Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/84604
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Guo, Qingyu | en |
dc.contributor.author | Zick, Yair | en |
dc.contributor.author | Miao, Chunyan | en |
dc.contributor.author | An, Bo | en |
dc.date.accessioned | 2016-12-16T04:14:06Z | en |
dc.date.accessioned | 2019-12-06T15:48:10Z | - |
dc.date.available | 2016-12-16T04:14:06Z | en |
dc.date.available | 2019-12-06T15:48:10Z | - |
dc.date.issued | 2016 | en |
dc.identifier.citation | Guo, Q., An, B., Zick, Y., & Miao, C. (2016). Optimal Interdiction of Illegal Network Flow. Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16), 2507-2513. | en |
dc.identifier.uri | https://hdl.handle.net/10356/84604 | - |
dc.description.abstract | Large scale smuggling of illegal goods is a longstanding problem, with $1.4b and thousands of agents assigned to protect the borders from such activity in the US-Mexico border alone. Illegal smuggling activities are usually blocked via inspection stations or ad-hoc checkpoints/roadblocks. Security resources are insufficient to man all stations at all times; furthermore, smugglers regularly conduct surveillance activities. This paper makes several contributions toward the challenging task of optimally interdicting an illegal network flow: i) A new Stackelberg game model for network flow interdiction; ii) A novel Column and Constraint Generation approach for computing the optimal defender strategy; iii) Complexity analysis of the column generation subproblem; iv) Compact convex nonlinear programs for solving the subproblems; v) Novel greedy and heuristic approaches for subproblems with good approximation guarantee. Experimental evaluation shows that our approach can obtain a robust enough solution outperforming the existing methods and heuristic baselines significantly and scale up to realistic-sized problems. | en |
dc.description.sponsorship | NRF (Natl Research Foundation, S’pore) | en |
dc.format.extent | 7 p. | en |
dc.language.iso | en | en |
dc.rights | © 2016 International Joint Conferences on Artificial Intelligence. This paper was published in Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16) and is made available as an electronic reprint (preprint) with permission of IJCAI. The published version is available at: [http://www.ijcai.org/Abstract/16/357]. One print or electronic copy may be made for personal use only. Systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper is prohibited and is subject to penalties under law. | en |
dc.title | Optimal Interdiction of Illegal Network Flow | en |
dc.type | Conference Paper | en |
dc.contributor.school | School of Computer Science and Engineering | en |
dc.contributor.conference | Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16) | en |
dc.description.version | Published version | en |
dc.identifier.url | http://www.ijcai.org/Abstract/16/357 | en |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
Appears in Collections: | SCSE Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Optimal Interdiction of Illegal Network Flow.pdf | 1.17 MB | Adobe PDF | View/Open |
Page view(s) 10
766
Updated on Mar 28, 2024
Download(s) 20
276
Updated on Mar 28, 2024
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.