{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T18:09:34Z","timestamp":1759774174020,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Rolls-Royce@NTU Corporate Lab"},{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tcss.2018.2858754","type":"journal-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T19:05:09Z","timestamp":1535051109000},"page":"698-712","source":"Crossref","is-referenced-by-count":10,"title":["Toward General Robustness Evaluation of Incentive Mechanism Against Bounded Rationality"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9498-161X","authenticated-orcid":false,"given":"Zehong","family":"Hu","sequence":"first","affiliation":[]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Probability and Random Processes","year":"2015","author":"krishnan","key":"ref39"},{"key":"ref38","first-page":"374","article-title":"Iterative solution of games by fictitious play","volume":"13","author":"brown","year":"1951","journal-title":"Activ Anal Prod Allocat"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctvcm4gdk","author":"astrom","year":"2010","journal-title":"Feedback Systems An Introduction for Scientists and Engineers"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.10.054"},{"key":"ref31","first-page":"150","article-title":"Signaling in Bayesian Stackelberg games","author":"xu","year":"2016","journal-title":"Proc 1st Int Conf Autonomous Agents Multiagent Syst"},{"key":"ref30","first-page":"597","article-title":"Bootstrap statistics for empirical games","author":"wiedenbeck","year":"2014","journal-title":"Proc Int Conf Auton Agents Multi-Agent Syst"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1162\/0033553041502225"},{"journal-title":"Numerical Methods for Engineers and Scientists","year":"2001","author":"hoffman","key":"ref36"},{"key":"ref35","first-page":"1","article-title":"Beyond Nash equilibrium: Solution concepts for the 21st century","author":"halpern","year":"2008","journal-title":"Proc 27th ACM Symp Princ Distrib Comput"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1137\/080734510"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2011.03.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2012.10.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-015-9296-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2011.04.005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/2297425"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(88)90156-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2307\/2951479"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1050.0379"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2012.09.007"},{"key":"ref19","first-page":"2611","article-title":"Measuring performance of peer prediction mechanisms using replicator dynamics","author":"shnayder","year":"2016","journal-title":"Proc 25th Int Conf Artif Intell"},{"key":"ref28","first-page":"2483","article-title":"An adversarial interpretation of information-theoretic bounded rationality","author":"ortega","year":"2014","journal-title":"Proc 28th AAAI Conf Artif Intell"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.mathsocsci.2015.08.001"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1006\/game.1995.1023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1613\/jair.3166"},{"key":"ref6","first-page":"1673","article-title":"Bounded rationality of restricted turing machines","author":"chen","year":"2015","journal-title":"Proc 1st Int Conf Autonomous Agents Multiagent Syst"},{"key":"ref29","first-page":"458","article-title":"Improving resource allocation strategy against human adversaries in security games","author":"yang","year":"2011","journal-title":"Proc 22nd Int Joint Conf Artif Intell"},{"key":"ref5","first-page":"264","article-title":"Modeling agents through bounded rationality theories","author":"rosenfeld","year":"2009","journal-title":"Proc 21st Int Joint Conf Artif Intell"},{"key":"ref8","first-page":"118","article-title":"Optimal auctions for partially rational bidders","author":"wang","year":"2015","journal-title":"Proc 24th Int Joint Conf Artif Intell"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.2012.0683"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.1999.2530"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1257\/0002828043052349"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134728"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0262.2005.00638.x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jet.2015.06.005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2010.05.001"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4702.001.0001","author":"rubinstein","year":"1998","journal-title":"Modeling Bounded Rationality"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctvjsf522","author":"myerson","year":"2013","journal-title":"Game Theory"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-economics-080511-110857"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.23943\/princeton\/9780691155234.003.0003","article-title":"Learning as a rational foundation for macroeconomics and finance","volume":"68","author":"evans","year":"2013","journal-title":"Rethinking Expectations The Way Forward for Macroeconomics"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/8464016\/08444974.pdf?arnumber=8444974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T09:39:37Z","timestamp":1643189977000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8444974\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":39,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2018.2858754","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"type":"electronic","value":"2329-924X"},{"type":"electronic","value":"2373-7476"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}