Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/84604
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGuo, Qingyuen
dc.contributor.authorZick, Yairen
dc.contributor.authorMiao, Chunyanen
dc.contributor.authorAn, Boen
dc.date.accessioned2016-12-16T04:14:06Zen
dc.date.accessioned2019-12-06T15:48:10Z-
dc.date.available2016-12-16T04:14:06Zen
dc.date.available2019-12-06T15:48:10Z-
dc.date.issued2016en
dc.identifier.citationGuo, Q., An, B., Zick, Y., & Miao, C. (2016). Optimal Interdiction of Illegal Network Flow. Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16), 2507-2513.en
dc.identifier.urihttps://hdl.handle.net/10356/84604-
dc.description.abstractLarge scale smuggling of illegal goods is a longstanding problem, with $1.4b and thousands of agents assigned to protect the borders from such activity in the US-Mexico border alone. Illegal smuggling activities are usually blocked via inspection stations or ad-hoc checkpoints/roadblocks. Security resources are insufficient to man all stations at all times; furthermore, smugglers regularly conduct surveillance activities. This paper makes several contributions toward the challenging task of optimally interdicting an illegal network flow: i) A new Stackelberg game model for network flow interdiction; ii) A novel Column and Constraint Generation approach for computing the optimal defender strategy; iii) Complexity analysis of the column generation subproblem; iv) Compact convex nonlinear programs for solving the subproblems; v) Novel greedy and heuristic approaches for subproblems with good approximation guarantee. Experimental evaluation shows that our approach can obtain a robust enough solution outperforming the existing methods and heuristic baselines significantly and scale up to realistic-sized problems.en
dc.description.sponsorshipNRF (Natl Research Foundation, S’pore)en
dc.format.extent7 p.en
dc.language.isoenen
dc.rights© 2016 International Joint Conferences on Artificial Intelligence. This paper was published in Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16) and is made available as an electronic reprint (preprint) with permission of IJCAI. The published version is available at: [http://www.ijcai.org/Abstract/16/357]. One print or electronic copy may be made for personal use only. Systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper is prohibited and is subject to penalties under law.en
dc.titleOptimal Interdiction of Illegal Network Flowen
dc.typeConference Paperen
dc.contributor.schoolSchool of Computer Science and Engineeringen
dc.contributor.conferenceProceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16)en
dc.description.versionPublished versionen
dc.identifier.urlhttp://www.ijcai.org/Abstract/16/357en
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:SCSE Conference Papers
Files in This Item:
File Description SizeFormat 
Optimal Interdiction of Illegal Network Flow.pdf1.17 MBAdobe PDFThumbnail
View/Open

Page view(s) 10

766
Updated on Mar 28, 2024

Download(s) 20

276
Updated on Mar 28, 2024

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.