Adversary Models Account for Imperfect Crime Data: Forecasting and Planning against Real-world Poachers
暂无分享,去创建一个
Milind Tambe | Shahrzad Gholami | Bistra N. Dilkina | Sara Mc Carthy | Andrew J. Plumptre | Mustapha Nsubaga | Joshua Mabonga | Margaret Driciru | Fred Wanyama | Aggrey Rwetsiba | Tom Okello | Eric Enyel | Milind Tambe | B. Dilkina | A. Plumptre | A. Rwetsiba | F. Wanyama | M. Driciru | Shahrzad Gholami | S. M. Carthy | Tom Okello | Mustapha Nsubaga | Joshua Mabonga | Eric Enyel
[1] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[2] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[3] A. Plumptre,et al. Spatiotemporal trends of illegal activities from ranger‐collected data in a Ugandan national park , 2015, Conservation biology : the journal of the Society for Conservation Biology.
[4] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[5] Sam M. Ferreira,et al. Continent-wide survey reveals massive decline in African savannah elephants , 2016, PeerJ.
[6] Yijing Li,et al. Learning from class-imbalanced data: Review of methods and applications , 2017, Expert Syst. Appl..
[7] Milind Tambe,et al. Divide to Defend: Collusive Security Games , 2016, GameSec.
[8] Nicholas R. Jennings,et al. Introducing alarms in adversarial patrolling games: extended abstract , 2013, AAMAS.
[9] Bo Yang,et al. Flexible neural trees ensemble for stock index modeling , 2007, Neurocomputing.
[10] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[11] Milind Tambe,et al. CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection , 2016, AAMAS.
[12] Milind Tambe,et al. Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security , 2016, AAAI.
[13] Geoffrey E. Hinton,et al. Adaptive Mixtures of Local Experts , 1991, Neural Computation.
[14] Milind Tambe,et al. Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data , 2017, AAMAS.
[15] H. Travers,et al. From Poachers to Protectors: Engaging Local Communities in Solutions to Illegal Wildlife Trade , 2017 .
[16] Anneli Douglas,et al. The impact of rhino poaching on tourist experiences and future visitation to National Parks in South Africa , 2019 .
[17] George Wittemyer,et al. Illegal killing for ivory drives global decline in African elephants , 2014, Proceedings of the National Academy of Sciences.
[18] Nicola Basilico,et al. Strategic guard placement for optimal response toalarms in security games , 2014, AAMAS.
[19] Haifeng Xu,et al. Optimal Patrol Planning for Green Security Games with Black-Box Attackers , 2017, GameSec.
[20] Longbing Cao,et al. Effective detection of sophisticated online banking fraud on extremely imbalanced data , 2012, World Wide Web.
[21] Bing Liu,et al. Learning with Positive and Unlabeled Examples Using Weighted Logistic Regression , 2003, ICML.
[22] Noa Agmon,et al. Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games , 2015, GameSec.
[23] Nicole D. Sintov,et al. A Game Theoretic Approach on Addressing Cooperation among Human Adversaries , 2016 .
[24] Steven Okamoto,et al. Solving non-zero sum multiagent network flow security games with attack costs , 2012, AAMAS.
[25] Milind Tambe,et al. Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test , 2017, ECML/PKDD.
[26] Nicholas R. Jennings,et al. Introducing Alarms in Adversarial Patrolling Games , 2013 .
[27] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[28] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.
[29] Andrew Balmford,et al. Estimating economic losses to tourism in Africa from the illegal killing of elephants , 2016, Nature Communications.
[30] Bo An,et al. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.
[31] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[32] Raymond J. Mooney,et al. Supervised and Unsupervised Ensembling for Knowledge Base Population , 2016, ArXiv.
[33] Vincent Conitzer,et al. Solving Stackelberg games with uncertain observability , 2011, AAMAS.
[34] Vladik Kreinovich,et al. Security games with interval uncertainty , 2013, AAMAS.