{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T12:40:10Z","timestamp":1751719210426,"version":"3.41.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/uic-atc.2017.8397517","type":"proceedings-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T22:34:27Z","timestamp":1530225267000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Optimal patrol strategies against attacker's persistent attack with multiple resources"],"prefix":"10.1109","author":[{"given":"Mingchu","family":"Li","sequence":"first","affiliation":[]},{"given":"Yuanpeng","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Tie","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"826","article-title":"Game-theoretic resource allocation for protecting large public events","author":"yin","year":"2014","journal-title":"International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"ref11","first-page":"681","article-title":"Computing optimal mixed strategies for security games with dynamic payoffs","author":"yin","year":"2015","journal-title":"International Joint Conference on Artificial Intelligence (IJCAI)"},{"key":"ref12","first-page":"2589","article-title":"When security games go green: designing defender strategies to prevent poaching and illegal fishing","author":"fang","year":"2015","journal-title":"International Joint Conference on Artificial Intelligence (IJCAI)"},{"journal-title":"China kunming knife attack Security tightened","year":"0","author":"grammaticas","key":"ref13"},{"journal-title":"China train station killings described as a terrorist attack","year":"0","author":"watkins","key":"ref14"},{"journal-title":"What happened at the bataclan?","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031.006"},{"key":"ref17","first-page":"2173","article-title":"Protect: An application of computational game theory for the security of the ports of the united states","author":"shieh","year":"2012","journal-title":"Association for the Advancement of Artificial Intelligence (AAAI'05)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1609\/icaps.v24i1.13614","article-title":"Computing solutions in infinite-horizon discounted adversarial patrolling games","author":"vorobeychik","year":"2014","journal-title":"ICAPS"},{"key":"ref28","first-page":"49","article-title":"Real-time and generic queue time estimation based on mobile crowdsensing","author":"jiangtao","year":"2017","journal-title":"Frontiers of Computer Science"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1080\/10576100801925208","article-title":"Terrorist organization typologies and the probability of a boomerang effect","volume":"31","author":"boaz","year":"2008","journal-title":"Studies in Conflict and Terrorism"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998193"},{"key":"ref3","first-page":"2507","article-title":"Optimal interdiction of illegal network flow","author":"guo","year":"2016","journal-title":"Association for the Advancement of Artificial Intelligence (AAAI'05)"},{"key":"ref6","first-page":"591","article-title":"Solving security games on graphs via marginal probabilities","author":"letchford","year":"2013","journal-title":"Association for the Advancement of Artificial Intelligence (AAAI'05)"},{"key":"ref5","first-page":"689","article-title":"Computing optimal randomized resource allocations for massive security games","author":"kiekintveld","year":"2009","journal-title":"International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"ref8","first-page":"327","article-title":"A double oracle algorithm for zero-sum security games on graphs","author":"gan","year":"2011","journal-title":"International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"ref7","first-page":"914","article-title":"Security games with protection externalities","author":"gan","year":"2015","journal-title":"Association for the Advancement of Artificial Intelligence (AAAI'05)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-012-9209-6"},{"key":"ref9","first-page":"327","article-title":"A double oracle algorithm for zero-sum security games on graphs","author":"jain","year":"2011","journal-title":"International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"ref1","first-page":"10","article-title":"Iris-a tool for strategic security allocation in transportation networks","author":"kiekintveld","year":"2009","journal-title":"International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"ref20","first-page":"215","article-title":"Security scheduling for real-world networks","author":"jain","year":"2013","journal-title":"International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"ref22","first-page":"531","article-title":"Efficient resource allocation for protecting coral reef ecosystems","author":"yin","year":"2016","journal-title":"Int Joint Conference on Artificial Intelligence"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1110.0983"},{"key":"ref24","first-page":"119","article-title":"Stackelberg vs. nash in security games: Interchangeability, equivalence, and uniqueness","author":"yin","year":"2010","journal-title":"International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"journal-title":"Persistent Patrolling in the Presence of Adversarial Observers","year":"2014","author":"root","key":"ref23"},{"key":"ref26","first-page":"536","article-title":"Planning in the presence of cost functions controlled by an adversary","author":"mcmahan","year":"2003","journal-title":"ICML"},{"key":"ref25","first-page":"59","article-title":"Trusts: Scheduling randomized patrols for fare inspection in transit systems","author":"yin","year":"2012","journal-title":"Association for the Advancement of Artificial Intelligence (AAAI'05)"}],"event":{"name":"2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)","start":{"date-parts":[[2017,8,4]]},"location":"San Francisco, CA","end":{"date-parts":[[2017,8,8]]}},"container-title":["2017 IEEE SmartWorld, Ubiquitous Intelligence &amp; Computing, Advanced &amp; Trusted Computed, Scalable Computing &amp; Communications, Cloud &amp; Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8386711\/8397387\/08397517.pdf?arnumber=8397517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T12:08:31Z","timestamp":1751717311000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8397517\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/uic-atc.2017.8397517","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}