{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T11:28:59Z","timestamp":1777548539946,"version":"3.51.4"},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402103"],"award-info":[{"award-number":["62402103"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["52102400"],"award-info":[{"award-number":["52102400"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272050"],"award-info":[{"award-number":["62272050"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20241273"],"award-info":[{"award-number":["BK20241273"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["62203123"],"award-info":[{"award-number":["62203123"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006469","name":"Fundo para o Desenvolvimento das Ci\u00eancias e da Tecnologia","doi-asserted-by":"publisher","award":["SKL-IOTSC-2024-2026"],"award-info":[{"award-number":["SKL-IOTSC-2024-2026"]}],"id":[{"id":"10.13039\/501100006469","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006469","name":"Fundo para o Desenvolvimento das Ci\u00eancias e da Tecnologia","doi-asserted-by":"publisher","award":["0085\/2022\/A"],"award-info":[{"award-number":["0085\/2022\/A"]}],"id":[{"id":"10.13039\/501100006469","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006469","name":"Fundo para o Desenvolvimento das Ci\u00eancias e da Tecnologia","doi-asserted-by":"publisher","award":["0014\/2022\/AFJ"],"award-info":[{"award-number":["0014\/2022\/AFJ"]}],"id":[{"id":"10.13039\/501100006469","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010877","name":"Science, Technology and Innovation Commission of Shenzhen Municipality","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003009","name":"Science and Technology Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003009","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Artificial Intelligence"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1016\/j.artint.2025.104297","type":"journal-article","created":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T18:59:29Z","timestamp":1739213969000},"page":"104297","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["On the computation of mixed strategies for security games with general defending requirements"],"prefix":"10.1016","volume":"341","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9059-8141","authenticated-orcid":false,"given":"Rufan","family":"Bai","sequence":"first","affiliation":[]},{"given":"Haoxing","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5766-2115","authenticated-orcid":false,"given":"Xiaowei","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7370-6237","authenticated-orcid":false,"given":"Minming","family":"Li","sequence":"additional","affiliation":[]},{"given":"Weijia","family":"Jia","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.artint.2025.104297_br0010","series-title":"AAMAS","first-page":"13","article-title":"PROTECT: a deployed game theoretic system to protect the ports of the United States","author":"Shieh","year":"2012"},{"key":"10.1016\/j.artint.2025.104297_br0020","series-title":"USENIX Security Symposium","first-page":"3943","article-title":"PATROL: provable defense against adversarial policy in two-player games","author":"Guo","year":"2023"},{"key":"10.1016\/j.artint.2025.104297_br0030","series-title":"IJCAI","first-page":"2589","article-title":"When security games go green: designing defender strategies to prevent poaching and illegal fishing","author":"Fang","year":"2015"},{"key":"10.1016\/j.artint.2025.104297_br0040","series-title":"IJCAI","first-page":"5494","article-title":"Stackelberg security games: looking beyond a decade of success","author":"Sinha","year":"2018"},{"key":"10.1016\/j.artint.2025.104297_br0050","doi-asserted-by":"crossref","DOI":"10.1016\/j.artint.2022.103791","article-title":"Defense coordination in security games: equilibrium analysis and mechanism design","volume":"313","author":"Gan","year":"2022","journal-title":"Artif. Intell."},{"key":"10.1016\/j.artint.2025.104297_br0060","series-title":"AAAI","article-title":"Analyzing the effectiveness of adversary modeling in security games","author":"Nguyen","year":"2013"},{"key":"10.1016\/j.artint.2025.104297_br0070","series-title":"EC","first-page":"639","article-title":"Imitative follower deception in Stackelberg games","author":"Gan","year":"2019"},{"issue":"1","key":"10.1016\/j.artint.2025.104297_br0080","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1038\/s41467-018-03740-9","article-title":"Optimal diversification strategies in the networks of related products and of related research areas","volume":"9","author":"Alshamsi","year":"2018","journal-title":"Nat. Commun."},{"key":"10.1016\/j.artint.2025.104297_br0090","series-title":"AAAI","article-title":"Security games for controlling contagion","author":"Tsai","year":"2012"},{"key":"10.1016\/j.artint.2025.104297_br0100","series-title":"ICC","first-page":"1","article-title":"Security games with incomplete information","author":"Nguyen","year":"2009"},{"key":"10.1016\/j.artint.2025.104297_br0110","series-title":"AAMAS (1)","first-page":"689","article-title":"Computing optimal randomized resource allocations for massive security games","author":"Kiekintveld","year":"2009"},{"key":"10.1016\/j.artint.2025.104297_br0120","series-title":"AAAI","article-title":"Complexity of computing optimal Stackelberg strategies in security resource allocation games","author":"Korzhyk","year":"2010"},{"key":"10.1016\/j.artint.2025.104297_br0130","series-title":"AAMAS","first-page":"327","article-title":"A double oracle algorithm for zero-sum security games on graphs","author":"Jain","year":"2011"},{"key":"10.1016\/j.artint.2025.104297_br0140","series-title":"AAMAS","first-page":"215","article-title":"Security scheduling for real-world networks","author":"Jain","year":"2013"},{"key":"10.1016\/j.artint.2025.104297_br0150","series-title":"AAAI","first-page":"637","article-title":"Computing optimal monitoring strategy for detecting terrorist plots","author":"Wang","year":"2016"},{"key":"10.1016\/j.artint.2025.104297_br0160","series-title":"AAAI","first-page":"530","article-title":"Security games on a plane","author":"Gan","year":"2017"},{"key":"10.1016\/j.artint.2025.104297_br0170","series-title":"ICAPS","article-title":"Computing solutions in infinite-horizon discounted adversarial patrolling games","author":"Vorobeychik","year":"2014"},{"key":"10.1016\/j.artint.2025.104297_br0180","series-title":"IJCAI","first-page":"681","article-title":"Computing optimal mixed strategies for security games with dynamic payoffs","author":"Yin","year":"2015"},{"key":"10.1016\/j.artint.2025.104297_br0190","article-title":"Defending against contagious attacks on a network with resource reallocation","volume":"35","author":"Bai","year":"2021","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"10.1016\/j.artint.2025.104297_br0200","series-title":"AAAI","first-page":"2111","article-title":"Defending with shared resources on a network","author":"Li","year":"2020"},{"key":"10.1016\/j.artint.2025.104297_br0210","series-title":"SODA","first-page":"43","article-title":"Inoculation strategies for victims of viruses and the sum-of-squares partition problem","author":"Aspnes","year":"2005"},{"key":"10.1016\/j.artint.2025.104297_br0220","series-title":"ICDCS","first-page":"348","article-title":"Existence theorems and approximation algorithms for generalized network security games","author":"Kumar","year":"2010"},{"key":"10.1016\/j.artint.2025.104297_br0230","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1016\/j.jet.2016.09.009","article-title":"Network security and contagion","volume":"166","author":"Acemoglu","year":"2016","journal-title":"J. Econ. Theory"},{"key":"10.1016\/j.artint.2025.104297_br0240","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1613\/jair.1.14563","article-title":"Stackelberg security games with contagious attacks on a network: reallocation to the rescue","volume":"77","author":"Bai","year":"2023","journal-title":"J. Artif. Intell. Res."},{"key":"10.1016\/j.artint.2025.104297_br0250","series-title":"AAMAS","first-page":"223","article-title":"Security games with surveillance cost and optimal timing of attack execution","author":"An","year":"2013"},{"issue":"2","key":"10.1016\/j.artint.2025.104297_br0260","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s10458-014-9258-0","article-title":"Securing interdependent assets","volume":"29","author":"Vorobeychik","year":"2015","journal-title":"Auton. Agents Multi-Agent Syst."},{"key":"10.1016\/j.artint.2025.104297_br0270","series-title":"AAAI","first-page":"914","article-title":"Security games with protection externalities","author":"Gan","year":"2015"},{"key":"10.1016\/j.artint.2025.104297_br0280","series-title":"GameSec","first-page":"149","article-title":"Multiple oracle algorithm to solve continuous games","volume":"vol. 13727","author":"Kroupa","year":"2022"},{"key":"10.1016\/j.artint.2025.104297_br0290","series-title":"AAMAS (1)","first-page":"57","article-title":"Leader-follower strategies for robotic patrolling in environments with arbitrary topologies","author":"Basilico","year":"2009"},{"key":"10.1016\/j.artint.2025.104297_br0300","series-title":"IJCAI","first-page":"596","article-title":"Equilibrium analysis of multi-defender security games","author":"Lou","year":"2015"},{"key":"10.1016\/j.artint.2025.104297_br0310","series-title":"AAMAS, International Foundation for Autonomous Agents and Multiagent Systems Richland","first-page":"703","article-title":"Stackelberg security games with multiple uncoordinated defenders","author":"Gan","year":"2018"},{"key":"10.1016\/j.artint.2025.104297_br0320","series-title":"AAMAS, International Foundation for Autonomous Agents and Multiagent Systems","first-page":"402","article-title":"Mechanism design for defense coordination in security games","author":"Gan","year":"2020"},{"key":"10.1016\/j.artint.2025.104297_br0330","series-title":"IJCAI","first-page":"433","article-title":"Robust solutions for multi-defender Stackelberg security games","author":"Mutzari","year":"2022"},{"key":"10.1016\/j.artint.2025.104297_br0340","series-title":"International Conference on Decision and Game Theory for Security","first-page":"65","article-title":"Multi-defender security games with schedules","author":"Song","year":"2023"},{"key":"10.1016\/j.artint.2025.104297_br0350","article-title":"Risk-sharing mechanism design in non-cooperative multi-defender Stackelberg defense resources allocation game","author":"Shao","year":"2023","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"10.1016\/j.artint.2025.104297_br0360","series-title":"EC","first-page":"82","article-title":"Computing the optimal strategy to commit to","author":"Conitzer","year":"2006"},{"key":"10.1016\/j.artint.2025.104297_br0370","series-title":"ECAI","first-page":"170","article-title":"Phase transitions and annealed theories: number partitioning as a case study","author":"Gent","year":"1996"},{"key":"10.1016\/j.artint.2025.104297_br0380","author":"Leskovec"},{"key":"10.1016\/j.artint.2025.104297_br0390","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2020.107165","article-title":"Modeling multi-target defender-attacker games with quantal response attack strategies","volume":"205","author":"Zhang","year":"2021","journal-title":"Reliab. Eng. Syst. Saf."}],"container-title":["Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0004370225000165?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0004370225000165?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T17:45:32Z","timestamp":1777398332000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0004370225000165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":39,"alternative-id":["S0004370225000165"],"URL":"https:\/\/doi.org\/10.1016\/j.artint.2025.104297","relation":{},"ISSN":["0004-3702"],"issn-type":[{"value":"0004-3702","type":"print"}],"subject":[],"published":{"date-parts":[[2025,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"On the computation of mixed strategies for security games with general defending requirements","name":"articletitle","label":"Article Title"},{"value":"Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.artint.2025.104297","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104297"}}