Targets-Attackers-Defender Games with Communication Topology

Jianan Wang, Zeyu Wang, Guilu Li, Li Liang*, Chunyan Wang, Jiayuan Shan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Fingerprint

Dive into the research topics of 'Targets-Attackers-Defender Games with Communication Topology'. Together they form a unique fingerprint.

Computer Science