{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T16:21:37Z","timestamp":1773591697077,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T00:00:00Z","timestamp":1721952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,26]]},"DOI":"10.1145\/3695080.3695174","type":"proceedings-article","created":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T18:26:32Z","timestamp":1728757592000},"page":"547-552","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Game Theory and DQN-Based Network Defense Decision-Making for Terminal Security in Power Distribution System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8720-3219","authenticated-orcid":false,"given":"Daohua","family":"Zhu","sequence":"first","affiliation":[{"name":"Electric Power Research Institute, State Grid Jiangsu Electric Power Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8388-3544","authenticated-orcid":false,"given":"Jiang","family":"Zhu","sequence":"additional","affiliation":[{"name":"State Grid Electric Power Research Institute Co., China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3733-1730","authenticated-orcid":false,"given":"Xiaodong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5979-9814","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"State Grid Electric Power Research Institute Co., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4991-6406","authenticated-orcid":false,"given":"Longyun","family":"Qi","sequence":"additional","affiliation":[{"name":"Nanjing NARI Information and Communication Technology Co., Ltd., NARI Group Corporation (State Grid Electric Power Research Institute), China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Li X. Wang N. Zhu L. Yuan S. and Guan Z. 2024. FUSE: a federated learning and U-shape split learning-based electricity theft detection framework.\u00a0Science China Information Sciences \u00a067(4) 149302.","DOI":"10.1007\/s11432-023-3946-x"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.23919\/ICN.2020.0016"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2017.05.020"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061333"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Guan Z. Yang W. Zhu L. Wu L. and Wang R. 2021. Achieving adaptively secure data access control with privacy protection for lightweight IoT devices.\u00a0Science China Information Sciences \u00a064 1-14.","DOI":"10.1007\/s11432-020-2957-5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2023.04.009"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2019.105432"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.106683"},{"key":"e_1_3_2_1_9_1","first-page":"479","volume-title":"Advances in Brain Inspired Cognitive Systems: 10th International Conference, BICS 2019, vol 10","author":"Zhou R.","unstructured":"Zhou, R., Lin, J., Liu, L., Ye, M. and Wei, S. 2020. Analysis of SDN attack and defense strategy based on zero-sum game. In Advances in Brain Inspired Cognitive Systems: 10th International Conference, BICS 2019, vol 10, pp. 479-485. Springer Guangzhou, China."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3122115"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","author":"Garnaev A.","unstructured":"Garnaev, A., Trappe, W., Mandayam, N. B. and Poor, H. V. 2020. A Prospect Theoretic Extension of a Non-Zero-Sum Stochastic Eavesdropping and Jamming Game. In 2020 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1-6."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120216"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381038"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.4962"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3121870"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107113"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Liu X. Zhang H. Dong S. and Zhang Y. 2021. Network defense decision-making based on a stochastic game system and a deep recurrent Q-network. Computers & security 111 102480.","DOI":"10.1016\/j.cose.2021.102480"}],"event":{"name":"ICCBD 2024: 2024 International Conference on Cloud Computing and Big Data","location":"Dali China","acronym":"ICCBD 2024"},"container-title":["Proceedings of the 2024 International Conference on Cloud Computing and Big Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695080.3695174","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695080.3695174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T15:33:55Z","timestamp":1773588835000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695080.3695174"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,26]]},"references-count":17,"alternative-id":["10.1145\/3695080.3695174","10.1145\/3695080"],"URL":"https:\/\/doi.org\/10.1145\/3695080.3695174","relation":{},"subject":[],"published":{"date-parts":[[2024,7,26]]},"assertion":[{"value":"2024-10-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}