2023
DOI: 10.23919/jsee.2023.000022
|View full text |Cite
|
Sign up to set email alerts
|

A multi-UAV deployment method for border patrolling based on Stackelberg game

Abstract: To strengthen border patrol measures, unmanned aerial vehicles (UAVs) are gradually used in many countries to detect illegal entries on borders. However, how to efficiently deploy limited UAVs to patrol on borders of large areas remains challenging. In this paper, we first model the problem of deploying UAVs for border patrol as a Stackelberg game. Two players are considered in this game: The border patrol agency is the leader, who optimizes the patrol path of UAVs to detect the illegal immigrant. The illegal … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…Some other research studied a similar energy-efficient coverage problem with traditional UAVs, which can guide future research in this area. The paper [106] addresses the efficient deployment of UAVs for border patrol to detect illegal entries. It formulates the problem as a Stackelberg game with two players: the border patrol agency (leader) and the illegal immigrant (follower).…”
Section: Coverage Deployment For Suavsmentioning
confidence: 99%
“…Some other research studied a similar energy-efficient coverage problem with traditional UAVs, which can guide future research in this area. The paper [106] addresses the efficient deployment of UAVs for border patrol to detect illegal entries. It formulates the problem as a Stackelberg game with two players: the border patrol agency (leader) and the illegal immigrant (follower).…”
Section: Coverage Deployment For Suavsmentioning
confidence: 99%
“…5,6,16,17 In particular, zero-sum Stackelberg games model scenarios in which patrollers must commit to a patrolling strategy that is resistant to attacks even when the intruder is able to learn their strategies perfectly, and have enjoyed wide adoption in adversarial patrolling. 5,[16][17][18] In this work, we also assume that the intruder has access to patrollers' strategies and is able to optimize its attack against them. We expand on previous approaches, however, in two ways.…”
Section: Related Workmentioning
confidence: 99%
“…Another variety of problem is where the aim is to control a perimeter and deny entrance to intruders. 18,22 In this case, the motion of the patroller is constrained to be along the perimeter. In contrast to these prior works, we consider the fully general case of both patrollers and intruders moving on arbitrarily connected graphs.…”
Section: Related Workmentioning
confidence: 99%