Keyhole Adversarial Plan Recognition for Recognition of Suspicious and Anomalous Behavior

Abstract Adversarial plan recognition is the use of plan recognition in settings where the observed agent is an adversary, having plans or goals that oppose those of the observer. It is one of the key application areas of plan-recognition techniques. There are two approaches to adversarial plan recognition. The first is suspicious activity recognition; that is, directly recognizing plans, activities, and behaviors that are known to be suspect (e.g., carrying a suitcase, then leaving it behind in a crowded area). The second is anomalous activity recognition in which we indirectly recognize suspect behavior by first ruling out normal, nonsuspect behaviors as explanations for the observations. Different challenges are raised in pursuing these two approaches. In this chapter, we discuss a set of efficient plan-recognition algorithms that are capable of handling the variety of challenges required of realistic adversarial plan-recognition tasks. We describe an efficient hybrid adversarial plan-recognition system composed of two processes: a plan recognizer capable of efficiently detecting anomalous behavior, and a utility-based plan recognizer incorporating the observer’s own biases—in the form of a utility function—into the recognition process. This allows choosing recognition hypotheses based on their expected cost to the observer. These two components form a highly efficient adversarial plan recognizer capable of recognizing abnormal and potentially dangerous activities. We evaluate the system with extensive experiments using real-world and simulated activity data from a variety of sources.

[1]  Xavier Boyen,et al.  Tractable Inference for Complex Stochastic Processes , 1998, UAI.

[2]  Stacy Marsella,et al.  PsychSim: Modeling Theory of Mind with Decision-Theoretic Agents , 2005, IJCAI.

[3]  Qiang Yang,et al.  CIGAR: Concurrent and Interleaving Goal and Activity Recognition , 2008 .

[4]  Manuela M. Veloso,et al.  Conditional random fields for activity recognition , 2007, AAMAS '07.

[5]  Milind Tambe,et al.  Detection of suspicious behavior from a sparse set of multiagent interactions , 2012, AAMAS.

[6]  Chris L. Baker,et al.  Modeling Human Plan Recognition Using Bayesian Theory of Mind , 2014 .

[7]  Eric Horvitz,et al.  Layered representations for human activity recognition , 2002, Proceedings. Fourth IEEE International Conference on Multimodal Interfaces.

[8]  Junji Yamato,et al.  Recognizing human action in time-sequential images using hidden Markov model , 1992, Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[9]  Nipun Kwatra,et al.  A Framework for Activity Recognition and Detection of Unusual Activities , 2004, ICVGIP.

[10]  Alex Pentland,et al.  Real-time American Sign Language recognition from video using hidden Markov models , 1995 .

[11]  Michael P. Wellman,et al.  Probabilistic State-Dependent Grammars for Plan Recognition , 2000, UAI.

[12]  Svetha Venkatesh,et al.  Activity recognition and abnormality detection with the switching hidden semi-Markov model , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[13]  Edward Y. Chang,et al.  Multi-camera spatio-temporal fusion and biased sequence-data learning for security surveillance , 2003, MULTIMEDIA '03.

[14]  Branislav Bosanský,et al.  Game-theoretic Approach to Adversarial Plan Recognition , 2012, ECAI.

[15]  Christopher W. Geib,et al.  Assessing the Complexity of Plan Recognition , 2004, AAAI.

[16]  Henry A. Kautz,et al.  Learning and inferring transportation routines , 2004, Artif. Intell..

[17]  Wei Niu,et al.  Human activity detection and recognition for video surveillance , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[18]  Svetha Venkatesh,et al.  The Hidden Permutation Model and Location-Based Activity Recognition , 2008, AAAI.

[19]  Gita Reese Sukthankar,et al.  A cost minimization approach to human behavior recognition , 2005, AAMAS '05.

[20]  Robert Suzic,et al.  A generic model of tactical plan recognition for threat assessment , 2005, SPIE Defense + Commercial Sensing.

[21]  Christopher W. Geib,et al.  Empirical Analysis of a Probabilistic Task Tracking Algorithm , 2004 .

[22]  Stacy Marsella,et al.  Minimal Mental Models , 2007, AAAI.

[23]  Milind Tambe,et al.  Robust Agent Teams via Socially-Attentive Monitoring , 2000, J. Artif. Intell. Res..

[24]  Yoram Singer,et al.  The Hierarchical Hidden Markov Model: Analysis and Applications , 1998, Machine Learning.

[25]  Alex Pentland,et al.  Coupled hidden Markov models for complex action recognition , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[26]  Milind Tambe,et al.  Monitoring Teams by Overhearing: A Multi-Agent Plan-Recognition Approach , 2002, J. Artif. Intell. Res..

[27]  Gal A. Kaminka,et al.  Incorporating Observer Biases in Keyhole Plan Recognition (Efficiently!) , 2007, AAAI.

[28]  Michael P. Wellman,et al.  Generalized Queries on Probabilistic Context-Free Grammars , 1996, AAAI/IAAI, Vol. 2.

[29]  Robert P. Goldman,et al.  Plan recognition in intrusion detection systems , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[30]  Qiang Yang,et al.  Sensor-Based Abnormal Human-Activity Detection , 2008, IEEE Transactions on Knowledge and Data Engineering.

[31]  Nate Blaylock,et al.  Fast Hierarchical Goal Schema Recognition , 2006, AAAI.

[32]  Hila Zarosim,et al.  Fast and Complete Symbolic Plan Recognition: Allowing for Duration, Interleaved Execution, and Lossy Observations , 2005 .

[33]  H. Buxton,et al.  Advanced visual surveillance using Bayesian networks , 1997 .

[34]  Hung Hai Bui,et al.  A General Model for Online Probabilistic Plan Recognition , 2003, IJCAI.

[35]  Shaogang Gong,et al.  Video Behavior Profiling for Anomaly Detection , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[36]  Ramakant Nevatia,et al.  Bayesian framework for video surveillance application , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[37]  Richard J. Doyle,et al.  Determining the Loci of Anomalies Using Minimal Causal Models , 1995, IJCAI.

[38]  Michael I. Jordan,et al.  Factorial Hidden Markov Models , 1995, Machine Learning.

[39]  M.M. Trivedi,et al.  Performance evaluation of a vision based lane tracker designed for driver assistance systems , 2005, IEEE Proceedings. Intelligent Vehicles Symposium, 2005..

[40]  Gal A. Kaminka,et al.  The use of hidden semi-Markov models in clinical diagnosis maze tasks , 2009, Intelligent Data Analysis.

[41]  Christopher W. Geib,et al.  Delaying Commitment in Plan Recognition Using Combinatory Categorial Grammars , 2009, IJCAI.

[42]  Gal A. Kaminka,et al.  Detecting disagreements in large-scale multi-agent teams , 2009, Autonomous Agents and Multi-Agent Systems.

[43]  Uffe Kjaerulff,et al.  A computational scheme for Reasoning in Dynamic Probabilistic Networks , 2013, 1303.5407.

[44]  Wenji Mao,et al.  A Utility-Based Approach to Intention Recognition , 2004, AAMAS 2004.

[45]  Carla E. Brodley,et al.  Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.

[46]  Svetha Venkatesh,et al.  Learning and detecting activities from movement trajectories using the hierarchical hidden Markov model , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[47]  Meir Kalech,et al.  Online anomaly detection in unmanned vehicles , 2011, AAMAS.

[48]  Julie A. Adams,et al.  Human Management of a Hierarchical System for the Control of Multiple Mobile Robots ( Dissertation Proposal ) MS-CIS-95-17 GRASP Lab 392 , 1994 .

[49]  Svetha Venkatesh,et al.  Policy Recognition in the Abstract Hidden Markov Model , 2002, J. Artif. Intell. Res..

[50]  Gal A. Kaminka,et al.  Fast and Complete Symbolic Plan Recognition , 2005, IJCAI.

[51]  Karen L. Myers,et al.  Identifying Terrorist Activity with AI Plan Recognition Technology , 2005, AI Mag..

[52]  Robert P. Goldman,et al.  Recognizing Plans with Loops Represented in a Lexicalized Grammar , 2011, AAAI.

[53]  Wenji Mao,et al.  Decision-Theoretic Approach to Plan Recognition , 2004 .

[54]  Gregory F. Cooper,et al.  The Computational Complexity of Probabilistic Inference Using Bayesian Belief Networks , 1990, Artif. Intell..

[55]  M. Thonnat,et al.  Video understanding for metro surveillance , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[56]  Mark Steedman,et al.  On Natural Language Processing and Plan Recognition , 2007, IJCAI.