Efficient Algorithms for Boundary Defense with Heterogeneous Defenders

02/20/2023
by   Si Wei Feng, et al.
0

This paper studies the problem of defending (1D and 2D) boundaries against a large number of continuous attacks with a heterogeneous group of defenders. The defender team has perfect information of the attack events within some time (finite or infinite) horizon, with the goal of intercepting as many attacks as possible. An attack is considered successfully intercepted if a defender is present at the boundary location when and where the attack happens. Through proposing a network-flow and integer programming-based method for computing optimal solutions, and an exhaustive defender pairing heuristic method for computing near-optimal solutions, we are able to significantly reduce the computation burden in solving the problem in comparison to the previous state of the art. Extensive simulation experiments confirm the effectiveness of the algorithms. Leveraging our efficient methods, we also characterize the solution structures, revealing the relationships between the attack interception rate and the various problem parameters, e.g., the heterogeneity of the defenders, attack rate, boundary topology, and the look-ahead horizon.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/03/2019

Boundary Attack++: Query-Efficient Decision-Based Adversarial Attack

Decision-based adversarial attack studies the generation of adversarial ...
research
07/05/2022

Query-Efficient Adversarial Attack Based on Latin Hypercube Sampling

In order to be applicable in real-world scenario, Boundary Attacks (BAs)...
research
06/27/2023

Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by Feint

While collaborative systems provide convenience to our lives, they also ...
research
03/10/2023

Boosting Adversarial Attacks by Leveraging Decision Boundary Information

Due to the gap between a substitute model and a victim model, the gradie...
research
08/29/2023

Imperceptible Adversarial Attack on Deep Neural Networks from Image Boundary

Although Deep Neural Networks (DNNs), such as the convolutional neural n...
research
10/16/2019

Meet the Family of Statistical Disclosure Attacks

Disclosure attacks aim at revealing communication patterns in anonymous ...
research
02/21/2022

The Role of Heterogeneity in Autonomous Perimeter Defense Problems

When is heterogeneity in the composition of an autonomous robotic team b...

Please sign up or login with your details

Forgot password? Click here to reset