Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic review of optimization methods for recovery planning in cyber-physical infrastructure networks: Current state and future trends
Abstract Cyber-Physical Systems (CPS) are increasingly complex and frequently integrated
into modern societies via critical infrastructure systems, products, and services …
into modern societies via critical infrastructure systems, products, and services …
An exact method for binary fortification games
A fortification game (FG) is a three-level, two-player hierarchical game, also known as
defender-attacker-defender game, in which at the uppermost level, the defender selects …
defender-attacker-defender game, in which at the uppermost level, the defender selects …
Coordinated restoration of interdependent critical infrastructures: A novel distributed decision-making mechanism integrating optimization and reinforcement learning
The proper functioning of any society heavily depends on its critical infrastructures (CIs),
such as power grids, road networks, and water and waste-water systems. These …
such as power grids, road networks, and water and waste-water systems. These …
Modeling competitive-cooperative relationship between flood control and hydropower generation within hierarchical gaming structure of reservoir operation
X Wang, F Wu, T Hu, X Zeng, X Li, J Huang - Journal of Hydrology, 2023 - Elsevier
Quantifying the relationship between flood control and hydropower generation in reservoir
operation optimization is challenged by both institutional barriers and ill-posedness …
operation optimization is challenged by both institutional barriers and ill-posedness …
A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment
Q Li, M Li, Y Tian, J Gan - Reliability Engineering & System Safety, 2023 - Elsevier
This paper presents a risk-averse tri-level stochastic game-theoretic model between the
defender and the attacker in application to the supply networks. A real supposition is that the …
defender and the attacker in application to the supply networks. A real supposition is that the …
Shortest path network interdiction with incomplete information: a robust optimization approach
In this paper, we consider a shortest path network interdiction problem with incomplete
information and multiple levels of interdiction intensity. The evader knows the attacker's …
information and multiple levels of interdiction intensity. The evader knows the attacker's …
On the completeness of several fortification-interdiction games in the Polynomial Hierarchy
Fortification-interdiction games are tri-level adversarial games where two opponents act in
succession to protect, disrupt and simply use an infrastructure for a specific purpose. Many …
succession to protect, disrupt and simply use an infrastructure for a specific purpose. Many …
A quantified multi-stage optimization method for resource allocation of electric grid defense planning
Implicit enumeration (IE) and Column-and-Constraint Generation (CCG) are two commonly
used methods to solve the tri-level resource allocation of electric grid defense planning …
used methods to solve the tri-level resource allocation of electric grid defense planning …
A Subsidization Scheme for Maximizing Social Welfare in Mobile Communications Markets
In contemporary mobile communications markets, various agents or players interact to
pursue welfare. Regulatory policies enacted by governments in certain markets aim to …
pursue welfare. Regulatory policies enacted by governments in certain markets aim to …
Scalable Multi-Level optimization for Sequentially Cleared Energy Markets with a Case Study on Gas and Carbon Aware Unit Commitment
This paper examines Mixed-Integer Multi-Level problems with Sequential Followers
(MIMLSF), a specialized optimization model aimed at enhancing upper-level decision …
(MIMLSF), a specialized optimization model aimed at enhancing upper-level decision …