Benjamin J. Ford

According to our database1, Benjamin J. Ford authored at least 13 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Evaluation of Predictive Models for Wildlife Poaching Activity through Controlled Field Test in Uganda.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Optimal Patrol Planning for Green Security Games with Black-Box Attackers.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

Real-World Evaluation and Deployment of Adversary Attack Prediction Models.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections.
Proceedings of the Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection, 2016

2015
Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

2014
Adaptive resource allocation for wildlife protection against illegal poachers.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

PAWS: adaptive game-theoretic patrolling for wildlife protection.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

2013
A Real-Time Self-Adaptive Classifier for Identifying Suspicious Bidders in Online Auctions.
Comput. J., 2013

2010
Visual Specification of Layered Bidding Strategies for Autonomous Bidding Agents.
J. Comput., 2010

Identifying Suspicious Bidders Utilizing Hierarchical Clustering and Decision Trees.
Proceedings of the 2010 International Conference on Artificial Intelligence, 2010

2009
Model-Based Specification of Flexible and Complex Bidding Strategies in Agent-Based Online Auctions.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009


  Loading...