{"id":"https://openalex.org/W4411550916","doi":"https://doi.org/10.1109/cscwd64889.2025.11033569","title":"Multi-Leader Multi-Follower Stackelberg Game Based Defense Strategies Optimization for Interdependent Systems","display_name":"Multi-Leader Multi-Follower Stackelberg Game Based Defense Strategies Optimization for Interdependent Systems","publication_year":2025,"publication_date":"2025-05-05","ids":{"openalex":"https://openalex.org/W4411550916","doi":"https://doi.org/10.1109/cscwd64889.2025.11033569"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd64889.2025.11033569","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd64889.2025.11033569","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5118983719","display_name":"Ao Wang","orcid":"https://orcid.org/0009-0000-5261-0511"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ao Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325951","display_name":"Jiaqi Li","orcid":"https://orcid.org/0000-0002-6674-098X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaqi Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101712597","display_name":"Yang Zhao","orcid":"https://orcid.org/0000-0002-1492-6459"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Zhao","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100551798","display_name":"Bin Sun","orcid":"https://orcid.org/0009-0003-0943-2838"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Sun","raw_affiliation_strings":["China Mobile Group Liaoning Company Limited,Network Management Center,Liaoning,China"],"affiliations":[{"raw_affiliation_string":"China Mobile Group Liaoning Company Limited,Network Management Center,Liaoning,China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051038159","display_name":"Lidong Zhai","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lidong Zhai","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5118983719"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06692824,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2041","last_page":"2046"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.7384999990463257,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.7384999990463257,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7232000231742859,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.6784999966621399,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.9761118292808533},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.8315792083740234},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6462315320968628},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5393009781837463},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.4814119338989258},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.1578291356563568},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12029194831848145}],"concepts":[{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.9761118292808533},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.8315792083740234},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6462315320968628},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5393009781837463},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4814119338989258},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.1578291356563568},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12029194831848145},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd64889.2025.11033569","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd64889.2025.11033569","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1508191694","https://openalex.org/W1990414757","https://openalex.org/W2121805588","https://openalex.org/W2785598896","https://openalex.org/W2908297311","https://openalex.org/W3016437435","https://openalex.org/W3034307689","https://openalex.org/W4399268729","https://openalex.org/W4400489643","https://openalex.org/W6727851010"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1987562536","https://openalex.org/W4383533535","https://openalex.org/W2321381430","https://openalex.org/W2605497830","https://openalex.org/W3169439878","https://openalex.org/W4411484337","https://openalex.org/W2948291551"],"abstract_inverted_index":{"Many":[0],"critical":[1],"infrastructures":[2],"today":[3],"exhibit":[4,85],"complex":[5],"interdependencies,":[6],"which":[7,103],"facilitate":[8],"cross":[9],"system":[10],"attacks.":[11],"Therefore,":[12],"intrusion":[13],"intent":[14],"and":[15,39,73,92],"path":[16],"prediction":[17],"for":[18,48],"interdependent":[19,49],"systems":[20],"are":[21],"crucial.":[22],"This":[23],"article":[24],"proposes":[25],"multi-leader":[26],"multi-follower":[27],"Stackelberg":[28],"game":[29,66,81],"model":[30],"utilizing":[31],"attack":[32,37],"graphs":[33],"to":[34,96],"depict":[35],"potential":[36,53],"paths":[38],"defense":[40,45],"strategies,":[41],"aimed":[42],"at":[43],"optimizing":[44],"strategies":[46],"decisions":[47],"systems.":[50],"To":[51],"address":[52],"conflicts":[54],"of":[55,112],"interest":[56],"in":[57,88,100,106],"collaborative":[58],"decision-making":[59],"among":[60],"multiple":[61,101],"defenders,":[62],"we":[63],"introduce":[64],"two":[65],"theory":[67,82],"algorithm":[68],"variants":[69],"that":[70,80],"balance":[71],"individual":[72],"collective":[74],"utility.":[75],"The":[76],"experimental":[77],"results":[78],"show":[79],"based":[83],"algorithms":[84],"significant":[86],"advantages":[87],"both":[89],"runtime":[90],"performance":[91],"solution":[93],"quality,":[94],"due":[95],"their":[97],"mutual":[98],"adjustment":[99],"iterations,":[102],"is":[104],"more":[105],"line":[107],"with":[108],"the":[109],"stability":[110],"requirements":[111],"practical":[113],"applications.":[114]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
