Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence 2017
DOI: 10.24963/ijcai.2017/550
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Escape Interdiction on Transportation Networks

Abstract: Preventing crimes or terrorist attacks in urban areas is challenging. Law enforcement officers need to respond quickly to catch the attacker on his escape route, which is subject to time-dependent traffic conditions on transportation networks. The attacker can strategically choose his escape path and driving speed to avoid being captured. Existing work on security resource allocation has not considered such scenarios with time-dependent strategies for both players. Therefore, in this paper, we study the proble… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(22 citation statements)
references
References 13 publications
0
22
0
Order By: Relevance
“…, mu. The adversary cannot see the defender until he gets caught (Jain et al 2011;Zhang et al 2017). Motivated by the fact that new pursuit technology can be used to provide real-time information about the adversary's whereabouts, the defender can observe the adversary's locations in real time.…”
Section: Problem Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…, mu. The adversary cannot see the defender until he gets caught (Jain et al 2011;Zhang et al 2017). Motivated by the fact that new pursuit technology can be used to provide real-time information about the adversary's whereabouts, the defender can observe the adversary's locations in real time.…”
Section: Problem Descriptionmentioning
confidence: 99%
“…By default, L " W " 5, pp, qq " p0.5, 0.1q, horizon t max " L, |V e | " 10, and m " 4. Solution Quality: We compare the solution quality of our approach (represented by IGRS++) with one baseline, the algorithm for the discussed network security game model (Jain et al 2011;Zhang et al 2017) considering timedependent strategies, denoted as NSG. Figures 2(a) and 2(b) vary parameters: (1) the number of intersections, denoted by LˆW , and (2) edge generation probabilities.…”
Section: Experimental Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…The solution concept of various equilibriums, such as the Nash equilibrium and strong Stackelberg equilibrium, can provide randomized mixed strategies to further increase the uncertainty the attacker faces. Our interdiction model is most similar to that of security games [40], where the defender allocates security resources strategically to protect targets against the adversary. Jain et al [41] presented a scalable optimal solution technique for network-based security domains based on a double-oracle frame.…”
Section: Related Workmentioning
confidence: 99%
“…Resource management, which is the efficient and effective management of an organization's resources and has been widely applied to different research topics such as defense of terrorist attacks [6], trust data sharing in edge computing [7], green services of content-centric IoT [8] and efficient job scheduling and energy-aware resource management in data center networks [9], [10], provides the cloud defender the inspiration to the development of an effective security resources allocation strategy that mitigates his total loss. As the APT campaign is time-continuous, the cloud defender also needs to take continuous actions.…”
Section: Figurementioning
confidence: 99%