Skip to main content

2020 | OriginalPaper | Buchkapitel

Developing Patrol Strategies for the Cooperative Opportunistic Criminals

verfasst von : Yanan Zhao, Mingchu Li, Cheng Guo

Erschienen in: Algorithms and Architectures for Parallel Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Stackelberg security game (SSG) has been widely used in counter-terrorism, but SSG is not suitable for modeling opportunistic crime because the criminals in opportunistic crime focus on real-time information. Hence, the opportunistic security game (OSG) model is proposed and applied in crime diffusion in recent years. However, previous OSG models do not consider that a criminal can cooperate with other criminals and this situation is very common in real life. Criminals can agree to attack the selected multiple targets simultaneously and share the utility. The police may be unable to decide which target to protect because multiple targets are attacked at the same time, so criminals can gain more utility through cooperation and interfere with police decisions. To overcome this limitation of previous OSG model, this paper makes the following contributions. Firstly, we propose a new security game framework COSG (Cooperative Opportunistic Security Game) which can capture bounded rationality of the adversaries in the cooperative opportunistic crime. Secondly, we use a compact form to solve the problem of crime diffusion in the cooperative opportunistic crime. Finally, extensive experiments to demonstrate the scalability and feasibility of our proposed approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abbasi, Y.D., Short, M., Sinha, A., Sintov, N., Zhang, C., Tambe, M.: Human numes in opportunistic crime security games: evaluating competing bounded rationality models. In: Proceedings of the Third Annual Conference on Advances in Cognitive Systems ACS (2015) Abbasi, Y.D., Short, M., Sinha, A., Sintov, N., Zhang, C., Tambe, M.: Human numes in opportunistic crime security games: evaluating competing bounded rationality models. In: Proceedings of the Third Annual Conference on Advances in Cognitive Systems ACS (2015)
2.
Zurück zum Zitat Abbasi, Y., et al.: Know your adversary: insights for a better adversarial behavioral model. In: CogSci (2016) Abbasi, Y., et al.: Know your adversary: insights for a better adversarial behavioral model. In: CogSci (2016)
3.
Zurück zum Zitat Bondi, E., Fang, F., Hamilton, M., Kar, D., Dmello, D., Choi, J., Nevatia, R.: Spot poachers in action: augmenting conservation drones with automatic detection in near real time. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018) Bondi, E., Fang, F., Hamilton, M., Kar, D., Dmello, D., Choi, J., Nevatia, R.: Spot poachers in action: augmenting conservation drones with automatic detection in near real time. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018)
4.
Zurück zum Zitat Fang, F., Stone, P., Tambe, M.: When security games go green: designing defender strategies to prevent poaching and illegal fishing. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015) Fang, F., Stone, P., Tambe, M.: When security games go green: designing defender strategies to prevent poaching and illegal fishing. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)
5.
Zurück zum Zitat Fang, F., Jiang, A.X., Tambe, M.: Optimal patrol strategy for protecting moving targets with multiple mobile resources. In: Proceedings of the 12th International Conference on Autonomous Agents and Multiagent Systems (2013)MathSciNetCrossRef Fang, F., Jiang, A.X., Tambe, M.: Optimal patrol strategy for protecting moving targets with multiple mobile resources. In: Proceedings of the 12th International Conference on Autonomous Agents and Multiagent Systems (2013)MathSciNetCrossRef
6.
Zurück zum Zitat Gholami, S., Zhang, C., Sinha, A., Tambe, M.: An extensive study of Dynamic Bayesian Network for patrol allocation against adaptive opportunistic criminals (2015) Gholami, S., Zhang, C., Sinha, A., Tambe, M.: An extensive study of Dynamic Bayesian Network for patrol allocation against adaptive opportunistic criminals (2015)
7.
Zurück zum Zitat Gholami, S., Wilder, B., Brown, M., Sinha, A., Sintov, N., Tambe, M.: A game theoretic approach on addressing cooperation among human adversaries. In: Proceedings of the 15th International Conference on Autonomous Agents and Multiagent Systems (2016) Gholami, S., Wilder, B., Brown, M., Sinha, A., Sintov, N., Tambe, M.: A game theoretic approach on addressing cooperation among human adversaries. In: Proceedings of the 15th International Conference on Autonomous Agents and Multiagent Systems (2016)
8.
Zurück zum Zitat Gurumurthy, S., et al.: Exploiting data and human knowledge for predicting wildlife poaching. In: In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (2018) Gurumurthy, S., et al.: Exploiting data and human knowledge for predicting wildlife poaching. In: In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (2018)
9.
Zurück zum Zitat Halvorson, E.D., Conitzer, V., Parr, R.: Multi-step multi-sensor hider-seeker games. In: Twenty-First International Joint Conference on Artificial Intelligence (2009) Halvorson, E.D., Conitzer, V., Parr, R.: Multi-step multi-sensor hider-seeker games. In: Twenty-First International Joint Conference on Artificial Intelligence (2009)
10.
Zurück zum Zitat Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica 47(2), 263–292 (1979)MathSciNetCrossRef Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica 47(2), 263–292 (1979)MathSciNetCrossRef
11.
Zurück zum Zitat Kar, D., et al.: Cloudy with a chance of poaching: adversary behavior modeling and forecasting with real-world poaching data. In: Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems (2017) Kar, D., et al.: Cloudy with a chance of poaching: adversary behavior modeling and forecasting with real-world poaching data. In: Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems (2017)
12.
Zurück zum Zitat Li, M., Cao, Y., Qiu, T.: Optimal patrol strategies against attacker’s persistent attack with multiple resources. In: IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (2017) Li, M., Cao, Y., Qiu, T.: Optimal patrol strategies against attacker’s persistent attack with multiple resources. In: IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (2017)
13.
Zurück zum Zitat Laan, C.M., Barros, A.I., Boucherie, R.J., Monsuur, H., Timmer, J.: Solving partially observable agent-intruder games with an application to border security problems. Naval Res. Logist. 66(2), 174–190 (2019)MathSciNetCrossRef Laan, C.M., Barros, A.I., Boucherie, R.J., Monsuur, H., Timmer, J.: Solving partially observable agent-intruder games with an application to border security problems. Naval Res. Logist. 66(2), 174–190 (2019)MathSciNetCrossRef
14.
Zurück zum Zitat McKelvey, R.D., Palfrey, T.R.: Quantal response equilibria for normal form games. Games Econ. Behav. 10(1), 6–38 (1995)MathSciNetCrossRef McKelvey, R.D., Palfrey, T.R.: Quantal response equilibria for normal form games. Games Econ. Behav. 10(1), 6–38 (1995)MathSciNetCrossRef
15.
Zurück zum Zitat Nguyen, T.H., Yang, R., Azaria, A., Kraus, S., Tambe, M.: Analyzing the effectiveness of adversary modeling in security games. In: Twenty-Seventh AAAI Conference on Artificial Intelligence (2013) Nguyen, T.H., Yang, R., Azaria, A., Kraus, S., Tambe, M.: Analyzing the effectiveness of adversary modeling in security games. In: Twenty-Seventh AAAI Conference on Artificial Intelligence (2013)
16.
Zurück zum Zitat Pita, J., Jain, M., Ordóñez, F., Tambe, M., Kraus, S., Magori-Cohen, R.: Effective solutions for real-world stackelberg games: when agents must deal with human uncertainties. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (2009) Pita, J., Jain, M., Ordóñez, F., Tambe, M., Kraus, S., Magori-Cohen, R.: Effective solutions for real-world stackelberg games: when agents must deal with human uncertainties. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (2009)
17.
Zurück zum Zitat Shieh, E., et al.: Protect: a deployed game theoretic system to protect the ports of the united states. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (2012) Shieh, E., et al.: Protect: a deployed game theoretic system to protect the ports of the united states. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (2012)
18.
Zurück zum Zitat Sinha, A., Fang, F., An, B., Kiekintveld, C., Tambe, M.: Stackelberg security games: looking beyond a decade of success. In: Twenty-Seventh International Joint Conference on Artificial Intelligence (2018) Sinha, A., Fang, F., An, B., Kiekintveld, C., Tambe, M.: Stackelberg security games: looking beyond a decade of success. In: Twenty-Seventh International Joint Conference on Artificial Intelligence (2018)
19.
Zurück zum Zitat Tsai, J., Kiekintveld, C., Ordonez, F., Tambe, M., Rathi, S.: IRIS-a tool for strategic security allocation in transportation networks (2009) Tsai, J., Kiekintveld, C., Ordonez, F., Tambe, M., Rathi, S.: IRIS-a tool for strategic security allocation in transportation networks (2009)
20.
Zurück zum Zitat Tayebi, M. A., Ester, M., Glässer, U., Brantingham, P. L.: Crimetracer: activity space based crime location prediction. In: Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (2014) Tayebi, M. A., Ester, M., Glässer, U., Brantingham, P. L.: Crimetracer: activity space based crime location prediction. In: Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (2014)
21.
Zurück zum Zitat Varakantham, P., Lau, H. C., Yuan, Z.: Scalable randomized patrolling for securing rapid transit networks. In: Twenty-Fifth IAAI Conference (2013) Varakantham, P., Lau, H. C., Yuan, Z.: Scalable randomized patrolling for securing rapid transit networks. In: Twenty-Fifth IAAI Conference (2013)
22.
Zurück zum Zitat Wang, X., An, B., Strobel, M., Kong, F.: Catching Captain Jack: Efficient time and space dependent patrols to combat oil-siphoning in international waters. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018) Wang, X., An, B., Strobel, M., Kong, F.: Catching Captain Jack: Efficient time and space dependent patrols to combat oil-siphoning in international waters. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018)
23.
Zurück zum Zitat Wang, B., Zhang, Y., Zhou, Z.H., Zhong, S.: On repeated stackelberg security game with the cooperative human behavior model for wildlife protection. Appl. Intell. 49(3), 1002–1015 (2019)CrossRef Wang, B., Zhang, Y., Zhou, Z.H., Zhong, S.: On repeated stackelberg security game with the cooperative human behavior model for wildlife protection. Appl. Intell. 49(3), 1002–1015 (2019)CrossRef
24.
Zurück zum Zitat Yin, Z., et al.: Trusts: scheduling randomized patrols for fare inspection in transit systems. In: Twenty-Fourth IAAI Conference (2012) Yin, Z., et al.: Trusts: scheduling randomized patrols for fare inspection in transit systems. In: Twenty-Fourth IAAI Conference (2012)
25.
Zurück zum Zitat Yang, R., Ford, B., Tambe, M., Lemieux, A.: Adaptive resource allocation for wildlife protection against illegal poachers. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015) Yang, R., Ford, B., Tambe, M., Lemieux, A.: Adaptive resource allocation for wildlife protection against illegal poachers. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)
26.
Zurück zum Zitat Yang, Z., Zhu, J., Teng, L., Xu, J., Zhu, Z.: A double oracle algorithm for allocating resources on nodes in graph-based security games. Multimedia Tools Appl. 77(9), 10961–10977 (2018)CrossRef Yang, Z., Zhu, J., Teng, L., Xu, J., Zhu, Z.: A double oracle algorithm for allocating resources on nodes in graph-based security games. Multimedia Tools Appl. 77(9), 10961–10977 (2018)CrossRef
27.
Zurück zum Zitat Zhang, C., Jiang, A.X., Short, M., Brantingham, P.J., Tambe, M.: Modeling Crime diffusion and crime suppression on transportation networks: an initial report. In: 2013 AAAI Fall Symposium Series (2013) Zhang, C., Jiang, A.X., Short, M., Brantingham, P.J., Tambe, M.: Modeling Crime diffusion and crime suppression on transportation networks: an initial report. In: 2013 AAAI Fall Symposium Series (2013)
28.
Zurück zum Zitat Zhang, C., Sinha, A., Tambe, M.: Keeping pace with criminals: Designing patrol allocation against adaptive opportunistic criminals. In: Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (2015) Zhang, C., Sinha, A., Tambe, M.: Keeping pace with criminals: Designing patrol allocation against adaptive opportunistic criminals. In: Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (2015)
Metadaten
Titel
Developing Patrol Strategies for the Cooperative Opportunistic Criminals
verfasst von
Yanan Zhao
Mingchu Li
Cheng Guo
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-38991-8_30