Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3583780.3615196acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
short-paper

You're Not Alone in Battle: Combat Threat Analysis Using Attention Networks and a New Open Benchmark

Published: 21 October 2023 Publication History

Abstract

For military commands, combat threat analysis is crucial in predicting future outcomes and informing consequent decisions. Its primary objectives include determining the intention and attack likelihood of the hostiles. The complex, dynamic, and noisy nature of combat, however, presents significant challenges in its analysis. The prior research has been limited in accounting for such characteristics, assuming independence of each entity, no unobserved tactics, and clean combat data. As such, we present spatio-temporal attention for threat analysis (SAFETY) to encode complex interactions that arise within combat. We test the model performance for unobserved tactics and with various perturbations. To do so, we also present the first open-source benchmark for combat threat analysis with two downstream tasks of predicting entity intention and attack probability. Our experiments show that SAFETY achieves a significant improvement in model performance, with enhancements of up to 13% in intention prediction and 7% in attack prediction compared to the strongest competitor, even when confronted with noisy or missing data. This result highlights the importance of encoding dynamic interactions among entities for combat threat analysis. Our codes and dataset are available at https://github.com/syleeheal/SAFETY.

References

[1]
Ehsan Azimirad and Javad Haddadnia. 2015. Target threat assessment using fuzzy sets theory. International Journal of Advances in Intelligent Informatics, Vol. 1, 2 (2015), 57--74.
[2]
Tianqi Chen and Carlos Guestrin. 2016. Xgboost: A scalable tree boosting system. In ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD).
[3]
Djork-Arné Clevert, Thomas Unterthiner, and Sepp Hochreiter. 2016. Fast and accurate deep network learning by exponential linear units (elus). In International Conference on Learning Representations (ICLR).
[4]
Anders Dahlbom and Per-Johan Nordlund. 2013. Detection of hostile aircraft behaviors using dynamic Bayesian networks. In International Conference on Information Fusion (Fusion). IEEE.
[5]
Yang Gao, Dong-sheng Li, and Hua Zhong. 2020. A novel target threat assessment method based on three-way decisions under intuitionistic fuzzy multi-attribute decision making environment. Engineering Applications of Artificial Intelligence, Vol. 87 (2020), 103276.
[6]
Michael L Hinman. 2001. Situation assessment and impact assessment activities in information fusion. In Signal Processing, Sensor Fusion, and Target Recognition.
[7]
Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural Computation, Vol. 9, 8 (1997), 1735--1780.
[8]
Sushil Kumar and Bipin Kumar Tripathi. 2016. Modelling of threat evaluation for dynamic targets using Bayesian network approach. Procedia Technology, Vol. 24 (2016), 1268--1275.
[9]
Soo Yong Lee, Juwon Kim, Kiwoong Park, Dong Kuk Ryu, Sangheun Shim, and Kijung Shin. 2023. You're Not Alone in Battle: Combat Threat Analysis Using Attention Networks and a New Open Benchmark (Appendix). https://github.com/syleeheal/SAFETY/blob/main/Appendix.pdf
[10]
Chao Lin and Yanan Liu. 2019. Target recognition and behavior prediction based on Bayesian network. International Journal of Performability Engineering, Vol. 15, 3 (2019), 1014.
[11]
Chung-Yi Lin, Hung-Ting Su, Shen-Lung Tung, and Winston H Hsu. 2021. Multivariate and propagation graph attention network for spatial-temporal prediction with outdoor cellular traffic. In ACM International Conference on Information & Knowledge Management (CIKM).
[12]
Bin Lu, Xiaoying Gan, Haiming Jin, Luoyi Fu, and Haisong Zhang. 2020. Spatiotemporal adaptive gated graph convolution network for urban traffic flow forecasting. In ACM International Conference on Information & Knowledge Management (CIKM).
[13]
Yihong Ma, Patrick Gerard, Yijun Tian, Zhichun Guo, and Nitesh V Chawla. 2022. Hierarchical spatio-temporal graph neural networks for pandemic forecasting. In ACM International Conference on Information & Knowledge Management (CIKM).
[14]
Cheonbok Park, Chunggi Lee, Hyojin Bahng, Yunwon Tae, Seungmin Jin, Kihwan Kim, Sungahn Ko, and Jaegul Choo. 2020. ST-GRAT: A novel spatio-temporal graph attention networks for accurately forecasting dynamically changing road speed. In ACM International Conference on Information & Knowledge Management (CIKM).
[15]
Yunsheng Shi, Zhengjie Huang, Shikun Feng, Hui Zhong, Wenjin Wang, and Yu Sun. 2021. Masked label prediction: Unified message passing model for semi-supervised classification. In International Joint Conference on Artificial Intelligence (IJCAI).
[16]
Fei Teng, Xinpeng Guo, Yafei Song, and Gang Wang. 2021a. An air target tactical intention recognition model based on bidirectional GRU with attention mechanism. IEEE Access, Vol. 9 (2021), 169122--169134.
[17]
Fei Teng, Yafei Song, and Xinpeng Guo. 2021b. Attention-TCN-BiGRU: An air target combat intention recognition model. Mathematics, Vol. 9, 19 (2021), 2412.
[18]
Fei Teng, Yafei Song, Gang Wang, Peng Zhang, Liuxing Wang, Zongteng Zhang, et al. 2021c. A GRU-based method for predicting intention of aerial targets. Computational Intelligence and Neuroscience, Vol. 2021 (2021).
[19]
Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of Machine Learning Research (JMLR), Vol. 9, 11 (2008).
[20]
Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Advances in Neural Information Processing Systems (NeurIPS).
[21]
Xin Wang, Jialiang Zuo, Rennong Yang, Zhenxing Zhang, Longfei Yue, and Huiliang Liu. 2019. Target threat assessment based on dynamic Bayesian network. In Journal of Physics: Conference Series. IOP Publishing.
[22]
Yi Wang, Yuan Sun, Ji-Ying Li, and Sun-Tao Xia. 2012. Air defense threat assessment based on dynamic Bayesian network. In International Conference on Systems and Informatics (ICSAI). IEEE.
[23]
Junjie Xue, Jie Zhu, Jiyang Xiao, Sheng Tong, and Ling Huang. 2020. Panoramic convolutional long short-term memory networks for combat intension recognition of aerial targets. IEEE Access, Vol. 8 (2020), 183312--183323.
[24]
Zixuan Yuan, Hao Liu, Yanchi Liu, Denghui Zhang, Fei Yi, Nengjun Zhu, and Hui Xiong. 2020. Spatio-temporal dual graph attention network for query-poi matching. In ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR).
[25]
Longfei Yue, Rennong Yang, Jialiang Zuo, Hao Luo, and Qiuliang Li. 2019. Air target threat assessment based on improved moth flame optimization-gray neural network model. Mathematical Problems in Engineering, Vol. 2019 (2019), 1--14.
[26]
Honglin Zhang, Jianjun Luo, Yuan Gao, and Weihua Ma. 2023. An intention inference method for the space non-cooperative target based on BiGRU-Self attention. Advances in Space Research (2023).
[27]
Jihai Zhang, Fangquan Lin, Cheng Yang, and Wei Jiang. 2022. A new sequential prediction framework with spatial-temporal embedding. In ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR).
[28]
Xiyue Zhang, Chao Huang, Yong Xu, and Lianghao Xia. 2020. Spatial-temporal convolutional graph attention networks for citywide traffic flow forecasting. In ACM International Conference on Information & Knowledge Management (CIKM).

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '23: Proceedings of the 32nd ACM International Conference on Information and Knowledge Management
October 2023
5508 pages
ISBN:9798400701245
DOI:10.1145/3583780
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 October 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attack prediction
  2. attention networks
  3. combat threat analysis
  4. intention prediction
  5. open benchmark

Qualifiers

  • Short-paper

Funding Sources

Conference

CIKM '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 81
    Total Downloads
  • Downloads (Last 12 months)47
  • Downloads (Last 6 weeks)3
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media