{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:02:35Z","timestamp":1764831755123,"version":"3.46.0"},"reference-count":57,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.069332","type":"journal-article","created":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T08:51:17Z","timestamp":1757062277000},"page":"3997-4021","source":"Crossref","is-referenced-by-count":0,"title":["A Dynamic Deceptive Defense Framework for Zero-Day Attacks in IIoT: Integrating Stackelberg Game and Multi-Agent Distributed Deep Deterministic Policy Gradient"],"prefix":"10.32604","volume":"85","author":[{"given":"Shigen","family":"Shen","sequence":"first","affiliation":[]},{"given":"Xiaojun","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Yimeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"573","DOI":"10.3390\/electronics12030573","article-title":"Anomaly detection of zero-day attacks based on CNN and regularization techniques","volume":"12","author":"Ibrahim Hairab","year":"2023","journal-title":"Electronics"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"111080","DOI":"10.1016\/j.asoc.2023.111080","article-title":"Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks","volume":"150","author":"Shen","year":"2024","journal-title":"Appl Soft Comput"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"110476","DOI":"10.1016\/j.comnet.2024.110476","article-title":"A framework for detecting zero-day exploits in network flows","volume":"248","author":"Tour\u00e9","year":"2024","journal-title":"Comput Netw"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"3824","DOI":"10.1109\/TDSC.2025.3542104","article-title":"Joint mean-field game and multiagent asynchronous advantage actor-critic for edge intelligence-based IoT malware propagation defense","volume":"22","author":"Shen","year":"2025","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref5","first-page":"104073","article-title":"RT-A3C: real-time asynchronous advantage actor\u2013critic for optimally defending malicious attacks in edge-enabled Industrial Internet of Things","volume":"91","author":"Zhu","year":"2025","journal-title":"J Inf Secur Appl"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"110541","DOI":"10.1016\/j.compeleceng.2025.110541","article-title":"A novel intrusion detection framework for industrial IoT: GCN-GRU architecture optimized with ant colony optimization","volume":"126","author":"Mir","year":"2025","journal-title":"Comput Electr Eng"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2043","DOI":"10.1002\/rnc.7777","article-title":"Resilient formation tracking for networked swarm systems under malicious data deception attacks","volume":"35","author":"Liu","year":"2025","journal-title":"Int J Robust Nonlinear Control"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1016\/j.geb.2024.10.009","article-title":"Tight incentive analysis of Sybil attacks against the market equilibrium of resource exchange over general networks","volume":"148","author":"Cheng","year":"2024","journal-title":"Games Econ Behav"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"115939","DOI":"10.1016\/j.chaos.2024.115939","article-title":"CPS-IoT-PPDNN: a new explainable privacy preserving DNN for resilient anomaly detection in Cyber-Physical Systems-enabled IoT networks","volume":"191","author":"Saheed","year":"2025","journal-title":"Chaos Solitons Fractals"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1859","DOI":"10.1109\/TMC.2024.3486689","article-title":"Defending data poisoning attacks in DP-based crowdsensing: a game-theoretic approach","volume":"24","author":"Zheng","year":"2025","journal-title":"IEEE Trans Mobile Comput"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"104153","DOI":"10.1016\/j.cose.2024.104153","article-title":"Dealing with uncertainty in cybersecurity decision support","volume":"148","author":"Zhang","year":"2025","journal-title":"Comput Secur"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"102041","DOI":"10.1016\/j.jksuci.2024.102041","article-title":"Enabling intrinsic intelligence, ubiquitous learning and blockchain empowerment for trust and reliability in 6G network evolution","volume":"36","author":"Alshahrani","year":"2024","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"123158","DOI":"10.1016\/j.eswa.2024.123158","article-title":"A Contrastive-enhanced ensemble framework for efficient multi-agent reinforcement learning","volume":"245","author":"Du","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"5302","DOI":"10.1109\/TIFS.2023.3307956","article-title":"Joint differential game and double deep Q-networks for suppressing malware spread in industrial Internet of Things","volume":"18","author":"Shen","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"33890","DOI":"10.1109\/JIOT.2024.3432728","article-title":"Multiagent deep deterministic policy gradient-based computation offloading and resource allocation for ISAC-aided 6G V2X networks","volume":"11","author":"Hu","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"12536","DOI":"10.1109\/JIOT.2023.3333903","article-title":"Deep Q-network-based open-set intrusion detection solution for Industrial Internet of Things","volume":"11","author":"Yu","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"6978","DOI":"10.1109\/TIFS.2024.3420233","article-title":"SGD3QN: joint stochastic games and dueling double deep Q-networks for defending malware propagation in edge intelligence-enabled Internet of Things","volume":"19","author":"Shen","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3605775","article-title":"Deep learning for zero-day malware detection and classification: a survey","volume":"56","author":"Deldar","year":"2023","journal-title":"ACM Comput Surv"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"103849","DOI":"10.1016\/j.cose.2024.103849","article-title":"Zero-Ran Sniff: a zero-day ransomware early detection method based on zero-shot learning","volume":"142","author":"Cen","year":"2024","journal-title":"Comput Secur"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"81118","DOI":"10.1109\/ACCESS.2025.3566980","article-title":"CPS-IIoT-P2Attention: explainable privacy-preserving with scaled dot-product attention in Cyber-Physical System-Industrial IoT network","volume":"13","author":"Saheed","year":"2025","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"103504","DOI":"10.1016\/j.adhoc.2024.103504","article-title":"SIHQR model with time delay for worm spread analysis in IIoT-enabled PLC network","volume":"160","author":"Wu","year":"2024","journal-title":"Ad Hoc Netw"},{"key":"ref22","first-page":"2743","article-title":"SCIRD: revealing infection of malicious software in edge computing-enabled IoT networks","volume":"79","author":"Ye","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"29132","DOI":"10.1109\/JIOT.2024.3406386","article-title":"Novel intrusion detection strategies with optimal hyper parameters for industrial Internet of Things based on stochastic games and double deep Q-networks","volume":"11","author":"Yu","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3708320","article-title":"Adversarial machine learning attacks and defences in multi-agent reinforcement learning","volume":"57","author":"Standen","year":"2025","journal-title":"ACM Comput Surv"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"23931","DOI":"10.1109\/JIOT.2024.3387090","article-title":"MFGD3QN: enhancing edge intelligence defense against DDoS with mean-field games and dueling double deep Q-network","volume":"11","author":"Shen","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"105116","DOI":"10.1016\/j.engappai.2022.105116","article-title":"Cyber-security and reinforcement learning\u2014a brief survey","volume":"114","author":"Adawadkar","year":"2022","journal-title":"Eng Appl Artif Intell"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"119688","DOI":"10.1016\/j.apenergy.2022.119688","article-title":"Resilience enhancement of multi-agent reinforcement learning-based demand response against adversarial attacks","volume":"324","author":"Zeng","year":"2022","journal-title":"Appl Energy"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"10842","DOI":"10.1109\/ACCESS.2023.3239684","article-title":"Multi-agent distributed deep learning algorithm to detect cyber-attacks in distance relays","volume":"11","author":"Rajaee","year":"2023","journal-title":"IEEE Access"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"18049","DOI":"10.1109\/TITS.2024.3408238","article-title":"Enhancing cyber-resilience in electric vehicle charging stations: a multi-agent deep reinforcement learning approach","volume":"25","author":"Sepehrzad","year":"2024","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"10733","DOI":"10.1007\/s10462-023-10437-z","article-title":"Zero-day attack detection: a systematic literature review","volume":"56","author":"Ahmad","year":"2023","journal-title":"Artif Intell Rev"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.comcom.2022.11.001","article-title":"A review of machine learning-based zero-day attack detection: challenges and future directions","volume":"198","author":"Guo","year":"2023","journal-title":"Comput Commun"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"3934","DOI":"10.3390\/electronics11233934","article-title":"Comparative evaluation of AI-based techniques for zero-day attacks detection","volume":"11","author":"Ali","year":"2022","journal-title":"Electronics"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"144150","DOI":"10.1109\/ACCESS.2024.3455410","article-title":"A systematic literature review on AI-based methods and challenges in detecting zero-day attacks","volume":"12","author":"Yee Por","year":"2024","journal-title":"IEEE Access"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1007\/s10207-023-00676-0","article-title":"From zero-shot machine learning to zero-day attack detection","volume":"22","author":"Sarhan","year":"2023","journal-title":"Int J Inf Secur"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"3856","DOI":"10.1109\/TCE.2023.3335385","article-title":"Zero-day guardian: a dual model enabled federated learning framework for handling zero-day attacks in 5G enabled IIoT","volume":"70","author":"Verma","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"103898","DOI":"10.1016\/j.cose.2024.103898","article-title":"NERO: neural algorithmic reasoning for zeRO-day attack detection in the IoT: a hybrid approach","volume":"142","author":"Cevallos","year":"2024","journal-title":"Comput Secur"},{"key":"ref37","first-page":"103516","article-title":"An adaptable deep learning-based intrusion detection system to zero-day attacks","volume":"76","author":"Soltani","year":"2023","journal-title":"J Inf Secur Appl"},{"key":"ref38","first-page":"3003","article-title":"An asset-based approach to mitigate zero-day ransomware attacks","volume":"73","author":"Azzedin","year":"2022","journal-title":"Comput Mater Contin"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"12399","DOI":"10.1109\/TVT.2024.3385916","article-title":"Zero-X: a blockchain-enabled open-set federated learning framework for zero-day attack detection in IoV","volume":"73","author":"Korba","year":"2024","journal-title":"IEEE Transact Vehic Technol"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"16510","DOI":"10.1109\/JIOT.2022.3153089","article-title":"Stackelberg-game-based computation offloading method in cloud\u2013edge computing networks","volume":"9","author":"Zhou","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.inffus.2023.03.013","article-title":"A Stackelberg game model for large-scale group decision making based on cooperative incentives","volume":"96","author":"Tang","year":"2023","journal-title":"Inf Fusion"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1007\/s11277-021-08926-x","article-title":"Resource allocation in cognitive radio networks using Stackelberg game: a survey","volume":"122","author":"Chowdhury","year":"2022","journal-title":"Wirel Pers Commun"},{"key":"ref43","first-page":"1904","article-title":"Incentive mechanism for mobile crowdsensing with two-stage Stackelberg game","volume":"16","author":"Hu","year":"2023","journal-title":"IEEE Trans Serv Comput"},{"key":"ref44","first-page":"2429","article-title":"Stackelberg game-based resource allocation with blockchain for cold-chain logistics system","volume":"75","author":"Zhang","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"119134","DOI":"10.1016\/j.ins.2023.119134","article-title":"Optimal DoS attack strategy for cyber-physical systems: a Stackelberg game-theoretical approach","volume":"642","author":"Wang","year":"2023","journal-title":"Inf Sci"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"6622","DOI":"10.1109\/JIOT.2022.3197155","article-title":"UAV-aided computation offloading in mobile-edge computing networks: a Stackelberg game approach","volume":"10","author":"Zhou","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"12871","DOI":"10.1109\/TASE.2025.3549114","article-title":"Prescribed performance robust approximate optimal tracking control via Stackelberg game","volume":"22","author":"Tan","year":"2025","journal-title":"IEEE Trans Autom Sci Eng"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"1418","DOI":"10.1109\/TAC.2023.3330797","article-title":"No-regret learning in dynamic Stackelberg games","volume":"69","author":"Lauffer","year":"2024","journal-title":"IEEE Trans Autom Control"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"9520","DOI":"10.3390\/s23239520","article-title":"A policy gradient algorithm to alleviate the multi-agent value overestimation problem in complex environments","volume":"23","author":"Yang","year":"2023","journal-title":"Sensors"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"4331","DOI":"10.1109\/JIOT.2024.3484005","article-title":"Multiagent DRL-based consensus mechanism for blockchain-based collaborative computing in UAV-assisted 6G Networks","volume":"12","author":"Nahom Abishu","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"15453","DOI":"10.1109\/JIOT.2025.3527929","article-title":"Joint Task Partitioning and resource allocation in RAV-enabled vehicular edge computing based on deep reinforcement learning","volume":"12","author":"Liang","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"6909","DOI":"10.1109\/TCE.2024.3440178","article-title":"Advancing security and trust in WSNs: a federated multi-agent deep reinforcement learning approach","volume":"70","author":"Moudoud","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"13914","DOI":"10.1109\/TMC.2024.3439016","article-title":"Secure offloading with adversarial multi-agent reinforcement learning against intelligent eavesdroppers in UAV-enabled mobile edge computing","volume":"23","author":"Li","year":"2024","journal-title":"IEEE Trans Mob Comput"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"1274","DOI":"10.1109\/OJCOMS.2023.3280359","article-title":"Reputation-aware multi-agent DRL for secure hierarchical federated learning in IoT","volume":"4","author":"Al-Maslamani","year":"2023","journal-title":"IEEE Open J Commun Soc"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"3470","DOI":"10.1109\/JSAC.2022.3213360","article-title":"Incentivizing proof-of-stake blockchain for secured data collection in UAV-assisted IoT: a multi-agent reinforcement learning approach","volume":"40","author":"Tang","year":"2022","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1109\/COMST.2022.3160697","article-title":"Applications of multi-agent reinforcement learning in future internet: a comprehensive survey","volume":"24","author":"Li","year":"2022","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"103933","DOI":"10.1016\/j.jnca.2024.103933","article-title":"Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems","volume":"230","author":"Baccour","year":"2024","journal-title":"J Netw Comput Appl"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_69332\/TSP_CMC_69332.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:49Z","timestamp":1764826549000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":57,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.069332","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}