• Publications
  • Influence
Adaptive resource allocation for wildlife protection against illegal poachers
TLDR
This paper introduces the Protection Assistant for Wildlife Security (PAWS) application - a joint deployment effort done with researchers at Uganda's Queen Elizabeth National Park (QENP) with the goal of improving wildlife ranger patrols. Expand
  • 148
  • 10
  • PDF
A Real-Time Self-Adaptive Classifier for Identifying Suspicious Bidders in Online Auctions
TLDR
We introduce a Real-Time Self-Adaptive Classifier (RT-SAC) for identifying suspicious bidders in online auctions using an incremental neural network approach. Expand
  • 24
  • 7
  • PDF
Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data
TLDR
We present an adversary behavior modeling system, INTERCEPT (INTERpretable Classification Ensemble to Protect Threatened species), and provide the most extensive evaluation in the AI literature of one of the largest poaching datasets from Queen Elizabeth National Park (QENP) in Uganda, comparing INTERCEPT with its competitors. Expand
  • 44
  • 2
  • PDF
Visual Specification of Layered Bidding Strategies for Autonomous Bidding Agents
TLDR
In an agent-based online auction system, a bidding agent can automatically place bids on behalf of human user according to a user-specified bidding strategy. Expand
  • 5
  • 2
  • PDF
Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test
TLDR
We present a hybrid spatio-temporal model that predicts poaching threat levels and results from a five-month field test of our model in Uganda’s Queen Elizabeth Protected Area. Expand
  • 29
  • 1
  • PDF
Identifying Suspicious Bidders Utilizing Hierarchical Clustering and Decision Trees
TLDR
We use a hierarchical clustering technique to divide a collection of bidders into normal and deviant groups based on their bidding behavior. Expand
  • 13
  • 1
  • PDF
Optimal Patrol Planning for Green Security Games with Black-Box Attackers
TLDR
We propose OPERA, a general patrol planning framework that: (1) generates optimal implementable patrolling routes against a black-box attacker which can represent a wide range of poaching prediction models; (2) incorporates entropy maximization to ensure that the generated routes are more unpredictable and robust to poachers’ partial monitoring. Expand
  • 27
  • PDF
Model-Based Specification of Flexible and Complex Bidding Strategies in Agent-Based Online Auctions
TLDR
We introduce a formal bidding strategy model for specification of flexible and complex bidding strategies for bidding agents. Expand
  • 7
  • PDF
PAWS: Game Theory Based Protection Assistant for Wildlife Security
This chapter introduces Protection Assistant for Wildlife Security (PAWS) (Yang, Ford, Tambe, & Lemieux, 2014) as a joint effort done by computer scientists, conservation researchers, andExpand
  • 12
  • PDF
Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games
TLDR
We first demonstrate that predictive reliability is indeed strong for previous Stackelberg Security Game experiments. Expand
  • 12
  • PDF
...
1
2
...