Two coupled pursuit-evasion games in target-Attacker-defender problem

Li Liang, Zhihong Peng, Fan Zhang, Xinxing Li

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Citations (Scopus)

Abstract

This paper addresses a differential game with three players: A target, an attacker and a defender, where the Attacker aims to capture the Target while avoiding being captured by the Defender, and the Defender tries to defend the Target from being captured by the Attacker while trying to capture the Attacker. There are two coupled pursuit-evasion problems in this game: Attacker-Target and Defender-Attacker. Firstly, a game of kind in this differential game is considered and a so-called barrier is constructed to divide the space into three disjoint regions: The win region of the Attacker, the win region of the team of the Target and Defender and the uncertain region in which neither of three players can win the game. Secondly, a game of degree is considered by introducing a payoff function. Some explicit expressions of optimal strategies for the players are obtained. Finally, the numerical solutions of optimal strategies and the corresponding optimal trajectories for three players with different initial conditions are provided.

Original languageEnglish
Title of host publication2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages5596-5601
Number of pages6
ISBN (Electronic)9781509028733
DOIs
Publication statusPublished - 28 Jun 2017
Event56th IEEE Annual Conference on Decision and Control, CDC 2017 - Melbourne, Australia
Duration: 12 Dec 201715 Dec 2017

Publication series

Name2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
Volume2018-January

Conference

Conference56th IEEE Annual Conference on Decision and Control, CDC 2017
Country/TerritoryAustralia
CityMelbourne
Period12/12/1715/12/17

Fingerprint

Dive into the research topics of 'Two coupled pursuit-evasion games in target-Attacker-defender problem'. Together they form a unique fingerprint.

Cite this