Don't Put All Your Strategies in One Basket: Playing Green Security Games with Imperfect Prior Knowledge
暂无分享,去创建一个
[1] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[2] Y. Mansour,et al. 4 Learning , Regret minimization , and Equilibria , 2006 .
[3] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[4] S. Basu,et al. Book Review: Species on the Edge of Survival. International Union for Conservation of Nature (IUCN) Red List , 2011 .
[5] Milind Tambe,et al. Divide to Defend: Collusive Security Games , 2016, GameSec.
[6] Gergely Neu,et al. An Efficient Algorithm for Learning with Semi-bandit Feedback , 2013, ALT.
[7] Jean Clobert,et al. The impact on tigers of poaching versus prey depletion , 2008 .
[8] Viliam Lisý,et al. Combining Online Learning and Equilibrium Computation in Security Games , 2015, GameSec.
[9] Milind Tambe,et al. CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection , 2016, AAMAS.
[10] James E. Hines,et al. Are ranger patrols effective in reducing poaching‐related threats within protected areas? , 2018 .
[11] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[12] Milind Tambe,et al. Learning Adversary Behavior in Security Games: A PAC Model Perspective , 2015, AAMAS.
[13] Nicholas R. Jennings,et al. Playing Repeated Security Games with No Prior Knowledge , 2016, AAMAS.
[14] Nicholas R. Jennings,et al. Introducing alarms in adversarial patrolling games: extended abstract , 2013, AAMAS.
[15] Vincent Conitzer,et al. Solving Stackelberg games with uncertain observability , 2011, AAMAS.
[16] Milind Tambe,et al. Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test , 2017, ECML/PKDD.
[17] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[18] Nicholas R. Jennings,et al. Introducing Alarms in Adversarial Patrolling Games , 2013 .
[19] Ariel D. Procaccia,et al. Learning Optimal Commitment to Overcome Insecurity , 2014, NIPS.
[20] Maria-Florina Balcan,et al. Commitment Without Regrets: Online Learning in Stackelberg Security Games , 2015, EC.
[21] Vladik Kreinovich,et al. Security games with interval uncertainty , 2013, AAMAS.
[22] Eric Horvitz,et al. Identifying Unknown Unknowns in the Open World: Representations and Policies for Guided Exploration , 2016, AAAI.
[23] Bo An,et al. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.
[24] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[25] A. Lemieux. Situational prevention of poaching , 2014 .
[26] Milind Tambe,et al. Adversary Models Account for Imperfect Crime Data: Forecasting and Planning against Real-world Poachers , 2018, AAMAS.
[27] Milind Tambe,et al. Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data , 2017, AAMAS.
[28] Haifeng Xu,et al. Optimal Patrol Planning for Green Security Games with Black-Box Attackers , 2017, GameSec.
[29] Milind Tambe,et al. Three Strategies to Success: Learning Adversary Models in Security Games , 2016, IJCAI.
[30] Viliam Lisý,et al. Online Learning Methods for Border Patrol Resource Allocation , 2014, GameSec.
[31] Peter Leimgruber,et al. Setting Priorities for Tiger Conservation , 2010 .
[32] Nicola Basilico,et al. Strategic guard placement for optimal response toalarms in security games , 2014, AAMAS.
[33] Y. Mansour,et al. Algorithmic Game Theory: Learning, Regret Minimization, and Equilibria , 2007 .