Silhouettes: a graphical aid to the interpretation and validation of cluster analysis
Journal of Computational and Applied Mathematics
Evolving dynamical neural networks for adaptive behavior
Adaptive Behavior
Automatic creation of an autonomous agent: genetic evolution of a neural-network driven robot
SAB94 Proceedings of the third international conference on Simulation of adaptive behavior : from animals to animats 3: from animals to animats 3
Learning and evolution in neural networks
Adaptive Behavior
Incremental evolution of complex general behavior
Adaptive Behavior - Special issue on environment structure and behavior
Pattern Recognition with Fuzzy Objective Function Algorithms
Pattern Recognition with Fuzzy Objective Function Algorithms
Performance Evaluation of Some Clustering Algorithms and Validity Indices
IEEE Transactions on Pattern Analysis and Machine Intelligence
Evolutionary Robotics: The Biology, Intelligence, and Technology of Self-Organizing Machines
Evolutionary Robotics: The Biology, Intelligence, and Technology of Self-Organizing Machines
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Can machine learning be secure?
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Lazy Associative Classification for Content-based Spam Detection
LA-WEB '06 Proceedings of the Fourth Latin American Web Congress
A Multiple Instance Learning Strategy for Combating Good Word Attacks on Spam Filters
The Journal of Machine Learning Research
Open problems in the security of learning
Proceedings of the 1st ACM workshop on Workshop on AISec
Situated agents can have goals
Robotics and Autonomous Systems
The security of machine learning
Machine Learning
IEEE Transactions on Pattern Analysis and Machine Intelligence
Paragraph: thwarting signature learning by training maliciously
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Computational Red Teaming: Past, Present and Future
IEEE Computational Intelligence Magazine
Characterizing warfare in red teaming
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Hi-index | 0.00 |
This paper presents an agent-based model to analyse behaviour produced under noisy and deceptive information conditions. A simple yet powerful simulation environment is developed where adaptive agents act and adapt to varying levels of information quality that they sense about their environment. The simulation environment consists of two types of agents moving in a bounded two-dimensional continuous plane: a neuro-evolutionary learning agent that adapts its manoeuvreing strategies to escape a pre-programmed deceptive agent; and a pre-programmed agent, whose goal is to capture the adaptive agent, that acts on noisy information about the adaptive agent's manoeuvres that it senses from the environment. The pre-programmed agent is also able to produce deceptive actions to confuse the adaptive agent. The behaviour is represented in terms of the manoeuvreing strategies that the agents adopt as their actions to the environmental changes. A behaviour analysis methodology is developed to compare agent actions under different information conditions, that elicits interesting relationships between behaviour and the studied information conditions. The framework is easily extendable to analyse human behaviour in similar environments by replacing the adaptive agent with an interactive human-machine interface.