Fei Fang

According to our database1, Fei Fang authored at least 52 papers between 2006 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Narrative Collage of Image Collections by Scene Graph Recombination.
IEEE Trans. Vis. Comput. Graph., 2018

Stackelberg Security Games: Looking Beyond a Decade of Success.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Designing the Game to Play: Optimizing Payoff Structure in Security Games.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

What Game Are We Playing? End-to-end Learning in Normal and Extensive Form Games.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Exploiting Data and Human Knowledge for Predicting Wildlife Poaching.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

AirSim-W: A Simulation Environment for Wildlife Conservation with UAVs.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

Deceiving Cyber Adversaries: A Game Theoretic Approach.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Inducible Equilibrium for Security Games.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Deep Reinforcement Learning for Green Security Game with Online Information.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Policy Learning for Continuous Space Security Games Using Neural Networks.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Evaluation of Predictive Models for Wildlife Poaching Activity through Controlled Field Test in Uganda.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

SPOT Poachers in Action: Augmenting Conservation Drones With Automatic Detection in Near Real Time.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Predicting poaching for wildlife Protection.
IBM Journal of Research and Development, 2017

Keeping it Real: Using Real-World Problems to Teach AI to Diverse Audiences.
AI Magazine, 2017

PAWS - A Deployed Game-Theoretic Application to Combat Poaching.
AI Magazine, 2017

Reports on the 2017 AAAI Spring Symposium Series.
AI Magazine, 2017

Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Optimal Patrol Planning for Green Security Games with Black-Box Attackers.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

VIOLA: Video Labeling Application for Security Domains.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Optimizing Peer Teaching to Enhance Team Performance.
Proceedings of the Autonomous Agents and Multiagent Systems, 2017

Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
An Analytical Framework for Multilayer Partial Frequency Reuse Scheme Design in Mobile Communication Systems.
IEEE Trans. Vehicular Technology, 2016

Green security games: apply game theory to addressing green security challenges.
SIGecom Exchanges, 2016

A Fast Adaptive Control Algorithm for Slotted ALOHA.
JCM, 2016

Comparing human behavior models in repeated Stackelberg security games: An extended study.
Artif. Intell., 2016

Three Strategies to Success: Learning Adversary Models in Security Games.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Combining Graph Contraction and Strategy Generation for Green Security Games.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Error Analysis of English-Chinese Machine Translation.
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2016

Abstraction Methods for Solving Graph-Based Security Games.
Proceedings of the Autonomous Agents and Multiagent Systems - AAMAS 2016 Workshops, - Visionary Papers, 2016

From the Lab to the Classroom and Beyond: Extending a Game-Based Research Platform for Teaching AI to Diverse Audiences.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Deploying PAWS to Combat Poaching: Game-Theoretic Patrolling in Areas with Complex Terrain (Demonstration).
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Performance Analysis of IEEE 802.11 DCF Based on OFDM.
JCM, 2015

Reports on the 2015 AAAI Spring Symposium Series.
AI Magazine, 2015

When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

"A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Defender Strategies In Domains Involving Frequent Adversary Interaction.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Effectiveness of Probability Perception Modeling and Defender Strategy Generation Algorithms in Repeated Stackelberg Games: An Initial Report.
Proceedings of the Computational Sustainability, 2015

2014
Research on Stability Control Algorithm of Slotted ALOHA.
JCM, 2014

Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Robust Protection of Fisheries with COmPASS.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Protecting Moving Targets with Multiple Mobile Resources.
J. Artif. Intell. Res., 2013

Automatic marker detection from X-ray images.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Optimal patrol strategy for protecting moving targets with multiple mobile resources.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
Expanding Approach to Information Retrieval Using Semantic Similarity Analysis Based on WordNet and Wikipedia.
International Journal of Software Engineering and Knowledge Engineering, 2012

Designing better strategies against human adversaries in network security games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Challenges in Patrolling to Maximize Pristine Forest Area (Position Paper).
Proceedings of the Game Theory for Security, 2012

Patrol Strategies to Maximize Pristine Forest Area.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
XKFitler: A Keyword Filter on XML Stream.
IJIRR, 2011

A CMOS broadband precise programmable gain amplifier with bandwidth extension technique.
Proceedings of the IEEE Asian Solid-State Circuits Conference, 2011

2009
SKeyword: Ontology-driven Semantic Keyword Search for Heterogeneous XML Data Sources.
Proceedings of the 2009 International Conference on Internet Computing, 2009

2006
FootPrinter3: phylogenetic footprinting in partially alignable sequences.
Nucleic Acids Research, 2006


  Loading...