1. Introduction
Low-altitude airspace holds immense potential for military, agricultural, medical, and transportation applications [
1,
2]. Advancements in unmanned aerial vehicle technology have further highlighted its value [
3,
4]. While opening low-altitude airspace benefits economic development, global security conditions remain concerning or, in some cases, critical [
5]. In recent years, rapid technological progress has diversified low-altitude airborne objects; however, illegal activities involving LSS targets have surged annually [
6,
7]. Rapid and accurate threat assessment of low-altitude targets can provide crucial auxiliary support for tasks such as air combat defense, firepower allocation, and strategy optimization. Monitoring LSS targets and providing early warnings have thus become an important research direction for modern defense systems.
LSS targets are defined as low-altitude objects flying below 1000 m at speeds under 200 km/h, with radar cross-sections (RCSs) smaller than 2 m
2. Their covert operations and low detectability pose substantial threats to important protected target territories. Timely identification of incoming targets is vital for low-altitude air defense. In low-altitude airspace over urban areas and battlefields, accurate recognition and handling of LSS targets present major challenges for surveillance activities linked to defense operations and early warning systems [
5,
8,
9]. Visible-light cameras are now a common means of LSS target identification and surveillance. Therefore, there is a growing need to build threat assessment algorithms for LSS targets based on visible camera detection techniques [
10,
11]. Currently, threat assessment relies on analyzing trajectories obtained through detection and tracking [
12,
13]. The general threat assessment process mainly consists of threat modeling for incoming targets, metric assignment using multi-attribute decision theory, and ranking, along with other activities [
14]. The construction of a target threat assessment model usually involves two key aspects: first, reasonably selecting target threat assessment factors to form quantitative evaluation indicators; second, determining the weight of each evaluation factor [
15].
The first key component can be distilled into effectively inferring target intent based on specific features extracted from images. The target type and its motion characteristics are the most intuitive, effective, and widely used attributes in threat assessment [
16,
17,
18]. Threat level evaluation aims to quantitatively describe hostile intent [
19]. Existing methods, such as multi-attribute decision-making (MADM) algorithms [
20,
21] and Bayesian networks [
22,
23], have made valuable contributions to threat identification strategies, but they also have certain limitations. The second key component, the weights of evaluation factors, can be determined using numerous methods. Depending on the data sources used for weight determination, these methods are categorized as subjective, objective, and combined weighting. Subjective weighting methods are among the earliest proposed and most maturely applied approaches. Techniques such as the Delphi Method, Best–Worst Method, AHP, and Analytic Network Process (ANP) have been widely adopted across various fields. Faizi et al. [
24] refined the BWM by proposing a Linear Best–Worst Method and a Euclidean Best–Worst Method. Rehman et al. [
25] constructed decision matrices based on the AHP with consistent fuzzy preference relations, both achieving enhanced expert decision quality in multi-criteria decision-making. Fei et al. [
26] integrated D-number theory into the ANP to better accommodate uncertainty in expert judgments. Lin [
27] introduced a Bayesian cosine maximization method to modify comparison matrices, enabling more accurate priority vector estimation. Despite challenges such as rank reversal, comparison scale inconsistency, and priority derivation limitations, the AHP remains the most efficient and practical decision-making method [
28]. Luo et al. [
29] introduced a target threat assessment model that combines the AHP and information entropy to determine the weights of targets’ subjective and objective threat factors.
Unlike conventional aerial targets, LSS targets pose detection challenges such as incomplete information acquisition [
30]. In addition, some types of LSS targets also have flexible maneuverability and dynamic task planning capabilities, making it difficult to accurately assign weights to each threat factor using a single weighting method. Therefore, extracting complete, comprehensive feature information with strong discriminative ability from images and comprehensively utilizing these features to improve the performance of spatial target recognition is of great significance [
31]. The subjective weighting approaches commonly used in target threat assessment require extensive auxiliary systems and prior knowledge bases. However, research on LSS targets is still in its infancy, and obtaining accurate assessment results based on the AHP method is difficult. The entropy method [
32] and CRITIC method [
11,
13] can update weights when threat factors change, with high feasibility. This study attempts to introduce the AHP, entropy, and CRITIC methods into the threat assessment of LSS targets to establish an optimization model. The weights determined by the three methods are fused to obtain more reliable evaluation weights. Theoretically available multi-information fusion methods include the weighted average method [
33], Kalman filtering method [
34], Bayesian estimation method [
22], D-S evidence theory [
35], etc.
Prior research has proven that Bayesian estimation can be used to address information uncertainty [
36]. However, the probability values calculated with this method are based on existing data, which is not applicable to the currently limited LSS target data. The TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) method is renowned for its effectiveness and robustness in managing attribute conflicts and generating exhaustive rankings. This is achieved through comparative analysis of alternatives against the positive ideal solution (PIS) and negative ideal solution (NIS) [
37]. The key focus of the TOPSIS method is on weight determination. Weight assignments range from subjective (based on expert judgment) to objective (derived from data analysis). While subjective methods, such as Delphi and the analytic hierarchy process, can become complex as the number of criteria increases, objective strategies, such as Criteria Importance Through CRITIC and information entropy theory, provide statistical weights that reduce subjectivity [
38]. D-S evidence theory is a typical mathematical tool for information fusion. It fuses uncertain information without prior knowledge or conditional probabilities and uses basic probability assignments to represent probabilities in uncertain problems [
39]. D-S evidence theory is more advantageous when dealing with the diversity, incompleteness, inaccuracy, or uncertainty of knowledge and information in the military field [
40]. Consequently, D-S evidence theory has been applied across intelligent decision-making domains, including surveillance systems [
41], decision analysis [
42], fault diagnosis [
43], and target tracking [
44]. Leveraging its unique strengths, D-S evidence theory reduces uncertainties during data fusion and holds significant potential in threat assessment [
19]. The generalized D-S evidence theory has been proposed to address the issues of fusing potentially incomplete and conflicting information caused by an incomplete recognition framework, and it has been validated in practical fuzzy applications [
45]. Therefore, this study considers modeling with the generalized D-S evidence theory to fuse incomplete information in LSS target threat assessment situations and compares the target threat evaluation results with those of multiple fusion algorithms to verify the effectiveness of this algorithm. The main contributions of this paper are as follows:
(1) A threat assessment system for LSS targets is established. Starting from aspects such as LSS target characteristics, flight attributes, and protected objects, an LSS threat index evaluation system is constructed by comprehensively considering target intentions and environmental attributes. Finally, the threat membership function is established for each attribute.
(2) By combining subjective and objective weighting methods with multi-attribute decision-making theory, the fuzziness inherent in visible-light camera data acquisition errors or subjective judgments is retained, and the dynamic characteristics of objective weights in target threat assessment are integrated. To effectively integrate information on the target’s combat intention, a combined weighting method based on deviation coefficients is proposed.
(3) Based on the weight values, the TOPSIS method and D-S evidence theory are used to rank the threats of different targets. The TOPSIS method comprehensively considers the membership degree of each attribute and uses a weighted scoring mechanism to improve the robustness of decision-making. D-S evidence theory is introduced to perform data fusion on the uncertain information of different LSS targets so as to rank the threat values of different targets. The effectiveness and accuracy of the TOPSIS method and D-S evidence theory are verified through testing and evaluation using different spatial LSS target data, and the two methods are compared with other fusion algorithms.
The structure of this article is as follows. In
Section 2, we first describe the process of the LSS target threat assessment model and select the LSS target threat assessment factors and their membership functions.
Section 3 elaborates on the models of the AHP, entropy weighting, CRITIC objective weighting, and combined weighting methods based on deviation coefficients. It also introduces the threat assessment system based on the TOPSIS method and D-S evidence theory.
Section 4 verifies the method developed in this study through simulation and measured data and analyzes and discusses the experimental data. In
Section 5, we summarize the research results and highlight future development directions.
3. LSS Target Threat Assessment Model
The aim of the threat assessment model for LSS targets is to scientifically and reliably quantify the threat levels of targets; its core consists of two parts: weighted optimization of threat factors and fusion-based assessment of target threat levels. The process of assigning weights focuses on determining the relative importance of each threat assessment index. By integrating the advantages of subjective and objective weighting methods, their respective limitations can be overcome, and more reliable combined weights can be obtained. Based on the obtained comprehensive weights, multi-attribute decision-making and information fusion techniques can be used to comprehensively calculate and rank the overall threat level of a target, effectively handle the uncertain and conflicting data in the assessment process, and finally output reliable results of target threat level assessment.
3.1. Methods of Improvement
The core challenges in weight allocation for evaluating LSS target threat indicators are mainly as follows: the lack of sufficient historical data, leading to incomplete information; high uncertainty caused by the complex kinematic characteristics of target types and their vulnerability to countermeasures; and the need to integrate dynamic real-time data with static expert knowledge. A single weight-setting method cannot fully encompass such complexity. Therefore, a hybrid weighting scheme is proposed, which integrates three complementary methods, each addressing specific aspects of the LSS target problem.
The analytic hierarchy process (AHP) can tackle issues of incomplete information and a lack of statistical data. This method incorporates domain experts’ knowledge and experience, which is crucial for quantifying intangible attributes and providing an a priori understanding of threat dynamics. A consistency construction approach is adopted to meet the needs of rapid assessment in low-level security defense scenarios.
The entropy weight method is suitable for processing dynamic real-time data. It can allocate weights based on the degree of data dispersion among different targets. Indicators with high variability contribute more to distinguishing threat levels among current LSS targets, enabling the assessment to adapt to immediate situations.
The CRITIC method can reflect the relationships between indicators. It considers both the comparative intensity between indicators and their conflict characteristics, providing a more comprehensive objective measurement standard, which is vital for LSS target evaluation.
The aim of integrating the above three methods is to establish a robust weight foundation that is supported by professional knowledge, is responsive to data, and accounts for interactions between different criteria. This is essential for an environment full of uncertainties and evolving low-frequency sudden threats.
3.1.1. Consistency-Based Analytic Hierarchy Process (AHP) Subjective Weights
The AHP is a multi-objective decision analysis method integrating qualitative and quantitative approaches. It uses expert experience to compare the importance of participating factors, constructs a comparison matrix to determine the relative importance of each factor in the hierarchy, and forms a judgment matrix to quantitatively determine the weights of threat factors [
52]. In the threat assessment model, the AHP is converted into a problem of finding the threat degree of the attacking target; in this version, the target layer is the threat degree for the current attacking LSS target, the criterion layer comprises the threat attributes for the target type, altitude, and speed, and the program layer is the current attacking batch LSS target. The hierarchical model is shown in
Figure 3.
The following steps are typically used when determining indicator weights using this method [
53]:
Step 1: Forming a judgment matrix. To establish an AHP model for the threat assessment system, experts, based on experience, rank each target threat attribute to characterize its degree of importance. Values from 1 to 9 quantitatively represent the importance level for each threat element, as shown in
Table 4. The judgment matrix
A = (
Aij)
n×n,
aij, is formed to compare targets based on various threat attributes.
Step 2: Hierarchical ordering. Using matrix theory, the equation Aw = λmaxw is solved to obtain the eigenvector w and the maximum eigenvalue λmax. The threat level weight vector for the indicator system is w = (w1, w2, …, wn)T.
Step 3: Conducting consistency tests. Expert evaluations are mainly subjective and do not follow mathematical formulas, making it difficult to meet the consistency requirements. Therefore, a consistency check of the calculated threat weight vector w is necessary.
Step 4: Hierarchical total ordering. When dealing with multiple hierarchical structures, if the weight vector of indices at the (k − 1)-th level is 1 and the weight vector of the k-th level relative to the (k − 1)-th level is H, then the weight vector of the k-th level relative to the target layer is w = (w1, w2, …, wn)T = l · H.
Since the consistency test increases modeling complexity, it is improved, and the steps of the improved AHP method are as follows:
Step 1: Based on the 1–9 ranking scale shown in
Table 1, a judgment matrix
q is generated through pairwise comparison of each target threat attribute element in the evaluation index set, as shown in Equation (9). When constructing the first row, the 1–9 scale is used as the criterion; for other rows, judgments are formed using
qij =
qik ×
qkj, and the complete judgment matrix
q is finally established.
Step 2: Using matrix theory, the equation qw = λmaxw is solved to obtain the eigenvector w and the maximum eigenvalue λmax of matrix q. The resulting vector w = (w1, w2, …, wn)T represents the threat weight vector of the indicator system.
3.1.2. Entropy Method for Determining Objective Weights
After determining subjective weights based on expert experience, information entropy theory is introduced into the process of determining target attribute weights for LSS target threat assessment. This approach makes weight determination more objective and better reflects the impact of each attribute on threat assessment. With the entropy weight method, weights are assigned by analyzing the deviation of information entropy values, thereby deriving indicator weights with correct and reliable results. The entropy weight method is defined as follows.
If an object has
n states, and the probability of each state is (
p1,
p2, …,
pn), then the information entropy value of the object is defined as
The steps for determining objective weights using the entropy method are as follows:
Step 1: Calculate the entropy value for the indicator
Ej. Construct a decision matrix
B = (
bij)
m × n based on threat assessment indicators, where
m represents the number of LSS targets and
n represents the number of threat attributes. Here,
bij denotes the attribute value of the
i-th target under the
j-th threat indicator. Normalize the decision matrix
B to obtain the normalized matrix
, in which
where
is a value normalized to the attribute.
Then, the information entropy
Ej for the
j-th threat assessment indicator is
Step 2: Calculate the weighting system for each indicator. Based on the principles of the entropy weight method, the objective weight
woj for the
j-th threat assessment indicator can be obtained as
Then, the information entropy-based target weight value
wo is
In this formula, wo1, wo2, wo3, wo4, wo5, wo6, and wo7 represent the calculated weights for the following threat factors: target category, target altitude, velocity component relative to the air defense center, target distance, target armament performance, whether the target is queryable, and the protected object, respectively.
3.1.3. CRITIC Calculation of Objectively Assigned Weights
The CRITIC method, proposed by DIAKOULAKI, is an objective weighting method that assigns weights by quantifying the information volume of each indicator based on two key principles: comparative intensity (variability) and conflict (correlation) among indicators. Below are the specific calculation steps and an example application in threat assessment.
Step 1: The original situational data matrix dij, formed by j threat assessment indicators of i targets, first undergoes normalization processing.
For positive indicators (the higher the value, the higher the threat, e.g., speed),
For negative indicators (the smaller the value, the higher the threat, e.g., distance),
Step 2: The comparative strength for the indicator
Sj is determined:
The conflictual correlation coefficient
rij is
Step 3: Conflictiveness is measured by the correlation coefficient between indicators: the higher the conflictiveness (the lower the correlation coefficient), the greater the weight. The formula for calculating conflictability is
Step 4: The comprehensive information volume
Gj is determined for each threat indicator:
Step 5: The weight coefficients, denoted by
w, for each threat indicator are determined from the combined information of the indicators:
3.1.4. Combined Assignment Method Based on Deviation Coefficients
In the threat assessment of LSS targets, the results of subjective and objective weighting methods often differ, reflecting uncertainties from different perspectives. Simple fixed-proportion fusion (such as equal-weight averaging) cannot fully utilize the consistency information between the results of these methods. The ideal fusion assigns greater weights to methods with more consistent results. To this end, this study proposes a dynamic fusion mechanism based on the weight deviation similarity index rlk. Methods with highly consistent weighting results can more truly reflect the weight relationships and should dominate the fusion; methods with large result differences should contribute less. Compared with fixed fusion or complex optimization methods, this consistency-based dynamic weighting strategy provides a more intuitive, transparent, and efficient approach to handling uncertainties in weight allocation, enhancing the robustness of fusion results.
Due to the limitations of uncertainties in various evaluation indicators and data collection conditions, existing evaluation schemes often only consider expert experience or original situational data. To make up for the drawbacks of subjective and objective weighting, this study, on the basis of the obtained subjective and objective weight vectors, determines their weighting coefficients in the weight combination based on the deviation coefficients from the subjective and objective weighting results mentioned above; then, the relevant models are established, and the combined weights are calculated.
The numerical deviation representing the differences between the results of different weighting methods is called the weight deviation similarity index
rlk. The smaller the difference, the greater the consistency between the weighting methods, and the larger the
rlk value. The value of
rlk is always less than or equal to 1 and non-negative. The consistency coefficient
rlk of the weighting results is defined as the deviation correlation coefficient between the
l-th and
k-th weighting methods:
The specific solution steps for model construction are as follows.
Let the indicator number for the original evaluation program be i, i = 1, 2, …, n, the assignment method used be j, j = 1, 2, …, n, and the weight of each indicator for each assignment method be w = (w1, w2, …, wn).
Step 1: By minimizing the sum of squared deviations, solve for the optimal combined weights. The calculation model is
Formulate it as the Lagrangian function
L(
l,
wi):
This leads to the unique optimal solution
wi:
Step 2: Using the concept of correlation coefficients, establish a relevant model to calculate the weight coefficients for the three weighting results. Let
rlk denote the correlation coefficient between the
l-th and
k-th weighting methods, and obtain the correlation coefficient matrix
r corresponding to
q weighting results:
From the definition of
rik, it is known that
rll = 1 (
l = 1, 2, …,
q),
rlk =
rkl (
l,
k = 1, 2, …,
q). According to the symmetric matrix, calculate the correlation degree
rj between the
j-th weighting method and all other weighting methods. The calculation formula is
Through normalization, obtain the weight coefficients
lj for each weighting method in the combined weighting:
Substitute the above formula into Equation (25) to obtain the combined weights
v of each indicator calculated based on three weighting methods:
3.2. Target Threat Level Assessment
3.2.1. Target Threat Level Assessment Based on TOPSIS Method
The TOPSIS method is a commonly used multi-attribute decision analysis approach. Its basic principle involves ranking alternatives by calculating their distances to both the ideal solution (the best possible scenario, where all attributes achieve optimal values) and the negative ideal solution (the worst possible scenario, where all attributes achieve suboptimal values). A better alternative is simultaneously closer to the positive ideal solution and farther from the negative ideal solution. After obtaining the combined weights v for target threat indicators, as described in the preceding section, we analyze and rank the threat levels of each target using the decision matrix and weight information.
The standardized attribute matrix H = [hij]m×n is constructed using the comprehensive weights v = [v1, v2, …, vn] for target attributes, calculated using the combined weighting method based on deviation coefficients and based on the threat indicators of each target.
Step 1: Calculate the weighted normalized matrix
V:
Step 2: Determine the ideal solution
vj+ and negative ideal solution
vj−:
Step 3: Calculate the distance
di+,
di− from each target threat indicator attribute value series to the ideal and negative ideal solutions:
Step 4: Calculate the closeness coefficient
Ci for each target, representing its proximity to the ideal solution:
3.2.2. Target Threat Level Assessment Based on D-S Evidence Theory
D-S evidence theory was proposed and improved by Dempster and Shafer. It can handle incomplete, uncertain, and unclear information in multisource evidence, reducing the interference of conflicting weights in decision-making. This enables the fusion of multisource information.
D-S evidence theory first defines a finite non-empty set of hypotheses as the Frame of Discernment (FoD). This set contains
U mutually exclusive and exhaustive hypotheses.
where
U is the number of hypotheses in the system, and
Hi (
i = 1, 2, …,
M) represents the
i-th hypothesis reflecting the
i-th possible identification result. According to the definition of FoD, the power set can be denoted by 2
ϴ.
where Φ is the empty set, and
H ⊆ ϴ,
H ∈ 2ϴ.
To describe the support for the hypotheses, a basic probability assignment (BPA), also known as a basic belief assignment (BBA), is introduced into the power set 2
Θ. The mass function
m: 2
Θ→[0, 1] must satisfy the following conditions:
where
H is a proposition in 2
Θ containing one or more hypotheses, and
m(H) denotes the initial support for
H.
Equations (36) and (37) reflect the non-negativity and normalization of the mass function. Without further information, m(H) cannot be further subdivided into any proper subsets of H. When m(H) > 0, H is called a focal set, and all focal sets are collectively referred to as the core of the mass function.
The belief function
Bel and plausibility function
Pl in the power set 2
Θ are defined by the following formulas:
where
H and
A are both propositions in the power set 2
Θ.
From Equation (38),
Bel(H) is defined as the degree of belief in proposition
H, which is the sum of basic probabilities of all subsets of
H, representing the total belief in
H. Therefore, it can also be considered the lower-bound function of
H.
Pl(
H) is defined as the plausibility function of
H, representing the degree of non-false belief in proposition
H; thus, it is also known as the upper-bound function of
H. The relationship between
Bel(
H) and
Pl(
H) can be understood from
Figure 4.
The uncertainty description reveals that D-S evidence theory can reflect probabilistic uncertainty, so it can be seen as an uncertainty reasoning theory, showing its applicability to multisource data information fusion. As
Figure 4 shows, the logical relationship between
Bel(
H) and
Pl(
H) is as follows:
where
is the complement of
H.
The interval [
Bel(
H),
Pl(
H)] is called the confidence interval or uncertainty interval, representing the uncertainty and imprecision in D-S evidence theory. Suppose that
m1,
m2, …,
mN are
N independent BPAs obtained by
N different sensors for the same target. D-S evidence theory’s combination rule (orthogonal sum rule) can be expressed as
Thus, the combination rule for different
mi,
mj (
I,
j = 1, 2, …,
N) can be defined as
where
k is the total conflict factor, which represents the total conflict between
mi and
mj.
The value of k represents the degree of conflict between two pieces of evidence, with 1/(1 − k) serving as the normalization factor. This ensures that the combined evidence m in Equation (45) is non-negative and normalized.
D-S evidence theory’s combination rule satisfies commutative and associative laws during computation, defined as, respectively,
5. Conclusions
Based on expert experience, the AHP can be used to subjectively evaluate target attributes. In contrast, the information entropy weight and CRITIC methods can objectively reflect the variability in target attributes, enabling rapid responses to dynamic task planning and maneuverability. Therefore, they are often used for threat estimation when target information is incomplete. This study uses two models—the combined weighting method based on deviation coefficients and D-S evidence theory—to fuse three types of subjective and objective weights, thereby obtaining more reliable evaluation results. The threat levels of LSS targets are calculated using both TOPSIS and D-S evidence theory. Finally, the reliability and effectiveness of the two models are verified through simulation analysis and measured data, providing a reference for LSS target interception decision-making. The main conclusions obtained are as follows:
(1) For the evaluation of LSS target threat levels, the threat level rankings obtained by D-S evidence theory (using basic probability assignments (BPA) and indicator weights) are completely consistent with those of TOPSIS based on the combined weighting method with deviation coefficients. This consistency demonstrates that both methods equally capture core threat features in scenarios without indicator conflicts. The dynamic adjustment of subjective–objective weight ratios via deviation coefficients essentially involves linear weighted summation, while D-S evidence theory achieves evidence fusion through Dempster’s combination rule. Although their mathematical logics differ, in scenarios where all indicators positively support threat levels and no evidence conflict exists, the weighted sum is equivalent to the D-S belief function calculation. Thus, their results align, both providing reliable bases for tactical decision-making.
(2) The combined weighting method based on deviation coefficients calculates the consistency between weighting methods through the dynamic fusion mechanism of the weight deviation similarity index rlk and allocates combination coefficients according to the degree of correlation, ensuring that the weight allocation between subjective experience and objective data is more in line with actual scenarios. In contrast, D-S evidence theory reduces the influence of contradictory evidence through the conflict coefficient k, balances differences between subjective and objective sources, and prevents dominance by a single indicator, aligning with the comprehensive judgment of multisource evidence.
(3) Simulation analysis and comparative experiments show that the two methods proposed in this paper can comprehensively consider the capabilities and intentions of multiple LSS targets and accurately provide threat assessment results based on different LSS movement state information. The proposed methods can be directly applied to real-world low-altitude airspace defense systems.
The limitations of the established expert knowledge base accordingly decrease the reliability of the evaluation. Future in-depth research on the movement laws of LSS targets will continually enrich the expert knowledge base. Future work will focus on three key areas: (1) continuously enrich and improve the expert database and incorporate new threat assessment factors; (2) establish the structure of new threat assessment factor quantification functions and optimize their parameters to improve accuracy; (3) adopt incremental computing technology to accelerate the processing of large-scale data and improve the dynamic update speed of the evaluation system.