Mixed Strategies for Security Games with General Defending Requirements

Authors: Rufan Bai, Haoxing Lin, Xinyu Yang, Xiaowei Wu, Minming Li, Weijia Jia

IJCAI 2022 | Conference PDF | Archive PDF | Plain Text | LLM Run Details

Reproducibility Variable Result LLM Response
Research Type Experimental Our experimental results demonstrate the effectiveness of our algorithm in several large real-world datasets.
Researcher Affiliation Academia Rufan Bai1 , Haoxing Lin2 , Xinyu Yang1 , Xiaowei Wu1 , Minming Li3 , Weijia Jia4 5 1 Io TSC, University of Macau 2 National University of Singapore 3 City University of Hong Kong 4 BNU-UIC 5 Beijing Normal University (Zhuhai)
Pseudocode Yes Algorithm 1 Patching, Algorithm 2 Find R
Open Source Code No The paper does not include an unambiguous statement or a direct link indicating that the source code for the described methodology is publicly available.
Open Datasets Yes All the datasets are downloaded from SNAP by Stanford [Leskovec and Krevl, 2014].
Dataset Splits No The paper describes the datasets used and how parameters for instances are set, but it does not provide specific details on train/validation/test dataset splits (e.g., percentages, sample counts, or references to predefined splits).
Hardware Specification No The paper does not explicitly describe the specific hardware (e.g., GPU/CPU models, memory) used to run the experiments.
Software Dependencies No The paper does not provide specific version numbers for any software components or libraries used (e.g., Python, PyTorch, or solvers).
Experiment Setup No The paper specifies parameters for generating dataset instances (e.g., values for αu, θu, wuv, and total resource R), but it does not provide explicit details on experimental setup for the algorithm's execution, such as hyperparameters (learning rate, batch size, epochs, optimizer settings) or system-level training settings.