COOPERATIVE CONTROL STRATEGIES AND DECEPTION IN ADVERSARIAL SYSTEMS
暂无分享,去创建一个
[1] T. Getty,et al. Cooperative nest defence in red–winged blackbirds: reciprocal altruism, kinship or by–product mutualism? , 2004, Proceedings of the Royal Society of London. Series B: Biological Sciences.
[2] Martin Shubik,et al. Systems Defense Games: Colonel Blotto, Command and Control , 1981 .
[3] Carlos Eduardo Pereira,et al. Coordinating Aerial Robots and Unattended Ground Sensors for Intelligent Surveillance Systems , 2010, Int. J. Comput. Commun. Control.
[4] Lawrence Freedman. The Problem of Strategy , 1980 .
[5] Huihui Jiang,et al. Modeling and control of military operations against adversarial control , 2000, Proceedings of the 39th IEEE Conference on Decision and Control (Cat. No.00CH37187).
[6] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[7] Tamer Basar,et al. Differential Games and Applications , 1989 .
[8] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[9] Pramod P. Khargonekar,et al. A sequential Colonel Blotto game with a sensor network , 2012, 2012 American Control Conference (ACC).
[10] Roger B. Myerson,et al. Game theory - Analysis of Conflict , 1991 .
[11] Pramod P. Khargonekar,et al. Games, deception, and Jones' Lemma , 2011, Proceedings of the 2011 American Control Conference.
[12] Eliot A. Cohen,et al. Fortitude: The D-Day Deception Campaign , 2000 .
[13] B. Roberson,et al. The non-constant-sum Colonel Blotto game , 2008, SSRN Electronic Journal.
[14] I. N. Katz,et al. Solution of a Differential Game Formulation of Military Air Operations by the Method of Characteristics , 2005 .
[15] K. N. Laland,et al. Social structure and co-operative interactions in a wild population of guppies (Poecilia reticulata) , 2006, Behavioral Ecology and Sociobiology.
[16] João Pedro Hespanha,et al. A cooperative homicidal chauffeur game , 2007, 2007 46th IEEE Conference on Decision and Control.
[17] Pramod P. Khargonekar,et al. Cooperative defense within a single-pursuer, two-evader pursuit evasion differential game , 2010, 49th IEEE Conference on Decision and Control (CDC).
[18] D. W. Blackett. Pure strategy solutions of blotto games , 1958 .
[19] M. Pachter,et al. A stochastic homicidal chauffeur pursuit-evasion differential game , 1981 .
[20] Michael R. Baye,et al. The all-pay auction with complete information , 1990 .
[21] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[22] Barton Whaley,et al. Stratagem: Deception and Surprise in War , 2007 .
[23] Robert Powell,et al. Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..
[24] M. Pachter,et al. Two-target pursuit-evasion differential games in the plane , 1981 .
[25] Joao P. Hespanha,et al. Deception in Non-Cooperative Games with Partial Information , 2000 .
[26] Singular Paths in Differential Games with Simple Motion , 1994 .
[27] Marc Quincampoix,et al. Some algorithms for differential games with two players and one target , 1994 .
[28] J. Lewin. Differential Games: Theory And Methods For Solving Game Problems With Singular Surfaces , 2011 .
[29] Bruce A. Conway,et al. Optimal Fighter Pursuit-Evasion Maneuvers Found via Two-Sided Optimization , 2006 .
[30] Gerardus Sierksma,et al. Linear and integer programming - theory and practice , 1999, Pure and applied mathematics.
[31] Tamer Basar,et al. Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).
[32] D. W. Blackett,et al. Some blotto games , 1954 .
[33] Bruce A. Conway,et al. Optimal Interception of Evasive Missile Warheads: Numerical Solution of the Differential Game , 2008 .
[34] P. Hagedorn,et al. Point capture of two evaders in succession , 1979 .
[35] Tamer Basar,et al. Secure communication for mobile agents in an adversarial environment , 2011, 14th International Conference on Information Fusion.
[36] Pramod P. Khargonekar,et al. Encouraging attacker retreat through defender cooperation , 2011, IEEE Conference on Decision and Control and European Control Conference.
[37] B. Roberson. The Colonel Blotto game , 2006 .
[38] Gerald G. Brown,et al. A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..
[39] L. Dugatkin,et al. Tit-For-Tat in guppies (Poecilia reticulata): the relative nature of cooperation and defection during predator inspection , 1991, Evolutionary Ecology.
[40] Pierre Bernhard,et al. Geometry of Optimal Paths around Focal Singular Surfaces in Differential Games , 2005 .
[41] Naira Hovakimyan,et al. Singular surfaces in multi-agent connectivity maintenance games , 2011, IEEE Conference on Decision and Control and European Control Conference.
[42] B. E. Wallacker,et al. Sun Tzu: The Art of War , 2008 .
[43] Mike Mesterton-Gibbons,et al. Neighbor intervention: a game-theoretic model. , 2009, Journal of theoretical biology.
[44] Ian L. Gale,et al. Caps on Political Lobbying , 1998 .
[45] A. W. Merz,et al. To pursue or to evade - That is the question , 1985 .
[46] S. Nowicki,et al. The Evolution of Animal Communication: Reliability and Deception in Signaling Systems: Reliability and Deception in Signaling Systems , 2005 .
[47] John K. Karlof,et al. Integer programming : theory and practice , 2005 .
[48] K. Buchanan. The Evolution of Animal Communication. Reliability and Deception in Signalling Systems, William A. Searcy, Stephen Nowicki. Princeton University Press, Princeton, New Jersey (2005), Pp xiv+270. Price £26.95 paperback , 2006 .
[49] S Bhattacharya,et al. Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.
[50] A I Houston,et al. Beyond the prisoner's dilemma: Toward models to discriminate among mechanisms of cooperation in nature. , 1992, Trends in ecology & evolution.
[51] Richard Bellman,et al. On “Colonel Blotto” and Analogous Games , 1969 .
[52] Rafael Murrieta-Cid,et al. Optimal Paths for Landmark-Based Navigation by Differential-Drive Vehicles With Field-of-View Constraints , 2007, IEEE Transactions on Robotics.
[53] Jose B. Cruz,et al. Information, decision-making and deception in games , 2009, Decis. Support Syst..
[54] Tamer Basar,et al. Game-theoretic analysis of a visibility based pursuit-evasion game in the presence of obstacles , 2009, 2009 American Control Conference.
[55] Bruce A. Conway,et al. Numerical Solution of the Three-Dimensional Orbital Pursuit-Evasion Game , 2009 .
[56] Antony W Merz,et al. The Homicidal Chauffeur - A Differential Game , 1971 .
[57] T. Başar,et al. Dynamic Noncooperative Game Theory, 2nd Edition , 1998 .
[58] Eitan Israeli,et al. Sowing Doubt Optimally in Two-Person Repeated Games , 1999 .
[59] Lee Alan Dugatkin. Cheating Monkeys and Citizen Bees: The Nature of Cooperation in Animals and Humans , 1999 .
[60] Marta B. Manser,et al. The function of mobbing in cooperative meerkats , 2007, Animal Behaviour.
[61] Pierre Bernhard,et al. Singular surfaces in differential games an introduction , 1977 .
[62] Rufus Isaacs,et al. Differential Games , 1965 .
[63] Michael Bennett,et al. Counterdeception Principles and Applications for National Security , 2007 .
[64] Debasish Ghose,et al. Modeling and analysis of air campaign resource allocation: a spatio-temporal decomposition approach , 2002, IEEE Trans. Syst. Man Cybern. Part A.
[65] Tamar Frankel. [The theory and the practice...]. , 2001, Tijdschrift voor diergeneeskunde.
[66] Giles. Sun Tzu On The Art Of War , 2013 .
[67] Tamer Basar,et al. Spatial approaches to broadband jamming in heterogeneous mobile networks: a game-theoretic approach , 2011, Auton. Robots.