Uncertainty-Sensitive Heterogeneous Information Fusion: Assessing Threat with Soft, Uncertain, and Conflicting Evidence

Abstract : Military and other government organizations put substantial effort into detecting and thwarting attacks such as those by suicide bombers or involving improvised explosive devices. Such attacks may be against military or government installations in the United States or abroad, civilian infrastructure, or any of many other targets. An element of thwarting such attacks is observing suspicious individuals over time with such diverse means as cameras, scanners, and other devices; travel records; behavioral observations; and intelligence sources. Such observations provide data that are often both complex and softi.e. qualitative, subjective, fuzzy, or ambiguousand also contradictory or even deceptive (as when humans lie). The problem, then, is how to fuse the heterogeneous data. This report summarizes our research on heterogeneous fusion methods. The context is military and civilian counterterrorism,

[1]  Jonathan Baron,et al.  Combining multiple probability predictions using a simple logit model , 2014 .

[2]  Claude E. Shannon,et al.  A Mathematical Theory of Communications , 1948 .

[3]  Kathryn B. Laskey Model uncertainty: theory and practical implications , 1996, IEEE Trans. Syst. Man Cybern. Part A.

[4]  Norman Fenton,et al.  Risk Assessment and Decision Analysis with Bayesian Networks , 2012 .

[5]  Arthur E. Hoerl,et al.  Ridge Regression: Biased Estimation for Nonorthogonal Problems , 2000, Technometrics.

[6]  J Swanson,et al.  Business Dynamics—Systems Thinking and Modeling for a Complex World , 2002, J. Oper. Res. Soc..

[7]  N. Pennington,et al.  Explanation-based decision making: effects of memory structure on judgment , 1988 .

[8]  H. Zou,et al.  Regularization and variable selection via the elastic net , 2005 .

[9]  Jeremy E. Oakley,et al.  Probability is perfect, but we can't elicit it perfectly , 2004, Reliab. Eng. Syst. Saf..

[10]  Robert L. Winkler,et al.  [Combining Probability Distributions: A Critique and an Annotated Bibliography]: Comment , 1986 .

[11]  I. J. Myung,et al.  Maximum Entropy Aggregation of Expert Predictions , 1996 .

[12]  Kathryn B. Laskey,et al.  Detecting Threatening Behavior Using Bayesian Networks , 2006 .

[13]  John D. Sterman,et al.  System Dynamics: Systems Thinking and Modeling for a Complex World , 2002 .

[14]  Richards J. Heuer,et al.  Psychology of Intelligence Analysis , 1999 .

[15]  Paul K. Davis,et al.  Measuring Interdiction Capabilities in the Presence of Anti-Access Strategies: Exploratory Analysis to Inform Adaptive Strategy for the Persian Gulf , 2002 .

[16]  Carter C. Price,et al.  Modeling Terrorism Risk to the Air Transportation System: An Independent Assessment of TSA’s Risk Management Analysis Tool and Associated Methods , 2012 .

[17]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[18]  Gary Klein,et al.  Making Sense of Sensemaking 1: Alternative Perspectives , 2006, IEEE Intelligent Systems.

[19]  Tom Ziemke,et al.  On the Definition of Information Fusion as a Field of Research , 2007 .

[20]  Richards J. Heuer,et al.  Structured Analytic Techniques for Intelligence Analysis , 2014 .

[21]  Christian Genest,et al.  Combining Probability Distributions: A Critique and an Annotated Bibliography , 1986 .

[22]  Max Henrion,et al.  Uncertainty: A Guide to Dealing with Uncertainty in Quantitative Risk and Policy Analysis , 1990 .

[23]  Paul K. Davis,et al.  Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base , 2013 .

[24]  H. Simon Rational Decision Making in Business Organizations , 1978 .

[25]  J. Armstrong,et al.  PRINCIPLES OF FORECASTING 1 Principles of Forecasting : A Handbook for Researchers and Practitioners , 2006 .

[26]  Yun-Wei Chiang,et al.  Maximum entropy: a complement to Tikhonov regularization for determination of pair distance distributions by pulsed ESR. , 2005, Journal of magnetic resonance.

[27]  David G. Groves,et al.  A General, Analytic Method for Generating Robust Strategies and Narrative Scenarios , 2006, Manag. Sci..

[28]  Lawrence A. Klein,et al.  Sensor and Data Fusion: A Tool for Information Assessment and Decision Making , 2004 .

[29]  R. Tibshirani Regression Shrinkage and Selection via the Lasso , 1996 .

[30]  R. Dawes Judgment under uncertainty: The robust beauty of improper linear models in decision making , 1979 .

[31]  Richard O. Duda,et al.  Subjective bayesian methods for rule-based inference systems , 1976, AFIPS '76.

[32]  E. T. Jaynes,et al.  Probability Theory as Logic , 1990 .

[33]  Huaiyu Zhu On Information and Sufficiency , 1997 .

[34]  P. Thagard Why wasn't O.J. convicted? Emotional coherence in legal inference , 2003, Cognition & emotion.

[35]  J. Pearl Causality: Models, Reasoning and Inference , 2000 .

[36]  A. Tversky,et al.  Judgment under Uncertainty: Heuristics and Biases , 1974, Science.

[37]  Heinz W. Engl,et al.  Convergence rates for maximum entropy regularization , 1993 .

[38]  C. List,et al.  Judgment aggregation: A survey , 2009 .

[39]  Paul K. Davis,et al.  Rand's Portfolio Analysis Tool (Pat): Theory, Methods, and Reference Manual , 2009 .

[40]  Scott Atran,et al.  Talking to the Enemy: Faith, Brotherhood, and the (Un)Making of Terrorists , 2010 .

[41]  Paul K. Davis,et al.  Synthetic cognitive modeling of adversaries for effects-based planning , 2002, SPIE Defense + Commercial Sensing.

[42]  R. Clemen Combining forecasts: A review and annotated bibliography , 1989 .

[43]  Angela O'Mahony,et al.  A Computational Model of Public Support for Insurgency and Terrorism: A Prototype for More-General Social-Science Modeling , 2013 .

[44]  Patrick M. Morgan,et al.  Deterrence Now: CAMBRIDGE STUDIES IN INTERNATIONAL RELATIONS , 2003 .

[45]  R. Selten,et al.  Bounded rationality: The adaptive toolbox , 2000 .

[46]  R. Hogarth,et al.  Research on Judgment and Decision Making: Currents, Connections, and Controversies , 1997 .

[47]  Christopher Paul,et al.  Social Science for Counterterrorism: Putting the Pieces Together , 2009 .

[48]  E. Jaynes Information Theory and Statistical Mechanics , 1957 .

[49]  Fakhri Karray,et al.  Multisensor data fusion: A review of the state-of-the-art , 2013, Inf. Fusion.