{"id":"https://openalex.org/W1483323386","doi":"https://doi.org/10.1109/icc.2015.7248793","title":"Resource allocation in pollution attack and defense: A game-theoretic perspective","display_name":"Resource allocation in pollution attack and defense: A game-theoretic perspective","publication_year":2015,"publication_date":"2015-06-01","ids":{"openalex":"https://openalex.org/W1483323386","doi":"https://doi.org/10.1109/icc.2015.7248793","mag":"1483323386"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2015.7248793","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2015.7248793","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021538603","display_name":"Wei Tong","orcid":"https://orcid.org/0000-0002-8427-6068"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Tong","raw_affiliation_strings":["State Key Laboratory of Novel Software Technology, Nanjing University, China","State Key Laboratory of Novel Software Technology, Nanjing University, China#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Novel Software Technology, Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory of Novel Software Technology, Nanjing University, China#TAB#","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060268538","display_name":"Sheng Zhong","orcid":"https://orcid.org/0000-0002-6581-8730"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Zhong","raw_affiliation_strings":["State Key Laboratory of Novel Software Technology, Nanjing University, China","State Key Laboratory of Novel Software Technology, Nanjing University, China#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Novel Software Technology, Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory of Novel Software Technology, Nanjing University, China#TAB#","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5021538603"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.3328,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62300998,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"74","issue":null,"first_page":"3057","last_page":"3062"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10482","display_name":"Mathematical and Theoretical Epidemiology and Ecology Models","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/2739","display_name":"Public Health, Environmental and Occupational Health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9602000117301941,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7479377388954163},{"id":"https://openalex.org/keywords/damages","display_name":"Damages","score":0.7018980979919434},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5910136699676514},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5711103081703186},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.5662139058113098},{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.4333687424659729},{"id":"https://openalex.org/keywords/limited-resources","display_name":"Limited resources","score":0.4186261296272278},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.3659486770629883},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.2964398264884949},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16615813970565796},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.12843936681747437},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.12588587403297424},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.10179230570793152},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09670361876487732},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08044269680976868}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7479377388954163},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.7018980979919434},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5910136699676514},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5711103081703186},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.5662139058113098},{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.4333687424659729},{"id":"https://openalex.org/C3019252630","wikidata":"https://www.wikidata.org/wiki/Q6549547","display_name":"Limited resources","level":2,"score":0.4186261296272278},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.3659486770629883},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.2964398264884949},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16615813970565796},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.12843936681747437},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12588587403297424},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.10179230570793152},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09670361876487732},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08044269680976868},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2015.7248793","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2015.7248793","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W15592790","https://openalex.org/W1521680667","https://openalex.org/W1594668186","https://openalex.org/W1666539389","https://openalex.org/W1743877615","https://openalex.org/W1919048710","https://openalex.org/W1952010661","https://openalex.org/W1964439345","https://openalex.org/W1964972187","https://openalex.org/W1983596191","https://openalex.org/W2033301118","https://openalex.org/W2067064328","https://openalex.org/W2078865458","https://openalex.org/W2100907763","https://openalex.org/W2109100253","https://openalex.org/W2122213991","https://openalex.org/W2127350146","https://openalex.org/W2128555802","https://openalex.org/W2139416652","https://openalex.org/W2153098283","https://openalex.org/W2160313770","https://openalex.org/W2177105478","https://openalex.org/W2623293810","https://openalex.org/W3163366489","https://openalex.org/W4245735493","https://openalex.org/W6600622082","https://openalex.org/W6631173456","https://openalex.org/W6637644075","https://openalex.org/W6640053769","https://openalex.org/W6640739076","https://openalex.org/W6678528404","https://openalex.org/W6683340569"],"related_works":["https://openalex.org/W2605497830","https://openalex.org/W3169439878","https://openalex.org/W2948291551","https://openalex.org/W2062756478","https://openalex.org/W2899710666","https://openalex.org/W2034088638","https://openalex.org/W2914176944","https://openalex.org/W1992922491","https://openalex.org/W2389498702","https://openalex.org/W343526625"],"abstract_inverted_index":{"Pollution":[0],"attacks":[1],"can":[2,133],"cause":[3],"severe":[4],"damages":[5],"in":[6],"network":[7],"coding":[8],"systems.":[9],"Many":[10],"approaches":[11,23],"have":[12],"been":[13],"proposed":[14,107,125],"to":[15,32,52,56,81,93,108,122],"defend":[16,33,82],"against":[17,34,83],"pollution":[18,35,84],"attacks.":[19,36,85],"However,":[20],"the":[21,27,38,41,50,54,66,69,77,95,98,101,110,115,124,136,139],"current":[22],"implicitly":[24],"assume":[25],"that":[26,68,130],"defender":[28,42,51,78,99],"has":[29],"adequate":[30],"resources":[31,39,55,71,80],"When":[37],"of":[40,138],"are":[43,72,106],"limited,":[44],"they":[45],"provide":[46],"no":[47],"information":[48],"for":[49,114],"allocate":[53],"get":[57],"better":[58],"defense":[59],"performance.":[60],"In":[61],"this":[62],"paper,":[63],"we":[64,118],"consider":[65],"case":[67],"defender's":[70],"limited":[73],"and":[74,100],"study":[75],"how":[76],"allocates":[79],"We":[86],"first":[87],"propose":[88],"a":[89],"two-player":[90],"strategic":[91],"game":[92],"model":[94],"interactions":[96],"between":[97],"attacker.":[102],"Then,":[103],"two":[104],"algorithms":[105,132],"find":[109],"best":[111],"response":[112],"strategy":[113],"defender.":[116],"Finally,":[117],"conducted":[119],"extensive":[120],"simulations":[121],"evaluate":[123],"algorithms.":[126],"The":[127],"results":[128],"demonstrate":[129],"our":[131],"significantly":[134],"improve":[135],"utility":[137],"defender,":[140],"with":[141],"reasonable":[142],"computation":[143],"time.":[144]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
