{"id":"https://openalex.org/W3008309395","doi":"https://doi.org/10.1109/access.2020.2974786","title":"An Intelligent Deployment Policy for Deception Resources Based on Reinforcement Learning","display_name":"An Intelligent Deployment Policy for Deception Resources Based on Reinforcement Learning","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3008309395","doi":"https://doi.org/10.1109/access.2020.2974786","mag":"3008309395"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2974786","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2974786","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09001034.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09001034.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100719231","display_name":"Shuo Wang","orcid":"https://orcid.org/0000-0002-0522-7867"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210119388","display_name":"Zhejiang Science and Technology Information Institute","ror":"https://ror.org/02rzte064","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210119388"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuo Wang","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, China","Zhengzhou Information Science and Technology Institute, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China"],"raw_orcid":"https://orcid.org/0000-0002-0522-7867","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, China","institution_ids":["https://openalex.org/I4210119388"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101845665","display_name":"Qingqi Pei","orcid":"https://orcid.org/0000-0001-7614-1422"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingqi Pei","raw_affiliation_strings":["Shaanxi Key Laboratory of Blockchain and Secure Computing, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China","Shaanxi Key Laboratory of Blockchain and Secure Computing, Xidian University, Xi'an, China"],"raw_orcid":"https://orcid.org/0000-0001-7614-1422","affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Blockchain and Secure Computing, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Shaanxi Key Laboratory of Blockchain and Secure Computing, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100420031","display_name":"Jianhua Wang","orcid":"https://orcid.org/0000-0001-6090-1300"},"institutions":[{"id":"https://openalex.org/I4210119388","display_name":"Zhejiang Science and Technology Information Institute","ror":"https://ror.org/02rzte064","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210119388"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhua Wang","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, China","institution_ids":["https://openalex.org/I4210119388"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102847418","display_name":"Guangming Tang","orcid":"https://orcid.org/0000-0002-2685-830X"},"institutions":[{"id":"https://openalex.org/I4210119388","display_name":"Zhejiang Science and Technology Information Institute","ror":"https://ror.org/02rzte064","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210119388"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangming Tang","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, China","institution_ids":["https://openalex.org/I4210119388"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100424320","display_name":"Yuchen Zhang","orcid":"https://orcid.org/0000-0002-7568-4959"},"institutions":[{"id":"https://openalex.org/I4210119388","display_name":"Zhejiang Science and Technology Information Institute","ror":"https://ror.org/02rzte064","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210119388"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuchen Zhang","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, China","institution_ids":["https://openalex.org/I4210119388"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100689572","display_name":"Xiaohu Liu","orcid":"https://orcid.org/0000-0001-9446-7426"},"institutions":[{"id":"https://openalex.org/I4210119388","display_name":"Zhejiang Science and Technology Information Institute","ror":"https://ror.org/02rzte064","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210119388"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohu Liu","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, China"],"raw_orcid":"https://orcid.org/0000-0001-9446-7426","affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, China","institution_ids":["https://openalex.org/I4210119388"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100719231"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210119388"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.4006,"has_fulltext":true,"cited_by_count":36,"citation_normalized_percentile":{"value":0.92567158,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"8","issue":null,"first_page":"35792","last_page":"35804"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.9370046854019165},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.8999232053756714},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7976692914962769},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7681750655174255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.630804181098938},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.373018741607666},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.09507536888122559},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.07629796862602234}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.9370046854019165},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.8999232053756714},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7976692914962769},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7681750655174255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.630804181098938},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.373018741607666},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.09507536888122559},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.07629796862602234},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.2974786","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2974786","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09001034.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a669a58632524b8bba11fc3ecd221be8","is_oa":true,"landing_page_url":"https://doaj.org/article/a669a58632524b8bba11fc3ecd221be8","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 35792-35804 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2974786","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2974786","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09001034.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1013565655","display_name":null,"funder_award_id":"2018YFE0126000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G2059520079","display_name":null,"funder_award_id":"U1636209","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7407643660","display_name":null,"funder_award_id":"61902292","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7838805107","display_name":null,"funder_award_id":"2019ZDLGY13-07","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7963383444","display_name":null,"funder_award_id":"U1636209","funder_id":"https://openalex.org/F4320334091","funder_display_name":"Key Program of NSFC-Tongyong Union Foundation"},{"id":"https://openalex.org/G8190979695","display_name":null,"funder_award_id":"2018YFE0126000","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8635493100","display_name":null,"funder_award_id":"2019ZDLGY13-04","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334091","display_name":"Key Program of NSFC-Tongyong Union Foundation","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3008309395.pdf","grobid_xml":"https://content.openalex.org/works/W3008309395.grobid-xml"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W1514368868","https://openalex.org/W1669806660","https://openalex.org/W1979091937","https://openalex.org/W1999588868","https://openalex.org/W2003630445","https://openalex.org/W2072610876","https://openalex.org/W2093397575","https://openalex.org/W2197836422","https://openalex.org/W2257979135","https://openalex.org/W2295173838","https://openalex.org/W2320597598","https://openalex.org/W2364198687","https://openalex.org/W2494110282","https://openalex.org/W2495047120","https://openalex.org/W2536759866","https://openalex.org/W2552542906","https://openalex.org/W2594371090","https://openalex.org/W2725073272","https://openalex.org/W2752488036","https://openalex.org/W2766447205","https://openalex.org/W2767129667","https://openalex.org/W2773002476","https://openalex.org/W2780895759","https://openalex.org/W2791310119","https://openalex.org/W2794694510","https://openalex.org/W2797887368","https://openalex.org/W2809494870","https://openalex.org/W2896811869","https://openalex.org/W2930323883","https://openalex.org/W2944979906","https://openalex.org/W2951384144","https://openalex.org/W2956698276","https://openalex.org/W2959653735","https://openalex.org/W2962858319","https://openalex.org/W3004535097","https://openalex.org/W4233382079","https://openalex.org/W4299801659","https://openalex.org/W6630780968","https://openalex.org/W6637397297","https://openalex.org/W6697442158","https://openalex.org/W6719325137","https://openalex.org/W6750480621","https://openalex.org/W6986893907"],"related_works":["https://openalex.org/W2165717120","https://openalex.org/W2039390456","https://openalex.org/W2948663225","https://openalex.org/W2029954793","https://openalex.org/W1992683634","https://openalex.org/W4295295666","https://openalex.org/W1978059949","https://openalex.org/W2512387791","https://openalex.org/W70044515","https://openalex.org/W2128448209"],"abstract_inverted_index":{"Traditional":[0],"deception-based":[1],"cyber":[2],"defenses":[3],"(DCD)":[4],"often":[5],"adopt":[6],"the":[7,13,21,25,36,43,56,88,96,105,114,118,122,129,147,151,156,164,173],"static":[8,37],"deployment":[9,38,61,82,131],"policy":[10,83,153],"that":[11,126,196],"places":[12],"deception":[14,29,45,92,108,134,157],"resources":[15,30,46,93,109,135,158],"in":[16,20],"some":[17],"fixed":[18],"positions":[19],"target":[22],"network.":[23],"Unfortunately,":[24],"effectiveness":[26],"of":[27,90,107,133,193,205],"these":[28,91],"has":[31,199],"been":[32],"greatly":[33],"restricted":[34],"by":[35,53],"policy,":[39,62],"which":[40,63,208],"also":[41],"causes":[42],"deployed":[44],"to":[47,73,85,95,154],"be":[48,74],"easily":[49],"identified":[50],"and":[51,68,117,162,180],"bypassed":[52],"attackers.":[54],"Moreover,":[55],"existing":[57,213],"studies":[58],"on":[59,137,189],"dynamic":[60],"make":[64],"many":[65],"strict":[66],"assumptions":[67],"constraints,":[69],"are":[70],"too":[71],"idealistic":[72],"practical.":[75],"To":[76],"overcome":[77],"this":[78],"limitation,":[79],"an":[80],"intelligent":[81],"used":[84],"dynamically":[86],"adjust":[87],"locations":[89,132],"according":[94],"network":[97,175],"security":[98],"state":[99],"is":[100,142,209],"developed.":[101],"Starting":[102],"with":[103,168,184],"formulating":[104],"problem":[106],"deployment,":[110],"we":[111,145,171],"then":[112],"model":[113,148],"attacker-defender":[115],"scenario":[116],"attacker's":[119],"strategy.":[120],"Next,":[121],"preliminary":[123],"screening":[124],"method":[125,198],"can":[127],"derive":[128],"effective":[130],"based":[136],"threat":[138],"penetration":[139],"graph":[140],"(TPG)":[141],"proposed.":[143],"Afterward,":[144],"construct":[146],"for":[149,177],"finding":[150],"optimal":[152],"deploy":[155],"using":[159],"reinforcement":[160],"learning":[161],"design":[163],"Q-Learning":[165],"training":[166],"algorithm":[167],"model-free.":[169],"Finally,":[170],"use":[172],"real-world":[174],"environment":[176],"our":[178,197],"experiments":[179],"conduct":[181],"in-depth":[182],"comparisons":[183],"state-of-the-art":[185],"methods.":[186],"Our":[187],"evaluations":[188],"a":[190,200],"large":[191],"number":[192],"attacks":[194],"show":[195],"high":[201],"defense":[202],"success":[203],"probability":[204],"nearly":[206],"80%,":[207],"more":[210],"efficient":[211],"than":[212],"schemes.":[214]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
