Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data
暂无分享,去创建一个
Milind Tambe | Shahrzad Gholami | Andrew J. Plumptre | Mustapha Nsubaga | Joshua Mabonga | Margaret Driciru | Fred Wanyama | Aggrey Rwetsiba | Fei Fang | Debarun Kar | Benjamin J. Ford | Milind Tambe | Fei Fang | A. Plumptre | A. Rwetsiba | F. Wanyama | M. Driciru | Shahrzad Gholami | Debarun Kar | Mustapha Nsubaga | Joshua Mabonga
[1] Milind Tambe,et al. Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries , 2014, GameSec.
[2] Bo An,et al. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.
[3] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[4] Milind Tambe,et al. Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security , 2016, AAAI.
[5] V. S. Subrahmanian,et al. APE: A Data-Driven, Behavioral Model-Based Anti-Poaching Engine , 2015, IEEE Transactions on Computational Social Systems.
[6] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[7] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[8] Kevin Leyton-Brown,et al. Behavioral game theoretic models: a Bayesian framework for parameter analysis , 2012, AAMAS.
[9] Miguel A. Costa-Gomes,et al. Cognition and Behavior in Normal-Form Games: An Experimental Study , 1998 .
[10] Kevin Leyton-Brown,et al. Level-0 meta-models for predicting human behavior in games , 2014, EC.
[11] A. Plumptre,et al. Spatiotemporal trends of illegal activities from ranger‐collected data in a Ugandan national park , 2015, Conservation biology : the journal of the Society for Conservation Biology.
[12] D. Stahl,et al. Experimental evidence on players' models of other players , 1994 .
[13] Bing Liu,et al. Learning with Positive and Unlabeled Examples Using Weighted Logistic Regression , 2003, ICML.
[14] Nicole D. Sintov,et al. Human Adversaries in Opportunistic Crime Security Games: Evaluating Competing Bounded Rationality Models , 2015 .
[15] Andrew J. Plumptre,et al. Improving Law‐Enforcement Effectiveness and Efficiency in Protected Areas Using Ranger‐collected Monitoring Data , 2017 .
[16] Noa Agmon,et al. Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games , 2015, GameSec.
[17] S. Chainey,et al. Mapping Crime: Understanding Hot Spots , 2014 .
[18] Nicholas R. Jennings,et al. Introducing Alarms in Adversarial Patrolling Games , 2013 .
[19] Mark Goadrich,et al. The relationship between Precision-Recall and ROC curves , 2006, ICML.
[20] Milind Tambe,et al. Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals , 2015, AAMAS.
[21] Nicola Basilico,et al. Strategic guard placement for optimal response toalarms in security games , 2014, AAMAS.
[22] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[23] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.
[24] Kevin Leyton-Brown,et al. Beyond equilibrium: predicting human behaviour in normal form games , 2010, AAAI.
[25] D. McFadden. Conditional logit analysis of qualitative choice behavior , 1972 .
[26] Sarit Kraus,et al. Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..
[27] Patrick MacAlpine,et al. A Study of Layered Learning Strategies Applied to Individual Behaviors in Robot Soccer , 2015, RoboCup.
[28] Milind Tambe,et al. CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection , 2016, AAMAS.
[29] Milind Tambe,et al. Robust Protection of Fisheries with COmPASS , 2014, AAAI.
[30] Milind Tambe,et al. Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms , 2014, GameSec.
[31] V. S. Subrahmanian,et al. Saving rhinos with predictive analytics , 2015, IEEE Intelligent Systems.
[32] Milind Tambe,et al. Using Abstractions to Solve Opportunistic Crime Security Games at Scale , 2016, AAMAS.
[33] Nicholas R. Jennings,et al. Introducing alarms in adversarial patrolling games: extended abstract , 2013, AAMAS.
[34] Vladik Kreinovich,et al. Security games with interval uncertainty , 2013, AAMAS.
[35] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[36] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[37] Vincent Conitzer,et al. Solving Stackelberg games with uncertain observability , 2011, AAMAS.
[38] Robert P. Goldman,et al. Plan, Activity, and Intent Recognition: Theory and Practice , 2014 .
[39] Henrik Boström,et al. Trade-off between accuracy and interpretability for predictive in silico modeling. , 2011, Future medicinal chemistry.
[40] Mikhail Kanevski,et al. Machine Learning Algorithms for GeoSpatial Data. Applications and Software Tools , 2008 .