Forecasting group behavior via multiple plan recognition

Xiaochen Li, Wenji Mao, Daniel Zeng, Huachi Zhu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Forecasting group behavior is critical to national and international security. Various forecasting methods have been developed previously. However, the majority of them are data-driven methods and rely heavily on the structured data which are often hard to obtain. To overcome the limitation of previous methods, we propose a novel plan recognition method for detecting multiple group behavior based on graph search. We further conduct human experiments in security informatics domain to empirically evaluate our proposed method. The experimental results show the effectiveness of our method.

Original languageEnglish (US)
Title of host publicationProceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011
Pages184-186
Number of pages3
DOIs
StatePublished - Sep 22 2011
Event2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011 - Beijing, China
Duration: Jul 10 2011Jul 12 2011

Publication series

NameProceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011

Other

Other2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011
CountryChina
CityBeijing
Period7/10/117/12/11

Keywords

  • group behavior forecasting
  • multiple plan recognition

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems

Fingerprint Dive into the research topics of 'Forecasting group behavior via multiple plan recognition'. Together they form a unique fingerprint.

  • Cite this

    Li, X., Mao, W., Zeng, D., & Zhu, H. (2011). Forecasting group behavior via multiple plan recognition. In Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011 (pp. 184-186). [5983997] (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011). https://doi.org/10.1109/ISI.2011.5983997