A Hybrid Framework For Maritime Surveillance Detec
A Hybrid Framework For Maritime Surveillance Detec
Article
A Hybrid Framework for Maritime Surveillance: Detecting
Illegal Activities through Vessel Behaviors and Expert
Rules Fusion
Vinicius D. do Nascimento 1,2, * , Tiago A. O. Alves 3 , Claudio M. de Farias 1 and Diego Leonel Cadette Dutra 1
1 Systems Engineering and Computer Science Graduate Program (PESC)/COPPE, Federal University of Rio de
Janeiro (UFRJ), Rio de Janeiro 21941-972, RJ, Brazil; [email protected] (C.M.d.F.);
[email protected] (D.L.C.D.)
2 Brazilian Navy Research Institute (IPqM), Rio de Janeiro 21931-095, RJ, Brazil
3 Institute of Mathematics and Statistics (IME), State University of Rio de Janeiro (UERJ),
Rio de Janeiro 20550-900, RJ, Brazil; [email protected]
* Correspondence: [email protected]
Abstract: Maritime traffic is essential for global trade but faces significant challenges, including
navigation safety, environmental protection, and the prevention of illicit activities. This work presents
a framework for detecting illegal activities carried out by vessels, combining navigation behavior
detection models with rules based on expert knowledge. Using synthetic and real datasets based on
the Automatic Identification System (AIS), we structured our framework into five levels based on
the Joint Directors of Laboratories (JDL) model, efficiently integrating data from multiple sources.
Activities are classified into four categories: illegal fishing, suspicious activity, anomalous activity, and
normal activity. To address the issue of a lack of labels and integrate data-driven detection with expert
knowledge, we employed a stack ensemble model along with active learning. The results showed
that the framework was highly effective, achieving 99% accuracy in detecting illegal fishing and 92%
in detecting suspicious activities. Furthermore, it drastically reduced the need for manual checks
by specialists, transforming experts’ tacit knowledge into explicit knowledge through the models
and allowing continuous updates of maritime domain rules. This work significantly contributes to
Citation: do Nascimento, V.D.; Alves, maritime surveillance, offering a scalable and efficient solution for detecting illegal activities in the
T.A.O.; de Farias, C.M.; Dutra, D.L.C. maritime domain.
A Hybrid Framework for Maritime
Surveillance: Detecting Illegal Keywords: maritime surveillance; illegal activities detection; navigation behavior models; expert
Activities through Vessel Behaviors knowledge integration; active learning
and Expert Rules Fusion. Sensors 2024,
24, 5623. https://doi.org/
10.3390/s24175623
coast by the country [4]. To improve maritime traffic security, it is essential to strengthen
intelligence processes in maritime surveillance. Detecting illegal activities carried out by
vessels is crucial for enhancing navigation safety, as well as improving the efficiency and
protection of maritime operations [3]. The detection of navigation behaviors such as fishing
trajectories, loitering, spoofing, encounters (or rendezvous), and dark ships is essential for
situational awareness and, consequently, for the detection of illegal activities [5].
Several works in the literature have addressed how to detect individual vessel behav-
iors [6–9], mainly anomalies. In [10], the relationship between these navigation behaviors
and the activities performed by the vessels was addressed, and how it is possible to detect
activities through this relationship. Vessel behaviors can be observed through sensors,
while the activities performed are part of the human will for which the vessels are used.
In a literature review on the detection of anomalous vessel behaviors conducted in [11],
it was concluded that specialized knowledge is an important aid in understanding ship
navigation behavior, although experts with knowledge in the maritime area are mixed
and diverse, making it difficult to form a unified pattern. Thus, establishing a data-driven
method incorporating specialized knowledge is an important research direction.
A significant portion of the literature on maritime surveillance mostly concentrates
on anomaly identification, as evidenced by the works of [5,6,11,12]. There is a scarcity of
research on the identification and detection of illegal activities in the maritime domain. As
an illustration, Ref. [10] discussed activity classification, focusing solely on the ontological
viewpoint. In [13], the authors introduced a method to infer illegal maritime activities in
real time by examining the multiscale spatial behavior of entire fleets, specifically groups of
vessels that transmit their location via AIS. However, in our investigation, we did not find
any work attempting to detect illegal vessel activities using a methodology similar to ours.
Hence, the objective of this study is to address this gap by presenting a framework capable
of detecting illegal activities carried out by vessels through the fusion of vessel behavior
detection models with rule outputs created based on expert knowledge.
Many maritime domain monitoring systems used by maritime authorities are based
on kinematic rules created by experts. Rule-based approaches aim to detect a restricted
set of vessel activities, areas, or dynamic characteristics of vessel trajectories or trajectory
evolutions through predefined rules and limits. Automated Behavior Monitoring (ABM),
developed by the European Maritime Safety Agency (EMSA) [14], enhances maritime
surveillance by incorporating a collection of predefined rule-based scenarios. These sce-
narios enable the automatic activation of detection for vessels arriving in specific areas,
following unconventional routes, or being located in designated areas.
However, a significant issue with these systems is the creation of thousands of rules
and the triggering of a large number of false alerts, which can overwhelm operators. In
this context, our framework seeks to enhance this activity detection process by reducing
the necessary interventions from specialists, ensuring that they only intervene in vessel
trajectories that truly require attention. Therefore, our framework aims to achieve the
following primary objectives:
• Detect illegal activities in the maritime domain involving the use of vessels;
• Reduce the number of trajectories that specialists need to analyze;
• Integrate the tacit knowledge of specialists with data-driven methods;
• Convert the tacit knowledge of specialists into explicit knowledge through machine
learning models;
• Ensure the scalability of the framework for detecting other activities, behaviors,
and rules.
To reach these objectives and show that our framework works for detecting illegal
activities on vessels, we will use a combination of methods in a JDL framework, using both
synthetic and real datasets for training and testing.
Sensors 2024, 24, 5623 3 of 30
Figure 1. A summarized process for detecting illegal activities in the maritime domain.
on historical behaviors or established rules. For example, for fuel economy reasons, cargo
vessels usually follow a predefined commercial route at a constant speed and without
abrupt deviations. In the case of fishing vessels, they may exhibit characteristic fishing
trajectories in the locations where they are actually fishing. An anomalous trajectory, on the
other hand, may show significant deviations from the expected pattern, indicating atypical
or suspicious behaviors. The next section discusses these behaviors and how to spot them.
Thus, to detect AIS spoofing behavior, we calculate the speed in knots between each
consecutive points of the trajectory. If at any point the speed exceeds 50 knots, it will be
considered an impossible speed, and the trajectory will be identified as a spoofing case.
Additionally, trajectories with points in impossible locations, such as crossing land, will
also be considered spoofed.
Figure 3. An instance of spoofing. The SOG given by the AIS is 3.2 knots. However, when we
compute the speed using the coordinates and the time taken to move between them, we obtain a
speed of 92 knots.
in this work, we group the hashes generated by each AIS position using resolution 9 (200 m)
and use a time window of 4 h. Thus, for one or more vessels to be considered in an
encounter, they must be in the same geohash cell within a 4 h window and more than
10 nautical miles from the coast. The choice of resolution 9 was based on the need for spatial
precision that allows capturing relevant encounters between vessels without generating an
excessive number of data. We selected the 4-hour window to detect proximity, even if both
vessels take up to 2 h to emit an AIS signal.
Figure 4. An example of an encounter at sea between vessels. The green points represent the trajectory
of Vessel 1, while the red points represent Vessel 2. The blue squares represent FPSO areas. The image
shows that the vessel had an encounter outside the FPSO area.
region. When we identify a gap in a vessel’s trajectory, we verify if AIS transmissions have
previously taken place in the red regions. If there have been no transmissions in that region,
it would not be considered a gap in the trajectory. Therefore, in our work, we consider these
transmission gaps along with the geohashes’ transmission histories to determine whether
the vessel should have transmitted an AIS signal from that position or not.
Figure 5. The image shows an example of gap detection in a vessel’s trajectory. The blue points reflect
the vessel’s trajectory. The red squares indicate where the vessel should have transmitted the AIS
signal, while the green squares represent where the vessel did transmit. The red squares represent
transmission gaps.
where:
• d is the distance between the two points, in nautical miles.
• r is the radius of the Earth, approximately 3440 nautical miles.
• φ1 and φ2 are the latitudes of the two points, in radians.
• λ1 and λ2 are the longitudes of the two points, in radians.
In terms of the time difference between two points, we use the unit of minutes. To
calculate the speed and acceleration in knots, we simply divide the distance and speed,
Sensors 2024, 24, 5623 8 of 30
respectively, by the time in hours. Finally, to calculate the angular difference between the
points, we can use Formula (2).
where θ1 and θ2 are the directions at each point, and arctan 2 is a variation of the arc
tangent function that takes into account the sign of both the sine and cosine components
to determine the quadrant of the resulting angle. This same strategy for detecting fishing
trajectories was used in [36].
After creating the RNN model for detecting fishing trajectories, we trained it using
the Global Fishing Watch (GFW) fishing trajectories dataset [37]. Thus, the model infers a
probability value from 0 to 1, where 1 indicates 100% likelihood of a fishing trajectory and
0 indicates otherwise.
2.2.5. Loitering
Loitering involves a ship or boat spending an abnormally long time in the same area
or performing slow movements around a larger area without displacing itself a significant
distance. Vessels that remain stationary or move in circles indicate possibly waiting for
another ship or engaging in activities like illegal fishing.
Several studies on loitering detection have generally described it as detecting an
object at a scene for a period of time that exceeds a given threshold [38–40]. However,
to detect a loitering trajectory, we innovatively created a method using an RNN model,
similar to the detection of fishing trajectories. First, using the MarineCadastre dataset [41]
with AIS data from the coast of the United States, we detected vessel encounters. For
vessels to meet, they first need to slow down to a complete stop. This deceleration and
subsequent low-speed movement for a few hours in a location are characteristic of loitering
trajectories that can precede an encounter between vessels. By detecting the trajectories that
performed these encounters, we extracted these trajectories to train our RNN model. Then,
we created an RNN architecture with the same dimensions that we used to detect fishing
behaviors (speed, distance difference, time difference, angular difference, and acceleration).
Finally, we trained the model with the trajectories extracted from the encounters in the
MarineCadastre dataset.
Sensors 2024, 24, 5623 9 of 30
Rule Purpose
Validation of the vessel’s MMSI, both To determine if the vessel has an MMSI
syntactically and semantically [47] registered with the local maritime authorities.
A crawler searches the internet using the MMSI
and identifies the name, flag, and vessel type.
Identify the expected behavior based on the
As a result, we can generate the following
type and flag of the vessel.
attributes: flag_brazil, flag_other, flag_unknown,
type_fishing, type_other, type_unknown
Identify if the vessel anchors in areas where
Passage through anchorage areas
ships typically anchor.
Based on the distance from the coast, identify
Distance from the coast the laws to which the vessel may be subject
and the expected behavior in those regions.
Sensors 2024, 24, 5623 10 of 30
Table 1. Cont.
Rule Purpose
Determine if the vessel exhibits fishing
Passage through marine protected
behavior within areas where fishing
areas (MPAs)
is prohibited.
Identify if the offshore support vessels conduct
Passage through FPSO areas
a rendezvous within these regions.
Conduct a comparison between the average
speed calculated based on latitude and
Average speed of the trajectory longitude positions and the speed reported by
the AIS. Additionally, analyze the correlation
between the vessel’s behavior and its speed.
Figure 7. In the picture, we can see rules established by the expert based on his expertise. For
example, the expert establishes kinematic rules for specific areas (e.g., MPA and FPSO areas), vessel
identification characteristics, the distance from the shore where certain activities occur, and so on.
These rules apply to all trajectories and normalize the outputs. We convert the values
of binary responses to either 1 or 0. Finally, we apply these rules to the trajectories and
insert them into the SQLite database for later use in the metamodel and active learning.
the vessel’s behavior, but also the identification of the human intent (commander, crew,
owner, etc.) behind the vessel’s use.
In [10], an ontology-based approach was proposed to detect vessel activity based on
vessel behavior. The author argues that modeling and exploring uncertain information is
a fundamental enabler for recognizing vessel activity, given the high variability of vessel
behavior and the inherent uncertainty of its intent. As a result, vessel behavior is part of the
observed activity. In this work, we consider the detected vessel behaviors in conjunction
with the expert-created rules to detect vessel activity.
Detecting all these activities would be an unfeasible scope for this work, both due to
the lack of historical data and sensors and due to the broad scope. Therefore, we will focus
on activities where academic data exist so that we can train our models and present tests
demonstrating that our framework works and can be scalable. Therefore, this work will
classify activities into the following categories:
• Illegal fishing: fishing is considered illegal when a vessel engages in fishing within an
area where fishing is not allowed, or when vessels fish within the EEZ of a foreign
country [50];
• Suspicious activity: an activity that, according to the expert’s judgment, might be
conducted to commit an illicit activity. However, some evidence is missing (due to
uncertainty in certain data) to confirm this specific activity (such as illegal fishing,
trafficking, etc.). Based on the expert’s experience, these activities should be consid-
ered with a higher level of severity than a typical anomalous activity. For instance,
encounters between ships situated across a distance of 12 nautical miles from the shore
means they may be engaging in the transportation of goods or the transfer of arms.
Another example would be unidentified vessels exhibiting fishing patterns between
180 and 200 nautical miles, which is often indicative of illegal fishing activity;
• Anomalous activity: an expert classifies an activity as anomalous when a specific set
of behaviors and/or rules appear uncommon but do not immediately suggest illegal
activity. For instance, if a vessel is performing atypical maneuvers in a region that is
usually devoid of activity, the expert may classify it as anomalous. However, in this
situation, there is no evidence of illicit conduct, just a deviation from the norm;
• Normal activity: when a navigation activity is considered normal for that locality.
At first, there is no association between vessel behaviors and activities. This correla-
tion exists empirically in the expert’s mind and will be established through the expert’s
evaluation of the trajectories. In the following sections, we will outline the strategy for
selecting trajectories for the expert to evaluate so that this correlation can be developed. In
this work, we will use these four activities as the primary labels for classification. In the
Section 2.8, we will define objective criteria for the expert to classify each activity.
This process allows stacking to leverage the strengths of different learning models,
which can result in a significant improvement in predictive performance. The effectiveness
of stacking is particularly notable in scenarios where there is significant heterogeneity
among the base models. This diversity allows the metamodel to develop an enhanced
ability to recognize the most efficient way to integrate individual predictions from the base
models, resulting in superior accuracy in the final prediction. As a metamodel, we will use
the random forest model for its robust ability to reduce overfitting and improve prediction
accuracy. The random forest, which is an ensemble of multiple decision trees, combines
the predictability of different base models and captures various nuances in the data. Its
non-parametric nature allows it to efficiently handle high-dimensional and heterogeneous
data, common in the detection of illegal vessel activities.
In our case, we will use the navigation behaviors presented in Section 2.2 and the
expert-created rules in Section 2.3 as base models. We will use the output of these models as
input for the metamodel, specifically the random forest model. However, even combining
behavior models with expert rules, we will still face the problem of a lack of labels for
activities. In the next section, where we discuss active learning, we will address this
problem in more detail.
informative examples from the unlabeled dataset and asks a human expert to label them.
This is especially useful when data labeling is expensive or time-consuming. In an active
learning scenario, the machine learning algorithm not only learns from previously labeled
data but also has the ability to request labels for specific examples from the unlabeled
dataset. The idea is that the model will improve more quickly if it can obtain labels for
the examples it finds most uncertain or informative. To make this efficient, active learning
algorithms typically use some type of query strategy. They can, for example, select examples
where the model’s predictions are most uncertain, or examples that are on the decision
boundary between two classes. When we have a large unlabeled dataset and a human
expert who can provide accurate labels, but the expert’s time is limited, active learning can
be very effective [52].
Given its unique characteristics, our problem presents an exceptional opportunity for
the application of active learning. First, we start with unlabeled data, and the expert needs
to perform a “cold start” on the labels to provide context. This is a common scenario in
many real-world applications where data collection is abundant but labeling is expensive
due to the need for human expertise. After the cold start performed by the expert, active
learning can be trained and begin querying the user for labels. The model will select data
that has the highest probability of increasing its prediction accuracy. Thus, with each label
provided by the user, the model’s weights are updated, and, consequently, the model’s
accuracy increases. In our case, the model used in active learning is the random forest. In
the next section, we will present how our JDL-based framework is organized, from data
acquisition to activity prediction.
2.7.1. Preprocessing
Data preprocessing is a crucial step to ensure the quality and integrity of subsequent
analyses. Data can be obtained from different sources and sensors, such as AIS, radars,
satellite images, etc. The data used in this study come from raw AIS data. Each row in
the dataset comprises latitude, longitude, speed over ground (SOG), course over ground
(COG), MMSI, vessel name, and a timestamp. As a result, the primary preprocessing
steps are:
• Loading raw AIS data: the raw AIS data are initially loaded directly from the available
files using the Python Pandas library;
• Cleaning missing or invalid data: after loading, rows with missing or incorrect data are
cleaned. A trajectory must consist of at least five points, so missing cases are removed;
• Transforming AIS data into geodataframes: the cleaned data are then transformed
into geodataframes using the geopandas library [55]. This transformation allows for
Sensors 2024, 24, 5623 14 of 30
storing the data in a database, preparing the data for use in active learning, and presenting
the data intuitively to the user.
To combine the data, we first create a dataframe where each row contains columns
with data on the outputs of each model and expert rule, correlated with the respective
trajectory. Then, these data are stored in a database (SQLite). Using a database facilitates
manipulation and speeds up the loading of data for model execution. Once completed, the
next level can utilize these data as input for its execution.
Practically, a class called Situational Awareness is instantiated, and an Object Level Fusion
is provided as an argument in the constructor. Next, the fuse method is called to merge all
behaviors, centralize all data associated with each trajectory, and make them ready for the
subsequent stage.
Figure 9. Experts evaluate trajectories through an interface at the impact assessment level. The
user can have a situational awareness of a trajectory with vessel information, navigation behaviors
presented by the trajectory, and whether the trajectory triggers the rules created by the expert.
Sensors 2024, 24, 5623 16 of 30
The model updates itself after each labeling by the user. After a sufficient number of
classifications (described in the Section 2.8), the model can infer activities for each received
trajectory. Thus, the expert can now work only with trajectories that generate predictions of
interest, such as illegal fishing and suspicious activities. In the next section, we will address
this topic.
Synthetic Dataset
A synthetic dataset is a dataset generated artificially rather than collected directly from
the real world. These data can be created using algorithms and simulations that model the
behavior of real systems or processes. The creation of synthetic datasets allows researchers
and developers to test and validate algorithms in situations where real data are scarce,
unavailable, or incomplete. In our case, we used a synthetic dataset due to the lack of
labels for classifying illegal vessel activities. The available real data do not include enough
information to accurately identify and label these activities, making it necessary to create a
synthetic dataset that simulates these situations.
Our synthetic dataset was built in several steps:
• Fishing trajectories from GFW randomly translated to the southeast coast of Brazil: we used
fishing trajectory data from the GFW dataset [57] and performed random translations
of these trajectories to the southeast coast of Brazil. The regions where these trajectories
were introduced were within the EEZ and within environmental areas of the southeast
coast of Brazil;
Sensors 2024, 24, 5623 17 of 30
• Modification of the flag and type of the vessel: to increase data heterogeneity, we altered
the flag and type of some trajectories. The vessel’s flag can be brazil, other, or unknown.
The vessel type can be fishing, other, or unknown;
• Encounter trajectories from MarineCadastre translated to the southeast coast of Brazil: vessel
encounter data were obtained from the MarineCadastre dataset [41] and translated
to the same southeast region, maintaining the same geographical coherence as the
fishing data. The regions where these trajectories were inserted were within the EEZ
and offshore exploration areas of the southeast region of Brazil;
• Updating the AIS timestamp: we updated the AIS timestamps to identify the synthetic
data in the dataset;
• Concatenation of synthetic data with real AIS data from the coast of Brazil (2019 to 2020):
Finally, we combined the synthetic data with the real AIS data collected from the coast
of Brazil from 2019 to 2020, creating a comprehensive and representative dataset.
Thus, we trained our framework using data from the southeast region and tested it
across the entire coast to detect some real situations. By creating a synthetic dataset, we
could train and validate our framework in more varied and challenging conditions, thereby
enhancing its accuracy and effectiveness in detecting suspicious activities.
Figure 11. The maritime monitoring framework processing trajectories after training. Online data
stream processing can make use of this procedure.
Sensors 2024, 24, 5623 19 of 30
During the testing process, the expert evaluated a total of 400 trajectories, analyzing
the behavior outputs and rules of each trajectory, and finally assigning their classification.
In Figure 11, at Level 3, this evaluation process can be seen. Thus, based on the metamodel’s
activity inference and the expert’s responses, we could now evaluate the performance of
our framework.
To better understand the predictions of our metamodel, we used the SHAP (SHapley
Additive exPlanations) tool. SHAP is a machine learning model interpretation tool based
on Shapley values, which originate from game theory [58]. Shapley values provide a fair
way to attribute the contribution of each feature to a model’s prediction, considering all
possible combinations of features. SHAP allows for both global interpretation, providing an
overview of feature importance across the entire dataset, and local interpretation, explaining
the prediction of a single data point. Shapley values help us to understand how much each
feature contributes to a model’s prediction, ensuring consistency and intuitive interpretation
of the results. In the next section, we will present and analyze the results in more detail.
3. Results
As previously stated, the results obtained here were the result of a manual evaluation of
each of the 400 trajectories inferred by the framework. We selected 100 random trajectories
for each inferred activity class. To measure the framework’s performance, we used the
metrics of precision, recall, f1-score, and support. Each metric can be defined as follows:
• Precision: this is the proportion of true positives among the instances that are classified
as positive. It measures the accuracy of the model’s positive predictions.
• Recall: this is the proportion of true positives among all instances that are actually
positive. It measures the model’s ability to find all positive instances.
• F1-score: this is the harmonic mean of precision and recall, providing a single metric
that balances both considerations. It is especially useful when there is an imbalance
between classes.
• Support: this refers to the number of actual occurrences for each class in the dataset.
It is a measure that indicates how many instances are present for each class.
Additionally, macro and weighted averages were calculated:
• Macro avg: calculates the average of the metrics for all classes, treating each class
equally, regardless of the number of instances.
• Weighted avg: calculates the average of the metrics for all classes, weighted by the
number of instances in each class.
In Table 2, we can observe the performance of the four classes, highlighting that our
framework achieved the best performance in detecting normal activities, with a perfor-
mance of 100%, and illegal fishing activities, with a performance of 99%. In Figure 12, we
can analyze the confusion matrix of the classes. From the matrix, we can observe that the
framework, in some situations, incorrectly inferred the suspicious class instead of normal or
anomalous, causing the model’s precision for this class to decrease. We also calculated the
macro and weighted averages. As shown in Table 2, even with slightly different support in
some classes, the averages were practically 97%.
Table 2. Performance metrics of the metamodel: precision, recall, and F1-score for each activity class.
In Figure 13, we have the plots for the four activities, where the y-axis shows the
attributes used in the model and the x-axis shows how much each attribute impacted the
prediction. Positive SHAP values (in red) indicate that the variable contributes to predicting
the positive class, while negative values (in blue) indicate contribution to the negative class.
The absolute size of the SHAP value indicates the magnitude of the contribution.
In Figure 13a, we can observe how the dimension values behave when inferring the
illegal fishing class in our metamodel. In this graph, we can see that the most decisive
dimension is ft (fishing trajectory), which is the output of the model that detects fishing
behavior. In this case, the higher the ft value is, the greater is the impact on the model
to infer illegal fishing. The same applies to the type_fishing dimension, which indicates
whether the vessel is a fishing vessel or not. Since we used synthetic trajectories, the
impactful dimensions are very noticeable due to the well-defined pattern established with
the synthetic data, which may have facilitated the detection of these simpler cases by
the model.
Regarding Figure 13b, we have the dimension values when the metamodel infers the
suspicious activity class. In this case, we can see that the most impactful dimensions are enc
(encounters) and ft. In this situation, if an encounter is detected, it is highly suspicious. The
same happens with the fishing trajectory (ft). However, we can see that the type_unknown
and coast_distance dimensions also have a strong influence on the result. In the case of a
vessel with an unknown type (type_unknown), presenting a fishing trajectory (ft) within
a marine protected area (inside_mpa), the metamodel considers it a suspicious activity. If
type_fishing in this case were 1, it would be considered illegal fishing activity. Therefore, in
this case, the higher the type_fishing value is, the lower the impact is for it to be classified as
suspicious. For an encounter between vessels (enc) to be considered suspicious, the location
must be outside an oil exploration area and more than 12 NM from the coast, meaning
in_fpso_area must be 0 and inside_ts must be 0.
In Figure 13c, we have a case of activity classified as anomalous. In this case, we see
from the three most impactful dimensions that, to be classified as an anomalous activity,
the MMSI (mmsi_valid = 0) must be invalid, it cannot be a fishing trajectory (ft close
to zero), and there should be no encounters (enc = 0). We can also observe that when
spoofing = 1 and out_of_anchor_zone = 1, we have a well-defined distribution to be inferred
as suspicious activity.
Finally, in Figure 13d, we can highlight the most impactful dimensions for classifying
normal activity. The dimensions mmsi_valid greater than zero, enc = 0, ft close to zero,
vessel type (type_other) different from fishing, and within the territorial sea (inside_ts = 1)
Sensors 2024, 24, 5623 21 of 30
influence the metamodel to classify the activity as normal. Thus, the model was able to
accurately capture the characteristics of each activity that was initially only within the
expert’s knowledge.
(a) Shap for illegal fishing activity. (b) Shap for suspicious activity.
(c) Shap for anomalous activity. (d) Shap for normal activity.
Figure 13. This figure shows the SHAP graphics for the metamodel predictions. The SHAP shows
the contributions of each dimension to the class prediction.
In a real-world scenario where we applied the framework to actual AIS data, we did not
identify any real instances of illegal fishing; such cases were only detected in the synthetic
trajectories. On the other hand, in the case of suspicious activities, we found real situations
of suspicious encounters between vessels in the EEZ that could be trafficking activities, for
example. We also discovered instances of fishing vessels operating within marine protected
areas, potentially engaging in fishing activities for which our fishing trajectory detection
model lacked training. In the future, we can incorporate additional behaviors or rules into
the framework to classify activities more precisely, not just as suspicious.
In the case of anomalous activities, it is necessary to analyze repeating anomaly
patterns and investigate the reasons. For example, in the case of an invalid MMSI, many
Sensors 2024, 24, 5623 22 of 30
smaller vessels use AIS transponders without registration with the competent authority and
assign any number to the MMSI. This could be understood as a small vessel moving away
from the coast to fish, for example. In the worst-case scenario, this same vessel may not
want to identify itself as committing an illegal activity. Therefore, we need to study these
anomaly patterns and incorporate other forms of behavior detection into the framework to
identify such situations.
In Figure 14, we can see all the trajectories inferred by the framework and plotted
on the map. In Figure 14a, we can see the trajectories considered normal activities, in
Figure 14b those considered illegal fishing, in Figure 14c those considered suspicious
activities, and in Figure 14d the activities inferred as anomalous. In Figure 14a, we observe
the large number of trajectories, representing about 97% of the total trajectories, occupying
almost the entire EEZ space. We also note that there are trajectories in rivers that are not
included in our study.
(a) Trajectories identified as normal activity by (b) Trajectories identified as illegal fishing ac-
the framework. tivities by the framework.
(c) Trajectories identified as suspicious activi- (d) Trajectories identified as anomalous activ-
ties by the framework. ities by the framework.
Figure 14. All trajectories inferred by the framework plotted on the map.
In yellow, in Figure 14b, we can see that the trajectories considered illegal fishing are
mainly concentrated in the southeast region. Indeed, all of them are synthetic trajectories,
and the framework did not explicitly indicate any real illegal fishing activities based on the
dataset used. In green, in Figure 14d, many trajectories in rivers are considered anomalous,
as they were not part of our study and were not used in our training. Additionally, there
are anomalous trajectories along the entire coast, mainly in the southeast and south regions.
Sensors 2024, 24, 5623 23 of 30
In some cases, navigation aid buoys were mistaken for vessels, either being transported
with AIS on or in fixed locations.
In red, in Figure 14c, we can see that most of these trajectories are concentrated in
the southeast region, exactly where we inserted the synthetic vessel encounter trajecto-
ries. However, the framework also identified other real dataset trajectories as potentially
suspicious activities, as observed in other coastal regions.
During the manual evaluations in the tests, we identified some real-world scenarios
that warrant highlighting as examples. In Figure 15, we have a trajectory that our frame-
work classified as anomalous. In the image, it is possible to observe the model outputs and
the expert rules, where the vessel has an invalid MMSI, an unknown flag and type, a gap
in its trajectory, and, visually, a sinuous trajectory with an average speed of 4.34 knots. Ad-
ditionally, the vessel is close to 200 nautical miles, which is the EEZ limit. These anomalous
behaviors alone cannot tell us what the vessel is trying to do, only that it is unusual.
In Figure 16, we have an example of suspicious activity classified by our framework,
where two vessels meet approximately 70 NM from the coast. Vessel encounters are
not illegal, but they can be an indication of illicit activity. To reduce false positives in
activity detection, it is necessary to create models that detect behaviors, allowing for a
better understanding of the situation. For instance, oil platforms require support vessels
to transport oil, personnel, and materials. Therefore, encounters between vessels in these
regions are common. The region where the encounter occurred, as shown in Figure 16, does
not have oil exploration areas. Thus, the vessel had another reason for the encounter aside
from offshore activity. Therefore, the specialist needs to pay closer attention to these cases.
Observing the SHAP graph of the suspicious activity class (Figure 13b), we see that,
when an encounter between vessels is detected, far from the coast and outside an FPSO
area, there is a high probability of predicting the suspicious activity class, due to these
dimensions having a greater impact. These rules were implicitly inserted by the specialist
during the active learning training. This is a significant advantage of the framework,
which transforms the specialist’s tacit knowledge into explicit knowledge through the
trained models.
Figure 15. The image presents a real-world example of an anomalous activity that the framework has
identified. An unidentified vessel with trajectory gaps and a sinuous path close to EEZ boundaries.
Sensors 2024, 24, 5623 24 of 30
Figure 16. The image shows suspicious activity detected by the framework. The vessel represented
by the green points is encountering the vessel represented by the red points at 70 NM off the coast.
In northern Brazil, the framework identified suspicious activities involving the tra-
jectories of fishing vessels from a foreign country. Although the model did not classify
these trajectories as fishing, the vessels exhibited an average speed of 2 knots and sinuous
trajectories, characteristics that typically occur in some fishing situations. The lack of
training with this type of fishing may have led to a false negative for fishing in the fishing
trajectory detection model. However, even without detecting them as fishing, the frame-
work classified the trajectories as suspicious, as shown in Figure 17. Due to the location
and the fact that the vessels belong to the same country, these activities are noteworthy and
need to be analyzed in more detail by the specialist.
Figure 17. The figure shows trajectories detected as suspicious by the framework. The red points
represent the trajectories of foreign fishing vessels along the northern coast of Brazil.
Another case worth highlighting, which our framework identified as suspicious, was a
fishing vessel within the marine protected area of the São Pedro and São Paulo Archipelago.
Sensors 2024, 24, 5623 25 of 30
In Figure 18, we can see that the vessel is stationary; however, fishing is prohibited in this
region. In preprocessing, we filtered for trajectories with speeds between 1 and 50 knots,
which is the speed reported by the AIS. On the other hand, the average speed we calculated
in the metamodel is the actual speed, based on the positions and the AIS point timestamps.
The specialist must analyze this situation, as the vessel might be involved in another fishing
modality where it stays stationary.
One of the main results of this research is the possibility of increasing human operator
efficiency by eliminating the requirement to examine trajectories that are considered normal.
We can perform a quantitative analysis to evaluate the workload required by human
operators in this case study in the absence of our framework. In Table 3, we display the
aggregate count of trajectories that have been analyzed by the framework.
In Table 3, we can see the number of activities inferred by our framework, where
1100 trajectories out of the total of 361,229 were used for training. Initially, in a maritime
domain monitoring situation by specialists, we could avoid checking 350,780 trajectories
that were considered normal activities, representing about 97% of the total trajectories. This
makes sense, as a large portion of vessel trajectories are normal. Subsequently, specialists
could prioritize more severe activities. In our case, we have the situation of illegal fishing.
Figure 18. The figure shows a situation detected as suspicious activity by the framework. A vessel
anchored within a marine protected area.
Sensors 2024, 24, 5623 26 of 30
4. Discussion
The results presented highlight the robustness and effectiveness of the proposed frame-
work in classifying illegal activities in the maritime domain using vessel trajectory data.
The high precision and recall, particularly in detecting illegal fishing and normal activities,
demonstrate the model’s capability to accurately identify these activities. However, there
were some limitations in classifying suspicious activities, which were sometimes confused
with normal or anomalous activities, indicating the need for further refinement. This refine-
ment could be achieved by increasing the number of trajectories in the training data and/or
by adding other behaviors and/or rules that could better characterize these activities.
The SHAP analysis confirmed that the model’s predictions are consistent with expert
knowledge, with features such as fishing trajectory and vessel type being key determinants
in detecting illegal fishing. Identifying suspicious activities in real-world scenarios depends
on detecting vessel encounters in unusual areas and operations in protected zones. The
detection of these activities demonstrates the practical applicability of the framework.
These results suggest that the framework could significantly reduce human operators’
workload by up to 97% by filtering out normal trajectories and allowing focus on critical
cases. Despite being trained on synthetic data, the framework was able to accurately
identify suspicious and anomalous activities in real-world scenarios, as evidenced in the
preceding section.
However, the presence of false positives in detecting fishing trajectories showed that
the curving paths of other vessels could be erroneously identified as fishing trajectories.
This is especially noticeable in instances where cargo ship paths displayed fishing-like
patterns with a probability exceeding 50%. When comparing the vessel’s data with other
metamodel information, it was evident that the vessel was not involved in fishing activities.
However, the curving and twisting path of the trajectory still caused the operator to be
cautious about a possible abnormality. The training dataset used for fishing trajectories was
given by GFW [57] and consists of data from large fishing vessels with particular features
in their trajectories.
For comparison purposes, we could compare the performance of our results with
existing literature. However, to the best of our knowledge, there are no prior studies that
address our specific problem using the methodology we employed. Most works in the
literature focus specifically on the detection of behaviors rather than on the overall activity
of the vessel.
5. Conclusions
This work presents a framework capable of classifying vessel activities as illegal fishing,
suspicious activity, anomalous activity, and normal activity. The framework combines the
navigation behaviors presented by each trajectory with rules created based on the expert’s
knowledge. We created a metamodel using the random forest model to perform the fusion.
To address the problem of a lack of labels, we used active learning so that the expert could
classify the trajectories with the highest probability of improving the model’s performance.
We also built our framework based on the JDL model, which consists of five levels.
To train the behavior detection models, we used the GFW [57] and MarineCadastre [41]
datasets. To train and test our metamodel using active learning, we used a synthetic dataset
created by translating fishing and encounter trajectories from the GFW and MarineCadastre
datasets to a real dataset from the coast of Brazil. In the tests we conducted, we can highlight
the best performance, which was in detecting normal activities with 100% accuracy, illegal
fishing with 99% accuracy, and the worst performance, which was in detecting suspicious
activities with 92% accuracy.
Throughout the tests, our framework, trained with synthetic datasets, successfully
identified real cases of vessels involved in suspicious encounters, as well as foreign vessels
seemingly fishing within Brazil’s Exclusive Economic Zone (EEZ). This demonstrates that
our framework for detecting illegal vessel activities is both viable and flexible in terms of
Sensors 2024, 24, 5623 27 of 30
adding new behaviors and activities, and it significantly reduces the number of trajectories
that require expert attention.
As future work, testing with larger datasets and adding new behaviors, rules, and
activities could further assess the framework’s scalability. The specialization of suspicious
activities could be refined into more specific activities, such as drug trafficking or water pol-
lution. The specification of these activities can be achieved by adding new behaviors/rules
that detect the characteristics of these activities. Therefore, this work makes a significant
contribution to the field of maritime surveillance, offering a scalable and efficient solution
for detecting illegal activities in the maritime domain.
Author Contributions: Conceptualization, V.D.d.N.; data curation, V.D.d.N.; formal analysis, V.D.d.N.;
investigation, V.D.d.N.; methodology, V.D.d.N.; project administration, V.D.d.N.; resources, V.D.d.N.;
software, V.D.d.N.; supervision, D.L.C.D.; validation, V.D.d.N.; visualization, T.A.O.A., C.M.d.F.
and D.L.C.D.; writing—original draft, V.D.d.N.; writing—review & editing, T.A.O.A., C.M.d.F. and
D.L.C.D. All authors have read and agreed to the published version of the manuscript.
Funding: The APC was funded by the Brazilian Navy Research Institute (IPqM).
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: The original data presented in the study used to train navigation
behaviors are openly available in https://globalfishingwatch.org/data-download/datasets/public-
training-data-v1 (Global Fishing Watch) and https://marinecadastre.gov/data (MarineCadastre.gov),
accessed on 21 August 2024. However, the AIS data from the Brazilian coast presented in this article
are not readily available because the authors do not have permission to share.
Conflicts of Interest: The authors declare no conflicts of interest.
Abbreviations
The following abbreviations are used in this manuscript:
References
1. Stopford, M. Maritime Economics; Routledge: London, UK, 2009.
2. Forum, W.E. Worlds Busiest Ocean Shipping Routes. 2024. Available online: https://www.weforum.org/agenda/2024/02/
worlds-busiest-ocean-shipping-routes-trade (accessed on 22 August 2024).
3. Crimes, M. MICA Center—Annual Report 2021. 2022. Available online: https://maritimescrimes.com/2022/01/10/mica-center-
annual-report-2021/ (accessed on 13 August 2024).
4. Sharda. A General Overview of Maritime Domain Awareness (MDA). 2024. Available online: https://www.marineinsight.com/
maritime-law/a-general-overview-of-maritime-domain-awareness-mda/ (accessed on 13 August 2024).
5. Wolsing, K.; Roepert, L.; Bauer, J.; Wehrle, K. Anomaly Detection in Maritime AIS Tracks: A Review of Recent Approaches. J. Mar.
Sci. Eng. 2022, 10, 112. [CrossRef]
6. Dogancay, K.; Tu, Z.; Ibal, G. Research into vessel behaviour pattern recognition in the maritime domain: Past, present and future.
Digit. Signal Process. Rev. J. 2021, 119, 103191. [CrossRef]
7. Rong, H.; Teixeira, A.; Soares, C.G. A framework for ship abnormal behaviour detection and classification using AIS data. Reliab.
Eng. Syst. Saf. 2024, 247, 110105. [CrossRef]
8. Shi, Y.; Long, C.; Yang, X.; Deng, M. Abnormal Ship Behavior Detection Based on AIS Data. Appl. Sci. 2022, 12, 4635. [CrossRef]
9. Fahn, C.S.; Ling, J.; Yeh, M.Y.; Huang, P.Y.; Wu, M.L. Abnormal Maritime Activity Detection in Satellite Image Sequences Using
Trajectory Features. Int. J. Future Comput. Commun. 2019, 8, 29–33. [CrossRef]
10. Zocholl, M.; Iphar, C.; Jousselme, A.L.; Ray, C. Ontology-based approach for vessel activity recognition. In Proceedings of the
OCEANS 2021: San Diego—Porto, San Diego, CA, USA, 20–23 September 2021; pp. 1–5. [CrossRef]
11. Wang, Y.; Liu, J.; Liu, R.W.; Liu, Y.; Yuan, Z. Data-driven methods for detection of abnormal ship behavior: Progress and trends.
Ocean Eng. 2023, 271, 113673. [CrossRef]
12. Ferlansyah, N.M.; Suharjito. A systematic literature review of vessel anomaly behavior detection methods based on Automatic
Identification System (AIS) and another sensor fusion. Adv. Sci. Technol. Eng. Syst. 2020, 5, 287–292. [CrossRef]
13. Watson, J.R.; Woodill, A.J. Detecting illegal maritime activities from anomalous multiscale fleet behaviours. Fish Fish. 2022,
23, 1055–1069. [CrossRef]
14. European Maritime Safety Agency (EMSA). Available online: https://www.emsa.europa.eu (accessed on 24 May 2024).
15. Androjna, A.; Perkovic, M.; Pavic, I.; Miskovic, J. Ais data vulnerability indicated by a spoofing case-study. Appl. Sci. 2021, 11,
5015. [CrossRef]
16. Androjna, A.; Perkovič, M. Impact of Spoofing of Navigation Systems on Maritime Situational Awareness. Trans. Marit. Sci. 2021,
10, 361–373. [CrossRef]
17. Kontopoulos, I.; Spiliopoulos, G.; Zissis, D.; Chatzikokolakis, K.; Artikis, A. Countering Real-Time Stream Poisoning: An
Architecture for Detecting Vessel Spoofing in Streams of AIS Data. In Proceedings of the 2018 IEEE 16th Intl Conf on Dependable,
Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence
and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), Athens, Greece, 12–15
August 2018; pp. 981–986. [CrossRef]
18. Kelly, P. A novel technique to identify AIS transmissions from vessels which attempt to obscure their position by switching their
AIS transponder from normal transmit power mode to low transmit power mode. Expert Syst. Appl. 2022, 202, 117205. [CrossRef]
19. D’Afflisio, E.; Braca, P.; Willett, P. Malicious AIS Spoofing and Abnormal Stealth Deviations: A Comprehensive Statistical
Framework for Maritime Anomaly Detection. IEEE Trans. Aerosp. Electron. Syst. 2021, 57, 2093–2108. [CrossRef]
20. Shahir, H.Y.; Glasser, U.; Shahir, A.Y.; Wehn, H. Maritime Situation Analysis Framework: Vessel Interaction Classification and
Anomaly Detection. In Proceedings of the 2015 IEEE International Conference on Big Data (Big Data), Santa Clara, CA, USA,
29 October–1 November 2015; pp. 1279–1289. [CrossRef]
21. Matossian, M.; Laurila, P.; Blanchet, C. Detecting dark vessels: Radar satellite-based monitoring of illegal activities at sea. Sea
Technol. 2020, 61, 30–32.
22. Uney, M.; Millefiori, L.M.; Braca, P. Prediction of Rendezvous in Maritime Situational Awareness. In Proceedings of the 2018 21st
International Conference on Information Fusion (FUSION), Cambridge, UK, 10–13 July 2018; pp. 622–628. [CrossRef]
23. Sharma, A.; Shekhar, S. Analyzing Trajectory Gaps to Find Possible Rendezvous Region. ACM Trans. Intell. Syst. Technol. 2022, 13,
1–23. [CrossRef]
24. Niemeyer, G. Geohash. 2008. Available online: http://geohash.org (accessed on 20 May 2024).
25. Uber Technologies, Inc. H3: A Hexagonal Hierarchical Spatial Index. 2018. Available online: https://h3geo.org (accessed on
20 May 2024).
26. Zhang, T.; Zhao, S.; Cheng, B.; Chen, J. Detection of AIS closing behavior and MMSI spoofing behavior of ships based on
spatiotemporal data. Remote Sens. 2020, 12, 702. [CrossRef]
27. Nikolic, D.; Stojkovic, N.; Popovic, Z.; Tosic, N.; Lekic, N.; Stankovic, Z.; Doncov, N. Maritime over the horizon sensor integration:
HFSWR data fusion algorithm. Remote Sens. 2019, 11, 852. [CrossRef]
Sensors 2024, 24, 5623 29 of 30
28. Mazzarella, F.; Vespe, M.; Alessandrini, A.; Tarchi, D.; Aulicino, G.; Vollero, A. A novel anomaly detection approach to identify
intentional AIS on-off switching. Expert Syst. Appl. 2017, 78, 110–123. [CrossRef]
29. Kontopoulos, I.; Chatzikokolakis, K.; Zissis, D.; Tserpes, K.; Spiliopoulos, G. Real-time maritime anomaly detection: Detecting
intentional AIS switch-off. Int. J. Big Data Intell. 2020, 7, 85–96. [CrossRef]
30. Kontopoulos, I.; Makris, A.; Tserpes, K. A deep learning streaming methodology for trajectory classification. ISPRS Int. J. Geo-Inf.
2021, 10, 250. [CrossRef]
31. Arasteh, S.; Tayebi, M.A.; Zohrevand, Z.; Glässer, U.; Shahir, A.Y.; Saeedi, P.; Wehn, H. Fishing Vessels Activity Detection from
Longitudinal AIS Data. Assoc. Comput. Mach. 2020, 11, 347–356. [CrossRef]
32. Zhang, Z.; Huang, L.; Peng, X.; Wen, Y.; Song, L. Loitering behavior detection and classification of vessel movements based on
trajectory shape and Convolutional Neural Networks. Ocean Eng. 2022, 258, 111852. [CrossRef]
33. Ferreira, M.D.; Spadon, G.; Soares, A.; Matwin, S. A Semi-Supervised Methodology for Fishing Activity Detection Using the
Geometry behind the Trajectory of Multiple Vessels. Sensors 2022, 22, 6063. [CrossRef] [PubMed]
34. Zhao, L.; Shi, G. Maritime Anomaly Detection using Densitybased Clustering and Recurrent Neural Network. J. Navig. 2019, 72,
894–916. [CrossRef]
35. Pedroche, D.S.; Amigo, D.; García, J.; Molina, J.M. Architecture for trajectory-based fishing ship classification with AIS data.
Sensors 2020, 20, 3782. [CrossRef]
36. Do Nascimento, V.D.; Alves, T.A.O.; Dutra, D.L.C.; Kundu, S. A Comparative Study of Fishing Activity Detection Approaches in
Maritime Surveillance. In Proceedings of the 2023 Congress in Computer Science, Computer Engineering, & Applied Computing
(CSCE), Las Vegas, NV, USA, 24–27 July 2023; pp. 173–179. [CrossRef]
37. Watch, G.F. Global Fishing Watch Fishing Effort Dataset. 2024. Available online: https://globalfishingwatch.org/datasets-and-
code/fishing-effort/ (accessed on 20 May 2024).
38. Li, W.; Zhang, D.; Sun, M.; Yin, Y.; Shen, Y. Loitering Detection Based on Trajectory Analysis. In Proceedings of the 2015 8th
International Conference on Intelligent Computation Technology and Automation (ICICTA), Nanchang, China, 14–15 June 2015;
pp. 530–533. [CrossRef]
39. Lu, R.; Yang, H.; Zhu, J.; Wu, S.; Wang, J.; Bull, D. Hierarchical Video Summarization with Loitering Indication. In Proceedings of
the 2015 Visual Communications and Image Processing (VCIP), Singapore, 13–16 December 2015; pp. 1–4. [CrossRef]
40. Patino, L.; Ferryman, J. Loitering Behaviour Detection of Boats at Sea. IEEE Comput. Soc. 2017, 8, 2169–2175. [CrossRef]
41. Cadastre, M. Marine Cadastre National Viewer Datasets. 2024. Available online: https://marinecadastre.gov/data/ (accessed on
20 May 2024).
42. Sidibé, A.; Shu, G. Study of automatic anomalous behaviour detection techniques for maritime vessels. J. Navig. 2017, 70, 847–858.
[CrossRef]
43. Pan, X.; Wang, H.; Cheng, X.; Peng, X.; He, Y. Online detection of anomaly behaviors based on multidimensional trajectories. Inf.
Fusion 2020, 58, 40–51. [CrossRef]
44. Laxhammar, R.; Falkman, G. Conformal Prediction for Distribution-Independent Anomaly Detection in Streaming Vessel Data.
In Proceedings of the First International Workshop on Novel Data Stream Pattern Mining Techniques (StreamKDD ’10), New
York, NY, USA, 25–30 July 2010; pp. 47–55. [CrossRef]
45. Lu, N.; Liang, M.; Yang, L.; Wang, Y.; Xiong, N.; Liu, R.W. Shape-Based Vessel Trajectory Similarity Computing and Clustering: A
Brief Review. In Proceedings of the 2020 5th IEEE International Conference on Big Data Analytics (ICBDA), Xiamen, China, 8–11
May 2020; pp. 186–192. [CrossRef]
46. Weintrit, A. Marine Navigation and Safety of Sea Transportation: Navigational Problems; CRC Press: New York, NY, USA, 2013.
47. FCC. Maritime Mobile Service Identities. 2024. Available online: https://www.fcc.gov/wireless/bureau-divisions/mobility-
division/maritime-mobile/ship-radio-stations/maritime-mobile (accessed on 2 July 2024).
48. de Faria, J.A.P.M. A consciência situacional marítima (CSM) e a Marinha do Brasil. Nav. War Coll. J. Rev. Esc. Guerra Nav. 2012, 18,
213–229.
49. Amazonia Azul. Available online: https://www.marinha.mil.br/delareis/?q=amazoniazul (accessed on 27 May 2024).
50. Illegal, Unreported, and Unregulated Fishing. Available online: https://www.fisheries.noaa.gov/national/international-affairs/
illegal-unreported-and-unregulated-fishing (accessed on 21 August 2024).
51. Hastie, T.; Tibshirani, R.; Friedman, J. The Elements of Statistical Learning: Data Mining, Inference, and Prediction; Springer Series in
Statistics; Springer: New York, NY, USA, 2009. [CrossRef]
52. Zhou, Z.H. Ensemble Methods: Foundations and Algorithms; Chapman and Hall/CRC: London, UK, 2012.
53. Zhu, X.; Goldberg, A.B. Introduction to Semi-Supervised Learning; Morgan & Claypool Publishers: San Rafael, CA, USA, 2009.
54. Hall, D.L.; Llinas, J. An introduction to multisensor data fusion. Proc. IEEE 1997, 85, 6–23. [CrossRef]
55. Team, G.D. GeoPandas: Python tools for geographic data. J. Open Source Softw. 2018, 3, 3522.
56. Graser, A. MovingPandas: Efficient Structures for Movement Data in Python. 2021. Available online: https://github.com/
anitagraser/movingpandas (accessed on 8 March 2024).
Sensors 2024, 24, 5623 30 of 30
57. Watch, G.F. Global Fishing Watch Dataset. 2023. Available online: https://globalfishingwatch.org/data-download/datasets/
public-training-data-v1 (accessed on 7 March 2024).
58. Lundberg, S.M.; Lee, S.I. A Unified Approach to Interpreting Model Predictions. In Proceedings of the 31st International
Conference on Neural Information Processing Systems (NIPS’17); Curran Associates Inc.: Red Hook, NY, USA, 2017; pp. 4768–4777.
https://dl.acm.org/doi/10.5555/3295222.3295230.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.