Abstract
Stackelberg security game (SSG) has been widely used in counter-terrorism, but SSG is not suitable for modeling opportunistic crime because the criminals in opportunistic crime focus on real-time information. Hence, the opportunistic security game (OSG) model is proposed and applied in crime diffusion in recent years. However, previous OSG models do not consider that a criminal can cooperate with other criminals and this situation is very common in real life. Criminals can agree to attack the selected multiple targets simultaneously and share the utility. The police may be unable to decide which target to protect because multiple targets are attacked at the same time, so criminals can gain more utility through cooperation and interfere with police decisions. To overcome this limitation of previous OSG model, this paper makes the following contributions. Firstly, we propose a new security game framework COSG (Cooperative Opportunistic Security Game) which can capture bounded rationality of the adversaries in the cooperative opportunistic crime. Secondly, we use a compact form to solve the problem of crime diffusion in the cooperative opportunistic crime. Finally, extensive experiments to demonstrate the scalability and feasibility of our proposed approach.
Supported by National Nature Science foundation of China under grant Nos: 61572095, 61877007.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abbasi, Y.D., Short, M., Sinha, A., Sintov, N., Zhang, C., Tambe, M.: Human numes in opportunistic crime security games: evaluating competing bounded rationality models. In: Proceedings of the Third Annual Conference on Advances in Cognitive Systems ACS (2015)
Abbasi, Y., et al.: Know your adversary: insights for a better adversarial behavioral model. In: CogSci (2016)
Bondi, E., Fang, F., Hamilton, M., Kar, D., Dmello, D., Choi, J., Nevatia, R.: Spot poachers in action: augmenting conservation drones with automatic detection in near real time. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018)
Fang, F., Stone, P., Tambe, M.: When security games go green: designing defender strategies to prevent poaching and illegal fishing. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)
Fang, F., Jiang, A.X., Tambe, M.: Optimal patrol strategy for protecting moving targets with multiple mobile resources. In: Proceedings of the 12th International Conference on Autonomous Agents and Multiagent Systems (2013)
Gholami, S., Zhang, C., Sinha, A., Tambe, M.: An extensive study of Dynamic Bayesian Network for patrol allocation against adaptive opportunistic criminals (2015)
Gholami, S., Wilder, B., Brown, M., Sinha, A., Sintov, N., Tambe, M.: A game theoretic approach on addressing cooperation among human adversaries. In: Proceedings of the 15th International Conference on Autonomous Agents and Multiagent Systems (2016)
Gurumurthy, S., et al.: Exploiting data and human knowledge for predicting wildlife poaching. In: In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (2018)
Halvorson, E.D., Conitzer, V., Parr, R.: Multi-step multi-sensor hider-seeker games. In: Twenty-First International Joint Conference on Artificial Intelligence (2009)
Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica 47(2), 263–292 (1979)
Kar, D., et al.: Cloudy with a chance of poaching: adversary behavior modeling and forecasting with real-world poaching data. In: Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems (2017)
Li, M., Cao, Y., Qiu, T.: Optimal patrol strategies against attacker’s persistent attack with multiple resources. In: IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (2017)
Laan, C.M., Barros, A.I., Boucherie, R.J., Monsuur, H., Timmer, J.: Solving partially observable agent-intruder games with an application to border security problems. Naval Res. Logist. 66(2), 174–190 (2019)
McKelvey, R.D., Palfrey, T.R.: Quantal response equilibria for normal form games. Games Econ. Behav. 10(1), 6–38 (1995)
Nguyen, T.H., Yang, R., Azaria, A., Kraus, S., Tambe, M.: Analyzing the effectiveness of adversary modeling in security games. In: Twenty-Seventh AAAI Conference on Artificial Intelligence (2013)
Pita, J., Jain, M., Ordóñez, F., Tambe, M., Kraus, S., Magori-Cohen, R.: Effective solutions for real-world stackelberg games: when agents must deal with human uncertainties. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (2009)
Shieh, E., et al.: Protect: a deployed game theoretic system to protect the ports of the united states. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (2012)
Sinha, A., Fang, F., An, B., Kiekintveld, C., Tambe, M.: Stackelberg security games: looking beyond a decade of success. In: Twenty-Seventh International Joint Conference on Artificial Intelligence (2018)
Tsai, J., Kiekintveld, C., Ordonez, F., Tambe, M., Rathi, S.: IRIS-a tool for strategic security allocation in transportation networks (2009)
Tayebi, M. A., Ester, M., Glässer, U., Brantingham, P. L.: Crimetracer: activity space based crime location prediction. In: Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (2014)
Varakantham, P., Lau, H. C., Yuan, Z.: Scalable randomized patrolling for securing rapid transit networks. In: Twenty-Fifth IAAI Conference (2013)
Wang, X., An, B., Strobel, M., Kong, F.: Catching Captain Jack: Efficient time and space dependent patrols to combat oil-siphoning in international waters. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018)
Wang, B., Zhang, Y., Zhou, Z.H., Zhong, S.: On repeated stackelberg security game with the cooperative human behavior model for wildlife protection. Appl. Intell. 49(3), 1002–1015 (2019)
Yin, Z., et al.: Trusts: scheduling randomized patrols for fare inspection in transit systems. In: Twenty-Fourth IAAI Conference (2012)
Yang, R., Ford, B., Tambe, M., Lemieux, A.: Adaptive resource allocation for wildlife protection against illegal poachers. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)
Yang, Z., Zhu, J., Teng, L., Xu, J., Zhu, Z.: A double oracle algorithm for allocating resources on nodes in graph-based security games. Multimedia Tools Appl. 77(9), 10961–10977 (2018)
Zhang, C., Jiang, A.X., Short, M., Brantingham, P.J., Tambe, M.: Modeling Crime diffusion and crime suppression on transportation networks: an initial report. In: 2013 AAAI Fall Symposium Series (2013)
Zhang, C., Sinha, A., Tambe, M.: Keeping pace with criminals: Designing patrol allocation against adaptive opportunistic criminals. In: Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhao, Y., Li, M., Guo, C. (2020). Developing Patrol Strategies for the Cooperative Opportunistic Criminals. In: Wen, S., Zomaya, A., Yang, L. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2019. Lecture Notes in Computer Science(), vol 11944. Springer, Cham. https://doi.org/10.1007/978-3-030-38991-8_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-38991-8_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38990-1
Online ISBN: 978-3-030-38991-8
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)