TY - GEN
T1 - Detecting and tracking hostile plans in the hats world
AU - Galstyan, Aram
AU - Mitra, Sinjini
AU - Cohen, Paul
PY - 2007
Y1 - 2007
N2 - Plan recognition is the problem of inferring an agent's hidden state of plans, or intentions, based on the pattern of his observable actions. Among many potential applications, intention recognition can be particularly useful for intelligence analysis and homeland security related problems. While most of the existing work in plan recognition has focused on studying overt agents, problems from the intelligence domain usually have different settings, where hostile agents operate covertly in a large population of otherwise benign entities. In this paper we formulate a problem of detecting and tracking hostile intentions in such an environment - a virtual world where a large number of agents are involved in individual and collective activities. Most of the agents are benign, while a small number of them have malicious intent. We describe our initial effort for building a probabilistic framework for detecting hostile activities in this system, and provide some initial results for simple scenarios.
AB - Plan recognition is the problem of inferring an agent's hidden state of plans, or intentions, based on the pattern of his observable actions. Among many potential applications, intention recognition can be particularly useful for intelligence analysis and homeland security related problems. While most of the existing work in plan recognition has focused on studying overt agents, problems from the intelligence domain usually have different settings, where hostile agents operate covertly in a large population of otherwise benign entities. In this paper we formulate a problem of detecting and tracking hostile intentions in such an environment - a virtual world where a large number of agents are involved in individual and collective activities. Most of the agents are benign, while a small number of them have malicious intent. We describe our initial effort for building a probabilistic framework for detecting hostile activities in this system, and provide some initial results for simple scenarios.
UR - http://www.scopus.com/inward/record.url?scp=51849136377&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=51849136377&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:51849136377
SN - 9781577353362
T3 - AAAI Workshop - Technical Report
SP - 37
EP - 43
BT - Plan, Activity, and Intent Recognition, PAIR - Papers from the 2007 AAAI Workshop, Technical Report
T2 - 2007 AAAI Workshop
Y2 - 23 July 2007 through 23 July 2007
ER -