Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/3172077.3172439guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Optimal escape interdiction on transportation networks

Published: 19 August 2017 Publication History

Abstract

Preventing crimes or terrorist attacks in urban areas is challenging. Law enforcement officers need to respond quickly to catch the attacker on his escape route, which is subject to time-dependent traffic conditions on transportation networks. The attacker can strategically choose his escape path and driving speed to avoid being captured. Existing work on security resource allocation has not considered such scenarios with time-dependent strategies for both players. Therefore, in this paper, we study the problem of efficiently scheduling security resources for interdicting the escaping attacker. We propose: 1) a new defender-attacker security game model for escape interdiction on transportation networks; and 2) an efficient double oracle algorithm to compute the optimal defender strategy, which combines mixed-integer linear programming formulations for best response problems and effective approximation algorithms for improving the scalability of the algorithms. Experimental evaluation shows that our approach significantly outperforms baselines in solution quality and scales up to realistic-sized transportation networks with hundreds of intersections.

References

[1]
Konstantinos Aboudolas, Markos Papageorgiou, and Elias B. Kosmatopoulos. Store-and-forward based methods for the signal control problem in large-scale congested urban road networks. Transportation Research Part C: Emerging Technologies , 17(2):163 -174, 2009.
[2]
Micah Adler, Harald Räcke, Naveen Sivadasan, Christian Sohler, and Berthold Vöcking. Randomized pursuit-evasion in graphs. In ICALP , pages 901- 912, 2002.
[3]
Nicola Basilico, Nicola Gatti, and Francesco Amigoni. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In AAMAS , pages 57-64, 2009.
[4]
Avrim Blum, Nika Haghtalab, and Ariel D Procaccia. Learning optimal commitment to overcome insecurity. In NIPS , pages 1826-1834, 2014.
[5]
S. Coogan and M. Arcak. A compartmental model for traffic networks and its dynamical behavior. IEEE Transactions on Automatic Control , 60(10):2698-2703, 2015.
[6]
Carlos F. Daganzo. The cell transmission model: A dynamic representation of highway traffic consistent with the hydrodynamic theory. Transportation Research Part B: Methodological , 28(4):269-287, 1994.
[7]
Carlos F. Daganzo. The cell transmission model, part II: Network traffic. Transportation Research Part B: Methodological , 29(2):79-93, 1995.
[8]
Fei Fang, Thanh Hong Nguyen, Rob Pickles, Wai Y Lam, Gopalasamy R Clements, Bo An, Amandeep Singh, Milind Tambe, and Andrew Lemieux. Deploying PAWS: Field optimization of the protection assistant for wildlife security. In IAAI , pages 3966-3973, 2016.
[9]
Qingyu Guo, Bo An, Yair Zick, and Chunyan Miao. Optimal interdiction of illegal network flow. In IJCAI , pages 2507-2513, 2016.
[10]
Hiroaki Iwashita, Kotaro Ohori, Hirokazu Anai, and Atsushi Iwasaki. Simplifying urban network security games with cut-based graph contraction. In AAMAS , pages 205-213, 2016.
[11]
Manish Jain, Dmytro Korzhyk, Ondrej Vanek, Vincent Conitzer, Michal Pechouček, and Milind Tambe. A double oracle algorithm for zero-sum security games on graphs. In AAMAS , pages 327-334, 2011.
[12]
Manish Jain, Kevin Leyton-Brown, and Milind Tambe. The deployment-to-saturation ratio in security games. In AAAI , pages 1362-1370, 2012.
[13]
Manish Jain, Vincent Conitzer, and Milind Tambe. Security scheduling for real-world networks. In AAMAS , pages 215-222, 2013.
[14]
Jean-Patrick Lebacque. Intersection modeling, application to macroscopic network traffic flow models and traffic management. In Traffic and Granular Flow'03 , pages 261-278. 2005.
[15]
Joshua Letchford and Vincent Conitzer. Solving security games on graphs via marginal probabilities. In AAAI , pages 591-597, 2013.
[16]
Traffic Assignment Manual. Bureau of public roads. US Department of Commerce , 1964.
[17]
Richard Nowakowski and Peter Winkler. Vertex-to-vertex pursuit in a graph. Discrete Mathematics , 43(2):235-239, 1983.
[18]
Wei Peng, Guohua Dong, Kun Yang, and Jinshu Su. A random road network model and its effects on topological characteristics of mobile delay-tolerant networks. IEEE Transactions on Mobile Computing , 13(12):2706-2718, 2014.
[19]
Eric Shieh, Bo An, Rong Yang, Milind Tambe, Ben Maule, and Garrett Meyer. PROTECT: An application of computational game theory for the security of the ports of the United States. In AAAI , pages 2173- 2179, 2012.
[20]
Alexander Skabardonis and Richard Dowling. Improved speed-flow relationships for planning applications. Transportation Research Record: Journal of the Transportation Research Board , 1572:18-23, 1997.
[21]
Milind Tambe. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned . Cambridge University Press, 2011.
[22]
Jason Tsai, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld, and Milind Tambe. Urban security: Game-theoretic resource allocation in networked physical domains. In AAAI , pages 881- 886, 2010.
[23]
Yevgeniy Vorobeychik, Bo An, Milind Tambe, and Satinder P. Singh. Computing solutions in infinite-horizon discounted adversarial patrolling games. In ICAPS , pages 314-322, 2014.
[24]
Zhen Wang, Yue Yin, and Bo An. Computing optimal monitoring strategy for detecting terrorist plots. In AAAI , pages 637-643, 2016.
[25]
Alan Washburn and Kevin Wood. Two-person zero-sum games for network interdiction. Operations Research , 43(2):243-251, 1995.
[26]
Yue Yin, Bo An, and Manish Jain. Game-theoretic resource allocation for protecting large public events. In AAAI , pages 826-834, 2014.
[27]
Yue Yin, Haifeng Xu, Jiarui Gan, Bo An, and Albert Xin Jiang. Computing optimal mixed strategies for security games with dynamic payoffs. In IJCAI , pages 681-687, 2015.
[28]
Mengchen Zhao, Bo An, and Christopher Kiekintveld. Optimizing personalized email filtering thresholds to mitigate sequential spear phishing attacks. In AAAI , pages 658-665, 2016.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
IJCAI'17: Proceedings of the 26th International Joint Conference on Artificial Intelligence
August 2017
5253 pages
ISBN:9780999241103

Sponsors

  • Australian Comp Soc: Australian Computer Society
  • NSF: National Science Foundation
  • Griffith University
  • University of Technology Sydney
  • AI Journal: AI Journal

Publisher

AAAI Press

Publication History

Published: 19 August 2017

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media