{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T12:28:03Z","timestamp":1768739283107,"version":"3.49.0"},"reference-count":47,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T00:00:00Z","timestamp":1664236800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["945719"],"award-info":[{"award-number":["945719"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010663","name":"European Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/W002949\/1"],"award-info":[{"award-number":["EP\/W002949\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N509711\/1"],"award-info":[{"award-number":["EP\/N509711\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["639945"],"award-info":[{"award-number":["639945"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["1958\/20"],"award-info":[{"award-number":["1958\/20"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Artificial Intelligence"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1016\/j.artint.2022.103791","type":"journal-article","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T11:13:01Z","timestamp":1664277181000},"page":"103791","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Defense coordination in security games: Equilibrium analysis and mechanism design"],"prefix":"10.1016","volume":"313","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1280-2134","authenticated-orcid":false,"given":"Jiarui","family":"Gan","sequence":"first","affiliation":[]},{"given":"Edith","family":"Elkind","sequence":"additional","affiliation":[]},{"given":"Sarit","family":"Kraus","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9329-8410","authenticated-orcid":false,"given":"Michael","family":"Wooldridge","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.artint.2022.103791_br0010","series-title":"Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI'19)","first-page":"11","article-title":"Portioning using ordinal preferences: fairness and efficiency","author":"Airiau","year":"2019"},{"key":"10.1016\/j.artint.2022.103791_br0020","series-title":"Improving Homeland Security Decisions","first-page":"485","article-title":"Stackelberg Security Games (SSG) basics and application overview","author":"An","year":"2017"},{"key":"10.1016\/j.artint.2022.103791_br0030","series-title":"Proceedings of the 2019 ACM Conference on Economics and Computation","first-page":"753","article-title":"Fair mixing: the case of dichotomous preferences","author":"Aziz","year":"2019"},{"issue":"1","key":"10.1016\/j.artint.2022.103791_br0040","first-page":"67","article-title":"Computing the team-maxmin equilibrium in single-team single-adversary team games","volume":"11","author":"Basilico","year":"2017","journal-title":"Intell. Artif."},{"issue":"2","key":"10.1016\/j.artint.2022.103791_br0050","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.jet.2004.05.005","article-title":"Collective choice under dichotomous preferences","volume":"122","author":"Bogomolnaia","year":"2005","journal-title":"J. Econ. Theory"},{"key":"10.1016\/j.artint.2022.103791_br0060","series-title":"Funding public projects: a case for the Nash product rule","author":"Brandl","year":"2020"},{"key":"10.1016\/j.artint.2022.103791_br0070","series-title":"Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI'19)","first-page":"123","article-title":"Be a leader or become a follower: the strategy to commit to with multiple leaders","author":"Castiglioni","year":"2019"},{"key":"10.1016\/j.artint.2022.103791_br0080","series-title":"Proceedings of the 28th Conference on Uncertainty in Artificial Intelligence (UAI'12)","first-page":"152","article-title":"Interdependent defense games: modeling interdependent security under deliberate attacks","author":"Chan","year":"2012"},{"key":"10.1016\/j.artint.2022.103791_br0090","series-title":"Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI'17)","first-page":"171","article-title":"Pessimistic leader-follower equilibria with multiple followers","author":"Coniglio","year":"2017"},{"key":"10.1016\/j.artint.2022.103791_br0100","series-title":"Proceedings of the 7th ACM Conference on Electronic Commerce (ACM EC'06)","first-page":"82","article-title":"Computing the optimal strategy to commit to","author":"Conitzer","year":"2006"},{"issue":"1","key":"10.1016\/j.artint.2022.103791_br0110","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1137\/070699652","article-title":"The complexity of computing a Nash equilibrium","volume":"39","author":"Daskalakis","year":"2009","journal-title":"SIAM J. Comput."},{"key":"10.1016\/j.artint.2022.103791_br0120","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.4317","article-title":"Game-theoretic patrolling with dynamic execution uncertainty and a case study on a real transit system","volume":"50","author":"Maria Delle Fave","year":"2014","journal-title":"J. Artif. Intell. Res."},{"issue":"5","key":"10.1016\/j.artint.2022.103791_br0130","doi-asserted-by":"crossref","first-page":"1220","DOI":"10.1287\/opre.1080.0686","article-title":"A stochastic multiple-leader Stackelberg model: analysis, computation, and application","volume":"57","author":"DeMiguel","year":"2009","journal-title":"Oper. Res."},{"key":"10.1016\/j.artint.2022.103791_br0140","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.mathsocsci.2014.10.005","article-title":"Fair sharing under dichotomous preferences","volume":"73","author":"Duddy","year":"2015","journal-title":"Math. Soc. Sci."},{"key":"10.1016\/j.artint.2022.103791_br0150","series-title":"Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI'15)","first-page":"914","article-title":"Security games with protection externalities","author":"Gan","year":"2015"},{"key":"10.1016\/j.artint.2022.103791_br0160","series-title":"Proceedings of the 31st AAAI Conference on Artificial Intelligence (AAAI'17)","first-page":"530","article-title":"Security games on a plane","author":"Gan","year":"2017"},{"key":"10.1016\/j.artint.2022.103791_br0170","series-title":"Proceedings of the 17th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'18)","first-page":"703","article-title":"Stackelberg security games with multiple uncoordinated defenders","author":"Gan","year":"2018"},{"key":"10.1016\/j.artint.2022.103791_br0180","series-title":"Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'20)","article-title":"Mechanism design for defense coordination in security games","author":"Gan","year":"2020"},{"issue":"4","key":"10.1016\/j.artint.2022.103791_br0190","doi-asserted-by":"crossref","first-page":"587","DOI":"10.2307\/1914083","article-title":"Manipulation of voting schemes: a general result","volume":"41","author":"Gibbard","year":"1973","journal-title":"Econometrica"},{"key":"10.1016\/j.artint.2022.103791_br0200","series-title":"Proceedings of the 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'16)","first-page":"159","article-title":"Coalitional security games","author":"Guo","year":"2016"},{"key":"10.1016\/j.artint.2022.103791_br0210","first-page":"2020","article-title":"On the inducibility of Stackelberg equilibrium for security games","volume":"vol. 33","author":"Guo","year":"2019"},{"key":"10.1016\/j.artint.2022.103791_br0220","series-title":"Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI'13)","first-page":"220","article-title":"Defender (mis) coordination in security games","author":"Jiang","year":"2013"},{"key":"10.1016\/j.artint.2022.103791_br0230","series-title":"IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'12)","first-page":"185","article-title":"Scheduling with setup costs and monotone penalties","volume":"vol. 18","author":"Khandekar","year":"2012"},{"issue":"2","key":"10.1016\/j.artint.2022.103791_br0240","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.cosrev.2009.04.003","article-title":"Worst-case equilibria","volume":"3","author":"Koutsoupias","year":"2009","journal-title":"Comput. Sci. Rev.","ISSN":"https:\/\/id.crossref.org\/issn\/1574-0137","issn-type":"print"},{"issue":"4","key":"10.1016\/j.artint.2022.103791_br0250","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1007\/s11228-014-0292-5","article-title":"A shared-constraint approach to multi-leader multi-follower games","volume":"22","author":"Kulkarni","year":"2014","journal-title":"Set-Valued Var. Anal."},{"key":"10.1016\/j.artint.2022.103791_br0260","series-title":"Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI'16)","first-page":"537","article-title":"Multi-defender strategic filtering against spear-phishing attacks","author":"Laszka","year":"2016"},{"issue":"4","key":"10.1016\/j.artint.2022.103791_br0270","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1080\/10556780903448052","article-title":"Solving multi-leader\u2013common-follower games","volume":"25","author":"Leyffer","year":"2010","journal-title":"Optim. Methods Softw."},{"key":"10.1016\/j.artint.2022.103791_br0280","series-title":"Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI'15)","first-page":"596","article-title":"Equilibrium analysis of multi-defender security games","author":"Lou","year":"2015"},{"key":"10.1016\/j.artint.2022.103791_br0290","series-title":"Proceedings of the Symposium and Bootcamp on the Science of Security","first-page":"90","article-title":"Decentralization and security in dynamic traffic light control","author":"Lou","year":"2016"},{"issue":"1","key":"10.1016\/j.artint.2022.103791_br0300","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MIS.2017.11","article-title":"Multidefender security games","volume":"32","author":"Lou","year":"2017","journal-title":"IEEE Intell. Syst."},{"key":"10.1016\/j.artint.2022.103791_br0310","series-title":"Proceedings of the 35th AAAI Conference on Artificial Intelligence (AAAI'21)","first-page":"5603","article-title":"Coalition formation in multi-defender security games","author":"Mutzari","year":"2021"},{"issue":"3","key":"10.1016\/j.artint.2022.103791_br0320","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/1379759.1379762","article-title":"Computing correlated equilibria in multi-player games","volume":"55","author":"Papadimitriou","year":"2008","journal-title":"J. ACM"},{"key":"10.1016\/j.artint.2022.103791_br0330","series-title":"Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'07)","first-page":"311","article-title":"An efficient heuristic approach for security against multiple adversaries","author":"Paruchuri","year":"2007"},{"key":"10.1016\/j.artint.2022.103791_br0340","series-title":"Proceedings of the 23rd AAAI Conference on Artificial Intelligence (AAAI'08)","first-page":"1559","article-title":"Efficient algorithms to solve Bayesian Stackelberg games for security applications","author":"Paruchuri","year":"2008"},{"key":"10.1016\/j.artint.2022.103791_br0350","series-title":"Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'08)","first-page":"895","article-title":"Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games","author":"Paruchuri","year":"2008"},{"issue":"15","key":"10.1016\/j.artint.2022.103791_br0360","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1016\/j.artint.2010.07.002","article-title":"Robust solutions to Stackelberg games: addressing bounded rationality and limited observations in human cognition","volume":"174","author":"Pita","year":"2010","journal-title":"Artif. Intell."},{"issue":"2","key":"10.1016\/j.artint.2022.103791_br0370","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/0022-0531(75)90050-2","article-title":"Strategy-proofness and Arrow's conditions: existence and correspondence theorems for voting procedures and social welfare functions","volume":"10","author":"Satterthwaite","year":"1975","journal-title":"J. Econ. Theory"},{"issue":"2","key":"10.1016\/j.artint.2022.103791_br0380","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1287\/opre.32.2.390","article-title":"A multiple leader Stackelberg model and analysis","volume":"32","author":"Sherali","year":"1984","journal-title":"Oper. Res."},{"key":"10.1016\/j.artint.2022.103791_br0390","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1016\/j.cor.2013.07.010","article-title":"Finding optimal strategies in a multi-period multi-leader-follower Stackelberg game using an evolutionary algorithm","volume":"41","author":"Sinha","year":"2014","journal-title":"Comput. Oper. Res."},{"key":"10.1016\/j.artint.2022.103791_br0400","series-title":"Proceedings of the 27th International Joint Conference on Artificial Intelligence (IJCAI'18)","first-page":"5494","article-title":"Stackelberg security games: looking beyond a decade of success","author":"Sinha","year":"2018"},{"issue":"4","key":"10.1016\/j.artint.2022.103791_br0410","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1145\/2627534.2627536","article-title":"Multi-defender security games on networks","volume":"41","author":"Smith","year":"2014","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"10.1016\/j.artint.2022.103791_br0420","series-title":"Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned","author":"Tambe","year":"2011"},{"key":"10.1016\/j.artint.2022.103791_br0430","series-title":"Proceedings of the 24th AAAI Conference on Artificial Intelligence (AAAI'10)","first-page":"881","article-title":"Urban security: game-theoretic resource allocation in networked physical domains","author":"Tsai","year":"2010"},{"key":"10.1016\/j.artint.2022.103791_br0440","series-title":"Proceedings of the ASE\/IEEE International Conference on Social Computing (SocialCom)","first-page":"33","article-title":"Bayesian security games for controlling contagion","author":"Tsai","year":"2013"},{"key":"10.1016\/j.artint.2022.103791_br0450","series-title":"Leadership with commitment to mixed strategies","author":"Von Stengel","year":"2004"},{"key":"10.1016\/j.artint.2022.103791_br0460","series-title":"Proceedings of the 32nd AAAI Conference on Artificial Intelligence (AAAI'18)","first-page":"208","article-title":"Catching captain Jack: efficient time and space dependent patrols to combat oil-siphoning in international waters","author":"Wang","year":"2018"},{"key":"10.1016\/j.artint.2022.103791_br0470","series-title":"Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI'16)","first-page":"637","article-title":"Computing optimal monitoring strategy for detecting terrorist plots","author":"Wang","year":"2016"}],"container-title":["Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S000437022200131X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S000437022200131X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T07:26:10Z","timestamp":1757748370000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S000437022200131X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":47,"alternative-id":["S000437022200131X"],"URL":"https:\/\/doi.org\/10.1016\/j.artint.2022.103791","relation":{},"ISSN":["0004-3702"],"issn-type":[{"value":"0004-3702","type":"print"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Defense coordination in security games: Equilibrium analysis and mechanism design","name":"articletitle","label":"Article Title"},{"value":"Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.artint.2022.103791","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"103791"}}