Hide and Seek at Megacity Scale

Event Time

Originally Aired - Monday, May 6 3:30 PM - 3:35 PM

Info Alert

Create or Log in to My Show Planner to see Videos and Resources.

Info Alert

Your account does not have access to this session.




Log in to your planner to join the zoom meeting!



Session Recording

Info Alert

This Session Has Not Started Yet

Be sure to come back after the session starts to have access to session resources.

Event Location

Location: Innovation Hub, Exhibit Hall 2219

Event Information

Title: Hide and Seek at Megacity Scale


Currently, large-scale human movement modeling focuses on aggregated, high-level data to study migration, the spread of disease, and other patterns of behavior. For example, hourly toll booth counts indicate traffic volume. Kitware’s work on the IARPA HAYSTAC program aims to capture more fine-grained, individual human movement patterns to identify what characterizes “normal” movement while upholding public expectations for privacy. In contrast to toll booth counts, this could mean modeling the behavior of vehicles traveling along a toll road. Where do they originate from? Where do they typically go after the toll booth, and what stops do they make along a given route? How can we model this behavior without violating any individual’s privacy?

Toward these ends Kitware is developing a privacy preserving human movement simulation system designed to handle mega-cities of up to 30 million people and simulations as long as an entire year.  Our MIRROR simulator uses a parallel, multi-resolution, spatio-temporal decomposition approach to achieve state-of-the-art computational efficiency and scale.  In our talk we will describe the architecture of our simulator, including our novel combination of efficient mesoscopic, que-based traffic simulation for traffic modeling and route generation with a parallel kinematic movement simulator which captures the detailed, meter- by-meter movement of vehicles.

In addition, we will describe approaches our team has developed to detect anomalous behaviors in trajectory data.  These include more classical “feature engineering” based methods and novel transformer-based approaches.  We will share initial anomaly detection results using our methods.  Further, we will introduce methods we have developed to generate anomalous trajectories that meet certain goals, such as going to an unusual place or going to a usual place at an unusual time, but are hidden.  

Type: Lightning Talk


Create or Log in to My Show Planner to add notes.