Deploying paws: Field optimization of the protection assistant for wildlife security

F Fang, T Nguyen, R Pickles, W Lam… - Proceedings of the …, 2016 - ojs.aaai.org
Poaching is a serious threat to the conservation of key species and whole ecosystems.
While conducting foot patrols is the most commonly used approach in many countries to …

A Review of Incident Prediction, Resource Allocation, and Dispatch Models for Emergency Management

A Mukhopadhyay, G Pettet, S Vazirizade, D Lu… - arxiv preprint arxiv …, 2020 - arxiv.org
In the last fifty years, researchers have developed statistical, data-driven, analytical, and
algorithmic approaches for designing and improving emergency response management …

Capture: A new predictive anti-poaching tool for wildlife protection

TH Nguyen, A Sinha, S Gholami, A Plumptre, L Joppa… - 2016 - ink.library.smu.edu.sg
Wildlife poaching presents a serious extinction threat to many animalspecies. Agencies
(“defenders”) focused on protecting suchanimals need tools that help analyze, model and …

Cloudy with a chance of poaching: Adversary behavior modeling and forecasting with real-world poaching data

D Kar, B Ford, S Gholami, F Fang, A Plumptre… - 2017 - nru.uncst.go.ug
Wildlife conservation organizations task rangers to deter and capture wildlife poachers.
Since rangers are responsible for patrolling vast areas, adversary behavior modeling can …

PAWS—A deployed game-theoretic application to combat poaching

F Fang, TH Nguyen, R Pickles, WY Lam, GR Clements… - AI Magazine, 2017 - ojs.aaai.org
Poaching is considered a major driver for the population drop of key species such as tigers,
elephants, and rhinos, which can be detrimental to whole ecosystems. While conducting foot …

[PDF][PDF] Trends and applications in Stackelberg security games

D Kar, TH Nguyen, F Fang, M Brown… - Handbook of dynamic …, 2017 - andrew.cmu.edu
Security is a critical concern around the world, whether it is the challenge of protecting ports,
airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and …

Three strategies to success: Learning adversary models in security games

N Haghtalab, F Fang, TH Nguyen, A Sinha… - 2016 - ink.library.smu.edu.sg
State-of-the-art applications of Stackelberg security games--including wildlife protection--
offer a wealth of data, which can be used to learn the behavior of the adversary. But existing …

Adversary models account for imperfect crime data: Forecasting and planning against real-world poachers

S Gholami, S Mc Carthy, B Dilkina, A Plumptre… - 2018 - nru.uncst.go.ug
Poachers are engaged in extinction level wholesale slaughter, so it is critical to harness
historical data for predicting poachers' behavior. However, in these domains, data collected …

Learning adversary behavior in security games: A PAC model perspective

A Sinha, D Kar, M Tambe - arxiv preprint arxiv:1511.00043, 2015 - arxiv.org
Recent applications of Stackelberg Security Games (SSG), from wildlife crime to urban
crime, have employed machine learning tools to learn and predict adversary behavior using …

Preventing illegal logging: Simultaneous optimization of resource teams and tactics for security

SM Mc Carthy, M Tambe, C Kiekintveld… - Proceedings of the …, 2016 - ojs.aaai.org
Green security—protection of forests, fish and wildlife—is a critical problem in environmental
sustainability. We focus on the problem of optimizing the defense of forests againstillegal …