{"id":"https://openalex.org/W4403351102","doi":"https://doi.org/10.1145/3695080.3695174","title":"Game Theory and DQN-Based Network Defense Decision-Making for Terminal Security in Power Distribution System","display_name":"Game Theory and DQN-Based Network Defense Decision-Making for Terminal Security in Power Distribution System","publication_year":2024,"publication_date":"2024-07-26","ids":{"openalex":"https://openalex.org/W4403351102","doi":"https://doi.org/10.1145/3695080.3695174"},"language":"en","primary_location":{"id":"doi:10.1145/3695080.3695174","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3695080.3695174","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 International Conference on Cloud Computing and Big Data","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041358701","display_name":"Daohua Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126065","display_name":"Shanghai Electric (China)","ror":"https://ror.org/0314qy595","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210126065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Daohua Zhu","raw_affiliation_strings":["Electric Power Research Institute, State Grid Jiangsu Electric Power Co., Ltd., China"],"raw_orcid":"https://orcid.org/0009-0001-8720-3219","affiliations":[{"raw_affiliation_string":"Electric Power Research Institute, State Grid Jiangsu Electric Power Co., Ltd., China","institution_ids":["https://openalex.org/I4210126065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103886182","display_name":"Jiang Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I17442442","display_name":"State Grid Corporation of China (China)","ror":"https://ror.org/05twwhs70","country_code":"CN","type":"company","lineage":["https://openalex.org/I17442442"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiang Zhu","raw_affiliation_strings":["State Grid Electric Power Research Institute Co., China"],"raw_orcid":"https://orcid.org/0009-0001-8388-3544","affiliations":[{"raw_affiliation_string":"State Grid Electric Power Research Institute Co., China","institution_ids":["https://openalex.org/I17442442"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100382661","display_name":"Xiaodong Wang","orcid":"https://orcid.org/0000-0002-3733-1730"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaodong Wang","raw_affiliation_strings":["School of Control and Computer Engineering, North China Electric Power University, China"],"raw_orcid":"https://orcid.org/0000-0002-3733-1730","affiliations":[{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Wei Wang","orcid":"https://orcid.org/0009-0003-5979-9814"},"institutions":[{"id":"https://openalex.org/I17442442","display_name":"State Grid Corporation of China (China)","ror":"https://ror.org/05twwhs70","country_code":"CN","type":"company","lineage":["https://openalex.org/I17442442"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["State Grid Electric Power Research Institute Co., China"],"raw_orcid":"https://orcid.org/0009-0003-5979-9814","affiliations":[{"raw_affiliation_string":"State Grid Electric Power Research Institute Co., China","institution_ids":["https://openalex.org/I17442442"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017055773","display_name":"Longyun Qi","orcid":"https://orcid.org/0009-0007-4991-6406"},"institutions":[{"id":"https://openalex.org/I4210118629","display_name":"NARI Group (China)","ror":"https://ror.org/02egn3136","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210118629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longyun Qi","raw_affiliation_strings":["Nanjing NARI Information and Communication Technology Co., Ltd., NARI Group Corporation (State Grid Electric Power Research Institute), China"],"raw_orcid":"https://orcid.org/0009-0007-4991-6406","affiliations":[{"raw_affiliation_string":"Nanjing NARI Information and Communication Technology Co., Ltd., NARI Group Corporation (State Grid Electric Power Research Institute), China","institution_ids":["https://openalex.org/I4210118629"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5041358701"],"corresponding_institution_ids":["https://openalex.org/I4210126065"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19892432,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"547","last_page":"552"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/terminal","display_name":"Terminal (telecommunication)","score":0.8132916688919067},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6653199195861816},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.6408487558364868},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.5125112533569336},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45004117488861084},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4166001081466675},{"id":"https://openalex.org/keywords/distribution","display_name":"Distribution (mathematics)","score":0.41125011444091797},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3023967146873474},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.21667122840881348},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11356547474861145}],"concepts":[{"id":"https://openalex.org/C2779664074","wikidata":"https://www.wikidata.org/wiki/Q3518405","display_name":"Terminal (telecommunication)","level":2,"score":0.8132916688919067},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6653199195861816},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.6408487558364868},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.5125112533569336},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45004117488861084},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4166001081466675},{"id":"https://openalex.org/C110121322","wikidata":"https://www.wikidata.org/wiki/Q865811","display_name":"Distribution (mathematics)","level":2,"score":0.41125011444091797},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3023967146873474},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.21667122840881348},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11356547474861145},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3695080.3695174","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3695080.3695174","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 International Conference on Cloud Computing and Big Data","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2620119489","https://openalex.org/W2952298682","https://openalex.org/W2969428826","https://openalex.org/W2978730210","https://openalex.org/W3003649845","https://openalex.org/W3013559981","https://openalex.org/W3023951208","https://openalex.org/W3116478815","https://openalex.org/W3134731360","https://openalex.org/W3153620288","https://openalex.org/W3163380956","https://openalex.org/W3198931490","https://openalex.org/W3210896474","https://openalex.org/W4256354935","https://openalex.org/W4324093415","https://openalex.org/W4365447587","https://openalex.org/W4391250959","https://openalex.org/W4393074637"],"related_works":["https://openalex.org/W3211557223","https://openalex.org/W1528816634","https://openalex.org/W2007036916","https://openalex.org/W4206528302","https://openalex.org/W872563264","https://openalex.org/W2164087676","https://openalex.org/W4240867999","https://openalex.org/W2416728927","https://openalex.org/W2120266540","https://openalex.org/W108604697"],"abstract_inverted_index":{"The":[0],"increase":[1],"of":[2,26,97,113,207],"terminal":[3,70],"devices":[4,71],"in":[5,72,116,137,170],"the":[6,12,22,27,50,66,73,84,95,110,117,148,153,156,168,171,185,191,198,205,208],"automated":[7],"power":[8,28,74,118,131],"distribution":[9,75],"system":[10,105],"expands":[11],"attack":[13],"surface":[14],"for":[15,130],"malicious":[16],"adversaries,":[17],"which":[18],"can":[19],"severely":[20],"impair":[21],"reliability":[23],"and":[24,36,60,104,140,158,189],"stability":[25],"grids.":[29],"As":[30],"cyber-attacks":[31,67],"are":[32,134,201],"empowered":[33],"by":[34,78],"diverse":[35],"elaborate":[37],"techniques,":[38],"relying":[39],"solely":[40],"on":[41,83,197],"traditional":[42],"passive":[43],"defense":[44,86,90],"methods":[45,129],"is":[46,55],"insufficient":[47],"to":[48,57,63,125,151,166,183,203],"address":[49],"evolving":[51],"security":[52],"threats.":[53],"It":[54],"imperative":[56],"develop":[58],"adaptive":[59],"active":[61],"approaches":[62],"defend":[64],"against":[65],"aimed":[68],"at":[69],"system.":[76,119],"Motivated":[77],"this":[79,144],"idea,":[80],"we":[81,146],"focus":[82],"network":[85,200],"decision-making":[87],"approach.":[88,210],"Effective":[89],"strategies":[91],"not":[92],"only":[93],"mitigate":[94],"risk":[96],"disruptive":[98],"cyber-attacks,":[99],"such":[100],"as":[101],"data":[102],"breaches":[103],"compromises,":[106],"but":[107],"also":[108,178],"ensure":[109],"continuous":[111],"operation":[112],"essential":[114],"services":[115],"Though":[120],"researchers":[121],"have":[122],"made":[123],"efforts":[124],"explore":[126],"game-theoretic":[127],"defense-decision":[128],"systems,":[132],"there":[133],"still":[135],"shortcoming":[136],"defining":[138],"rewards":[139,169],"state":[141,187],"transitions.":[142],"In":[143],"paper,":[145],"utilize":[147],"stochastic":[149],"game":[150,173],"model":[152],"confrontation":[154],"between":[155],"attacker":[157],"defender.":[159],"We":[160,177],"design":[161],"a":[162,180],"hybrid":[163],"reward":[164],"function":[165],"describe":[167],"two-player":[172],"from":[174],"various":[175],"perspectives.":[176],"introduce":[179],"deep":[181],"Q-network":[182],"learn":[184],"high-dimensional":[186],"transitions":[188],"achieve":[190],"Nash":[192],"equilibrium.":[193],"Experimental":[194],"results":[195],"based":[196],"simulated":[199],"presented":[202],"demonstrate":[204],"effectiveness":[206],"proposed":[209]},"counts_by_year":[],"updated_date":"2026-03-06T06:45:51.903784","created_date":"2025-10-10T00:00:00"}
