Next Article in Journal
On the Application of a Hybrid Incomplete Exponential Sum to Aperiodic Hamming Correlation of Some Frequency-Hopping Sequences
Previous Article in Journal
Cross-Subject EEG Emotion Recognition Using SSA-EMS Algorithm for Feature Extraction
Previous Article in Special Issue
Bridging Intuition and Data: A Unified Bayesian Framework for Optimizing Unmanned Aerial Vehicle Swarm Performance
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Tree–Hillclimb Search: An Efficient and Interpretable Threat Assessment Method for Uncertain Battlefield Environments †

1
School of Information Science & Technology, Northwest University, Xi’an 710127, China
2
School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710129, China
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in the Proceedings of the 10th International Conference on Control and Robotics Engineering (ICCRE 2025), Nagoya, Japan, 9–11 May 2025, pp. 323–330, entitled “A Tree-Hillclimb Search Model for Naval Air Defense Threat Assessment Integrating Expert Experience and Bayesian Networks”.
Entropy 2025, 27(9), 987; https://doi.org/10.3390/e27090987
Submission received: 14 July 2025 / Revised: 4 September 2025 / Accepted: 17 September 2025 / Published: 21 September 2025
(This article belongs to the Special Issue Bayesian Networks and Causal Discovery)

Abstract

In uncertain battlefield environments, rapid and accurate detection, identification of hostile targets, and assessment of threat levels are crucial for supporting effective decision-making. Despite offering the advantage of structural transparency, traditional analytical methods rely on expert knowledge to construct models and often fail to comprehensively capture the non-linear causal relationships among complex threat factors. In contrast, data-driven methods excel at uncovering patterns in data but suffer from limited interpretability due to their black-box nature. Owing to probabilistic graphical modeling capabilities, Bayesian networks possess unique advantages in threat assessment. However, existing models are either constrained by the limitation of expert experience or suffer from excessively high complexity due to structure learning algorithms, making it difficult to meet the stringent real-time requirements of uncertain battlefield environments. To address these issues, this paper proposes a new method, the Tree–Hillclimb Search method—an efficient and interpretable threat assessment method specifically designed for uncertain battlefield environments. The core of the method is a structure learning algorithm constrained by expert knowledge—the initial network structure constructed from expert knowledge serves as a constraint, enabling the discovery of hidden causal dependencies among variables through structure learning. The model is then refined under these expert knowledge constraints and can effectively balance accuracy and complexity. Sensitivity analysis further validates the consistency between the model structure and the influence degree of threat factors, providing a theoretical basis for formulating hierarchical threat assessment strategies under resource-constrained conditions, which can effectively optimize sensor resource allocation. The Tree–Hillclimb Search method features (1) enhanced interpretability; (2) high predictive accuracy; (3) high efficiency and real-time performance; (4) actual impact on battlefield decision-making; and (5) good generality and broad applicability.

1. Introduction

The evolution of modern warfare, especially rapid advancements in aircraft and missile technologies, has profoundly altered the offensive and defensive dynamics on the battlefield, significantly compressing the decision-making window for the defender [1,2]. Under these circumstances, rapid and accurate threat assessment is an unprecedented challenge in uncertain battlefield environments. The ability to efficiently detect, identify, and assess targets—including their state, intent, and threat level—is directly related to the effectiveness of critical decisions such as evasive maneuvers and fire allocation, and it is crucial for enhancing overall operational effectiveness.
Currently, threat assessment methods primarily develop along two paths: analytical methods (linear weighting methods) and data-driven methods (non-linear reasoning methods). Analytical methods, such as the Analytic Hierarchy Process (AHP) [3,4], Multi-Attribute Decision-Making (MADM) theory [5], and TOPSIS [6,7], rely on expert knowledge to construct theoretical models and evaluate threats through using quantitative indicators. Their advantage lies in the simplicity and transparency of the model structure, and they can achieve high accuracy when expert knowledge is reliable and comprehensive. However, in the face of increasingly complex threat factor systems, existing expert knowledge often fails to comprehensively depict intricate, non-linear causal relationships, leading to limited model representational capacity and potentially decreased assessment accuracy. Data-driven methods, such as neural networks [8,9,10,11], support vector machines (SVMs) [12], and Bayesian networks (BNs) [13,14,15], learn non-linear mapping from threat attributes to assessment results directly from data, thereby reducing strong reliance on expert knowledge and excelling at uncovering complex patterns hidden within the data. However, their significant drawback—being treated as “black-box”—makes it difficult to effectively integrate and utilize valuable domain expert knowledge. Furthermore, data-driven methods suffer from poor interpretability and lack transparency in their reasoning processes.
As a key representative of data-driven methods, Bayesian networks (BNs), due to their integration of probability theory and graph theory, demonstrate unique value in the field of threat assessment under uncertain battlefield environments [16,17,18,19]. They can clearly represent the dependencies among threat factors and effectively integrate expert knowledge to handle situations with incomplete information, with their reasoning process being more aligned with human cognitive patterns. There are currently two main approaches for constructing Bayesian networks:
  • One is to build the network based on expert knowledge, typically resulting in single-layer or multi-layer naive models. For example, Zhou Yuan proposed a threat assessment model for key point air defense targets based on a Naive Bayesian Network [20]; Tang Shuai proposed a threat assessment model based on a hierarchical Naive Bayesian network according to the indicator system architecture for potential threat assessment of underwater platforms [21].
  • The other is to use structure learning algorithms to directly learn the network structure from data. For example, Li Ye proposed a dynamic programming Bayesian network structure learning algorithm integrating MWST and an improved MMPC algorithm and applied it to construct a target threat assessment model [22]; Shang Shanshan proposed a particle swarm optimization algorithm integrating a Salp Swarm Algorithm (SSA) mechanism and modeled submarine threat assessment [23].
However, both of these methods have limitations: models constructed by experts heavily rely on predefined causal relationships, and when experts fail to fully grasp all causal relationships among complex factors, the model structure may become inaccurate, affecting the accuracy of reasoning and assessment precision; while models obtained through purely data-driven structure learning often exhibit excessively high structural complexity, leading to large scoring computations, they significantly increase algorithmic computational time and storage requirements, making it difficult to meet the stringent real-time demands of uncertain battlefield environments.
To address these challenges, this paper aims to explore a novel Bayesian network threat assessment construction paradigm and develop its specific implementation, the Tree–Hillclimb Search method [24]. This method is dedicated to becoming an efficient and interpretable threat assessment solution for uncertain battlefield environments. Its core idea is to integrate expert knowledge as constraints into the structure learning process, seeking a superior balance among model accuracy, complexity, and real-time performance. Specifically, based on expert knowledge, Tree–Hillclimb Search takes the initial network structure as its foundation and constraint, ensuring the model possesses a reasonable logical starting point grounded in domain knowledge and interpretability; it then employs structure learning algorithms to reveal causal dependencies among variables and subsequently conducts guided corrections to the initial network within the constraint framework based on the learning results and sensitivity analysis. This hybrid mechanism allows for flexible adjustment according to the relative reliability of expert knowledge versus data. It is anticipated that this model will integrate the advantages of both approaches:
  • First, Tree–Hillclimb Search compensates for localized gaps in expert knowledge through data learning, thus achieving higher precision than expert empirical models.
  • Second, by incorporating expert constraints to limit structural complexity, Tree–Hillclimb Search maintains significantly lower model complexity and computational overhead compared to complex networks learned purely from data. This enables effective improvements in evaluation accuracy and speed within acceptable computational costs, better meeting the rapid decision-making demands in uncertain battlefield environments.
This paper conducts research (under the typical uncertain battlefield environment case of naval air defense) to demonstrate the effectiveness and superiority of Tree–Hillclimb Search.

2. Task Scenario

The uncertain battlefield environment poses significant challenges to threat assessment, characterized by incomplete information, rapidly changing situations, and severely compressed decision-making windows. In the context of naval air defense, the rapid advancement of aviation and missile technologies has profoundly altered the offense–defense balance. The diverse, dense, and high-speed aerial strike capabilities exert unprecedented pressure on surface ships [25]. In such uncertain battlefield environments, the ability to quickly and accurately assess threat levels and provide reliable bases for critical decisions, such as evasive maneuvers and fire distribution, is directly linked to the enhancement of overall combat effectiveness. This paper takes naval air defense as a case study, aiming to explore threat assessment methods suitable for such uncertain battlefield environments. The core idea and methodology are universal and can be extended to other battlefield scenarios with similar uncertainties.
Therefore, this paper focuses on the air defense operations of our fleet against enemy anti-ship attacks. In the task scenario, our fleet, centered around the flagship, is accompanied by multiple warships equipped with various sensors. The fleet maintains a constant formation during air defense operations. The formation of enemy flight will launch attacks from different directions, approximately 200 km away from the center of our fleet, consisting of two groups of carrier-based attack aircraft, one group of electronic warfare aircraft, and one group of unmanned reconnaissance aircraft, as shown in Figure 1.
According to the task scenario, the dataset used in this paper includes 15 nodes: threat level (Threaten), target type (Type), Target State (State), Time of Arrival (Time), electromagnetic radiation (Detected), Radiation Sources (Sources), electromagnetic detection time (Duration), Altitude, Sensors, time interval (Interval), Heading, Latitude, Longitude, Speed, and Distance. Among these, the parameters of the Threaten, Type, State, and Time nodes cannot be directly obtained or measured by our ships in real-world situations, while the parameters of the other nodes can be measured by our shipborne detection sensors.
Since Bayesian network algorithms are generally not suitable for continuous variables and there are multiple continuous variables in this dataset, along with some discrete variables with a large number of states, it is necessary to discretize certain data nodes before performing Bayesian network structure learning and sensitivity analysis. The state spaces of each node variable are shown in Table 1.
The dataset was generated via a high-fidelity naval combat simulation platform, modeling various encounter scenarios between a fleet and incoming aerial targets. The dataset comprises over thirty thousand data samples, each of which represents a battlefield snapshot containing sensor observations and the corresponding threat level. Table 2 below is a representative example of a data instance:

3. Threat Assessment Model Based on Expert Experience

According to the task scenario, the threat level is determined by the target information, which can be expressed using a Naive Bayes model. To enhance the interpretability of the model, several intermediate nodes are introduced. Therefore, a multi-layer Naive Bayes network is employed in this paper to construct the threat assessment model based on expert experience, comprising four local assessment models as shown in Figure 2, Figure 3, Figure 4 and Figure 5.
The threat level serves as the root node of the first layer and the entire network. When evaluating the degree of threat, the focus is on the Type and State of the target. Since these two characteristics directly determine the threat, the feature nodes of the Threaten in the threat assessment model consist solely of the Type and the State, as depicted in Figure 2.
In determining the assessment model of target type, the most intuitive feature node is whether the target is detected (Detected), as this scenario represents the highest likelihood of a particular aircraft type performing its designated mission. Additionally, the duration of electromagnetic detection time (Duration) and the estimated source of electromagnetic emission (Sources) are crucial for identifying the target type. Furthermore, our infrared detection source (Sensor), detection interval (Interval), and target altitude (Altitude) also serve as bases for judging the Type, and thus they are included as child nodes of the Type, as depicted in Figure 3.
For the Bayesian assessment model of the Target State, the root node is the State, and its feature node is the Heading, as depicted in Figure 4.
In addition to the three aforementioned local models, an additional feature node, time to arrival (Time), can be introduced at the lowest level. This node is related to various current motion state parameters of the enemy target. The parameters of the target that can be measured by our warship’s sensors include Latitude, Longitude, Speed, Altitude, and Distance, all of which are incorporated as feature nodes of the Time, as depicted in Figure 5.
By connecting the four local assessment models, a complete threat assessment model based on expert experience is obtained, as depicted in Figure 6. The eleven nodes, including Latitude, Longitude, Speed, Altitude, Distance, Heading, Duration, Detected, Sources, Sensors, and Interval, represent the most basic feature nodes. They constitute the parameters of the unknown aerial target that can be directly acquired or measured by our warship.

4. Threat Assessment Model Based on Structure Learning Algorithms

Bayesian network structure learning (BNSL) refers to the process of using certain reasoning algorithms to identify the network structure that best fits the sample dataset without prior knowledge of the network structure or its parameters. It also reveals the qualitative relationships between variables [26,27].
In this study, we select a diverse set of structure learning algorithms as benchmarks to thoroughly evaluate the proposed Tree–Hillclimb Search method against state-of-the-art approaches from different philosophical families. This selection is made to be compared with our method:
  • Constraint-based methods: These are represented by the PC-estimate algorithm, which is grounded in statistical conditional independence tests. This approach is theoretically well-founded for learning causal structures and is particularly suitable for revealing the underlying dependency skeleton among variables, making it a robust baseline for comparison.
  • Score-based local search methods: These are represented by the Hillclimbing Search algorithm. This approach is chosen for its simplicity, computational efficiency, and widespread adoption in practical applications. It exemplifies the classic trade-off between search efficiency and the risk of converging to local optima.
  • Global optimization strategies: These are represented by the Tree Search algorithm. The method of this category aims to search the model space in more detail. Compared with the Hillclimbing algorithm, it is not easy to fall into local optimization, but the computational cost is high.
In the hyper-parameter settings for the simulation tests, the Bayesian Information Criterion (BIC) was adopted as the scoring function for all score-based algorithms (Hillclimbing, Tree Search, and Tree–Hillclimb) due to its desirable property of penalizing model complexity. The search process terminates when no score improvement is observed over 100 consecutive iterations.
This multi-faceted benchmarking approach ensures a comprehensive and fair evaluation of our proposed method against strong and diverse competitors.

4.1. PC-Estimate Algorithm

The PC-estimate algorithm is a significant variant of the classical PC algorithm, specifically designed for learning Bayesian network structures from observational data. Its core theoretical foundation lies in conditional independence testing, which assumes that the true network structure encodes the conditional independence relationships among variables [28,29]. The algorithm systematically eliminates non-existent edges through statistical testing, ultimately deriving the network’s skeleton structure (undirected graph) and partially determining the direction of edges, forming a complete partial directed acyclic graph (CPDAG) representing Markov equivalence classes. The pseudocode for the PC-estimate algorithm is presented in Algorithm 1.
Algorithm 1 PC-estimate algorithm [30]
  • INPUT: Vertex set  V , Conditional Independence Information
  • OUTPUT: Estimated skeleton  C , separation sets  S  (only needed when directing the skeleton afterwards)
  • 1. Form the complete undirected graph C on the vertex set V.
  • 2.  l = 1 ; C C ˜
  • 3. repeat
  • 4.      l = l + 1
  • 5.      repeat
  • 6.              Select a (new) ordered pair of nodes  i , j  that are adjacent such that
  •                | adj ( C , i ) { j } | l
  • 7.              repeat
  • 8.                    Choose (new)  k adj ( C , i ) { j }  with  | k | = l
  • 9.                    if i and j are conditionally independent given k then
  • 10.                          Delete edge  i , j
  • 11.                          Denote this new graph by C
  • 12.                          Save k in  S ( i , j )  and  S ( j , i )
  • 13.                    end if
  • 14.              until edge  i , j  is deleted or all  k adj ( C , i ) { j }  with  | k | = l  have been chosen
  • 15.        until all ordered pairs of adjacent variables i and j such that  | adj ( C , i ) { j } | l
  •            and  k adj ( C , i ) { j }  with  | k | = l  have been tested for conditional independence
  • 16. until for each ordered pair of adjacent nodes  i , j : | adj ( C , i ) { j } | < l
The algorithm starts with a complete undirected graph, assuming potential connections between all variables. Its core phase employs a stratified conditional independence testing strategy, beginning with zeroth-order conditioning (unconditional independence testing) and progressively increasing the number of conditioning variables ( k = 0 , 1 , 2 , ). At each layer, the algorithm tests the independence of adjacent variable pairs  X Y  given a candidate conditioning set Z of size k. If there exists a Z that renders X and Y conditionally independent, the connecting edge is removed, and Z is recorded as the separating set. This process iterates until all adjacent variable pairs have been tested or the conditioning set size reaches a preset limit. Unlike the traditional PC algorithm, PC-estimate introduces a stability enhancement mechanism: it generates candidate skeletons through multiple data subsamples and filters edges based on their frequency of appearance in the subsamples, retaining only those with stability exceeding a threshold  τ . This design aims to improve robustness in scenarios with small samples and high dimensions. After the skeleton is determined, the algorithm identifies V-structures (triplets of the form  X Z Y ) using Sepset information and applies the Meek ruleset to propagate directional constraints, ultimately outputting a CPDAG.
Using the PC-estimate algorithm for Bayesian network structure learning, the resulting threat assessment model is shown in Figure 7, referred to as the PC-estimate model. In this model, the Detected node has no connecting edges to other nodes, and a directed cycle “Time→Speed→Interval→Time” appears, which is not allowed in Bayesian networks. Consequently, the PC-estimate model is unreasonable and unsuitable for further work; it should be discarded.

4.2. PC-skeleton_to_pdag Algorithm

The PC-skeleton_to_pdag algorithm is a core directional module within the classical PC structure learning framework, responsible for converting an undirected skeleton graph into a partially directed acyclic graph (PDAG) representing Markov equivalence classes. Its design objective is to maximize the determination of edge directions while maintaining structural equivalence consistency, under the premise of satisfying d-separation semantics. The pseudocode for the PC-skeleton_to_pdag algorithm is presented in Algorithm 2.
Algorithm 2 PC-skeleton_to_pdag algorithm [30]
  • INPUT: Skeleton  G skel , separation sets  S
  • OUTPUT: CPDAG  G
  • 1. for all pairs of nonadjacent variables  i , j  with common neighbor k do
  • 2.        if  k S ( i , j )  then
  • 3.              Replace  i k j  in  G s k e l   i k j
  • 4.        end if
  • 5. end for
  • 6. In the resulting PDAG, try to orient as many undirected edges as possible by repeated
  •    application of the following three rules:
  • 7. R1 Orient  j k  into  j k  whenever there is an arrow  i j  such that i and k are nonadjacent.
  • 8. R2 Orient  i j  into  i j  whenever there is a chain  i k j
  • 9. R3 Orient  i j  into  i j  whenever there are two chains  i k j  and  i l j  such that k and l are nonadjacent.
  • 10. R4 Orient  i j  into  i j  whenever there are two chains  i k l  and  k l j  such that k and l are nonadjacent.
The algorithm takes the skeleton graph and separating sets as input and realizes direction derivation through a two-phase process. In the first phase, V-structures (collider nodes) are identified: for every undirected triplet X-Z-Y (where X and Y are nonadjacent) in the skeleton, if Z is not in the Sepset (X,Y), then Z is inferred to be a collider node, and the direction is set as X→Z←Y. This step is based on the logic of conditional independence—if X and Y are related (non-independent) given Z, then Z must be a common effect of X and Y. In the second phase, the Meek ruleset is applied to propagate directional constraints: based on the partially determined edge directions, the remaining edge directions are iteratively derived using four types of deterministic rules (avoiding new V-structures, preventing cycle formation, transitive orientation, and repelling conflicting directions). For example, if there exists A→B—C and A and C are nonadjacent, then B→C is mandatorily oriented to avoid generating an unobserved V-structure A→B←C; if there exists A→B→C and A—C, then A→C is oriented to prevent cycle formation. This process continues until no new edges can be oriented, outputting a PDAG containing both directed and undirected edges, where undirected edges represent uncertain dependency relationships within the equivalence class.
Using the PC-estimate algorithm for Bayesian network structure learning, the resulting threat assessment model is shown in Figure 8, referred to as the PC-skeleton_to_pdag model. In this model, the Detected node has no connecting edges to other nodes, and a directed cycle “Latitude→Time→Speed→Latitude” appears, which is not allowed in Bayesian networks. Consequently, the PC-skeleton_to_pdag model is unreasonable and unsuitable for further work; it should be discarded.

4.3. Hillclimbing Search Algorithm

The Hillclimbing Search algorithm is a classic local optimization method within the framework of Bayesian network structure learning based on scoring search. The core idea is to transform the structure learning into a combinatorial optimization problem: defining a scoring function to quantify the fitness of the network structure to the data and using heuristic search to find the graph model with the best score [31,32]. Due to its simplicity and computational efficiency, this algorithm has become a widely adopted basic method in practical applications. The pseudocode for the Hillclimbing algorithm is presented in Algorithm 3.
Algorithm 3 Hillclimbing Search algorithm
  • INPUT: Variables set  X , dataset  D , scoring function  f
  • OUTPUT: Bayesian network  G
  • 1. Initial network structure G
  • 2.  b e s t S c o r e f ( G D )
  • 3. while true
  • 4.         N e w S c o r e , N e w D A G null
  • 5.        for each do obtained by the add-edge, delete-edge, and reverse-edge operators  G
  • 6.                 c u r r e n t S c o r e f G D
  • 7.                if  c u r r e n t S c o r e > n e w S c o r e
  • 8.                         n e w S c o r e c u r r e n t S c o r e , n e w D A G G
  • 9.                end if
  • 10.          end for
  • 11.      if  n e w S c o r e > b e s t S c o r e
  • 12.                 b e s t S c o r e n e w S c o r e , G n e w D A G
  • 13.        else
  • 14.                return G
  • 15.        end if
  • 16. end while
Hillclimbing Search starts with a randomly generated or empty network as the initial structure and iteratively executes the optimization loop of local perturbation, evaluation, and selection. In each iteration, the algorithm generates a set of neighboring structures for the current network, usually including three types of operations: adding valid edges (without introducing cycles), deleting existing edges, or reversing edge directions (while maintaining acyclicity). Each candidate structure is evaluated by a scoring function (such as the Bayesian Information Criterion (BIC), the Bayesian Dirichlet equivalent (BDe) score, or the Minimum Description Length (MDL)), and the structure with the greatest score improvement is selected as the starting point for the next round of search. This process continues until convergence conditions are met (such as no improvement in the neighborhood or reaching the maximum number of iterations). To avoid local optimum traps, strategies such as random restarts (randomly initializing new starting points) or taboo lists (recording recent operations to avoid cycles) are often employed. The final output is the directed acyclic graph (DAG) with the highest score.
Using the Hillclimbing Search algorithm for Bayesian network structure learning, the threat assessment model obtained, as shown in Figure 9, is called the Hillclimbing Search model. This model includes all nodes, and the network structure does not contain directed cycles, indicating that the Hillclimbing Search model is reasonable and suitable for subsequent work.

4.4. Tree Search Algorithm

The Tree Search algorithm is a class of Bayesian network structure learning methods based on systematic space enumeration, whose core idea is to model the network structure learning as an optimal path search problem in the state space [33,34]. Unlike local optimization strategies, this algorithm explicitly constructs a search tree to traverse the possible network structure space, aiming to balance computational feasibility and global optimality, especially suitable for precise learning of medium-sized networks. The pseudocode for the Tree Search algorithm is presented in Algorithm 4.
Algorithm 4 Tree Search algorithm [35]
  • INPUT: Mutual information  { I ( i , j ) } i j
  • OUTPUT: Edge set  E
  • 1.  E : = { }
  • 2.  ε : = { { i , j } i j }
  • 3.  ε : = ε { { i , j } }  for  { i , j } ε  maximizing  I ( i , j )
  • 4. if  ( V , E { { i , j } } )  does not contain a loop, then  E : = E { { i , j } }
  • 5. if  ε { } , then go to 3, else terminate
  • ( ∪ and ∖ denote the addition and subtraction of two sets)
The algorithm starts with an empty graph or a preset initial structure as the root node and iteratively extends child nodes to generate a search tree. Each node represents a partial or complete network structure, and edges represent structural transformation operations (such as adding, deleting, or reversing directed edges). The search process relies on heuristic scoring functions (such as BIC or BDeu) to evaluate the fitness of structures and employs branch-and-bound strategies for space pruning: setting a score threshold for the current best solution and discarding branches whose upper bound score is below the threshold (proving that they cannot yield a better solution). Typical implementations include two paradigms:
  • Breadth-First Search (BFS): Expanding all possible operations layer by layer, using score bounds for pruning to ensure the global optimal solution is found within a limited depth;
  • A* Search: Introducing a heuristic function to estimate the potential score gain of unexplored paths, prioritizing the expansion of the most promising branches to improve search efficiency.
The termination condition is usually set as the completion of the search tree traversal or reaching the computational resource limit, with the output being the DAG structure corresponding to the historically best score.
Using the Tree Search algorithm for Bayesian network structure learning, the threat assessment model obtained, as shown in Figure 10, is called the Tree Search model. This model includes all nodes, and the network structure does not contain directed cycles, indicating that the Tree Search model is reasonable and suitable for subsequent work.

4.5. TAN Model

The Tree–Augmented Naive Bayes (TAN) model is a semi-naive classifier based on the Bayesian network, proposed by Nir Friedman et al. in 1997 [36]. While retaining the efficiency of the Naive Bayes model, the TAN model introduces a tree-like conditional dependence structure among attribute variables, significantly improving classification performance and maintaining computational efficiency. This model balances complexity and expressiveness, making it particularly suitable for complex scenarios with significant correlations among attributes.
By examining the Hillclimbing Search model and the Tree Search model, we can observe that although their dependency and independence relationships are not entirely the same, some dependency relationships are reflected in both models, such as “Sources→Detected”, “Sensor→Interval”, and “Interval→Duration”. Based on this understanding, these edges are added to the expert experience model to establish a TAN model, as shown in Figure 11, serving as the fourth network structure for subsequent sensitivity analysis work.

5. Sensitivity Analysis of Threat Assessment Models

5.1. Sensitivity Analysis

The sensitivity analysis of Bayesian networks focuses on quantifying the impact of local parameter changes on global inference conclusions, thereby revealing the intrinsic dependency relationships among system variables [37,38,39]. Bayesian networks naturally depict causal dependencies among variables through directed acyclic graphs and utilize conditional independence to efficiently decompose high-dimensional joint probability distributions, significantly reducing the modeling and computational burden of complex systems. This characteristic not only enhances the model’s applicability to multi-attribute complex scenarios but also simplifies the implementation of sensitivity analysis—by systematically perturbing the conditional probability parameters of specific nodes, the propagation effect on the target query can be precisely traced without the need for repeated global computations. This method quantifies parameter sensitivity, identifies the sources of uncertainty that have the greatest impact on outputs, and provides a theoretical basis for optimizing data collection and improving model robustness.
The choice of sensitivity metrics is critical for accurately characterizing the influence of threat factors on the assessment outcome. Rather than relying on a single measure, we employ a trio of complementary metrics—variance reduction ( V r ), mutual information ( M I ), and expected variance ( V E )—to provide a holistic view. Each metric illuminates a different aspect of “influence”:
  • V r  quantifies the extent to which knowing a feature’s value reduces the uncertainty (variance) in the threat level. It answers the following question: “How much does a feature reduce the uncertainty of the target variable?”
  • M I  measures the amount of information shared between a feature and the threat level, capturing all forms of statistical dependence, both linear and non-linear. It answers the following: “How much does knowing this feature tell me about the threat level?”
  • V E  captures the degree to which changes in a feature cause shifts in the expected value (mean) of the threat level. It answers the following: “Does this feature systematically increase or decrease the estimated threat score?”
This multi-faceted approach is necessary because a feature might be highly informative (high  M I ) without drastically changing the mean threat estimate (low  V E ), or vice versa. Using all three metrics mitigates the potential bias of any single measure and provides a more robust foundation for formulating resource allocation strategies.

5.2. Sensitivity Analysis Based on Variance Reduction

Variance reduction is an indicator that measures the impact of a feature on the uncertainty of the target variable [40]. When the value of a node (feature) is known, the conditional variance of the target variable decreases. The greater the reduction in variance, the greater the impact of the feature on the target variable, indicating stronger sensitivity; conversely, weaker sensitivity is indicated. The calculation formula for variance reduction is shown in Equation (1):
V r ( F ) = V ( Q ) E [ V ( Q F ) ]
where Q is the target variable, which in this paper refers to Threaten;  V ( Q )  represents the unconditional variance of the target variable; F denotes the node to be analyzed, referring in this paper to target parameters such as Speed and Distance; and  E [ V ( Q F ) ]  is the expectation of the conditional variance, whose calculation formulas are shown in Equations (2) and (3):
V ( Q ) = q P ( q ) · X q E [ Q ] 2
E [ V ( Q F ) ] = f P ( f ) · V ( Q f )
where Q is the target variable,  X q  is the numerical mapping of each state of the target variable,  E [ Q ] = P ( q ) · X q  is the unconditional expectation, F is the node to be analyzed,  V ( Q f ) = q P ( q f ) · X q E [ Q f ] 2  is the conditional variance given  F = f , and  E ( Q f ) = q P ( q f ) · X q  is the conditional expectation.
The calculation of the sensitivity of each node to the Threaten node is shown in Table 3 V r [ 0 , V ( Q ) ] , and a higher value indicates a stronger impact of the feature on the uncertainty of the target variable. Considering the sensitivity analysis results of each threat assessment model, a sensitivity ranking based on variance reduction is provided: Distance, Heading, Speed, Latitude, Longitude, Sensor, Altitude, Interval, Sources, Duration, and Detected.

5.3. Sensitivity Analysis Based on Mutual Information

Mutual information measures the statistical dependence between a node and the target variable, reflecting the amount of information that a feature provides about the target variable [41]. In sensitivity analysis, it represents the amount of information shared between a feature and the target variable. The greater the mutual information, the more information the node provides about the target node, indicating a stronger correlation between the feature and the target variable, and thus the greater importance of the feature in predicting the target variable.
The definition of mutual information is based on the joint probability distribution  P ( X , Y )  and the marginal probability distributions  P ( X )  and  P ( Y ) , as shown in Equation (4):
I ( F ; Q ) = f q P ( f , q ) · log 2 P ( f , q ) P ( f ) · P ( q )
where Q is the target variable, which in this paper refers to Threaten; F denotes the node to be analyzed, referring in this paper to target parameters such as Speed and Distance;  P ( f )  and  P ( q )  are the marginal probabilities of F and Q, respectively; and  P ( f , q )  is the joint probability of F and Q. The logarithm used in mutual information  I ( F ; Q )  is based on 2 as the base, and the unit is bits.
The calculation of the sensitivity of each node to the Threaten node is shown in Table 4 I ( F ; Q ) 0 , and a higher value indicates that the feature provides more information about the target variable. Considering the sensitivity analysis results of each threat assessment model, a sensitivity ranking based on mutual information is provided: Distance, Speed, Heading, Sensor, Longitude, Sources, Duration, Detected, Altitude, Latitude, and Interval.

5.4. Sensitivity Analysis Based on Expected Variance

The expected variance measures the degree of change in the conditional expectation  E [ Y X ]  of the target variable Y as the input variable X changes, indicating the average impact on the expected value Y of X. The core idea is to calculate the conditional expectations of the target variable given different states of each feature node and then compute the variance of these conditional expectations [42], as defined in Equation (5):
V E = Var ( E [ Y X ] )
where  E [ Y X ]  is the conditional expectation of Y given X. When the input variable X assume different states  X i , the expected value of the target variable Y changes, and the expected variance quantifies the extent of this change, as shown in Equation (6):
V E = E ( E [ Y X ] E [ E [ Y X ] ] ) 2
If X has a strong influence on Y, then changing the value of X will significantly alter the expected value of Y, leading to large differences in  E [ Y X ]  across different values of X and consequently resulting in a large variance  V E . Conversely, if X has no influence on Y, then  E [ Y X ]  remains nearly constant, and the variance  V E  is approximately zero.
Based on the expected variance indicator, the sensitivity of each node to the Threaten node is calculated, with the results presented in Table 5 V E [ 0 , V ( Q ) ] , and a higher value indicates a greater impact of the feature on the conditional expectation of the target variable. Considering the sensitivity analysis results of each threat assessment model, a sensitivity ranking based on expected variance is provided: Sources, Heading, Distance, Speed, Longitude, Sensor, Latitude, Altitude, Interval, Detected, and Duration.

5.5. Comparative Visualization of Sensitivity Results

Based on the data presented in Table 3, Table 4 and Table 5, the results of the sensitivity analysis were visualized as shown in Figure 12, Figure 13, Figure 14 and Figure 15. The three sensitivity metrics— V r M I , and  V E —for the NB Model, TAN model, Hillclimbing Search model, and Tree Search model were each normalized via min-max scaling to the range [0, 1]. A separate visualization of the sensitivity analysis results was generated for each model. These visualizations facilitate a direct comparison of how each metric ranks the importance of key threat factors.
By comprehensively considering the above sensitivity ranking, the degree of influence of the 11 threat elements directly obtainable in this paper’s naval air defense threat assessment model on threat assessment is determined, yielding the following sensitivity ranking: Heading, Distance, Speed, Sensor, Latitude, Longitude, Interval, Altitude, Sources, Duration, and Detected. Among these, Heading and Distance have a strong influence on threat assessment, followed by Speed and Sensor, while Latitude and Longitude still have a certain degree of influence. Nodes such as Interval, Altitude, Sources, Duration, and Detected are considered to have minimal impact.

6. Tree–Hillclimb Search: Construction and Validation of an Efficient and Interpretable Threat Assessment Method

6.1. Model Construction

This section delineates the construction process of the core method proposed in the title—Tree–Hillclimb Search. The method aims to build a threat assessment model for uncertain battlefield environments that balances efficiency (low complexity, rapid inference) with interpretability. Its cornerstone is a structure learning mechanism grounded in expert knowledge constraints: an initial network structure constructed from expert knowledge serves as the foundation and constraint framework, mining potential causal dependencies between variables from data using a structural learning algorithm. Guided by the results of this learning and sensitivity analysis, the initial network is then refined within the boundaries set by expert experience. This approach is made to merge the interpretability of expert knowledge with the high-precision potential of data-driven methods, while strictly limiting model complexity through a constraint mechanism, thereby laying the groundwork for rapid inference in uncertain battlefield environments.
The expert knowledge is integrated through a set of hard constraints, denoted as C, which rigorously governs the structure learning process. These constraints are formally defined as follows:
  • C_preserve (Mandatory Edge Preservation): All directed edges ( X i X j ) that exist in the initial expert-derived graph  G _ e x p e r t  must be preserved. The Algorithm 5 is prohibited from removing or reversing these edges. This directly incorporates expert experience and guarantees that the final model remains interpretable to them.
  • C_add (Edge Addition Permission): A new directed edge ( X i X j ) not in  G _ e x p e r t  may be added only if it satisfies two conditions:
    (1) it does not create a directed cycle (C_acyclic);
    (2) the relationship between  X i  and  X j  is deemed semantically plausible by domain knowledge. This excludes nonsensical connections (e.g.,  Latitude Sensor ) and focuses the search on meaningful causal pathways (e.g.,  Speed Time ).
  • C_max_parents (Complexity Control): The number of parent nodes  | π ( X j ) |  for any variable  X j  must not exceed a predefined maximum k. In this study, k = 3. Formally,  X j V , | π ( X j ) | k . By limiting the number of parents, it prevents overfitting and ensures that the resulting network is sparse and computationally efficient, which is paramount for real-time inference.
  • C_acyclic (Acyclicity): The graph must remain a directed acyclic graph (DAG) at all times. This is a fundamental constraint of Bayesian networks.
Algorithm 5 The Tree–Hillclimb Search algorithm
  • INPUT: Variables set  V ; dataset  D ; expert-derived DAG  G _ expert ; scoring function  f ; constraint set  C .
  • OUTPUT: Final Bayesian network  G _ final .
  • 1. Initialize:  G _ c u r r e n t G _ e x p e r t b e s t _ s c o r e  f( G _ c u r r e n t D ).
  • 2. Define Constraint Set C:
  •       • C_preserve: All edges in  G _ e x p e r t  must be preserved.
  •       • C_add: New edges ( X Y ) are allowed only if they do not form a cycle and  X , Y  are conceptually related.
  •       • C_max_parents: Max parents for any node  k  (e.g., k = 3).
  •       • C_acyclic: All graphs must be acyclic.
  • 3. while not converged do
  • 4.   candidates ←
  •       Generate candidate neighbors by applying operators that comply with constraint set C:
  •       • Add-edge: For any allowed edge ( X Y ) not in  G _ c u r r e n t , if Add( X Y ) complies with C_add, C_max_parents, and C_acyclic, add  G _ c a n d i d a t e  =  G _ c u r r e n t ∪ ( X Y ) to candidates.
  •       • Reverse-edge: For an existing edge ( X Y ) in  G _ c u r r e n t , if ( X Y ) is not in C_preserve, and if Reverse( X Y ) (i.e., converting it to ( Y X )) complies with C_acyclic and C_max_parents for both nodes, add the new graph to candidates.
  •       • Delete-edge: This operator is disabled for any edge in C_preserve. For an edge ( X Y ) not in C_preserve, Delete( X Y ) is always allowed and the resulting graph is added to candidates.
  • 5.        for each  G _ c a n d i d a t e  in candidates do
  • 6.                 c u r r e n t _ s c o r e ← f( G _ c a n d i d a t e  | D)
  • 7.                if  c u r r e n t _ s c o r e > b e s t _ s c o r e  then
  • 8.                         b e s t _ s c o r e c u r r e n t _ s c o r e
  • 9.                         G _ c u r r e n t G _ c a n d i d a t e
  • 10.                end if
  • 11.        end for
  • 12. end while
  • 13.  G _ f i n a l G _ c u r r e n t
  • 14. return  G _ f i n a l
The pseudocode above formalizes the integration of expert knowledge through a set of hard constraints C. The algorithm begins by initializing the search with the expert-derived structure  G _ e x p e r t  (Step 1), ensuring that the process starts from a logically transparent and interpretable baseline. The constraint set C (Step 2) is the core mechanism that governs the entire search. The GenerateNeighbors function (Step 4) is now explicitly designed to operate within this constrained solution space. It only generates candidate structures that strictly adhere to all the rules in C. For example, it will never propose to delete an edge protected by the C_preserve. This ensures that the Tree–Hillclimb Search optimizes the model’s fit to the data without compromising the foundational knowledge provided by experts. Therefore, the final output model synergistically combines the interpretability of expert knowledge with the accuracy of data-driven learning, meeting operational requirements in uncertain battlefield environments.
In the context of naval air defense threat assessment, this paper establishes expert constraints based on domain knowledge, such as the following:
  • Time is a crucial factor affecting Threaten, with shorter times typically indicating higher threats. Consequently, while adhering to expert knowledge constraints (i.e., retaining Type and State as feature nodes for Threaten), the Time node is also included as a child of Threaten, forming an assessment structure of Threaten → [Type, State, Time].
    This structure is better aligned with the rapidly changing dynamics of the battlefield conditions.
  • A focused revision of the dependency relationships for the Time node in the initial expert model is undertaken. Based on kinematic formulas  v = s / t  and the dependencies revealed by the structure learning model, it is clear that distance (Distance) and speed (Speed) are the most direct and significant factors determining Time. Within the expert knowledge constraint framework, Distance and Speed are thus established as child nodes of Time (Time → [Distance, Speed]). Additionally, an examination of the structure learning outcomes indicates that latitude (Latitude) and longitude (Longitude) primarily influence Time indirectly through their association with Distance, while altitude (Altitude) affects Time through its connection with Speed. Hence, within the same constraint framework, Latitude and Longitude are designated as child nodes of Distance (Distance → [Latitude, Longitude]), and Altitude as a child node of Speed (Speed → Altitude). This revision not only is consistent with geographic spatial relationships and kinematic common sense but also incorporates the specific dependency strengths revealed by the data.
Ultimately, through this process of “structure learning based on expert knowledge constraints,” the Tree–Hillclimb Search model is obtained, as depicted in Figure 16. The key advantage of this model is its ability to retain and enhance the interpretable skeleton of the expert model while organically integrating critical causal dependencies revealed by data learning, thereby enhancing the model’s representational capability and expected accuracy. Crucially, the refinements made under constraint guidance keep the model’s complexity at a low level, significantly below that of pure data learning models. This streamlined structure directly translates into a marked improvement in computational efficiency, enabling rapid parameter learning and real-time inference, perfectly suiting the demanding efficiency requirements of uncertain battlefield environments. With the completion of the core model of Tree–Hillclimb Search as an efficient and interpretable threat assessment method for uncertain battlefield environments, its performance will be comprehensively evaluated in subsequent sections.

6.2. Evaluation of Model Explainability

Explainability refers to the ability of artificial intelligence systems to make their decision-making logic understandable, trustworthy, and verifiable by human users. This concept goes beyond mere “result explanation” and aims to build a cognitive bridge for human–machine collaboration, focusing on reducing the opacity of machine decisions to align with human cognitive needs and social ethical norms.
Bayesian networks, as a type of probabilistic graphical model, derive their core explainability from the fusion of structural semantic transparency and traceable probability inference. The directed acyclic graph structure of the network explicitly encodes conditional dependency relationships between variables, aligning with human cognitive modular thinking and allowing non-technical personnel to intuitively understand the system’s association mechanism. The Conditional Probability Table quantifies the interaction strength between variables, with prior probabilities representing the base State and conditional probabilities revealing the impact of interventions, thus enabling parameter-supported natural language explanations.
The Tree–Hillclimb Search model is constructed by starting from an expert knowledge model and then incorporating causal dependency relationships among threat elements obtained through structure learning. In addition to retaining the causal dependency relationships of the expert knowledge model, it also integrates deep causal dependencies mined from the data by the structure learning algorithm, rendering the causal relationships between nodes clearer and enhancing the model’s explainability compared to the expert knowledge model.

6.3. Simulation Testing Hardware Configuration

All timing experiments were conducted on a standardized hardware and software platform to ensure reproducible results. The specifications are as follows:
  • Hardware: The simulation equipment is a ROG Strix 7 Plus purchased in Xi’an, China, with the following hardware specifications: AMD Ryzen 9 7845HX (AMD, Santa Clara, CA, USA) with Radeon Graphics, 16 GB RAM.
  • Software: Windows 11 Operating System; Python 3.12.
  • Libraries: The pgmpy (v1.0.0) library was used for Bayesian network learning and inference.
All reported times are the average of 1000 independent runs. For inference time, each run involved performing belief propagation with a random set of evidence assigned to the observable nodes. This large number of iterations ensures that the measured times are statistically robust and account for potential runtime variability.

6.4. Evaluation of Model Prediction Accuracy

To evaluate the prediction accuracy of different models, we conducted conditional probability reasoning under a specific but representative threat scenario. The scenario is defined as follows: our other sensors (Sensors = 4) detect the electromagnetic radiation (Detected = 1) of an enemy aerial target with moderate altitude (Altitude = 2), small longitude (Longitude = 0), moderate latitude (Latitude = 2), and small heading angle (Heading = 0), but they fail to determine the source of the radiation (Sources = 0), with continuous electromagnetic detection (Duration = 0) and short interval time (Interval = 0). The aerial target is fast (Speed = 4) and at a moderate distance from us (Distance = 2). Analyzing the dataset reveals that, in this scenario, the threat level of the enemy aerial target to us is “high threat” (Threaten = 1).
For the evaluation of model prediction accuracy, this paper employs scenario-based reasoning of the conditional probabilities of the threat level node. To facilitate comparison, the reasoning results of the other four threat assessment models are presented side by side, as shown in Table 6.
The observed marginal difference in accuracy between the proposed Tree–Hillclimb Search model (99.7%) and the unconstrained Hillclimbing model (99.9%) warrants a detailed analysis, as it lies at the heart of the trade-off our method manages. From the perspective of model complexity and overfitting, the Hillclimbing model’s superior accuracy is achieved through a highly complex structure. This complexity grants it a high capacity to fit the training data, but it also inherently increases the risk of overfitting to noise and idiosyncrasies within the specific dataset, potentially compromising its performance and reliability on novel, unseen data. Our model, constrained to a sparser structure, inherently regularizes itself, seeking a more robust and generalizable solution. The negligible 0.2% accuracy difference suggests that the vast majority of the important predictive signals have been successfully captured without resorting to excessive complexity. From the perspective of structural constraints, the expert rules (C_max_parents, C_max_parents) deliberately limit the algorithm’s search space. This prevents it from adding edges that, while potentially yielding a minuscule gain in training accuracy, might be statistically flimsy, causally dubious, or detrimental to model interpretability. The constraints act as a form of domain-knowledge-based regularization, guiding the model toward a solution that is not only accurate but also physically meaningful and trustworthy for human operators. Therefore, this minimal accuracy gap is a conscious and advantageous sacrifice. It is the cost of achieving a model that is five times simpler and ten times faster, and one whose reasoning process can be understood and validated by experts. In the operational context of uncertain battlefields, where rapid decisions based on trustworthy information are paramount, this balance is vastly superior to a marginally more accurate but computationally expensive Hillclimbing Search model.

6.5. Evaluation of Model Complexity

In terms of model complexity, this paper first evaluates the parameter complexity of the five threat assessment models, as shown in Table 7. Parameter complexity refers to the size of the Conditional Probability Table required to store the network, which is related to the number of states of the node and the number of parent nodes. From the table, it is evident that the Tree–Hillclimb Search model exhibits significantly reduced complexity compared to the Hillclimbing Search model, greatly diminishing computational requirements. Although its complexity is slightly higher than other models, its accuracy compensates for this drawback.
The processing time of Bayesian networks is closely related to model complexity. Structure learning time measures the time required for the algorithm to discover the causal relationship network among variables from the data, reflecting the algorithm’s ability to effectively capture complex relationships between threat factors and the computational resource requirements of the training process. Parameter learning time measures the time required to estimate Conditional Probability Distributions (CPDs) under a given network structure, reflecting the efficiency in handling different variable state combinations. Inference time measures the time required to calculate the probability distribution of the target variable under given evidence conditions, reflecting the system’s ability to process real-time data and determining the real-time strength of the system’s threat level assessment.
The comparison of inference time is a crucial evaluation metric, which is different from the sensitivity analysis that informed the model design. Sensitivity analysis identifies which features are most influential on the threat level. However, the inference time is determined by the final model’s structural complexity (e.g., number of parameters or connectivity) and dictates the model’s practical viability in a real-time system. A model that is accurate but slow cannot be deployed for time-critical decision-making. Therefore, our model achieves ultra-fast inference while maintaining high accuracy, being strong evidence of its applicability in uncertain battlefield environments. This enables decision-making within seconds in combat scenarios.
As depicted in Table 8, the processing times of the Tree–Hillclimb Search model, including structure learning time, parameter learning time, and inference time, are significantly lower than those of the Hillclimbing Search model and the Tree Search model, demonstrating its superiority in computational resource requirements. Compared to other models, the processing time difference is not substantial, but the Tree–Hillclimb Search model boasts higher accuracy, granting it an advantage.
It should be noted that for the Tree–Hillclimb Search method, the model construction starts from a predefined expert model (Section 3) and undergoes refinement based on subsequent constraints. Importantly, the effort invested by domain experts in building the initial expert experience model constitutes a separate one-time cost and is not included in the structural learning time metrics.
These data fully validate the outstanding performance of the Tree–Hillclimb Search method in terms of “efficiency”. Although the unconstrained climbing search model achieved the highest accuracy (99.9%), its network structure is highly complex, computationally intensive, and prone to overfitting. In contrast, the Tree–Hillclimb Search method not only delivers a substantial 0.6% improvement in accuracy over the pure expert model (Naive Bayes), with nearly identical model complexity and inference speed, but also validates its outstanding efficiency. By successfully constructing a lightweight model through expert knowledge constraints, it achieves ultra-fast real-time inference capabilities—effectively addressing the challenges of rapidly changing information and extremely short decision windows in uncertain battlefield environments. More importantly, the marginal 0.2% accuracy gap between our method and the top performer is a trade-off for a fivefold reduction in model size and a tenfold increase in inference speed. This demonstrates that our constraint-based approach extracts meaningful patterns from data without resorting to bloated structures, thereby achieving overall excellence across all design objectives. Ultimately, the Tree–Hillclimb Search method occupies the unique “sweet spot”, simultaneously satisfying accuracy and efficiency, where others excel in one at the expense of others.

6.6. Threat Assessment Strategy

The Tree–Hillclimb Search model is represented in a hierarchical manner, with the Threaten node placed at the top level, its feature nodes Time, Type, and State at the second level, and so on. This hierarchical representation of the Tree–Hillclimb Search model is shown in Figure 17. Comparing this with the sensitivity analysis results, it is evident that nodes at higher levels exhibit higher sensitivity, while nodes at lower levels exhibit lower sensitivity, providing a direct manifestation of the model’s “explainability” advantage. Consequently, a threat assessment strategy, which ensures the detection accuracy of upper-level nodes while relaxing the accuracy requirements for lower-level nodes, can be formulated under such limited-detection-resources constraints. This approach not only guarantees the precision and reliability of threat assessment but also allows for a more rational allocation of sensor resources.
In real-world scenarios, the capability of our surface ships to acquire target information during air defense operations may be subject to various constraints. For instance, limited detection resources may preclude simultaneous high-precision detection of all threat elements, necessitating adjustments to the accuracy requirements for each threat element to accommodate detection resource limitations. Therefore, a reasonable threat assessment strategy is essential to reducing resource consumption while ensuring the reliability and accuracy of threat assessment results.
Through sensitivity analysis, we ascertain the impact of each threat element on threat assessment. Naturally, nodes with higher sensitivity require higher precision, while nodes with lower sensitivity can tolerate lower precision. Hence, a threat assessment strategy can be devised where Heading and Distance are subject to high-precision requirements to minimize misjudgments, while the precision requirements for Speed and Sensor can be slightly relaxed. Furthermore, the precision requirements for Latitude and Longitude can be relaxed even further, and nodes such as Interval, Altitude, Sources, Duration, and Detected can have broader precision requirements, although they should not be entirely neglected. By implementing this strategy under constrained conditions, the reliability and accuracy of threat assessment can be maintained, enabling its more effective application in uncertain adversarial scenarios.

6.7. Simulation Validation of Threat Assessment Strategy

Based on the sensitivity ranking results and the proposed threat assessment strategy, the precision of Distance was relaxed from being equally divided into five categories with equal frequency to being equally divided into three categories with equal frequency. The conditional probability of the threat level node was then reasoned under the given scenario, which was consistent with the scenario described in Section 6.6. The reasoning results are presented in Table 9.
Similarly, based on the sensitivity ranking results and the threat assessment strategy provided, the precision of Altitude was relaxed from being equally divided into five categories with equal frequency to being equally divided into three categories with equal frequency. The conditional probability of the threat level node was reasoned again under the given scenario, which was consistent with the scenario described in Section 6.3. The reasoning results are presented in Table 10.

6.8. Ablation Study on Expert Constraints

To quantitatively evaluate the contribution of the expert constraints in the Tree–Hillclimb Search method, we conducted an ablation study and compared the performance of three models (Table 11):
  • The Tree–Hillclimb Search model incorporates comprehensive expert constraints and a complete structural learning process;
  • The Hillclimbing Search model operates without expert constraints, initiating structural learning from an empty set with no prior knowledge or constraints;
  • The expert experience model derives its network structure entirely from expert knowledge, without involving any structural learning process.
The results demonstrate a critical trade-off. The unconstrained Hillclimbing model, while achieving the highest accuracy, results in an excessively complex network (2040 parameter complexity), which is over 5 times larger than our proposed model. This complexity directly leads to a 10× increase in inference time (0.0010 s), rendering it impractical for real-time applications. In contrast, our Tree–Hillclimb Search method, guided by expert constraints, successfully identifies a structure that is both highly accurate (a 0.6 improvement over the expert model) and efficient. It maintains a low parameter count and ultrafast inference speed equivalent to the simple expert model. This proves that the expert constraints effectively prevent the algorithm from overfitting to the data and learning spurious, complex relationships, thereby ensuring the model remains interpretable and deployable in resource-constrained, time-sensitive scenarios.

7. Conclusions

This paper addresses the requirements of real-time, accuracy, and interpretability in threat assessment under uncertain battlefield environments by proposing and investigating the Tree–Hillclimb Search method—an efficient and interpretable threat assessment approach, which was designed to overcome the limitations of traditional expert models with insufficient representation capabilities as well as pure data-driven models with high complexity and slow computation. The core innovation of this method lies in the implementation of structure learning based on expert experience constraints. The initial network based on expert experience serves as the foundation for constraints, and structural learning algorithms are employed to reveal the causal dependencies among variables hidden in the data. The network is then modified under the guidance of these constraints and sensitivity analysis based on the learning results.
Model evaluation demonstrates that the Tree–Hillclimb Search method effectively combines the advantages of expert experience and data-driven approaches, achieving its design objectives:
  • Enhanced Explainability: This model preserves the interpretable core framework of expert models while optimizing it with data-driven insights. It uncovers deeper causal relationships, results in a clear and transparent structure, and aligns logically with domain knowledge. This makes its reasoning process highly credible and easily understandable to human operators.
  • High Predictive Accuracy: The method achieves a 99.7% accuracy in threat assessment, coming within 0.2% of the top-performing unconstrained model while significantly outperforming models such as Naive Bayes, Tree-Augmented Naive Bayes, and Tree Search—effectively handling the uncertainty inherent in battlefield environments.
  • High Efficiency and Real-Time Performance: Through the strict enforcement of expert constraints, the model complexity is reduced by 80% (403 vs. 2040 parameter complexity) compared to the unconstrained Hillclimbing search, which significantly lowers storage and computational requirements. This reduction directly enables an order-of-magnitude faster inference speed of 0.1 milliseconds—10 times quicker than the unconstrained model—delivering extremely fast real-time reasoning that fully meets the stringent performance demands of uncertain battlefield environments.
  • Actual Impact on Battlefield Decision-Making: The performance gains of the Tree–Hillclimb Search method have a direct and profound impact on operational effectiveness. Its hierarchical structure aligns closely with sensitivity analysis results, providing reliable guidance for resource optimization strategies—an effect confirmed through simulation validation. The combination of high accuracy and ultra-low latency compresses the OODA (Observe, Orient, Decide, Act) loop, enabling millisecond-level decision-making processes that previously required seconds. This provides commanders with a critical time advantage for executing evasive maneuvers or weapon deployment against high-speed threats. Furthermore, the model’s explainability builds operator trust and supports informed decision-making under pressure.
  • Good Generality and Broad Applicability: The method is suitable for uncertain battlefield environments and nominal datasets, demonstrating effective threat assessment in scenarios involving uncertain incoming targets based on parameters such as direction and speed. However, the impact of target quantity on threat assessment remains unvalidated. The framework exhibits high transferability to other domains requiring real-time, interpretable, and data-integrated decision-making, such as ground combat, cybersecurity, and civilian applications like traffic management or industrial fault detection. Its core innovation—knowledge-constrained structure learning—is a universal paradigm adaptable to diverse scenarios.
In summary, the Tree–Hillclimb Search method successfully constructs a threat assessment tool that combines high interpretability, near-optimal predictive accuracy, low complexity, and excellent computational efficiency. By leveraging structure learning based on expert experience constraints, it effectively addresses the challenges faced by traditional methods in uncertain battlefield environments, particularly meeting the critical needs of real-time decision-making through its fast reasoning capability and resource optimization strategies. This approach provides a practical and superior solution for real-time threat assessment under uncertainty.

Author Contributions

Conceptualization, Z.Z. and Q.F.; methodology, Z.Z.; software, Z.Z.; validation, Z.Z., J.P., and Q.F.; formal analysis, Z.Z.; investigation, Z.Z.; resources, J.P.; data curation, Q.F.; writing—original draft preparation, Z.Z.; writing—review and editing, Z.Z. and Q.F.; visualization, Z.Z.; supervision, J.P.; project administration, Z.Z.; funding acquisition, Q.F. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (61573285).

Data Availability Statement

Data are contained within the article.

Acknowledgments

I have greatly benefited from the guidance of my supervisors and the support of my classmates throughout my research. I would like to express my sincere gratitude to Peng Jinye and Gao Xiaoguang, my advisors, for their meticulous and continuous guidance during both the research and writing processes. Their insightful suggestions have been invaluable to the completion of this work. I am also deeply appreciative of my university for providing an excellent scientific research platform and a supportive academic environment. Furthermore, I would like to extend my heartfelt thanks to my senior fellow apprentices, Liu Xiaohan and Wang Zidong, for their patient mentorship and selfless assistance throughout my academic journey. I am particularly grateful to my friend Chang Yamin for her generous and meticulous support in refining the language and ensuring compliance with academic English standards.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AHPAnalytic Hierarchy Process
BDeBayesian Dirichlet equivalent
BDeuBayesian Dirichlet equivalent uniform
BFSBreadth-First Search
BICBayesian Information Criterion
BNPLBayesian networks parameter learning
BNsBayesian networks
BNSLBayesian networks structure learning
CPDAGcomplete partial directed acyclic graph
CPDsConditional Probability Distributions
CPTsConditional Probability Tables
DAGdirected acyclic graph
MADMMulti-Attribute Decision-Making
MDLMinimum Description Length
MMPCMax-Min Parents and Children
MWSTMaximum Weight Spanning Tree
NBNaive Bayes model
OODAObserve, Orient, Decide, Act
PCPeter–Clark algorithm
PDAGpartial directed acyclic graph
SSASalp Swarm Algorithm
SVMssupport vector machines
TANTree Augmented Naive Bayes model
TOPSISTechnique for Order Preference by Similarity to Ideal Solution

References

  1. Zhao, X.; Wang, C.; Cui, P.; Sun, G. Operational rule extraction and construction based on task scenario analysis. Information 2022, 13, 144. [Google Scholar] [CrossRef]
  2. Zhao, T.; Huang, J.; Shi, J.; Chen, C. Route planning for military ground vehicles in road networks under uncertain battlefield environment. J. Adv. Transp. 2018, 2018, 2865149. [Google Scholar] [CrossRef]
  3. Yu, D.; Wang, H.; Yuan, J. Method of unknown target risk analysis and threat assessment for UUVs. In Proceedings of the 39th Chinese Control Conference, Shenyang, China, 27–29 July 2020; pp. 594–599. [Google Scholar]
  4. Luo, R.; Huang, S.; Zhao, Y.; Song, Y. Threat assessment method of low altitude slow small targets based on information entropy and AHP. Entropy 2021, 23, 1292. [Google Scholar] [CrossRef] [PubMed]
  5. Guo, J. Multiple Attribute Decision Making Based Air-Targets Threat Assessment Methods. Master’s Thesis, Beijing Institute of Technology, Beijing, China, 2017. [Google Scholar]
  6. Hu, T.; Wang, D.; Sun, Y.; Huang, Z.; Jiang, L. Air combat threat assessment of improved CRITIC-LRA and grey TOPSIS. Acta Armamentarii 2020, 41, 2561–2569. [Google Scholar]
  7. Zhang, H.; Xie, J.; Ge, J.; Zhang, Z.; Zong, B. Intuitionistic fuzzy set threat assessment based on improved TOPSIS and multiple times fusion. Syst. Eng. Electron. 2018, 40, 2263–2269. [Google Scholar]
  8. Liu, H.; Wang, H.; Shen, L. Target threat assessment using SAPSO and grey neural network. J. Northwestern Polytech. Univ. 2016, 34, 26–32. [Google Scholar]
  9. Chen, X.; Liu, Z.; Liang, H. Assessment of aerial target threat based on genetic algorithm optimizing fuzzy recurrent wavelet neural network. J. Northwestern Polytech. Univ. 2019, 37, 424–432. [Google Scholar] [CrossRef]
  10. Xi, Z.F.; Xu, A.; Kou, Y.X.; Li, Z.W.; Yang, A.W. Target threat assessment in air combat based on PCA-MPSO-ELM algorithm. Acta Aeronaut. Astronaut. Sin. 2020, 41, 323895. [Google Scholar]
  11. Feng, Q.; Li, B.; Liu, X.; Gao, X.; Wan, K. Low-high frequency network for spatial–temporal traffic flow forecasting. Eng. Appl. Artif. Intell. 2024, 158, 111304. [Google Scholar] [CrossRef]
  12. Guo, H.; Xu, H.; Liu, L. Threat assessment of air combat based on support vector machines for regression. J. Beijing Univ. Aeronaut. Astronaut. 2010, 36, 123–126. [Google Scholar]
  13. Hautaniemi, S.K.; Korpisaari, P.T.; Saarinen, J.P.P. Target identification with dynamic hybrid Bayesian networks. In Proceedings of the Europto Remote Sensing, Barcelona, Spain, 25–29 September 2002; Volume 4170, pp. 92–102. [Google Scholar]
  14. Hautaniemi, S.K.; Saarinen, J.P.P.; Dasarathy, B.V. Multitarget tracking with IMM and Bayesian networks: Empirical studies. In Proceedings of the Aerospace/Defense Sensing, Simulation, and Controls, Orlando, FL, USA, 16–20 April 2001; Volume 4385, pp. 47–57. [Google Scholar]
  15. Gao, X.G.; Yang, Y. Threat assessment for warship air defense based on Bayesian network. Tactical Missile Technol. 2020, 47–57+70. [Google Scholar] [CrossRef]
  16. Chuang, C.W. Bayesian Networks for Real-Time Multi-Robot Task Allocation in a Generic Agent-Based Framework with Uncertainty. Ph.D. Thesis, University of California, Davis, CA, USA, 2023. [Google Scholar]
  17. Liao, Z.; Wang, Y. Trust-based variable impedance control of human–robot cooperative manipulation. Robot. Comput.-Integr. Manuf. 2024, 88, 102730. [Google Scholar] [CrossRef]
  18. Huang, X.; Yang, C.; Zhang, H.; Lou, S.; Gao, D.; Kong, L. Data and knowledge collaborative-driven fault identification and self-healing control action inference framework for blast furnace. Expert Syst. Appl. 2024, 245, 123040. [Google Scholar] [CrossRef]
  19. Fan, Z.; Zhou, L.; Komolafe, T.E.; Ren, Z.; Tong, Y.; Feng, X. Learning Bayesian network parameters from limited data by integrating entropy and monotonicity. Knowl.-Based Syst. 2024, 291, 111568. [Google Scholar] [CrossRef]
  20. Zhou, Y.; Yan, J.; Sun, Y.; Xu, J.; Lu, H. Target threat evaluation model for important place air defense based on Bayesian network. J. Nav. Aeronaut. Astronaut. Univ. 2015, 30, 467–472. [Google Scholar]
  21. Tang, S.; Zhang, C.; Fan, P. Research on potential regional threat assessment methods for underwater platform. Fire Control Command Control 2024, 49, 145–151. [Google Scholar]
  22. Li, Y. Research on Threat Assessment Method of Battlefield Target Based on Bayesian Network. Master’s Thesis, Xi’an Technological University, Xi’an, China, 2022. [Google Scholar] [CrossRef]
  23. Shang, S. BN Structure Learning Based on Small Datasets and Its Application in Threat Assessment. Master’s Thesis, Xi’an Technological University, Xi’an, China, 2023. [Google Scholar] [CrossRef]
  24. Zeng, Z.; Peng, J.; Feng, Q. A Tree-Hillclimb Search Model for Naval Air Defense Threat Assessment Integrating Expert Experience and Bayesian Networks. In Proceedings of the 2025 10th International Conference on Control and Robotics Engineering (ICCRE), Nagoya, Japan, 9–11 May 2025; pp. 323–330. [Google Scholar]
  25. Tang, Z.; Zhang, A. Survey of methods and theory for battlefield threat assessment. Fire Control Command Control 2011, 36, 1–4. [Google Scholar]
  26. Yan, X.; Gao, X.; Wang, Z.; Wang, Q.; Liu, X. Bayesian network structure learning based on discrete artificial jellyfish search: Leveraging scoring and graphical properties. Swarm Evol. Comput. 2025, 92, 101781. [Google Scholar] [CrossRef]
  27. Wang, C.F.; Gao, X.G.; Li, X.Y.; Li, B.; Wan, K.F. Finding Community Structure in Bayesian Networks by Heuristic K-Standard Deviation Method. Future Gener. Comput. Syst. 2024, 158, 556–568. [Google Scholar] [CrossRef]
  28. Giudice, E.; Kuipers, J.; Moffa, G. The dual PC algorithm and the role of Gaussianity for structure learning of Bayesian networks. Int. J. Approx. Reason. 2023, 161, 108975. [Google Scholar] [CrossRef]
  29. Huang, J.; Zhou, Q. Partitioned hybrid learning of Bayesian network structures. Mach. Learn. 2022, 111, 1695–1738. [Google Scholar] [CrossRef]
  30. Kalisch, M.; Bühlmann, P. Estimating High-Dimensional Directed Acyclic Graphs with the PC-Algorithm. J. Mach. Learn. Res. 2007, 8, 613–636. [Google Scholar]
  31. Zhang, Y.; Wei, W.; Wang, Z. Progressive learning hill climbing algorithm with energy-map-based initialization for image reconstruction. Biomimetics 2023, 8, 174. [Google Scholar] [CrossRef]
  32. Gao, W.; Zhi, M.; Ke, Y.; Wang, X.; Zhuo, Y.; Liu, A.; Yang, Y. Bayesian network structure learning based on HC-PSO algorithm. J. Intell. Fuzzy Syst. 2024, 46, 4347–4359. [Google Scholar] [CrossRef]
  33. Laborda, J.D.; Torrijos, P.; Puerta, J.M.; Gámez, J.A. Enhancing Bayesian Network structural learning with Monte Carlo Tree Search. In Information Processing and Management of Uncertainty in Knowledge-Based Systems; Lecture Notes in Computer Science; Springer Nature: Cham, Switzerland, 2025; pp. 403–414. [Google Scholar]
  34. Kuperwajs, I.; Ma, W.J. Planning to plan: A Bayesian model for optimizing the depth of decision tree search. Proc. Annu. Meet. Cogn. Sci. Soc. 2021, 43, 101–106. [Google Scholar]
  35. Suzuki, J. A Generalization of the Chow-Liu Algorithm and Its Application to Statistical Learning. arXiv 2010, arXiv:1002.2240. [Google Scholar] [CrossRef]
  36. Friedman, N.; Geiger, D.; Goldszmidt, M. Bayesian Network Classifiers. Mach. Learn. 1997, 29, 131–163. [Google Scholar] [CrossRef]
  37. Roy, G.; Sen, M.K.; Singh, A.; Dutta, S.; Choudhury, S. Probabilistic seismic risk assessment of a reinforced concrete building considering hazard level and the resulting vulnerability using Bayesian Belief Network. Asian J. Civ. Eng. 2023, 25, 2993–3009. [Google Scholar] [CrossRef]
  38. Badjadi, M.A.; Zhu, H.; Zhang, C.; Safdar, M. A Bayesian network model for risk management during hydraulic fracturing process. Water 2023, 15, 4159. [Google Scholar] [CrossRef]
  39. Piccioni, F.; Casenave, C.; Baragatti, M.; Cloez, B.; Vinçon-Leite, B. Calibration of a complex hydro-ecological model through approximate Bayesian computation and random forest combined with sensitivity analysis. Ecol. Inform. 2022, 71, 101846. [Google Scholar] [CrossRef]
  40. Mohamed, S.; Rosca, M.; Figurnov, M.; Mnih, A. Monte Carlo gradient estimation in machine learning. J. Mach. Learn. Res. 2020, 21, 1–62. [Google Scholar]
  41. Jiang, P.; Son, K.; Mudunuru, M.K.; Chen, X. Using mutual information for global sensitivity analysis on watershed modeling. Water Resour. Res. 2022, 58, e2022WR032341. [Google Scholar] [CrossRef]
  42. Maeda, K.; Kurata, H. Quasi-multiparameter sensitivity measure for robustness analysis of complex biochemical networks. J. Theor. Biol. 2010, 272, 174–186. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Task scenario diagram of fleet air defense operations.
Figure 1. Task scenario diagram of fleet air defense operations.
Entropy 27 00987 g001
Figure 2. Threat level assessment model.
Figure 2. Threat level assessment model.
Entropy 27 00987 g002
Figure 3. Target type assessment model.
Figure 3. Target type assessment model.
Entropy 27 00987 g003
Figure 4. Target State assessment model.
Figure 4. Target State assessment model.
Entropy 27 00987 g004
Figure 5. Time to arrival assessment model.
Figure 5. Time to arrival assessment model.
Entropy 27 00987 g005
Figure 6. Threat assessment model based on expert experience (NB Model).
Figure 6. Threat assessment model based on expert experience (NB Model).
Entropy 27 00987 g006
Figure 7. Threat assessment model based on PC-estimate algorithm (PC-estimate model).
Figure 7. Threat assessment model based on PC-estimate algorithm (PC-estimate model).
Entropy 27 00987 g007
Figure 8. Threat assessment model based on PC-skeleton_to_pdag algorithm (PC-skeleton_to_pdag model).
Figure 8. Threat assessment model based on PC-skeleton_to_pdag algorithm (PC-skeleton_to_pdag model).
Entropy 27 00987 g008
Figure 9. Threat assessment model based on Hillclimbing Search algorithm (Hillclimbing Search model).
Figure 9. Threat assessment model based on Hillclimbing Search algorithm (Hillclimbing Search model).
Entropy 27 00987 g009
Figure 10. Threat assessment model based on Tree Search algorithm (Tree Search model).
Figure 10. Threat assessment model based on Tree Search algorithm (Tree Search model).
Entropy 27 00987 g010
Figure 11. Tree-Augmented Naive Bayes model for naval air defense threat assessment (TAN model).
Figure 11. Tree-Augmented Naive Bayes model for naval air defense threat assessment (TAN model).
Entropy 27 00987 g011
Figure 12. Visualization of sensitivity analysis results for NB Model.
Figure 12. Visualization of sensitivity analysis results for NB Model.
Entropy 27 00987 g012
Figure 13. Visualization of sensitivity analysis results for TAN model.
Figure 13. Visualization of sensitivity analysis results for TAN model.
Entropy 27 00987 g013
Figure 14. Visualization of sensitivity analysis results for Hillclimbing Search model.
Figure 14. Visualization of sensitivity analysis results for Hillclimbing Search model.
Entropy 27 00987 g014
Figure 15. Visualization of sensitivity analysis results for Tree Search model.
Figure 15. Visualization of sensitivity analysis results for Tree Search model.
Entropy 27 00987 g015
Figure 16. Tree–Hillclimb Search model for naval air defense threat assessment.
Figure 16. Tree–Hillclimb Search model for naval air defense threat assessment.
Entropy 27 00987 g016
Figure 17. Hierarchical representation of Tree–Hillclimb Search model.
Figure 17. Hierarchical representation of Tree–Hillclimb Search model.
Entropy 27 00987 g017
Table 1. State spaces of each node variable.
Table 1. State spaces of each node variable.
NodeState Spaces and Labels
Threat Level (Threaten)3: “Low threat”; 2: “Medium threat”; 1: “High threat”; 0: “False target”
Target Type (Type)5: “Missile”; 4: “Non-stealth carrier-based attack aircraft”; 3: “Electronic warfare aircraft”; 2: “Unmanned aerial vehicle”; 1: “Stealth carrier-based attack aircraft”; 0: “False target”
Target State (State)2: “Non-RTB”; 1: “RTB”; 0: “False target”
Time of Arrival (Time)4: “Long”; 3: “Relatively long”; 2: “Medium”; 1: “Shorter”; 0: “Short”
Electromagnetic Radiation (Detected)1: “Electromagnetic radiation detected”; 0: “No electromagnetic radiation detected”
Radiation Sources (Sources)2: “Aircraft-mounted active phased array radar”; 1: “Other”; 0: “No radiation detected”
Electromagnetic Detection Time (Duration)2: “Long detection time”; 1: “Short detection time”; 0: “No electromagnetic radiation detected”
Altitude4: “High”; 3: “Relatively high”; 2: “Medium”; 1: “Lower”; 0: “Low”
Sensors4: “Other”; 3: “Active phased array radar”; 2: “Air search radar”; 1: “Electronic warfare equipment”; 0: “Electronic support/measurement system”
Time Interval (Interval)2: “Long”; 1: “Medium”; 0: “Short”
Heading2: “Large”; 1: “Medium”; 0: “Small”
Latitude4: “Large”; 3: “Relatively large”; 2: “Medium”; 1: “Smaller”; 0: “Low”
Longitude4: “High”; 3: “Relatively high”; 2: “Medium”; 1: “Lower”; 0: “Small”
Speed4: “Fast”; 3: “Relatively fast”; 2: “Medium”; 1: “Slower”; 0: “Slow”
Distance4: “Far”; 3: “Further”; 2: “Medium”; 1: “Closer”; 0: “Near”
Table 2. An example of a data instance from the dataset.
Table 2. An example of a data instance from the dataset.
NodeValueDescription
altitude4The target altitude is “High altitude”.
time3The target time to arrival is “Relatively long”.
detected1Electromagnetic radiation from the target has been detected.
distance4The target distance is “Far”.
duration2The target electromagnetic detection time is “Relatively long detection time”.
heading2The target orientation is “Large”.
interval2The target time interval is “Long”.
latitude0The target latitude is “Small”.
longitude3The target longitude is “Relatively large”.
sensor0The target is detected by an electronic support/measurement system.
sources1The target is an “Other” type of Radiation Source.
speed0The target speed is “Slow”.
state2The target activity status is “Non-RTB”.
type1The target type is “Stealth carrier-based attack aircraft”.
threaten2The threat level of the target to us is “medium threat”.
Table 3. The sensitivity analysis results of each threat assessment model to the Threaten node based on the variance reduction indicator.
Table 3. The sensitivity analysis results of each threat assessment model to the Threaten node based on the variance reduction indicator.
NBTANHillclimbing SearchTree Search
Node V r Node V r Node V r Node V r
type0.452339type0.452339type0.452339type0.452339
state0.373774state0.373774state0.373774state0.373774
heading0.234806heading0.234806distance0.239502distance0.246874
sensor0.104329sensor0.104329time0.234805heading0.234806
interval0.09527interval0.09527heading0.229909time0.180547
sources0.050549sources0.050549longitude0.191044longitude0.127475
duration0.039677duration0.039677speed0.178489latitude0.121023
detected0.036223detected0.036223latitude0.142918speed0.120442
altitude0.033699altitude0.033699altitude0.107484sensor0.104329
time0time0sensor0.10161interval0.07746
speed0speed0interval0.05856altitude0.062925
longitude0longitude0sources0.050718sources0.050549
latitude0latitude0duration0.036898duration0.039677
distance0distance0detected0.036304detected0.036223
Table 4. The sensitivity analysis results of each threat assessment model to the Threaten node based on the mutual information indicator.
Table 4. The sensitivity analysis results of each threat assessment model to the Threaten node based on the mutual information indicator.
NBTANHillclimbing SearchTree Search
Node MI Node MI Node MI Node MI
type0.8431type0.8431type0.8431type0.8431
state0.5062state0.5062state0.5062state0.5062
sensor0.277sensor0.277distance0.4103time0.4676
heading0.2739heading0.2739time0.391distance0.3506
sources0.1901sources0.1901speed0.3152speed0.2985
duration0.1705duration0.1705heading0.2685sensor0.277
interval0.167interval0.167longitude0.2683heading0.2739
detected0.164detected0.164sensor0.2665longitude0.2584
altitude0.0599altitude0.0599altitude0.2618sources0.1901
time0time0latitude0.2002duration0.1705
distance0distance0sources0.1902detected0.164
latitude0latitude0duration0.1645altitude0.1622
longitude0longitude0detected0.1638interval0.1483
speed0speed0interval0.0974latitude0.1468
Table 5. The sensitivity analysis results of each threat assessment model to the Threaten node based on the expected variance indicator.
Table 5. The sensitivity analysis results of each threat assessment model to the Threaten node based on the expected variance indicator.
NBTANHillclimbing SearchTree Search
Node V E Node V E Node V E Node V E
state1.330473state1.330473state1.330473state1.330473
type1.122372type1.122372type1.122372type1.122372
sources0.53004sources0.53004sources0.5269sources0.53004
heading0.401594heading0.401594heading0.399965heading0.401594
sensor0.107022sensor0.107022distance0.230282time0.235428
interval0.103659interval0.103659time0.210783distance0.186231
duration0.06478duration0.06478speed0.167205speed0.150398
detected0.057179detected0.057179longitude0.166121longitude0.149314
altitude0.030958altitude0.030958latitude0.139369sensor0.107022
time0time0altitude0.107481interval0.100002
latitude0latitude0sensor0.100354latitude0.091211
longitude0longitude0detected0.057229altitude0.08969
speed0speed0interval0.056346duration0.06478
distance0distance0duration0.051926detected0.057179
Table 6. Conditional probability reasoning results of threat level nodes under different threat assessment models for a given scenario.
Table 6. Conditional probability reasoning results of threat level nodes under different threat assessment models for a given scenario.
Node Value/ModelNBTANHillclimbing SearchTree SearchTree–Hillclimb Search
Threaten = 00.470.440.030.640.16
Threaten = 199.199.199.999.099.7
Threaten = 20.080.060.050.100.04
Threaten = 30.350.400.020.260.10
Table 7. Parameter complexity of each threat assessment model.
Table 7. Parameter complexity of each threat assessment model.
ModelNBTANHillclimbing SearchTree SearchTree–Hillclimb Search
Parameter Complexity3073912040222403
Table 8. Processing time 1 of each threat assessment model.
Table 8. Processing time 1 of each threat assessment model.
ModelNBTANHillclimbing SearchTree SearchTree–Hillclimb Search
Structure Learning Time0.00090.00101.00074.53230.0011
Parameter Learning Time0.03590.03960.04320.04100.0366
Inference Time0.00100.00050.00100.00100.0001
1 The unit of time is seconds.
Table 9. Conditional probability reasoning results of the threat level node after changing the precision of Distance.
Table 9. Conditional probability reasoning results of the threat level node after changing the precision of Distance.
Node Value/ModelNBTANHillclimbing SearchTree SearchTree–Hillclimb Search
threaten = 01.351.260.830.720.56
threaten = 197.797.698.498.098.3
threaten = 20.190.170.220.620.66
threaten = 30.610.970.550.660.48
Table 10. Conditional probability reasoning results of threat level node after changing the precision of Altitude.
Table 10. Conditional probability reasoning results of threat level node after changing the precision of Altitude.
Node Value/ModelNBTANHillclimbing SearchTree SearchTree–Hillclimb Search
threaten = 00.490.460.10.530.19
threaten = 199.199.099.699.099.4
threaten = 20.050.120.090.210.11
threaten = 30.360.420.210.260.30
Table 11. Results of the ablation study on expert constraints.
Table 11. Results of the ablation study on expert constraints.
ModelAccuracy (%)Parameter ComplexityAverage Inference Time (s)
Tree–Hillclimb Search model99.74030.0001
Hillclimbing Search model99.920400.0010
Expert experience model99.13070.0010
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zeng, Z.; Peng, J.; Feng, Q. Tree–Hillclimb Search: An Efficient and Interpretable Threat Assessment Method for Uncertain Battlefield Environments. Entropy 2025, 27, 987. https://doi.org/10.3390/e27090987

AMA Style

Zeng Z, Peng J, Feng Q. Tree–Hillclimb Search: An Efficient and Interpretable Threat Assessment Method for Uncertain Battlefield Environments. Entropy. 2025; 27(9):987. https://doi.org/10.3390/e27090987

Chicago/Turabian Style

Zeng, Zuoxin, Jinye Peng, and Qi Feng. 2025. "Tree–Hillclimb Search: An Efficient and Interpretable Threat Assessment Method for Uncertain Battlefield Environments" Entropy 27, no. 9: 987. https://doi.org/10.3390/e27090987

APA Style

Zeng, Z., Peng, J., & Feng, Q. (2025). Tree–Hillclimb Search: An Efficient and Interpretable Threat Assessment Method for Uncertain Battlefield Environments. Entropy, 27(9), 987. https://doi.org/10.3390/e27090987

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop