An iterative security game for computing robust and adaptive network flows
نویسندگان
چکیده
We study the robust and adaptive maximum network flow problem in an uncertain environment where parameters (e.g., capacities) are known deterministic, but structure edges) is vulnerable to adversarial attacks or failures. propose a sustainable model effectively proactively counter plausible attacking behaviors of adversary operating under budget constraint. Specifically, we introduce novel scenario generation approach based on iterative two-player game between defender adversary. assume that always takes best myopic response (out some feasible attacks) against current prepared by defender. On other hand, considers all revealed previous iterations order generate new conservative strategy (maximin) those attacks. This continues until objectives administrator both converge. show be solved NP-hard complexity adversary’s decision grows exponentially with size value. two principled heuristic approaches for solving at scale large urban network. Extensive computational results multiple synthetic real-world data sets demonstrate solution provided defender’s significantly increases amount pushed through reduces expected lost over four state-of-the-art benchmark approaches.
منابع مشابه
Iterative robust adaptive beamforming
The minimum power distortionless response beamformer has a good interference rejection capability, but the desired signal will be suppressed if signal steering vector or data covariance matrix is not precise. The worst-case performance optimization-based robust adaptive beamformer (WCB) has been developed to solve this problem. However, the solution of WCB cannot be expressed in a closed form, ...
متن کاملAn Adaptive Learning Game for Autistic Children using Reinforcement Learning and Fuzzy Logic
This paper, presents an adapted serious game for rating social ability in children with autism spectrum disorder (ASD). The required measurements are obtained by challenges of the proposed serious game. The proposed serious game uses reinforcement learning concepts for being adaptive. It is based on fuzzy logic to evaluate the social ability level of the children with ASD. The game adapts itsel...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Operations Research
سال: 2022
ISSN: ['0305-0548', '1873-765X']
DOI: https://doi.org/10.1016/j.cor.2021.105558