A Reconnaissance Penetration Game With Territorial-Constrained Defender

被引:12
|
作者
Liang, Li [1 ]
Deng, Fang [2 ]
Wang, Jianan [3 ]
Lu, Maobin [2 ]
Chen, Jie [4 ,5 ]
机构
[1] Beijing Univ Chem Technol, Coll Informat Sci & Technol, Beijing 100029, Peoples R China
[2] Inst Technol, Sch Automat, Beijing 100081, Peoples R China
[3] Inst Technol, Sch Aerosp Engn, Beijing 100081, Peoples R China
[4] Tongji Univ, Shanghai Res Inst Intelligent Autonomous Syst, Shanghai 200092, Peoples R China
[5] Beijing Inst Technol, Key Lab Intelligent Control & Decis Complex Syst, Beijing 100081, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Games; Reconnaissance; Differential games; Missiles; Base stations; Velocity measurement; Trajectory; Barrier; pursuit-evasion differential game; reconnaissance penetration; DIFFERENTIAL GAME; PURSUIT; STRATEGIES;
D O I
10.1109/TAC.2022.3183034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A reconnaissance penetration game is a classic target-attacker-defender game. In this game, a reconnaissance UAV (namely attacker) tries to avoid the defender and reconnoiter a target as close as possible, whereas a target tries to escape the attacker with the help of defender. Practically, the defender is considered constrained in a certain territory to capture the attacker and help the target. This article is primarily concerned with the winning region for three players. An explicit policy method is proposed to construct the barrier analytically. In addition, taking practical payoff functions into account, a complete solution to the reconnaissance game is provided by fusing the games of kind and degree. Simulation results are elaborated to showcase the effectiveness of the proposed policy.
引用
收藏
页码:6295 / 6302
页数:8
相关论文
共 50 条
  • [1] Cooperative defense of a territorial-constrained target in a target-attacker-defender game
    Dong, Gangqi
    Xing, Yahong
    Mi, Qianbao
    ROBOTICA, 2024,
  • [2] An Attacker-Defender Game Model with Constrained Strategies
    Ren, Jiaqi
    Liu, Jin
    Dong, Yibo
    Li, Zhe
    Li, Weili
    ENTROPY, 2024, 26 (08)
  • [3] Cooperative Target Defense Differential Game with a Constrained-maneuverable Defender
    Casbeer, David W.
    Garcia, Eloy
    Fuchs, Zachariah E.
    Pachter, Meir
    2015 54TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2015, : 1713 - 1718
  • [4] RECONNAISSANCE GAME
    PLANTE, DE
    LEVIS, AH
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1972, AC17 (06) : 831 - &
  • [5] A network game with attackers and a defender
    Mavronicolas, Marios
    Papadopoulou, Vicky
    Philippou, Anna
    Spirakis, Paul
    ALGORITHMICA, 2008, 51 (03) : 315 - 341
  • [6] A Network Game with Attackers and a Defender
    Marios Mavronicolas
    Vicky Papadopoulou
    Anna Philippou
    Paul Spirakis
    Algorithmica, 2008, 51 : 315 - 341
  • [7] An Attacker-Defender Game for Honeynets
    Cai, Jin-Yi
    Yegneswaran, Vinod
    Alfeld, Chris
    Barford, Paul
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2009, 5609 : 7 - +
  • [8] An offender-defender safety game
    Krstic, Miroslav
    ANNUAL REVIEWS IN CONTROL, 2024, 57
  • [9] A Game Between a Terrorist and a Passive Defender
    Baron, Opher
    Berman, Oded
    Gavious, Arieh
    PRODUCTION AND OPERATIONS MANAGEMENT, 2018, 27 (03) : 433 - 457
  • [10] Solving the Defender-Attacker-Defender Constrained Shortest Path Problem with Lagrangian Relaxation
    Lazzaro, Gary
    Carlyle, W. Matthew
    MILITARY OPERATIONS RESEARCH, 2023, 28 (01) : 73 - 95