You are currently viewing a new version of our website. To view the old version click .

28 Results Found

  • Article
  • Open Access
2 Citations
2,824 Views
25 Pages

8 October 2024

In order to analyze the choice of the optimal strategy of cyber security attack and defense in the unmanned aerial vehicles’ (UAVs) cyber range, a game model-based UAV cyber range risk assessment method is constructed. Through the attack and de...

  • Feature Paper
  • Article
  • Open Access
1 Citations
8,839 Views
24 Pages

24 October 2018

We show that a Bayesian game where the type space of each agent is a bounded set of m-dimensional vectors with non-negative components and the utility of each agent depends linearly on its own type only is equivalent to a simultaneous competition in...

  • Article
  • Open Access
1,637 Views
31 Pages

14 July 2025

In this work, we study n-agent Bayesian games with m-dimensional vector types and linear payoffs, also called linear multidimensional Bayesian games. This class of games is equivalent with n-agent, m-game uniform multigames. We distinguish between ga...

  • Article
  • Open Access
6 Citations
3,248 Views
15 Pages

Configuration Equilibrium Model of Product Variant Design Driven by Customer Requirements

  • Qin Yang,
  • Xianjun Bian,
  • Rainer Stark,
  • Carina Fresemann and
  • Fei Song

8 April 2019

In view of the dynamic change of customer requirements (CRs) during the process of product use, in this paper we propose a Bayesian Nash equilibrium configuration model for product variant design driven by CRs. By analyzing CRs, the complete variant...

  • Article
  • Open Access
7 Citations
3,822 Views
19 Pages

For the air traffic management cyber physical system, if an attacker successfully obtains authority or data through a cyber attack, combined with physical attacks, it will cause serious consequences. Game theory can be applied to the strategic intera...

  • Article
  • Open Access
3 Citations
3,503 Views
19 Pages

22 December 2018

In this paper, we consider a Cournot duopoly, in which any firm does not know the marginal costs of production of the other player, as a Bayesian game. In our game, the marginal costs depend on two infinite continuous sets of states of the world. We...

  • Case Report
  • Open Access
17 Citations
4,488 Views
14 Pages

An Incomplete Information Static Game Evaluating Community-Based Forest Management in Zagros, Iran

  • Mehdi Zandebasiri,
  • José António Filipe,
  • Javad Soosani,
  • Mehdi Pourhashemi,
  • Luca Salvati,
  • Mário Nuno Mata and
  • Pedro Neves Mata

26 February 2020

The present study adopts a game theory approach analyzing land-use planning in Zagros forests, Iran. A Static Game of Incomplete Information (SGII) was applied to the evaluation of participatory forest management in the study area. This tool allows a...

  • Article
  • Open Access
2,897 Views
26 Pages

Mixed Mechanisms for Auctioning Ranked Items

  • Estrella Alonso,
  • Joaquín Sánchez-Soriano and
  • Juan Tejada

15 December 2020

This paper deals with the problem of designing and choosing auctioning mechanisms for multiple commonly ranked objects as, for instance, keyword auctions in search engines on Internet. We shall adopt the point of view of the auctioneer who has to sel...

  • Article
  • Open Access
1 Citations
2,063 Views
13 Pages

24 October 2024

With the rapid development of intelligent transportation systems and information technology, the security of road traffic signal systems has increasingly attracted the attention of managers and researchers. This paper proposes a new method for detect...

  • Article
  • Open Access
4 Citations
7,043 Views
23 Pages

19 February 2013

This study investigates the relationship between an actor’s beliefs about others’ other-regarding (social) preferences and her own other-regarding preferences, using an “avant-garde” hierarchical Bayesian method. We estimate two distributional other-...

  • Feature Paper
  • Article
  • Open Access
2 Citations
2,272 Views
16 Pages

9 April 2021

We propose a model of network formation as a two-stage game with chance moves and players of various types. First, the leader suggests a connected communication network for the players to join. Second, nature selects a type vector for players based o...

  • Article
  • Open Access
1 Citations
2,058 Views
19 Pages

Characterizing Manipulation via Machiavellianism

  • Jacqueline Sanchez-Rabaza,
  • Jose Maria Rocha-Martinez and
  • Julio B. Clempner

30 September 2023

Machiavellianism refers to the propensity of taking advantage of people within a society. Machiavellians have reputations for being cunning and competitive. They are also skilled long-term strategists and planners. Other than their “victories,&...

  • Article
  • Open Access
1,447 Views
21 Pages

Game-Theoretic Motion Planning with Perception Uncertainty and Right-of-Way Constraints

  • Pouya Panahandeh,
  • Ahmad Reza Alghooneh,
  • Mohammad Pirani,
  • Baris Fidan and
  • Amir Khajepour

21 December 2024

This paper addresses two challenges in AV motion planning: adherence to right-of-way and handling uncertainties, using two game-theoretic frameworks, namely Stackelberg and Nash Bayesian (Bayesian). By modeling the interactions between road users as...

  • Article
  • Open Access
726 Views
25 Pages

5 September 2025

This paper investigates a swarming strength allocation Bayesian game approach under incomplete information to address the high-value targets protection problem of swarming unmanned systems. The swarming strength allocation Bayesian game model is esta...

  • Article
  • Open Access
2 Citations
2,350 Views
18 Pages

6 January 2025

In recent years, the development of online food service has facilitated consumers’ catering needs, but it also has adverse environmental impacts. To mitigate pollution and attract environmentally conscious customers, restaurants have embarked o...

  • Article
  • Open Access
3 Citations
2,181 Views
42 Pages

Common data environments (CDEs) are centralized repositories in the architecture, engineering, and construction (AEC) industry designed to improve collaboration and project efficiency. However, CDEs hosted on cloud platforms face significant risks fr...

  • Article
  • Open Access
42 Citations
4,891 Views
16 Pages

Trusted Transactions in Micro-Grid Based on Blockchain

  • Yunjun Yu,
  • Yanghui Guo,
  • Weidong Min and
  • Fanpeng Zeng

22 May 2019

In order to build a local electricity market (LEM), community members can trade electricity peer-to-peer (P2P) with their neighbors. This paper proposes a Hierarchical Bidding and Transaction Structure based on blockchain (HBTS). First, combined with...

  • Article
  • Open Access
3 Citations
3,235 Views
22 Pages

26 August 2024

We start from the fundamental premise that any physical interaction can be interpreted as a game. To demonstrate this, we draw upon the free energy principle and the theory of quantum reference frames. In this way, we place the game-theoretic Nash Eq...

  • Article
  • Open Access
8 Citations
3,641 Views
19 Pages

Electricity Purchase Optimization Decision Based on Data Mining and Bayesian Game

  • Yajing Gao,
  • Xiaojie Zhou,
  • Jiafeng Ren,
  • Zheng Zhao and
  • Fushen Xue

26 April 2018

The openness of the electricity retail market results in the power retailers facing fierce competition in the market. This article aims to analyze the electricity purchase optimization decision-making of each power retailer with the background of the...

  • Article
  • Open Access
4 Citations
2,603 Views
14 Pages

25 February 2020

Ultra-dense and highly heterogeneous network (HetNet) deployments make the allocation of limited wireless resources among ubiquitous Internet of Things (IoT) devices an unprecedented challenge in 5G and beyond (B5G) networks. The interactions among m...

  • Article
  • Open Access
5,050 Views
36 Pages

7 July 2025

Objectives: We introduce the conceptual framework for the Adversarial Claim Robustness Diagnostics (ACRD) protocol, a novel tool for assessing how factual claims withstand ideological distortion. Methods: Based on semantics, adversarial collaboration...

  • Article
  • Open Access
4 Citations
6,590 Views
29 Pages

With the continuous expansion of air traffic flow, the increasingly serious aviation network security threats have a significant and far-reaching impact on the safe operation of the aviation industry. The networked air traffic management (ATM) system...

  • Article
  • Open Access
2,036 Views
24 Pages

13 February 2023

Along with the prevalence of photovoltaic (PV) procurement contracts, the corruption between auctioneers and potential electricity suppliers has attracted the attention of energy regulators. This study considers a corruption-proof environment wherein...

  • Article
  • Open Access
16 Citations
5,203 Views
16 Pages

2 April 2023

Reinforcement learning has shown a great ability and has defeated human beings in the field of real-time strategy games. In recent years, reinforcement learning has been used in cyberspace to carry out automated and intelligent attacks. Traditional d...

  • Article
  • Open Access
21 Citations
6,624 Views
24 Pages

Game Theoretic Honeypot Deployment in Smart Grid

  • Panagiotis Diamantoulakis,
  • Christos Dalamagkas,
  • Panagiotis Radoglou-Grammatikis,
  • Panagiotis Sarigiannidis and
  • George Karagiannidis

28 July 2020

The smart grid provides advanced functionalities, including real-time monitoring, dynamic energy management, advanced pricing mechanisms, and self-healing, by enabling the two-way flow of power and data, as well as the use of Internet of Things (IoT)...

  • Article
  • Open Access
1,364 Views
18 Pages

27 August 2024

Credit purchase enables the manufacturers in the e-commerce environment to provide pre-sales service that consumers can experience first and pay later. This paper considers demand associated with price and green promotion service level and builds fou...

  • Article
  • Open Access
17 Citations
3,553 Views
14 Pages

1 March 2019

The growing tendency for suppliers to encroach on the retailers’ market has forced the retailers, being independent entities, to distort shared information to maintain their information superiority. Previous studies on asymmetric information as...