Theoretical Foundations and Application in Connected and Automated Vehicle Cybersecurity","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3206895809","doi":"https://doi.org/10.1109/access.2021.3120700","mag":"3206895809"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3120700","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3120700","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2021.3120700","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100775829","display_name":"Yiyang Wang","orcid":"https://orcid.org/0000-0002-6478-7282"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yiyang Wang","raw_affiliation_strings":["ORCiD","Department of Civil and Environmental Engineering, University of Michigan, Ann Arbor, MI, USA"],"raw_orcid":"https://orcid.org/0000-0002-6478-7282","affiliations":[{"raw_affiliation_string":"ORCiD","institution_ids":[]},{"raw_affiliation_string":"Department of Civil and Environmental Engineering, University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083290583","display_name":"Neda Masoud","orcid":"https://orcid.org/0000-0002-6526-3317"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Neda Masoud","raw_affiliation_strings":["ORCiD","Department of Civil and Environmental Engineering, University of Michigan, Ann Arbor, MI, USA"],"raw_orcid":"https://orcid.org/0000-0002-6526-3317","affiliations":[{"raw_affiliation_string":"ORCiD","institution_ids":[]},{"raw_affiliation_string":"Department of Civil and Environmental Engineering, University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100775829"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.5373,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.70019056,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"9","issue":null,"first_page":"142475","last_page":"142488"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.9750999808311462,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7559356689453125},{"id":"https://openalex.org/keywords/regret","display_name":"Regret","score":0.7053222060203552},{"id":"https://openalex.org/keywords/variable","display_name":"Variable (mathematics)","score":0.6214966773986816},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6127060055732727},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5272031426429749},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.5153864622116089},{"id":"https://openalex.org/keywords/pursuit-evasion","display_name":"Pursuit-evasion","score":0.48855599761009216},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4428376853466034},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.4323386251926422},{"id":"https://openalex.org/keywords/fictitious-play","display_name":"Fictitious play","score":0.4311378598213196},{"id":"https://openalex.org/keywords/complete-information","display_name":"Complete information","score":0.4121791422367096},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.4029272794723511},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.3331380784511566},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3067229390144348},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.27069103717803955},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.16247966885566711},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15008512139320374}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7559356689453125},{"id":"https://openalex.org/C50817715","wikidata":"https://www.wikidata.org/wiki/Q79895177","display_name":"Regret","level":2,"score":0.7053222060203552},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.6214966773986816},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6127060055732727},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5272031426429749},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.5153864622116089},{"id":"https://openalex.org/C2778388243","wikidata":"https://www.wikidata.org/wiki/Q7261573","display_name":"Pursuit-evasion","level":2,"score":0.48855599761009216},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4428376853466034},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.4323386251926422},{"id":"https://openalex.org/C145071142","wikidata":"https://www.wikidata.org/wiki/Q1411116","display_name":"Fictitious play","level":3,"score":0.4311378598213196},{"id":"https://openalex.org/C113336015","wikidata":"https://www.wikidata.org/wiki/Q574010","display_name":"Complete information","level":2,"score":0.4121791422367096},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4029272794723511},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.3331380784511566},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3067229390144348},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.27069103717803955},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.16247966885566711},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15008512139320374},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2021.3120700","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3120700","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2110.14078","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2110.14078","pdf_url":"https://arxiv.org/pdf/2110.14078","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:doaj.org/article:04aa55b312d745059e6a4405c219af04","is_oa":true,"landing_page_url":"https://doaj.org/article/04aa55b312d745059e6a4405c219af04","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 142475-142488 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3120700","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3120700","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":59,"referenced_works":["https://openalex.org/W87635799","https://openalex.org/W844031983","https://openalex.org/W1508384000","https://openalex.org/W1515851193","https://openalex.org/W1569127318","https://openalex.org/W1600999481","https://openalex.org/W1850547517","https://openalex.org/W1988790447","https://openalex.org/W2007604989","https://openalex.org/W2023954497","https://openalex.org/W2038505590","https://openalex.org/W2049934117","https://openalex.org/W2077902449","https://openalex.org/W2099005886","https://openalex.org/W2107381919","https://openalex.org/W2110309529","https://openalex.org/W2116067849","https://openalex.org/W2118795709","https://openalex.org/W2125724988","https://openalex.org/W2133854595","https://openalex.org/W2138637686","https://openalex.org/W2160484294","https://openalex.org/W2168405694","https://openalex.org/W2212142413","https://openalex.org/W2218489740","https://openalex.org/W2322269278","https://openalex.org/W2326784950","https://openalex.org/W2508573783","https://openalex.org/W2511642541","https://openalex.org/W2549079146","https://openalex.org/W2573607665","https://openalex.org/W2588620459","https://openalex.org/W2593182419","https://openalex.org/W2765574662","https://openalex.org/W2793580536","https://openalex.org/W2810911785","https://openalex.org/W2913794513","https://openalex.org/W2914156981","https://openalex.org/W2945434604","https://openalex.org/W2950929549","https://openalex.org/W2951936005","https://openalex.org/W2959120033","https://openalex.org/W2959364614","https://openalex.org/W2960644152","https://openalex.org/W2964125852","https://openalex.org/W2983192835","https://openalex.org/W3084669832","https://openalex.org/W3098881644","https://openalex.org/W3105105644","https://openalex.org/W3106860295","https://openalex.org/W4288283367","https://openalex.org/W6603557143","https://openalex.org/W6623395937","https://openalex.org/W6630506423","https://openalex.org/W6638804227","https://openalex.org/W6676122781","https://openalex.org/W6732044312","https://openalex.org/W6765977438","https://openalex.org/W6786329806"],"related_works":["https://openalex.org/W2971351794","https://openalex.org/W2969088334","https://openalex.org/W1999884485","https://openalex.org/W3118652828","https://openalex.org/W2951917596","https://openalex.org/W2086887538","https://openalex.org/W4232850892","https://openalex.org/W2065654548","https://openalex.org/W1275367343","https://openalex.org/W4200633647"],"abstract_inverted_index":{"We":[0,80,107,131],"extend":[1,109],"the":[2,9,12,25,28,48,52,56,61,64,69,72,82,90,95,125,129,137],"adversarial/non-stochastic":[3],"multi-play":[4],"multi-armed":[5],"bandit":[6],"(MPMAB)":[7],"to":[8,16,31,112,135],"case":[10],"where":[11],"number":[13],"of":[14,89,139],"arms":[15],"play":[17],"is":[18,22],"variable.":[19],"The":[20],"work":[21],"motivated":[23],"by":[24],"fact":[26],"that":[27],"resources":[29],"allocated":[30],"scan":[32],"different":[33],"critical":[34],"locations":[35],"in":[36],"an":[37,100],"interconnected":[38],"transportation":[39],"system":[40,59],"change":[41],"dynamically":[42],"over":[43],"time":[44],"and":[45,55,63,118,121],"depending":[46],"on":[47,124],"environment.":[49],"By":[50],"modeling":[51],"malicious":[53],"hacker":[54],"intrusion":[57],"monitoring":[58],"as":[60,75],"attacker":[62],"defender,":[65],"respectively,":[66],"we":[67,98],"formulate":[68],"problem":[70],"for":[71,115,128],"two":[73],"players":[74],"a":[76,86,140],"sequential":[77],"pursuit-evasion":[78],"game.":[79],"derive":[81],"condition":[83],"under":[84],"which":[85],"Nash":[87],"equilibrium":[88],"strategic":[91],"game":[92],"exists.":[93],"For":[94],"defender":[96],"side,":[97],"provide":[99,132],"exponential-weighted":[101],"based":[102],"algorithm":[103],"with":[104],"sublinear":[105],"pseudo-regret.":[106],"further":[108],"our":[110],"model":[111],"heterogeneous":[113],"rewards":[114],"both":[116],"players,":[117],"obtain":[119],"lower":[120],"upper":[122],"bounds":[123],"average":[126],"reward":[127],"attacker.":[130],"numerical":[133],"experiments":[134],"demonstrate":[136],"effectiveness":[138],"variable-arm":[141],"play.":[142]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-05-13T08:25:38.343686","created_date":"2025-10-10T00:00:00"}
