entropy-logo

Journal Browser

Journal Browser

Uncertainty Management in Intelligent Information Processing

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Multidisciplinary Applications".

Deadline for manuscript submissions: 15 August 2024 | Viewed by 1256

Special Issue Editors


E-Mail Website
Guest Editor
School of Microelectronics, Northwestern Polytechnical University, Xi’an 710072, China
Interests: intelligence information processing; intelligent control; information fusion; uncertainty measure; Dempster–Shafer evidence theory

E-Mail Website
Guest Editor
School of Microelectronics & School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
Interests: intelligent unmanned system and mission planning; complex system modeling and control; system simulation and evaluation; intelligence information processing

Special Issue Information

Dear Colleagues,

Uncertain information exists in practical applications such as complex systems, fuzzy systems, robotics systems, risk analysis, fault diagnosis, supplier selection, knowledge-based systems, pattern recognition, classification, clustering, healthcare, and multi-attribute decision-making. Uncertain information in a system or process can be classified as fuzzy information, probabilities and imprecise probabilities that can be represented by Bayesian methods, fuzzy sets, ambiguity information because of discord or non-specificity in semantic inconsistency and incomplete information in the open world assumption.

How to manage the uncertainty in practical applications while performing information processing is emphasized in this Special Issue. For learning about uncertainty, we may use active learning, representation learning, semi-supervised learning, classification, clustering, deep learning and so on. For the representation of uncertainty, we may use probability theory, imprecise probabilities, rough set theory, random set theory, imprecise set theory, Dempster–Shafer evidence theory, fuzzy sets theory and so on. For the measuring of uncertainty, we may use Shannon entropy theory, belief entropy theory and so on. For the fusion of uncertainty, we may use the weighted average method, Kalman filter method, Bayesian estimation method, production rule, Dempster combination rule and so on.

This Special Issue aims to provide a forum for communicating knowledge related to concepts, theories, models and methods regarding uncertainty management in wide areas of practical applications using intelligent information processing algorithms, theories and methods. Papers may discuss uncertainty representation, fusion, measure, and applications with intelligent information processing theories and methods in all areas.

Dr. Yongchuan Tang
Prof. Dr. Deyun Zhou
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • uncertainty measure
  • uncertainty management
  • uncertainty in artificial intelligence
  • intelligence information processing
  • intelligent control
  • information fusion
  • Bayesian methods
  • Monte Carlo methods
  • Dempster–Shafer evidence theory
  • fuzzy sets theory
  • entropy
  • belief entropy

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 3707 KiB  
Article
Modelling and Research on Intuitionistic Fuzzy Goal-Based Attack and Defence Game for Infrastructure Networks
by Zhe Li, Jin Liu, Yibo Dong, Jiaqi Ren and Weili Li
Entropy 2023, 25(11), 1558; https://doi.org/10.3390/e25111558 - 18 Nov 2023
Cited by 1 | Viewed by 970
Abstract
Network attack and defence games are gradually becoming a new approach through which to study the protection of infrastructure networks such as power grids and transportation networks. Uncertainty factors, such as the subjective decision preferences of attackers and defenders, are not considered in [...] Read more.
Network attack and defence games are gradually becoming a new approach through which to study the protection of infrastructure networks such as power grids and transportation networks. Uncertainty factors, such as the subjective decision preferences of attackers and defenders, are not considered in existing attack and defence game studies for infrastructure networks. In this paper, we introduce, respectively, the attacker’s and defender’s expectation value, rejection value, and hesitation degree of the target, as well as construct an intuitionistic fuzzy goal-based attack and defence game model for infrastructure networks that are based on the maximum connectivity slice size, which is a network performance index. The intuitionistic fuzzy two-player, zero-sum game model is converted into a linear programming problem for solving, and the results are analysed to verify the applicability and feasibility of the model proposed in this paper. Furthermore, different situations, such as single-round games and multi-round repeated games, are also considered. The experimental results show that, when attacking the network, the attacker rarely attacks the nodes with higher importance in the network, but instead pays more attention to the nodes that are not prominent in the network neutrality and median; meanwhile, the defender is more inclined to protect the more important nodes in the network to ensure the normal performance of the network. Full article
(This article belongs to the Special Issue Uncertainty Management in Intelligent Information Processing)
Show Figures

Figure 1

Back to TopTop