• Corpus ID: 17020498

Recognizing Deception in Trajectories

@inproceedings{Jian2006RecognizingDI,
  title={Recognizing Deception in Trajectories},
  author={Jiun-Yin Jian and Jiun-Yin Jian and Toshihiko Matsuka and Toshihiko Matsuka and Jeffrey V. Nickerson and Jeffrey V. Nickerson},
  year={2006}
}
This study examines how the movement patterns of individuals may reveal their intent. Subjects were asked to deceive an imaginary observer using a paper-and-pencil test. Geographical and qualitative methods were used to analyze the data. The results showed that deceptive intent can be detected in the subjects' trajectories. Additionally, conformity of trajectories was observed. 

Figures and Tables from this paper

Towards Deceptive Intention: Finding Trajectories and Its Analysis
This study investigated how an individual's deceptive intention may be inferred from non-verbal behavioral representation while simultaneously concealing suspicious movement. Using a paper-and-pencil
Can hostile intent be detected by means of signaling
An experiment was conducted in order to uncover if a (non-) verbal signal sent at greater than interpersonal distance by a police officer could aid in the detection of hostile intentions. The
“Psyosphere”: A GPS Data-Analysing Tool for the Behavioural Sciences
TLDR
The current study demonstrates that psyosphere may enable researchers to conduct behavioural experiments with positioning technology, outside of a laboratory setting, and showed that some of these GPS-derived behavioural variables could be linked to self-reported mental states, such as fear.
Intruder Detection: An Optimal Decision Analysis Strategy
  • T. Ben-Zvi, J. Nickerson
  • Computer Science
    IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)
  • 2012
TLDR
This study considers a situation in which a sensor network aims to protect a stationary target and detects signals from approaching objects and shows that the optimal policy is of a control limit threshold.
Measuring Target Predictability for Optimal Environment Design
  • Melkior Ornik
  • Computer Science
    2020 59th IEEE Conference on Decision and Control (CDC)
  • 2020
TLDR
This paper considers the problems of detecting an agent's objective from its partial path and determining an optimal environment to enable such detection, and introduces the notion of target entropy, where higher entropy implies lower target predictability.
Single Real Goal, Magnitude-Based Deceptive Path-Planning
TLDR
This work formalized a single real goal magnitude-based deceptive path-planning problem followed by a mixed-integer programming based deceptive path maximization and generation method that helps to establish a computable foundation for any further imposition of different deception concepts or strategies, and broadens its applicability in many scenarios.
Adversarial design games and the role of anticipation in sensor networks
TLDR
The continuous contest between intruders and sensor network designers an adversarial design game is called, and ways the sensors network designers may proceed are discussed, using human design processes and automated design techniques.
Goal Recognition for Rational and Irrational Agents
TLDR
This work presents a definition of rationality appropriate to situations where the ground truth is unknown, defines a rationality measure (RM) that quantifies an agent's expected degree of suboptimality, and presents a novel self-modulating probability distribution formula for goal recognition that recognises sub optimality and adjusts its level of confidence accordingly.
Improving the Scalability of the Magnitude-Based Deceptive Path-Planning Using Subgoal Graphs
TLDR
By leading the path deception information down into a general purpose but highly-efficient path-planning formulation, the paper substantially speeds up the task upon large scale terrains with an admissible loss of deception.
...
...

References

SHOWING 1-10 OF 21 REFERENCES
Towards Deceptive Intention: Finding Trajectories and Its Analysis
This study investigated how an individual's deceptive intention may be inferred from non-verbal behavioral representation while simultaneously concealing suspicious movement. Using a paper-and-pencil
An Approach for Intent Identification by Building on Deception Detection
TLDR
A theoretical foundation and model for the analysis of intent detection is proposed and two proof-of-concept studies exploring nonverbal communication within the context of deception detection and intent analysis are shared.
Detecting Deceit via Analysis of Verbal and Nonverbal Behavior
We examined the hypotheses that (1) a systematic analysis of nonverbal behavior could be useful in the detection of deceit and (2) that lie detection would be most accurate if both verbal and
Moving toward intent detection: a tool-based approach
  • J. Burgoon, M. Adkins, R. Younger
  • Psychology
    Proceedings. The 7th International IEEE Conference on Intelligent Transportation Systems (IEEE Cat. No.04TH8749)
  • 2004
TLDR
A theoretical foundation and model for the analysis of intent detection is proposed and two proof-of-concept studies exploring nonverbal communication within the context of intent Detection are shared.
Hostile attribution of intent and aggressive behavior: a meta-analysis.
TLDR
A robust significant association between hostile attribution of intent and aggressive behavior was found and the importance of understanding moderators of effect size for theory development is stressed.
Classifying Surveillance Events from Attributes and Behaviour
TLDR
A Bayesian classifier is employed to determine type from event attribute such as height, width and velocity and is extended to integrate all available evidence from the entire track to generate accurate type and behaviour classifications.
Individual differences in facial expression: stability over time, relation to self-reported emotion, and ability to inform person identification
TLDR
Individual differences in facial expression were stable over time, comparable in magnitude to stability of self-reported emotion, and sufficiently strong that individuals were recognized on the basis of their facial behavior alone at rates comparable to that for a commercial face recognition system.
Using movement and intentions to understand simple events
Aggregation and comparison of trajectories
TLDR
Different approaches to aggregate similar trajectories are described, which are good for short time series and in absence of noise, which is definitely not the case for moving objects.
...
...