Processing math: 100%
Wu Sunyong, Xue Qiutiao, Zhu Shengqi, Yan Qingzhu, Sun Xiyan. Track-Before-Detect Algorithm for Weak Extended Target Based on Particle Filter under Clutter Environment[J]. Journal of Radars, 2017, 6(3): 252-258. doi: 10.12000/JR16128
Citation: WANG Mingyang, LIU Xuxu, LI Yulin, et al. Dynamic adversarial risk estimation based on labeled multi-Bernoulli tracker[J]. Journal of Radars, 2024, 13(1): 270–282. doi: 10.12000/JR23207

Dynamic Adversarial Risk Estimation Based on Labeled Multi-Bernoulli Tracker

DOI: 10.12000/JR23207
Funds:  The National Natural Science Foundation of China (62301091, 62371078), China Postdoctoral Science Foundation Funded Project (2022M710533, 2022M710535)
More Information
  • Corresponding author: LI Suqi, lisuqi@cqu.edu.cn
  • Received Date: 2023-10-25
  • Rev Recd Date: 2023-12-25
  • Available Online: 2023-12-27
  • Publish Date: 2024-01-09
  • In many military and civilian areas, there exists a scenario in which multiple intruders from an adversary attempt to enter important region of our own to carry out intentional malign activity. Adversarial Risk (AR) estimation is used to assess and predict the expected damage to our valuable assets from the actions of online adversaries based on measurements performed by sensors. To evaluate random and time-varying AR, this study proposes a stochastic AR estimation approach based on a Labeled Multi-Bernoulli (LMB) tracker. First, in the formulation of LMB filtering, expressions of the minimum mean squared error estimation of the stochastic AR are derived for the additive and multiplying model. Second, by combining the Gaussian mixture and sampling approximations, we devise a numerical calculation approach for the proposed AR estimations. Third, we achieve an online evaluation of the expected damage to our valuable assets from the adversary by embedding the proposed AR estimation and LMB filtering. The effectiveness and performance advantage of the proposed estimation algorithms are verified using measurements from radars, considering a simulated scenario wherein multiple lethal targets hit the radar positions.

     

  • [1]
    刘宝旭, 徐菁, 许榕生. 黑客入侵防护体系研究与设计[J]. 计算机工程与应用, 2001, 37(8): 1–3, 29. doi: 10.3321/j.issn:1002-8331.2001.08.001

    LIU Baoxu, XU Jing, and XU Rongsheng. The study and design of the defence system of the hacker attacks[J]. Computer Engineering and Applications, 2001, 37(8): 1–3, 29. doi: 10.3321/j.issn:1002-8331.2001.08.001
    [2]
    王福军, 梅卫, 王春平, 等. 基于敌我对抗信息的目标机动态势估计[J]. 火力与指挥控制, 2010, 35(9): 152–155. doi: 10.3969/j.issn.1002-0640.2010.09.040

    WANG Fujun, MEI Wei, WANG Chunping, et al. Prediction of target maneuvering situation based on confrontation information between the enemy and ourselves[J]. Fire Control & Command Control, 2010, 35(9): 152–155. doi: 10.3969/j.issn.1002-0640.2010.09.040
    [3]
    LIGGINS II M, HALL D, and LLINAS J. Handbook of Multisensor Data fusion: Theory and Practice[M]. 2nd ed. Boca Raton, USA: CRC Press, 2009: 1–870.
    [4]
    GONG Hua, YU Xiaoye, ZHANG Yong, et al. Dynamic threat assessment of air multi-target based on DBN-TOPSIS method[C]. 2021 China Automation Congress, Beijing, China, 2021: 6902–6907.
    [5]
    ROY J, PARADIS S, and ALLOUCHE M. Threat evaluation for impact assessment in situation analysis systems[C]. Signal Processing, Sensor Fusion, and Target Recognition XI, Orlando, USA, 2002: 329–341.
    [6]
    ERLANDSSON T and NIKLASSON L. Automatic evaluation of air mission routes with respect to combat survival[J]. Information Fusion, 2014, 20: 88–98. doi: 10.1016/j.inffus.2013.12.001
    [7]
    TUZLUKOV V. Signal Processing in Radar Systems[M]. Boca Raton, USA: CRC Press, 2013: 1–632.
    [8]
    BOLDERHEIJ F. Mission-driven sensor management: Analysis, design, implementation and simulation[D]. [Ph.D. dissertation], Delft University of Technology, 2007.
    [9]
    JOHANSSON F. Evaluating the performance of TEWA systems[D]. [Ph.D. dissertation], Örebro University, 2010: 1–177.
    [10]
    NARYKOV A, DELANDE E, and CLARK D E. A Formulation of the adversarial risk for multiobject filtering[J]. IEEE Transactions on Aerospace and Electronic Systems, 2021, 57(4): 2082–2092. doi: 10.1109/TAES.2021.3098130
    [11]
    LUCAS T W. Damage functions and estimates of fratricide and collateral damage[J]. Naval Research Logistics (NRL), 2003, 50(4): 306–321. doi: 10.1002/nav.10057
    [12]
    HOFFMAN J R, SORENSEN E, STELZIG C A, et al. Scientific performance estimation of robustness and threat[C]. Signal Processing, Sensor Fusion, and Target Recognition XI, Orlando, USA, 2002: 248–258.
    [13]
    CLARK D E. Stochastic multi-object guidance laws for interception and rendezvous problems[J]. IEEE Transactions on Automatic Control, 2022, 67(3): 1482–1489. doi: 10.1109/TAC.2021.3062559
    [14]
    MAHLER R P S. Statistical Multisource-Multitarget Information Fusion[M]. Boston, USA: Artech House, 2007: 1–888.
    [15]
    周雪芹, 廖力, 高峰. 伯努利滤波在单站无源跟踪中的应用[J]. 电讯技术, 2019, 59(4): 419–425. doi: 10.3969/j.issn.1001-893x.2019.04.009

    ZHOU Xueqin, LIAO Li, and GAO Feng. Application of Bernoulli filter in single-station passive tracking[J]. Telecommunication Engineering, 2019, 59(4): 419–425. doi: 10.3969/j.issn.1001-893x.2019.04.009
    [16]
    MAHLER R P S. Multitarget Bayes filtering via first-order multitarget moments[J]. IEEE Transactions on Aerospace and Electronic Systems, 2003, 39(4): 1152–1178. doi: 10.1109/TAES.2003.1261119
    [17]
    VO B T, VO B N, and CANTONI A. Analytic implementations of the cardinalized probability hypothesis density filter[J]. IEEE Transactions on Signal Processing, 2007, 55(7): 3553–3567. doi: 10.1109/TSP.2007.894241
    [18]
    王佰录, 易伟, 李溯琪, 等. 分布式多目标伯努利滤波器的网络共识技术[J]. 信号处理, 2018, 34(1): 1–12. doi: 10.16798/j.issn.1003-0530.2018.01.001

    WANG Bailu, YI Wei, LI Suqi, et al. Consensus for distributed multi-Bernoulli filter[J]. Journal of Signal Processing, 2018, 34(1): 1–12. doi: 10.16798/j.issn.1003-0530.2018.01.001
    [19]
    VO B T, VO B N, and CANTONI A. The cardinality balanced multi-target multi-Bernoulli filter and its implementations[J]. IEEE Transactions on Signal Processing, 2009, 57(2): 409–423. doi: 10.1109/TSP.2008.2007924
    [20]
    VO B T and VO B N. Labeled random finite sets and multi-object conjugate priors[J]. IEEE Transactions on Signal Processing, 2013, 61(13): 3460–3475. doi: 10.1109/TSP.2013.2259822
    [21]
    VO B N, VO B T, and PHUNG D. Labeled random finite sets and the Bayes multi-target tracking filter[J]. IEEE Transactions on Signal Processing, 2014, 62(24): 6554–6567. doi: 10.1109/TSP.2014.2364014
    [22]
    SHIM C, VO B T, VO B N, et al. Linear complexity Gibbs sampling for generalized labeled multi-Bernoulli filtering[J]. IEEE Transactions on Signal Processing, 2023, 71: 1981–1994. doi: 10.1109/TSP.2023.3277220
    [23]
    REUTER S, VO B T, VO B N, et al. The labeled multi-Bernoulli filter[J]. IEEE Transactions on Signal Processing, 2014, 62(12): 3246–3260. doi: 10.1109/TSP.2014.2323064
    [24]
    LI Suqi, YI Wei, HOSEINNEZHAD R, et al. Multiobject tracking for generic observation model using labeled random finite sets[J]. IEEE Transactions on Signal Processing, 2018, 66(2): 368–383. doi: 10.1109/TSP.2017.2764864
    [25]
    LI Suqi, BATTISTELLI G, CHISCI L, et al. Computationally efficient multi-agent multi-object tracking with labeled random finite sets[J]. IEEE Transactions on Signal Processing, 2019, 67(1): 260–275. doi: 10.1109/TSP.2018.2880704
    [26]
    LI Suqi, YI Wei, HOSEINNEZHAD R, et al. Robust distributed fusion with labeled random finite sets[J]. IEEE Transactions on Signal Processing, 2018, 66(2): 278–293. doi: 10.1109/TSP.2017.2760286
    [27]
    李溯琪. 基于标号随机集的传感器网络分布式融合技术研究[D]. [博士论文], 电子科技大学, 2018: 1–142.

    LI Suqi. Labeled random finite set based distributed fusion over sensor network[D]. [Ph.D. dissertation], University of Electronic Science and Technology of China, 2018: 1–142.
    [28]
    NGUYEN T T D, VO B N, VO B T, et al. Tracking cells and their lineages via labeled random finite sets[J]. IEEE Transactions on Signal Processing, 2021, 69: 5611–5626. doi: 10.1109/TSP.2021.3111705
    [29]
    徐开明, 王佰录, 李溯琪, 等. 低空监视雷达“走-停-走”目标跟踪技术[J]. 雷达学报, 2022, 11(3): 443–458. doi: 10.12000/JR21211

    XU Kaiming, WANG Bailu, LI Suqi, et al. Move-stop-move target tracking with low-altitude surveillance radars[J]. Journal of Radars, 2022, 11(3): 443–458. doi: 10.12000/JR21211
    [30]
    WANG Bailu, LI Suqi, YI Wei, et al. Performance analysis for parallel grouping-based labeled multi-Bernoulli filter[J]. Signal Processing, 2023, 202: 108779. doi: 10.1016/j.sigpro.2022.108779
    [31]
    WITKOWSKI M, WHITE G, LOUVIERIS P, et al. High-level information fusion and mission planning in highly anisotropic threat spaces[C]. IEEE 11th International Conference on Information Fusion, Cologne, Germany, 2008: 1–8.
    [32]
    NARYKOV A, DELANDE E, CLARK D, et al. Second-order statistics for threat assessment with the PHD filter[C]. Sensor Signal Processing for Defence Conference (SSPD), London, UK, 2017: 1–5.
    [33]
    HORREY W J, WICKENS C D, STRAUSS R, et al. Supporting situation assessment through attention guidance and diagnostic aiding: The benefits and costs of display enhancement on judgment skill[J]. Adaptive Perspectives on Human-Technology Interaction: Methods and Models for Cognitive Engineering and Human-Computer Interaction, 2006: 55–70.
    [34]
    FANG Fang, HE Jiafan, LI Qingwei, et al. Weapon-target assignment based on improved particle swarm optimization for different allocation criteria[C]. 2021 China Automation Congress (CAC), Beijing, China, 2021: 6628–6633.
    [35]
    JOHANSSON F and FALKMAN G. A Bayesian network approach to threat evaluation with application to an air defense scenario[C]. IEEE 11th International Conference on Information Fusion, Cologne, Germany, 2008: 1–7.
    [36]
    LITTLE E G and ROGOVA G L. An ontological analysis of threat and vulnerability[C]. IEEE 9th International Conference on Information Fusion, Florence, Italy, 2006: 1–8.
    [37]
    GUERRIERO M, SVENSSON L, SVENSSON D, et al. Shooting two birds with two bullets: How to find minimum mean OSPA estimates[C]. IEEE 13th International Conference on Information Fusion, Edinburgh, UK, 2010: 1–8.
    [38]
    PAPAGEORGIOU D and RAYKIN M. A risk-based approach to sensor resource management[C]. Advances in Cooperative Control and Optimization. Berlin, Germany: Springer, 2007: 129–144.
    [39]
    ANGLEY D, RISTIC B, MORAN W, et al. Search for targets in a risky environment using multi-objective optimisation[J]. IET Radar, Sonar & Navigation, 2019, 13(1): 123–127. doi: 10.1049/iet-rsn.2018.5184
    [40]
    DITZEL M, KESTER L, VAN DEN BROEK S, et al. Cross-layer utility-based system optimization[C]. The IEEE 16th International Conference on Information Fusion, Istanbul, Turkey, 2013: 507–514.
    [41]
    KATSILIERIS F, DRIESSEN H, and YAROVOY A. Threat-based sensor management for target tracking[J]. IEEE Transactions on Aerospace and Electronic Systems, 2015, 51(4): 2772–2785. doi: 10.1109/TAES.2015.140052
    [42]
    BENAVOLI A, RISTIC B, FARINA A, et al. An application of evidential networks to threat assessment[J]. IEEE Transactions on Aerospace and Electronic Systems, 2009, 45(2): 620–639. doi: 10.1109/TAES.2009.5089545
  • Relative Articles

    [1]XIA Deping, ZHANG Liang, WU Tao, MENG Xiangdong. A Multiple Interference Suppression Algorithm Based on Airborne Bistatic Polarization Radar[J]. Journal of Radars, 2022, 11(3): 399-407. doi: 10.12000/JR21212
    [2]YASIR Saifullah, YANG Guomin, XU Feng. A Four-leaf Clover-shaped Coding Metasurface For Ultra-wideband Diffusion-like Scattering[J]. Journal of Radars, 2021, 10(3): 382-390. doi: 10.12000/JR21061
    [3]WANG Jingjing, LIU Zheng, XIE Rong, RAN Lei. HRRP Target Recognition Method for Full Polarimetric Radars by Combining Cameron Decomposition and Fusing RKELM[J]. Journal of Radars, 2021, 10(6): 944-955. doi: 10.12000/JR21099
    [4]SUN Dou, LU Dongwei, XING Shiqi, YANG Xiao, LI Yongzhen, WANG Xuesong. Full-polarization SAR Joint Multidimensional Reconstruction Based on Sparse Reconstruction[J]. Journal of Radars, 2020, 9(5): 865-877. doi: 10.12000/JR20092
    [5]FANG Linlin, ZHOU Chao, WANG Rui, HU Cheng. RCS Feature-aided Insect Target Tracking Algorithm[J]. Journal of Radars, 2019, 8(5): 598-605. doi: 10.12000/JR19067
    [6]Wang Yuzhuo, Zhu Shengqi, Xu Jingwei. A Range-ambiguous Clutter Suppression Method for MIMO Bistatic Airborne Radar[J]. Journal of Radars, 2018, 7(2): 202-211. doi: 10.12000/JR18016
    [7]Wu Yang, Bai Yang, Yin Hongcheng, Zhang Liangcong. Terahertz Radar Cross Section Measurements Based on Millimeter-wave Converter[J]. Journal of Radars, 2018, 7(1): 147-152. doi: 10.12000/JR17099
    [8]Sun Xiang, Song Hongjun, Wang Robert, Li Ning. POA Correction Method Using High-resolution Full-polarization SAR Image[J]. Journal of Radars, 2018, 7(4): 465-474. doi: 10.12000/JR18026
    [9]Chen Gang, Dang Hongxing, Tan Xiaomin, Chen Hui, Cui Tiejun. Scattering Properties of Electromagnetic Waves from Randomly Oriented Rough Metal Plate in the Lower Terahertz Region[J]. Journal of Radars, 2018, 7(1): 75-82. doi: 10.12000/JR17093
    [10]Qian Lichang, Xu Jia, Hu Guoxu. Long-time Integration of a Multi-waveform for Weak Target Detection in Non-cooperative Passive Bistatic Radar[J]. Journal of Radars, 2017, 6(3): 259-266. doi: 10.12000/JR16137
    [11]Wei Min, Li Xiaobo, Wang Li. A Method for Reducing the Impact of Range Ambiguity[J]. Journal of Radars, 2017, 6(1): 106-113. doi: 10.12000/JR16082
    [12]Zhu Xiaojing, Li Fei, Wang Robert, Wang Wei, Sun Xiang. Range Ambiguity Suppression Approach for Quad-pol SAR Systems Based on Modified Azimuth Phase Coding[J]. Journal of Radars, 2017, 6(4): 420-431. doi: 10.12000/JR17015
    [13]Lu Dongwei, Que Xiaofeng, Qi Xin, Nie Zaiping. Simulation and Analysis of the Fully Polarimetric Scattering Characteristics of Aircraft in UHF Band[J]. Journal of Radars, 2016, 5(2): 182-189. doi: 10.12000/JR16030
    [14]Lin Chunfeng, Huang Chunlin, Su Yi. Target Integration and Detection with the Radon-Fourier Transform for Bistatic Radar[J]. Journal of Radars, 2016, 5(5): 526-530. doi: 10.12000/JR16049
    [15]Zhang Ran, Feng Dejun, Xu Letao. Design and Polarization Characteristics Analysis of Dihedral Based on Salisbury Screen[J]. Journal of Radars, 2016, 5(6): 658-665. doi: 10.12000/JR16055
    [16]Hu Cheng, Liu Changjiang, Zeng Tao. Bistatic Forward Scattering Radar Detection and Imaging[J]. Journal of Radars, 2016, 5(3): 229-243. doi: 10.12000/JR16058
    [17]Wang Jia-ning, Xu Xiao-jian. Simulation and Analysis for Wide-band Scattering Characteristics of 2-D Linear and Nonlinear Sea Surfaces[J]. Journal of Radars, 2015, 4(3): 343-350. doi: 10.12000/JR15053
    [18]Cheng Feng, Zeng Qing-ping, Gong Zi-ping. First-order Sea Clutter Modeling and Simulation of High Frequency Passive Radar[J]. Journal of Radars, 2014, 3(6): 720-726. doi: 10.12000/JR14131
    [19]Li Jun, Dang Bo, Liu Chang-zan, Liao Gui-sheng. Bistatic MIMO Radar Clutter Suppression by Exploiting the Transmit Angle[J]. Journal of Radars, 2014, 3(2): 208-216. doi: 10.3724/SP.J.1300.2014.13148
    [20]Zeng Tao. Bistatic SAR: State of the Art and Development Trend[J]. Journal of Radars, 2012, 1(4): 329-341. doi: 10.3724/SP.J.1300.2012.20093
  • Created with Highcharts 5.0.7Amount of accessChart context menuAbstract Views, HTML Views, PDF Downloads StatisticsAbstract ViewsHTML ViewsPDF Downloads2024-052024-062024-072024-082024-092024-102024-112024-122025-012025-022025-032025-0401020304050
    Created with Highcharts 5.0.7Chart context menuAccess Class DistributionFULLTEXT: 23.6 %FULLTEXT: 23.6 %META: 62.4 %META: 62.4 %PDF: 14.0 %PDF: 14.0 %FULLTEXTMETAPDF
    Created with Highcharts 5.0.7Chart context menuAccess Area Distribution其他: 16.7 %其他: 16.7 %其他: 0.1 %其他: 0.1 %Central District: 0.1 %Central District: 0.1 %China: 0.9 %China: 0.9 %India: 0.1 %India: 0.1 %Matawan: 0.2 %Matawan: 0.2 %Mersin: 0.5 %Mersin: 0.5 %Rochester: 0.1 %Rochester: 0.1 %United States: 0.1 %United States: 0.1 %[]: 0.5 %[]: 0.5 %上海: 0.9 %上海: 0.9 %东莞: 0.1 %东莞: 0.1 %中卫: 0.1 %中卫: 0.1 %中山: 0.1 %中山: 0.1 %临汾: 0.1 %临汾: 0.1 %佛山: 0.1 %佛山: 0.1 %兰州: 0.1 %兰州: 0.1 %包头: 0.1 %包头: 0.1 %北京: 13.7 %北京: 13.7 %南京: 0.8 %南京: 0.8 %南充: 0.1 %南充: 0.1 %南宁: 0.1 %南宁: 0.1 %南昌: 0.1 %南昌: 0.1 %南通: 0.1 %南通: 0.1 %南阳: 0.1 %南阳: 0.1 %厦门: 0.1 %厦门: 0.1 %台北: 0.1 %台北: 0.1 %台州: 0.3 %台州: 0.3 %合肥: 0.2 %合肥: 0.2 %大连: 0.8 %大连: 0.8 %天津: 0.4 %天津: 0.4 %宜昌: 0.1 %宜昌: 0.1 %宝鸡: 0.1 %宝鸡: 0.1 %宣城: 0.2 %宣城: 0.2 %常州: 0.1 %常州: 0.1 %常德: 0.2 %常德: 0.2 %广州: 0.4 %广州: 0.4 %弗吉尼亚州: 0.1 %弗吉尼亚州: 0.1 %张家口: 1.9 %张家口: 1.9 %张家口市: 0.1 %张家口市: 0.1 %张家界: 0.1 %张家界: 0.1 %德州: 0.1 %德州: 0.1 %成都: 1.2 %成都: 1.2 %扬州: 0.1 %扬州: 0.1 %承德: 0.1 %承德: 0.1 %新乡: 0.1 %新乡: 0.1 %无锡: 0.3 %无锡: 0.3 %旧金山: 0.1 %旧金山: 0.1 %昆明: 0.2 %昆明: 0.2 %晋城市高平: 0.1 %晋城市高平: 0.1 %朔州: 0.1 %朔州: 0.1 %杭州: 1.4 %杭州: 1.4 %株洲: 0.1 %株洲: 0.1 %武汉: 0.3 %武汉: 0.3 %沈阳: 0.1 %沈阳: 0.1 %沧州: 0.1 %沧州: 0.1 %河内: 0.3 %河内: 0.3 %济南: 0.1 %济南: 0.1 %深圳: 0.4 %深圳: 0.4 %湖州: 0.1 %湖州: 0.1 %湘潭: 0.1 %湘潭: 0.1 %滁州: 0.1 %滁州: 0.1 %漯河: 0.2 %漯河: 0.2 %烟台: 0.1 %烟台: 0.1 %焦作: 0.1 %焦作: 0.1 %珠海: 0.1 %珠海: 0.1 %益阳: 0.2 %益阳: 0.2 %石家庄: 0.8 %石家庄: 0.8 %石家庄市: 0.1 %石家庄市: 0.1 %秦皇岛: 0.2 %秦皇岛: 0.2 %纽约: 0.1 %纽约: 0.1 %绵阳: 0.1 %绵阳: 0.1 %芒廷维尤: 14.3 %芒廷维尤: 14.3 %芝加哥: 0.1 %芝加哥: 0.1 %苏州: 0.2 %苏州: 0.2 %衢州: 0.1 %衢州: 0.1 %西宁: 35.7 %西宁: 35.7 %西安: 0.8 %西安: 0.8 %运城: 0.1 %运城: 0.1 %邯郸: 0.1 %邯郸: 0.1 %郑州: 1.1 %郑州: 1.1 %重庆: 0.1 %重庆: 0.1 %金华: 0.1 %金华: 0.1 %铜仁: 0.1 %铜仁: 0.1 %长沙: 0.1 %长沙: 0.1 %阳江: 0.1 %阳江: 0.1 %青岛: 0.1 %青岛: 0.1 %龙岩: 0.1 %龙岩: 0.1 %其他其他Central DistrictChinaIndiaMatawanMersinRochesterUnited States[]上海东莞中卫中山临汾佛山兰州包头北京南京南充南宁南昌南通南阳厦门台北台州合肥大连天津宜昌宝鸡宣城常州常德广州弗吉尼亚州张家口张家口市张家界德州成都扬州承德新乡无锡旧金山昆明晋城市高平朔州杭州株洲武汉沈阳沧州河内济南深圳湖州湘潭滁州漯河烟台焦作珠海益阳石家庄石家庄市秦皇岛纽约绵阳芒廷维尤芝加哥苏州衢州西宁西安运城邯郸郑州重庆金华铜仁长沙阳江青岛龙岩

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views(552) PDF downloads(79) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint