Skip to main content

Showing 1–12 of 12 results for author: Dorothy, M

Searching in archive eess. Search in all archives.
.
  1. arXiv:2506.13650  [pdf, ps, other

    eess.SY cs.GT cs.MA

    Deceptive Path Planning: A Bayesian Game Approach

    Authors: Violetta Rostobaya, James Berneburg, Yue Guan, Michael Dorothy, Daigo Shishika

    Abstract: This paper investigates how an autonomous agent can transmit information through its motion in an adversarial setting. We consider scenarios where an agent must reach its goal while deceiving an intelligent observer about its destination. We model this interaction as a dynamic Bayesian game between a mobile Attacker with a privately known goal and a Defender who infers the Attacker's intent to all… ▽ More

    Submitted 16 June, 2025; originally announced June 2025.

    Comments: 8 pages, 9 figures. This work has been submitted to the IEEE for possible publication

  2. arXiv:2504.13288  [pdf, other

    eess.SY

    Integrated Control and Active Perception in POMDPs for Temporal Logic Tasks and Information Acquisition

    Authors: Chongyang Shi, Michael R. Dorothy, Jie Fu

    Abstract: This paper studies the synthesis of a joint control and active perception policy for a stochastic system modeled as a partially observable Markov decision process (POMDP), subject to temporal logic specifications. The POMDP actions influence both system dynamics (control) and the emission function (perception). Beyond task completion, the planner seeks to maximize information gain about certain te… ▽ More

    Submitted 17 April, 2025; originally announced April 2025.

  3. arXiv:2409.16439  [pdf, other

    eess.SY

    Active Perception with Initial-State Uncertainty: A Policy Gradient Method

    Authors: Chongyang Shi, Shuo Han, Michael Dorothy, Jie Fu

    Abstract: This paper studies the synthesis of an active perception policy that maximizes the information leakage of the initial state in a stochastic system modeled as a hidden Markov model (HMM). Specifically, the emission function of the HMM is controllable with a set of perception or sensor query actions. Given the goal is to infer the initial state from partial observations in the HMM, we use Shannon co… ▽ More

    Submitted 24 September, 2024; originally announced September 2024.

  4. arXiv:2409.09302  [pdf, other

    eess.SY

    Heterogeneous Roles against Assignment Based Policies in Two vs Two Target Defense Game

    Authors: Goutam Das, Violetta Rostobaya, James Berneburg, Zachary I. Bell, Michael Dorothy, Daigo Shishika

    Abstract: In this paper, we consider a target defense game in which the attacker team seeks to reach a high-value target while the defender team seeks to prevent that by capturing them away from the target. To address the curse of dimensionality, a popular approach to solve such team-vs-team game is to decompose it into a set of one-vs-one games. Such an approximation assumes independence between teammates… ▽ More

    Submitted 14 September, 2024; originally announced September 2024.

    Comments: 7 pages, 7 figures, 2024 CDC Final Submission

  5. arXiv:2405.07465  [pdf, other

    cs.GT eess.SY

    Deception in Differential Games: Information Limiting Strategy to Induce Dilemma

    Authors: Daigo Shishika, Alexander Von Moll, Dipankar Maity, Michael Dorothy

    Abstract: Can deception exist in differential games? We provide a case study for a Turret-Attacker differential game, where two Attackers seek to score points by reaching a target region while a Turret tries to minimize the score by aligning itself with the Attackers before they reach the target. In contrast to the original problem solved with complete information, we assume that the Turret only has partial… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

  6. arXiv:2401.12848  [pdf, other

    cs.GT eess.SY

    Optimal Evasion from a Sensing-Limited Pursuer

    Authors: Dipankar Maity, Alexander Von Moll, Daigo Shishika, Michael Dorothy

    Abstract: This paper investigates a partial-information pursuit evasion game in which the Pursuer has a limited-range sensor to detect the Evader. Given a fixed final time, we derive the optimal evasion strategy for the Evader to maximize its distance from the pursuer at the end. Our analysis reveals that in certain parametric regimes, the optimal Evasion strategy involves a 'risky' maneuver, where the Evad… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

    Comments: Accepted for presentation at, and publication in the proceedings of, the 2024 American Control Conference

  7. arXiv:2311.03338  [pdf, other

    eess.SY

    Defending a Static Target Point with a Slow Defender

    Authors: Goutam Das, Michael Dorothy, Zachary I. Bell, Daigo Shishika

    Abstract: This paper studies a target-defense game played between a slow defender and a fast attacker. The attacker wins the game if it reaches the target while avoiding the defender's capture disk. The defender wins the game by preventing the attacker from reaching the target, which includes reaching the target and containing it in the capture disk. Depending on the initial condition, the attacker must cir… ▽ More

    Submitted 16 March, 2024; v1 submitted 6 November, 2023; originally announced November 2023.

    Comments: 8 pages, 12 figures, Accepted for Publication to IEEE ACC 2024

  8. arXiv:2306.03877  [pdf, other

    eess.SY

    The Eater and the Mover Game

    Authors: Violetta Rostobaya, Yue Guan, James Berneburg, Michael Dorothy, Daigo Shishika

    Abstract: This paper studies the idea of ``deception by motion'' through a two-player dynamic game played between a Mover who must retrieve resources at a goal location, and an Eater who can consume resources at two candidate goals. The Mover seeks to minimize the resource consumption at the true goal, and the Eater tries to maximize it. While the Mover has the knowledge about the true goal, the Eater canno… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: Submitted to the IEEE Control Systems Letters (L-CSS), 2023

  9. arXiv:2209.11664  [pdf, other

    cs.RO eess.SY math.OC

    A Constraint-Driven Approach to Line Flocking: The V Formation as an Energy-Saving Strategy

    Authors: Logan E. Beaver, Christopher Kroninger, Michael Dorothy, Andreas A. Malikopoulos

    Abstract: The study of robotic flocking has received significant attention in the past twenty years. In this article, we present a constraint-driven control algorithm that minimizes the energy consumption of individual agents and yields an emergent V formation. As the formation emerges from the decentralized interaction between agents, our approach is robust to the spontaneous addition or removal of agents… ▽ More

    Submitted 23 September, 2022; originally announced September 2022.

    Comments: 12 pages, 7 figures

  10. arXiv:2209.09318  [pdf, other

    eess.SY

    Guarding a Non-Maneuverable Translating Line with an Attached Defender

    Authors: Goutam Das, Michael Dorothy, Zachary I. Bell, Daigo Shishika

    Abstract: In this paper we consider a target-guarding differential game where the defender must protect a linearly translating line-segment by intercepting an attacker who tries to reach it. In contrast to common target-guarding problems, we assume that the defender is attached to the target and moves along with it. This assumption affects the defenders' maximum speed in inertial frame, which depends on the… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Comments: 8 pages, 8 figures. arXiv admin note: text overlap with arXiv:2207.04098

  11. arXiv:2204.04176  [pdf, other

    cs.GT eess.SY

    Path Defense in Dynamic Defender-Attacker Blotto Games (dDAB) with Limited Information

    Authors: Austin K. Chen, Bryce L. Ferguson, Daigo Shishika, Michael Dorothy, Jason R. Marden, George J. Pappas, Vijay Kumar

    Abstract: We consider a path guarding problem in dynamic Defender-Attacker Blotto games (dDAB), where a team of robots must defend a path in a graph against adversarial agents. Multi-robot systems are particularly well suited to this application, as recent work has shown the effectiveness of these systems in related areas such as perimeter defense and surveillance. When designing a defender policy that guar… ▽ More

    Submitted 25 May, 2023; v1 submitted 8 April, 2022; originally announced April 2022.

  12. arXiv:2112.09890  [pdf, other

    eess.SY cs.GT

    Dynamic Defender-Attacker Blotto Game

    Authors: Daigo Shishika, Yue Guan, Michael Dorothy, Vijay Kumar

    Abstract: This work studies a dynamic, adversarial resource allocation problem in environments modeled as graphs. A blue team of defender robots are deployed in the environment to protect the nodes from a red team of attacker robots. We formulate the engagement as a discrete-time dynamic game, where the robots can move at most one hop in each time step. The game terminates with the attacker's win if any loc… ▽ More

    Submitted 18 December, 2021; originally announced December 2021.