Multi-Attacker Single-Defender Target Defense in Conical Environments Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2509.13564
We consider a variant of the target defense problem in a planar conical environment where a single defender is tasked to capture a sequence of incoming attackers. The attackers' objective is to breach the target boundary without being captured by the defender. As soon as the current attacker breaches the target or gets captured by the defender, the next attacker appears at the boundary of the environment and moves radially toward the target with maximum speed. Therefore, the defender's final location at the end of the current game becomes its initial location for the next game. The attackers pick strategies that are advantageous for the current as well as for future engagements between the defender and the remaining attackers. The attackers have their own sensors with limited range, using which they can perfectly detect if the defender is within their sensing range. We derive equilibrium strategies for all the players to optimize the capture percentage using the notions of capture distribution. Finally, the theoretical results are verified through numerical examples using Monte Carlo type random trials of experiments.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2509.13564
- https://arxiv.org/pdf/2509.13564
- OA Status
- green
- OpenAlex ID
- https://openalex.org/W4416254382
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4416254382Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2509.13564Digital Object Identifier
- Title
-
Multi-Attacker Single-Defender Target Defense in Conical EnvironmentsWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-09-16Full publication date if available
- Authors
-
Arman Pourghorban, Dilip Kumar MaityList of authors in order
- Landing page
-
https://arxiv.org/abs/2509.13564Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2509.13564Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2509.13564Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W4416254382 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2509.13564 |
| ids.doi | https://doi.org/10.48550/arxiv.2509.13564 |
| ids.openalex | https://openalex.org/W4416254382 |
| fwci | |
| type | preprint |
| title | Multi-Attacker Single-Defender Target Defense in Conical Environments |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2509.13564 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2509.13564 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2509.13564 |
| locations[1].id | doi:10.48550/arxiv.2509.13564 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2509.13564 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5084080781 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Arman Pourghorban |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Pourghorban, Arman |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5042246095 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-4284-3578 |
| authorships[1].author.display_name | Dilip Kumar Maity |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Maity, Dipankar |
| authorships[1].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2509.13564 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Multi-Attacker Single-Defender Target Defense in Conical Environments |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-28T09:29:00.767055 |
| primary_topic | |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2509.13564 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2509.13564 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2509.13564 |
| primary_location.id | pmh:oai:arXiv.org:2509.13564 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2509.13564 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2509.13564 |
| publication_date | 2025-09-16 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 2, 10, 15, 22 |
| abstract_inverted_index.As | 42 |
| abstract_inverted_index.We | 0, 142 |
| abstract_inverted_index.as | 44, 106, 108 |
| abstract_inverted_index.at | 61, 81 |
| abstract_inverted_index.by | 39, 54 |
| abstract_inverted_index.if | 134 |
| abstract_inverted_index.in | 9 |
| abstract_inverted_index.is | 18, 30, 137 |
| abstract_inverted_index.of | 4, 24, 64, 84, 158, 176 |
| abstract_inverted_index.or | 51 |
| abstract_inverted_index.to | 20, 31, 150 |
| abstract_inverted_index.The | 27, 96, 119 |
| abstract_inverted_index.all | 147 |
| abstract_inverted_index.and | 67, 115 |
| abstract_inverted_index.are | 101, 165 |
| abstract_inverted_index.can | 131 |
| abstract_inverted_index.end | 83 |
| abstract_inverted_index.for | 92, 103, 109, 146 |
| abstract_inverted_index.its | 89 |
| abstract_inverted_index.own | 123 |
| abstract_inverted_index.the | 5, 33, 40, 45, 49, 55, 57, 62, 65, 71, 77, 82, 85, 93, 104, 113, 116, 135, 148, 152, 156, 162 |
| abstract_inverted_index.game | 87 |
| abstract_inverted_index.gets | 52 |
| abstract_inverted_index.have | 121 |
| abstract_inverted_index.next | 58, 94 |
| abstract_inverted_index.pick | 98 |
| abstract_inverted_index.soon | 43 |
| abstract_inverted_index.that | 100 |
| abstract_inverted_index.they | 130 |
| abstract_inverted_index.type | 173 |
| abstract_inverted_index.well | 107 |
| abstract_inverted_index.with | 73, 125 |
| abstract_inverted_index.Carlo | 172 |
| abstract_inverted_index.Monte | 171 |
| abstract_inverted_index.being | 37 |
| abstract_inverted_index.final | 79 |
| abstract_inverted_index.game. | 95 |
| abstract_inverted_index.moves | 68 |
| abstract_inverted_index.their | 122, 139 |
| abstract_inverted_index.using | 128, 155, 170 |
| abstract_inverted_index.where | 14 |
| abstract_inverted_index.which | 129 |
| abstract_inverted_index.breach | 32 |
| abstract_inverted_index.derive | 143 |
| abstract_inverted_index.detect | 133 |
| abstract_inverted_index.future | 110 |
| abstract_inverted_index.planar | 11 |
| abstract_inverted_index.random | 174 |
| abstract_inverted_index.range, | 127 |
| abstract_inverted_index.range. | 141 |
| abstract_inverted_index.single | 16 |
| abstract_inverted_index.speed. | 75 |
| abstract_inverted_index.target | 6, 34, 50, 72 |
| abstract_inverted_index.tasked | 19 |
| abstract_inverted_index.toward | 70 |
| abstract_inverted_index.trials | 175 |
| abstract_inverted_index.within | 138 |
| abstract_inverted_index.appears | 60 |
| abstract_inverted_index.becomes | 88 |
| abstract_inverted_index.between | 112 |
| abstract_inverted_index.capture | 21, 153, 159 |
| abstract_inverted_index.conical | 12 |
| abstract_inverted_index.current | 46, 86, 105 |
| abstract_inverted_index.defense | 7 |
| abstract_inverted_index.initial | 90 |
| abstract_inverted_index.limited | 126 |
| abstract_inverted_index.maximum | 74 |
| abstract_inverted_index.notions | 157 |
| abstract_inverted_index.players | 149 |
| abstract_inverted_index.problem | 8 |
| abstract_inverted_index.results | 164 |
| abstract_inverted_index.sensing | 140 |
| abstract_inverted_index.sensors | 124 |
| abstract_inverted_index.through | 167 |
| abstract_inverted_index.variant | 3 |
| abstract_inverted_index.without | 36 |
| abstract_inverted_index.Finally, | 161 |
| abstract_inverted_index.attacker | 47, 59 |
| abstract_inverted_index.boundary | 35, 63 |
| abstract_inverted_index.breaches | 48 |
| abstract_inverted_index.captured | 38, 53 |
| abstract_inverted_index.consider | 1 |
| abstract_inverted_index.defender | 17, 114, 136 |
| abstract_inverted_index.examples | 169 |
| abstract_inverted_index.incoming | 25 |
| abstract_inverted_index.location | 80, 91 |
| abstract_inverted_index.optimize | 151 |
| abstract_inverted_index.radially | 69 |
| abstract_inverted_index.sequence | 23 |
| abstract_inverted_index.verified | 166 |
| abstract_inverted_index.attackers | 97, 120 |
| abstract_inverted_index.defender, | 56 |
| abstract_inverted_index.defender. | 41 |
| abstract_inverted_index.numerical | 168 |
| abstract_inverted_index.objective | 29 |
| abstract_inverted_index.perfectly | 132 |
| abstract_inverted_index.remaining | 117 |
| abstract_inverted_index.Therefore, | 76 |
| abstract_inverted_index.attackers' | 28 |
| abstract_inverted_index.attackers. | 26, 118 |
| abstract_inverted_index.defender's | 78 |
| abstract_inverted_index.percentage | 154 |
| abstract_inverted_index.strategies | 99, 145 |
| abstract_inverted_index.engagements | 111 |
| abstract_inverted_index.environment | 13, 66 |
| abstract_inverted_index.equilibrium | 144 |
| abstract_inverted_index.theoretical | 163 |
| abstract_inverted_index.advantageous | 102 |
| abstract_inverted_index.experiments. | 177 |
| abstract_inverted_index.distribution. | 160 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile |