{"id":"https://openalex.org/W7123350128","doi":"https://doi.org/10.1109/cdc57313.2025.11312291","title":"Integrating Sequential Hypothesis Testing into Adversarial Games: A Sun Zi-Inspired Framework","display_name":"Integrating Sequential Hypothesis Testing into Adversarial Games: A Sun Zi-Inspired Framework","publication_year":2025,"publication_date":"2025-12-09","ids":{"openalex":"https://openalex.org/W7123350128","doi":"https://doi.org/10.1109/cdc57313.2025.11312291"},"language":null,"primary_location":{"id":"doi:10.1109/cdc57313.2025.11312291","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc57313.2025.11312291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 64th Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101911636","display_name":"Haosheng Zhou","orcid":"https://orcid.org/0000-0001-8062-9818"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Haosheng Zhou","raw_affiliation_strings":["University of California,Department of Statistics and Applied Probability,Santa Barbara,CA,USA,93106"],"affiliations":[{"raw_affiliation_string":"University of California,Department of Statistics and Applied Probability,Santa Barbara,CA,USA,93106","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116339238","display_name":"Daniel Ralston","orcid":null},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel Ralston","raw_affiliation_strings":["University of California,Department of Mathematics,Santa Barbara,CA,USA,93106"],"affiliations":[{"raw_affiliation_string":"University of California,Department of Mathematics,Santa Barbara,CA,USA,93106","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101765698","display_name":"Xu Yang","orcid":"https://orcid.org/0000-0003-1586-3661"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xu Yang","raw_affiliation_strings":["University of California,Department of Mathematics,Santa Barbara,CA,USA,93106"],"affiliations":[{"raw_affiliation_string":"University of California,Department of Mathematics,Santa Barbara,CA,USA,93106","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058618644","display_name":"Ruimeng Hu","orcid":"https://orcid.org/0000-0002-1823-7693"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ruimeng Hu","raw_affiliation_strings":["University of California,Department of Mathematics, and Department of Statistics and Applied Probability,Santa Barbara,CA,USA,93106"],"affiliations":[{"raw_affiliation_string":"University of California,Department of Mathematics, and Department of Statistics and Applied Probability,Santa Barbara,CA,USA,93106","institution_ids":["https://openalex.org/I154570441"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101911636"],"corresponding_institution_ids":["https://openalex.org/I154570441"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.82671609,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4540","last_page":"4546"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.4207000136375427,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.4207000136375427,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11031","display_name":"Game Theory and Applications","score":0.06870000064373016,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.03889999911189079,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9146000146865845},{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.6898999810218811},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5982999801635742},{"id":"https://openalex.org/keywords/deep-blue","display_name":"Deep blue","score":0.4047999978065491},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.38830000162124634},{"id":"https://openalex.org/keywords/time-horizon","display_name":"Time horizon","score":0.3474000096321106},{"id":"https://openalex.org/keywords/hide-and-seek","display_name":"Hide and seek","score":0.33550000190734863}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9146000146865845},{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.6898999810218811},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5982999801635742},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5087000131607056},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43529999256134033},{"id":"https://openalex.org/C3020693726","wikidata":"https://www.wikidata.org/wiki/Q378630","display_name":"Deep blue","level":2,"score":0.4047999978065491},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.38830000162124634},{"id":"https://openalex.org/C28761237","wikidata":"https://www.wikidata.org/wiki/Q7805321","display_name":"Time horizon","level":2,"score":0.3474000096321106},{"id":"https://openalex.org/C2994203483","wikidata":"https://www.wikidata.org/wiki/Q171957","display_name":"Hide and seek","level":2,"score":0.33550000190734863},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.2994000017642975},{"id":"https://openalex.org/C3018412434","wikidata":"https://www.wikidata.org/wiki/Q7889","display_name":"Video game","level":2,"score":0.2921000123023987},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2888000011444092},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2831000089645386},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2806999981403351},{"id":"https://openalex.org/C106485872","wikidata":"https://www.wikidata.org/wiki/Q5088884","display_name":"Cheap talk","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C3018176237","wikidata":"https://www.wikidata.org/wiki/Q5397000","display_name":"First person","level":2,"score":0.27250000834465027},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.2718000113964081}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cdc57313.2025.11312291","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc57313.2025.11312291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 64th Conference on Decision and Control (CDC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7591490745544434}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306164","display_name":"Simons Foundation","ror":"https://ror.org/01cmst727"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,19,63,67,78,92,101,108,123,130,135,139,155,167,174,183,186],"interplay":[4],"between":[5],"sequential":[6],"hypothesis":[7],"testing":[8],"(SHT)":[9],"and":[10,24,35,49,96,112,129,164,203,220],"adversarial":[11,192,213],"decision-making":[12],"in":[13,191,212],"partially":[14],"observable":[15],"games,":[16],"focusing":[17],"on":[18,38,85],"deceptive":[20,52],"strategies":[21,190],"of":[22,33,125,132,188],"red":[23,79,89,136,168],"blue":[25,64,102,109,118,140,156,175],"teams.":[26],"Inspired":[27],"by":[28],"Sun":[29],"Zi\u2019s":[30],"The":[31,88,117],"Art":[32],"War":[34],"its":[36,70,74,86,114,126,146],"emphasis":[37],"deception,":[39],"we":[40],"develop":[41],"a":[42,59,151,161,207],"novel":[43],"framework":[44],"to":[45,72,106,177],"both":[46],"deceive":[47],"adversaries":[48],"counter":[50],"their":[51],"tactics.":[53],"We":[54,149],"model":[55],"this":[56],"interaction":[57],"as":[58,66,91,216],"Stackelberg":[60],"game":[61,204],"where":[62],"team,":[65,90],"follower,":[68],"optimizes":[69],"controls":[71],"achieve":[73],"goals":[75],"while":[76,134],"misleading":[77],"team":[80,137,141,169,176],"into":[81,142],"forming":[82],"incorrect":[83],"beliefs":[84,99],"intentions.":[87,148],"leader,":[93],"strategically":[94],"constructs":[95],"instills":[97],"false":[98],"through":[100],"team\u2019s":[103,110,119,157],"envisioned":[104],"SHT":[105],"manipulate":[107],"behavior":[111],"reveal":[113],"true":[115],"objectives.":[116],"optimization":[120],"problem":[121,159],"balances":[122],"fulfillment":[124],"primary":[127],"objectives":[128],"level":[131],"misdirection,":[133],"coaxes":[138],"behaving":[143],"consistently":[144],"with":[145,200],"actual":[147],"derive":[150],"semi-explicit":[152],"solution":[153],"for":[154,209],"control":[158,202],"within":[160],"linear-quadratic":[162],"framework,":[163],"illustrate":[165],"how":[166],"leverages":[170],"leaked":[171],"information":[172],"from":[173],"counteract":[178],"deception.":[179],"Numerical":[180],"experiments":[181],"validate":[182],"model,":[184],"showcasing":[185],"effectiveness":[187],"deception-driven":[189],"systems.":[193],"These":[194],"findings":[195],"integrate":[196],"ancient":[197],"strategic":[198],"insights":[199],"modern":[201],"theory,":[205],"providing":[206],"foundation":[208],"further":[210],"exploration":[211],"decision-making,":[214],"such":[215],"cybersecurity,":[217],"autonomous":[218],"systems,":[219],"financial":[221],"markets.":[222]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-14T00:00:00"}
