{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:08Z","timestamp":1755993668813,"version":"3.44.0"},"reference-count":90,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,8]]},"DOI":"10.23919\/acc63710.2025.11107786","type":"proceedings-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:17:51Z","timestamp":1755800271000},"page":"2146-2163","source":"Crossref","is-referenced-by-count":0,"title":["Deception in Game Theory and Control: A Tutorial"],"prefix":"10.23919","author":[{"given":"Kyriakos G.","family":"Vamvoudakis","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology,Daniel Guggenheim School of Aerospace Engineering,Atlanta,GA,USA"}]},{"given":"Filippos","family":"Fotiadis","sequence":"additional","affiliation":[{"name":"University of Texas at Austin,Oden Institute for Computational Engineering &amp; Sciences,Austin,TX,USA"}]},{"given":"Tamer","family":"Ba\u015far","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,Electrical and Computer Engineering Department and the Coordinated Science Laboratory,Urbana,IL,USA"}]},{"given":"Vijay","family":"Gupta","sequence":"additional","affiliation":[{"name":"Purdue,Electrical and Computer Engineering Department,West Lafayette,IN,USA"}]},{"given":"Jorge","family":"Poveda","sequence":"additional","affiliation":[{"name":"University of California,Electrical and Computer Engineering Department of the Jacobs School of Engineering,San Diego, La Jolla,CA,USA"}]},{"given":"Michael","family":"Tang","sequence":"additional","affiliation":[{"name":"University of California,Electrical and Computer Engineering Department of the Jacobs School of Engineering,San Diego, La Jolla,CA,USA"}]},{"given":"Miroslav","family":"Krstic","sequence":"additional","affiliation":[{"name":"University of California,Mechanical and Aerospace Engineering Department of the Jacobs School of Engineering,San Diego, La Jolla,CA,USA"}]},{"given":"Quanyan","family":"Zhu","sequence":"additional","affiliation":[{"name":"New York University,Department of Electrical and Computer Engineering,NY,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611971132","volume-title":"Dynamic Noncooperative Game Theory","author":"Ba\u015far","year":"1998"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2978037"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8814387"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2714903"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CDC49753.2023.10383984"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21236\/ada608845"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2514\/6.2005-6152"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2015.7172127"},{"volume-title":"Stratagem: Deception and Surprise in War","year":"2007","author":"Whaley","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44374-4_1"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-44374-4","volume-title":"Handbook of Dynamic Game Theory","author":"Ba\u015far","year":"2018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54071-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2022.3171478"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44374-4_10"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/ACC55779.2023.10156432"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2024.3413870"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1142\/S0219198924400024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/0322015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0176-2680(89)90045-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575858"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.05.024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3030861"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65048-3_13"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121214"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60990-0_12"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1900661"},{"key":"ref27","first-page":"10571","article-title":"Robust Multi-Agent Reinforcement Learning with Model Uncertainty","volume":"33","author":"Zhang","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s13235-021-00420-0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022678204735"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11424-021-1242-6"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1978.1101727"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/0327030"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1889(87)80006-4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2173412"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10957-020-01757-z"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2022.3168527"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1137\/140953514"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2007.904450"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11537-007-0657-8"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44374-4_7"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1137\/17M1112583"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2018.0957"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.08.008"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2289711"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s13235-015-0160-4"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1080\/00207179.2015.1129560"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2579264"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s13235-018-00290-z"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2019.1044"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1049\/PBCE081E"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2021.3078100"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-control-042920-020021"},{"key":"ref53","first-page":"10178","article-title":"Oracle-free reinforcement learning in mean-field games along a single sample path","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Zaman"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s13235-022-00448-w"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2024.3397928"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3337772"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66065-9"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/9781119723950"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2886472"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68711-7_15"},{"key":"ref62","article-title":"Scalable algorithms for solving stochastic games with limited partial observability","volume-title":"PhD thesis","author":"Hor\u00e1k","year":"2020"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CDC56724.2024.10886479"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwz218"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1002\/9781119593386.ch2"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2022.01.001"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33432-1_10"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2814481"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02786-9_15"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2915746"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823893"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/tac.2025.3582524"},{"article-title":"Deception in Oligopoly Games via Adaptive Nash Seeking Systems","year":"2024","author":"Tang","key":"ref73"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.36.1.48"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717282"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2012.6315598"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2016.10.029"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-805246-4.00010-0"},{"volume-title":"Nonlinear Systems","year":"2002","author":"Khalil","key":"ref79"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2013.6736623"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1515\/9781400833344"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.23919\/ACC60939.2024.10644755"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719468"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.23919\/ACC50511.2021.9483080"},{"key":"ref85","first-page":"5872","article-title":"Fully Decentralized Multi-Agent Reinforcement Learning with Networked Agents","volume-title":"Proceedings of the 35th International Conference on Machine Learning","volume":"80","author":"Zhang"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2024.3409676"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2023.3266505"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2024.3486631"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2004.04.013"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CDC42340.2020.9303995"}],"event":{"name":"2025 American Control Conference (ACC)","start":{"date-parts":[[2025,7,8]]},"location":"Denver, CO, USA","end":{"date-parts":[[2025,7,10]]}},"container-title":["2025 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11107441\/11107442\/11107786.pdf?arnumber=11107786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:57:47Z","timestamp":1755907067000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11107786\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,8]]},"references-count":90,"URL":"https:\/\/doi.org\/10.23919\/acc63710.2025.11107786","relation":{},"subject":[],"published":{"date-parts":[[2025,7,8]]}}}