Skip to main content

Developing Patrol Strategies for the Cooperative Opportunistic Criminals

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2019)

Abstract

Stackelberg security game (SSG) has been widely used in counter-terrorism, but SSG is not suitable for modeling opportunistic crime because the criminals in opportunistic crime focus on real-time information. Hence, the opportunistic security game (OSG) model is proposed and applied in crime diffusion in recent years. However, previous OSG models do not consider that a criminal can cooperate with other criminals and this situation is very common in real life. Criminals can agree to attack the selected multiple targets simultaneously and share the utility. The police may be unable to decide which target to protect because multiple targets are attacked at the same time, so criminals can gain more utility through cooperation and interfere with police decisions. To overcome this limitation of previous OSG model, this paper makes the following contributions. Firstly, we propose a new security game framework COSG (Cooperative Opportunistic Security Game) which can capture bounded rationality of the adversaries in the cooperative opportunistic crime. Secondly, we use a compact form to solve the problem of crime diffusion in the cooperative opportunistic crime. Finally, extensive experiments to demonstrate the scalability and feasibility of our proposed approach.

Supported by National Nature Science foundation of China under grant Nos: 61572095, 61877007.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abbasi, Y.D., Short, M., Sinha, A., Sintov, N., Zhang, C., Tambe, M.: Human numes in opportunistic crime security games: evaluating competing bounded rationality models. In: Proceedings of the Third Annual Conference on Advances in Cognitive Systems ACS (2015)

    Google Scholar 

  2. Abbasi, Y., et al.: Know your adversary: insights for a better adversarial behavioral model. In: CogSci (2016)

    Google Scholar 

  3. Bondi, E., Fang, F., Hamilton, M., Kar, D., Dmello, D., Choi, J., Nevatia, R.: Spot poachers in action: augmenting conservation drones with automatic detection in near real time. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018)

    Google Scholar 

  4. Fang, F., Stone, P., Tambe, M.: When security games go green: designing defender strategies to prevent poaching and illegal fishing. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)

    Google Scholar 

  5. Fang, F., Jiang, A.X., Tambe, M.: Optimal patrol strategy for protecting moving targets with multiple mobile resources. In: Proceedings of the 12th International Conference on Autonomous Agents and Multiagent Systems (2013)

    Article  MathSciNet  Google Scholar 

  6. Gholami, S., Zhang, C., Sinha, A., Tambe, M.: An extensive study of Dynamic Bayesian Network for patrol allocation against adaptive opportunistic criminals (2015)

    Google Scholar 

  7. Gholami, S., Wilder, B., Brown, M., Sinha, A., Sintov, N., Tambe, M.: A game theoretic approach on addressing cooperation among human adversaries. In: Proceedings of the 15th International Conference on Autonomous Agents and Multiagent Systems (2016)

    Google Scholar 

  8. Gurumurthy, S., et al.: Exploiting data and human knowledge for predicting wildlife poaching. In: In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (2018)

    Google Scholar 

  9. Halvorson, E.D., Conitzer, V., Parr, R.: Multi-step multi-sensor hider-seeker games. In: Twenty-First International Joint Conference on Artificial Intelligence (2009)

    Google Scholar 

  10. Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica 47(2), 263–292 (1979)

    Article  MathSciNet  Google Scholar 

  11. Kar, D., et al.: Cloudy with a chance of poaching: adversary behavior modeling and forecasting with real-world poaching data. In: Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems (2017)

    Google Scholar 

  12. Li, M., Cao, Y., Qiu, T.: Optimal patrol strategies against attacker’s persistent attack with multiple resources. In: IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (2017)

    Google Scholar 

  13. Laan, C.M., Barros, A.I., Boucherie, R.J., Monsuur, H., Timmer, J.: Solving partially observable agent-intruder games with an application to border security problems. Naval Res. Logist. 66(2), 174–190 (2019)

    Article  MathSciNet  Google Scholar 

  14. McKelvey, R.D., Palfrey, T.R.: Quantal response equilibria for normal form games. Games Econ. Behav. 10(1), 6–38 (1995)

    Article  MathSciNet  Google Scholar 

  15. Nguyen, T.H., Yang, R., Azaria, A., Kraus, S., Tambe, M.: Analyzing the effectiveness of adversary modeling in security games. In: Twenty-Seventh AAAI Conference on Artificial Intelligence (2013)

    Google Scholar 

  16. Pita, J., Jain, M., Ordóñez, F., Tambe, M., Kraus, S., Magori-Cohen, R.: Effective solutions for real-world stackelberg games: when agents must deal with human uncertainties. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (2009)

    Google Scholar 

  17. Shieh, E., et al.: Protect: a deployed game theoretic system to protect the ports of the united states. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (2012)

    Google Scholar 

  18. Sinha, A., Fang, F., An, B., Kiekintveld, C., Tambe, M.: Stackelberg security games: looking beyond a decade of success. In: Twenty-Seventh International Joint Conference on Artificial Intelligence (2018)

    Google Scholar 

  19. Tsai, J., Kiekintveld, C., Ordonez, F., Tambe, M., Rathi, S.: IRIS-a tool for strategic security allocation in transportation networks (2009)

    Google Scholar 

  20. Tayebi, M. A., Ester, M., Glässer, U., Brantingham, P. L.: Crimetracer: activity space based crime location prediction. In: Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (2014)

    Google Scholar 

  21. Varakantham, P., Lau, H. C., Yuan, Z.: Scalable randomized patrolling for securing rapid transit networks. In: Twenty-Fifth IAAI Conference (2013)

    Google Scholar 

  22. Wang, X., An, B., Strobel, M., Kong, F.: Catching Captain Jack: Efficient time and space dependent patrols to combat oil-siphoning in international waters. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018)

    Google Scholar 

  23. Wang, B., Zhang, Y., Zhou, Z.H., Zhong, S.: On repeated stackelberg security game with the cooperative human behavior model for wildlife protection. Appl. Intell. 49(3), 1002–1015 (2019)

    Article  Google Scholar 

  24. Yin, Z., et al.: Trusts: scheduling randomized patrols for fare inspection in transit systems. In: Twenty-Fourth IAAI Conference (2012)

    Google Scholar 

  25. Yang, R., Ford, B., Tambe, M., Lemieux, A.: Adaptive resource allocation for wildlife protection against illegal poachers. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)

    Google Scholar 

  26. Yang, Z., Zhu, J., Teng, L., Xu, J., Zhu, Z.: A double oracle algorithm for allocating resources on nodes in graph-based security games. Multimedia Tools Appl. 77(9), 10961–10977 (2018)

    Article  Google Scholar 

  27. Zhang, C., Jiang, A.X., Short, M., Brantingham, P.J., Tambe, M.: Modeling Crime diffusion and crime suppression on transportation networks: an initial report. In: 2013 AAAI Fall Symposium Series (2013)

    Google Scholar 

  28. Zhang, C., Sinha, A., Tambe, M.: Keeping pace with criminals: Designing patrol allocation against adaptive opportunistic criminals. In: Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingchu Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, Y., Li, M., Guo, C. (2020). Developing Patrol Strategies for the Cooperative Opportunistic Criminals. In: Wen, S., Zomaya, A., Yang, L. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2019. Lecture Notes in Computer Science(), vol 11944. Springer, Cham. https://doi.org/10.1007/978-3-030-38991-8_30

Download citation

Publish with us

Policies and ethics