Better Prevent than Tackle: Valuing Defense in Soccer Based on Graph Neural Networks
- URL: http://arxiv.org/abs/2512.10355v1
- Date: Thu, 11 Dec 2025 07:12:23 GMT
- Title: Better Prevent than Tackle: Valuing Defense in Soccer Based on Graph Neural Networks
- Authors: Hyunsung Kim, Sangwoo Seo, Hoyoung Choi, Tom Boomstra, Jinsung Yoon, Chanyoung Park,
- Abstract summary: DEFCON (DEFensive CONtribution evaluator) is a framework that quantifies player-level defensive contributions for every attacking situation in soccer.<n>DEFCON estimates the success probability and expected value of each attacking option, along with each defender's responsibility for stopping it.<n>It assigns positive or negative credits to defenders according to whether they reduced or increased the opponent's Expected Possession Value.
- Score: 22.27208191198993
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Evaluating defensive performance in soccer remains challenging, as effective defending is often expressed not through visible on-ball actions such as interceptions and tackles, but through preventing dangerous opportunities before they arise. Existing approaches have largely focused on valuing on-ball actions, leaving much of defenders' true impact unmeasured. To address this gap, we propose DEFCON (DEFensive CONtribution evaluator), a comprehensive framework that quantifies player-level defensive contributions for every attacking situation in soccer. Leveraging Graph Attention Networks, DEFCON estimates the success probability and expected value of each attacking option, along with each defender's responsibility for stopping it. These components yield an Expected Possession Value (EPV) for the attacking team before and after each action, and DEFCON assigns positive or negative credits to defenders according to whether they reduced or increased the opponent's EPV. Trained on 2023-24 and evaluated on 2024-25 Eredivisie event and tracking data, DEFCON's aggregated player credits exhibit strong positive correlations with market valuations. Finally, we showcase several practical applications, including in-game timelines of defensive contributions, spatial analyses across pitch zones, and pairwise summaries of attacker-defender interactions.
Related papers
- A Machine Learning Framework for Off Ball Defensive Role and Performance Evaluation in Football [3.418921713486739]
We introduce a co-dependent Hidden Markov Model (CDHMM) tailored to corner kicks in football games.<n>Our model infers time-resolved man-marking and zonal assignments directly from player tracking data.<n>We propose a novel framework for defensive credit attribution and a role-conditioned ghosting method for counterfactual analysis of off-ball defensive performance.
arXiv Detail & Related papers (2026-01-02T17:10:36Z) - Attacking and Securing Community Detection: A Game-Theoretic Framework [22.20017945724223]
adversarial graphs can cause deep graph models to fail on classification tasks.<n>We propose novel attack and defense techniques for community detection problem.<n>These techniques have many applications in real-world scenarios, for example, protecting personal privacy in social networks.
arXiv Detail & Related papers (2025-12-12T08:17:33Z) - Prediction-based evaluation of back-four defense with spatial control in soccer [3.9252515141417756]
The study introduces interpretable indicators namely, space control, stretch index, pressure index, and defensive line height.<n>2,413 defensive sequences were analyzed following possession losses by FC Barcelona and Real Madrid.<n>Barcelona's success was characterized by higher spatial control and compact line coordination, whereas Real Madrid exhibited more adaptive but less consistent defensive structures.
arXiv Detail & Related papers (2025-11-09T02:33:11Z) - The Attacker Moves Second: Stronger Adaptive Attacks Bypass Defenses Against Llm Jailbreaks and Prompt Injections [74.60337113759313]
Current defenses against jailbreaks and prompt injections are typically evaluated against a static set of harmful attack strings.<n>We argue that this evaluation process is flawed. Instead, we should evaluate defenses against adaptive attackers who explicitly modify their attack strategy to counter a defense's design.
arXiv Detail & Related papers (2025-10-10T05:51:04Z) - Chasing Moving Targets with Online Self-Play Reinforcement Learning for Safer Language Models [64.47869632167284]
Conventional language model (LM) safety alignment relies on a reactive, disjoint procedure: attackers exploit a static model, followed by defensive fine-tuning to patch exposed vulnerabilities.<n>This sequential approach creates a mismatch -- attackers overfit to obsolete defenses, while defenders perpetually lag behind emerging threats.<n>We propose Self-RedTeam, an online self-play reinforcement learning algorithm where an attacker and defender agent co-evolve through continuous interaction.
arXiv Detail & Related papers (2025-06-09T06:35:12Z) - A Quantal Response Analysis of Defender-Attacker Sequential Security Games [1.3022753212679383]
We explore a scenario involving two sites and a sequential game between a defender and an attacker.
The attacker's objective is to target the site that maximizes the expected loss for the defender, taking into account the defender's security investments.
We consider quantal behavioral bias, where humans make errors in selecting efficient (pure) strategies.
arXiv Detail & Related papers (2024-08-02T00:40:48Z) - Cooperation or Competition: Avoiding Player Domination for Multi-Target
Robustness via Adaptive Budgets [76.20705291443208]
We view adversarial attacks as a bargaining game in which different players negotiate to reach an agreement on a joint direction of parameter updating.
We design a novel framework that adjusts the budgets of different adversaries to avoid any player dominance.
Experiments on standard benchmarks show that employing the proposed framework to the existing approaches significantly advances multi-target robustness.
arXiv Detail & Related papers (2023-06-27T14:02:10Z) - Adversarial Machine Learning and Defense Game for NextG Signal
Classification with Deep Learning [1.1726528038065764]
NextG systems can employ deep neural networks (DNNs) for various tasks such as user equipment identification, physical layer authentication, and detection of incumbent users.
This paper presents a game-theoretic framework to study the interactions of attack and defense for deep learning-based NextG signal classification.
arXiv Detail & Related papers (2022-12-22T15:13:03Z) - Vision-based Perimeter Defense via Multiview Pose Estimation [23.62649649982264]
We study the perimeter defense game in a photo-realistic simulator and the real world.
We train a deep machine learning-based system for intruder pose detection with domain randomization.
We newly introduce performance metrics to evaluate the vision-based perimeter defense.
arXiv Detail & Related papers (2022-09-25T03:41:45Z) - What Happened Next? Using Deep Learning to Value Defensive Actions in
Football Event-Data [1.290382979353427]
We use deep learning techniques to define a novel metric that values such defensive actions.
By studying the threat of passages of play that preceded them, we are able to value defensive actions.
Our model is able to predict the impact of defensive defenders using event-data.
arXiv Detail & Related papers (2021-06-03T12:18:26Z) - Improving the Adversarial Robustness for Speaker Verification by Self-Supervised Learning [95.60856995067083]
This work is among the first to perform adversarial defense for ASV without knowing the specific attack algorithms.
We propose to perform adversarial defense from two perspectives: 1) adversarial perturbation purification and 2) adversarial perturbation detection.
Experimental results show that our detection module effectively shields the ASV by detecting adversarial samples with an accuracy of around 80%.
arXiv Detail & Related papers (2021-06-01T07:10:54Z) - Guided Adversarial Attack for Evaluating and Enhancing Adversarial
Defenses [59.58128343334556]
We introduce a relaxation term to the standard loss, that finds more suitable gradient-directions, increases attack efficacy and leads to more efficient adversarial training.
We propose Guided Adversarial Margin Attack (GAMA), which utilizes function mapping of the clean image to guide the generation of adversaries.
We also propose Guided Adversarial Training (GAT), which achieves state-of-the-art performance amongst single-step defenses.
arXiv Detail & Related papers (2020-11-30T16:39:39Z) - Reliable evaluation of adversarial robustness with an ensemble of
diverse parameter-free attacks [65.20660287833537]
In this paper we propose two extensions of the PGD-attack overcoming failures due to suboptimal step size and problems of the objective function.
We then combine our novel attacks with two complementary existing ones to form a parameter-free, computationally affordable and user-independent ensemble of attacks to test adversarial robustness.
arXiv Detail & Related papers (2020-03-03T18:15:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.