2017
DOI: 10.1016/j.artint.2017.02.007
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial patrolling with spatially uncertain alarm signals

Abstract: When securing complex infrastructures or large environments, constant surveillance of every area is not affordable. To cope with this issue, a common countermeasure is the usage of cheap but wide-ranged sensors, able to detect suspicious events that occur in large areas, supporting patrollers to improve the effectiveness of their strategies. However, such sensors are commonly affected by uncertainty. In the present paper, we focus on spatially uncertain alarm signals. That is, the alarm system is able to detec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(25 citation statements)
references
References 27 publications
0
25
0
Order By: Relevance
“…Here the independent set is {1, 5, 9} , and the covering intervals are [1,3] , [4,6] and [7,9] , as shown in Figure 5. So the attacks are equiprobable on the independent set (denoted by x below) and the Patroller oscillates equiprobably on the three stated intervals.…”
Section: Proofmentioning
confidence: 99%
“…Here the independent set is {1, 5, 9} , and the covering intervals are [1,3] , [4,6] and [7,9] , as shown in Figure 5. So the attacks are equiprobable on the independent set (denoted by x below) and the Patroller oscillates equiprobably on the three stated intervals.…”
Section: Proofmentioning
confidence: 99%
“…[4] Algorithm multi-LP spatial branch-and-bound [6] multi-lex-MILP -optimistic version) in structured games where the action space is combinatorial. See [7] for more references.…”
Section: Previous Workmentioning
confidence: 99%
“…Notice that degenerate sets D p (a −n , a p ) play no role in Problem (7). This is because if D p (a −n , a p ) is degenerate, its constraint a n ∈A n U a −n ,a n p…”
Section: Theorem 5 Let ψ(Xmentioning
confidence: 99%
“…Due to the increasing threats of terroristic and criminal behaviors in the present world, researchers have developed lots of intelligent surveillance systems, such as suspect object tracking, intrusion detection, indoor security systems, traffic safety analysis, antisocial behavior analysis, and so on. The primary aim of these studies is to develop security system that can detect and predict the potential threats of objects being watched according to a large collection of meaningful events that are derived from sensory data of dispersed sources.…”
Section: Introductionmentioning
confidence: 99%