Fei Fang

According to our database1, Fei Fang authored at least 148 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
MS_HGNN: a hybrid online fraud detection model to alleviate graph-based data imbalance.
Connect. Sci., December, 2023

NewsPanda: Media Monitoring for Timely Conservation Action.
CoRR, 2023

Bi-level Latent Variable Model for Sample-Efficient Multi-Agent Reinforcement Learning.
CoRR, 2023

Self-Supervised Interest Transfer Network via Prototypical Contrastive Learning for Recommendation.
CoRR, 2023

Continual Transfer Learning for Cross-Domain Click-Through Rate Prediction at Taobao.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

A Dataset on Malicious Paper Bidding in Peer Review.
Proceedings of the ACM Web Conference 2023, 2023

Navigates Like Me: Understanding How People Evaluate Human-Like AI in Video Games.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Cooperative Communication Between Two Transiently Powered Sensor Nodes by Reinforcement Learning.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Spatio-Temporal Pricing for Ridesharing Platforms.
Oper. Res., 2022

Function Approximation for Solving Stackelberg Equilibrium in Large Perfect Information Games.
CoRR, 2022

Neighborhood Adaptive Estimators for Causal Inference under Network Interference.
CoRR, 2022

Explainable Action Advising for Multi-Agent Reinforcement Learning.
CoRR, 2022

Tradeoffs in Preventing Manipulation in Paper Bidding for Reviewer Assignment.
CoRR, 2022

Color Overmodification Emerges from Data-Driven Learning and Pragmatic Reasoning.
CoRR, 2022

PerfectDou: Dominating DouDizhu with Perfect Information Distillation.
CoRR, 2022

A Survey of Explainable Reinforcement Learning.
CoRR, 2022

MAVIPER: Learning Decision Tree Policies for Interpretable Multi-agent Reinforcement Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

PerfectDou: Dominating DouDizhu with Perfect Information Distillation.
NeurIPS, 2022

Inverse Game Theory for Stackelberg Games: the Blessing of Bounded Rationality.
NeurIPS, 2022

Curriculum Reinforcement Learning using Optimal Transport via Gradual Domain Adaptation.
NeurIPS, 2022

Ranked Prioritization of Groups in Combinatorial Bandit Allocation.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Robust Reinforcement Learning as a Stackelberg Game via Adaptively-Regularized Adversarial Training.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

The Real Deal: A Review of Challenges and Opportunities in Moving Reinforcement Learning-Based Traffic Signal Control Systems Towards Reality.
Proceedings of the Twelfth International Workshop on Agents in Traffic and Transportation co-located with the the 31st International Joint Conference on Artificial Intelligence and the 25th European Conference on Artificial Intelligence (IJCAI-ECAI 2022), 2022

Discriminator Modification in GAN for Text-to-Image Generation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

PhraseGAN: Phrase-Boost Generative Adversarial Network for Text-to-Image Generation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Near-Optimal Reviewer Splitting in Two-Phase Paper Reviewing and Conference Experiment Design.
Proceedings of the Tenth AAAI Conference on Human Computation and Crowdsourcing, 2022

Concadia: Towards Image-Based Text Generation with a Purpose.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

Scenario-Adaptive and Self-Supervised Model for Multi-Scenario Personalized Recommendation.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

UDM: A Unified Deep Matching Framework in Recommender Systems.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Bandit Data-Driven Optimization for Crowdsourcing Food Rescue Platforms.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Safe Subgame Resolving for Extensive Form Correlated Equilibrium.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Joint pricing and inventory decisions for substitutable and perishable products under demand uncertainty.
Eur. J. Oper. Res., 2021

Efficiency, Fairness, and Stability in Non-Commercial Peer-to-Peer Ridesharing.
CoRR, 2021

AGNT SI: agents and multiagent systems for social good.
Auton. Agents Multi Agent Syst., 2021

A Recommender System for Crowdsourcing Food Rescue Platforms.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Fighting the Fog: Evaluating the Clarity of Privacy Disclosures in the Age of CCPA.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

Robust reinforcement learning under minimax regret for green security.
Proceedings of the Thirty-Seventh Conference on Uncertainty in Artificial Intelligence, 2021

A Survey of Machine Learning-based IoT Intrusion Detection Techniques.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

Temporal Induced Self-Play for Stochastic Bayesian Games.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Discovering Diverse Multi-Agent Strategic Behavior via Reward Randomization.
Proceedings of the 9th International Conference on Learning Representations, 2021

A Novel GNN Model for Fraud Detection in Online Trading Activities.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Poster: Pallet Estimation for Food Bank Logistics Management.
Proceedings of the COMPASS '21: ACM SIGCAS Conference on Computing and Sustainable Societies, Virtual Event, Australia, 28 June 2021, 2021

Signal Instructed Coordination in Cooperative Multi-agent Reinforcement Learning.
Proceedings of the Distributed Artificial Intelligence - Third International Conference, 2021

Game Theoretic Models for Cyber Deception.
Proceedings of the MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, 2021

A Cloud Data Storage Technology for Alliance Blockchain Technology.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

Dual-Mandate Patrols: Multi-Armed Bandits for Green Security.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Iterative Bounding MDPs: Learning Interpretable Policies via Non-Interpretable Methods.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Harnessing Social Media to Identify Homeless Youth At-Risk of Substance Use.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Data-Driven Multimodal Patrol Planning for Anti-poaching.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
EdgeDIPN: a Unified Deep Intent Prediction Network Deployed at the Edge.
Proc. VLDB Endow., 2020

Chinese researchers' perceptions and use of open access journals: Results of an online questionnaire survey.
Learn. Publ., 2020

A Comprehensive Pipeline for Complex Text-to-Image Synthesis.
J. Comput. Sci. Technol., 2020

Bandit Data-driven Optimization: AI for Social Good and Beyond.
CoRR, 2020

TPG-DNN: A Method for User Intent Prediction Based on Total Probability Formula and GRU Loss with Multi-task Learning.
CoRR, 2020

Artificial Intelligence for Social Good: A Survey.
CoRR, 2020

AI for Social Impact: Learning and Planning in the Data-to-Deployment Pipeline.
CoRR, 2020

Artificial Intelligence for Social Impact: Learning and Planning in the Data-to-Deployment Pipeline.
AI Mag., 2020

Deep Archimedean Copulas.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Mitigating Manipulation in Peer Review via Randomized Reviewer Assignments.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

When to Follow the Tip: Security Games with Strategic Informants.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Evolutionary Population Curriculum for Scaling Multi-Agent Reinforcement Learning.
Proceedings of the 8th International Conference on Learning Representations, 2020

Learning and Planning in the Feature Deception Problem.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Harnessing the Power of Deception in Attack Graph-Based Security Games.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Optimal design of CCHP microgrid based on multi-objective genetic algorithm.
Proceedings of the 5th International Conference on Automation, 2020

Green Security Game with Community Engagement.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Improving Efficiency of Volunteer-Based Food Rescue Operations.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

To Signal or Not To Signal: Exploiting Uncertain Real-Time Information in Signaling Games for Security and Sustainability.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Signal Instructed Coordination in Team Competition.
CoRR, 2019

Learning and Planning in Feature Deception Games.
CoRR, 2019

Artificial Intelligence for Social Good.
CoRR, 2019

Towards Thwarting Social Engineering Attacks.
CoRR, 2019

On a fractional Schrödinger equation with periodic potential.
Comput. Math. Appl., 2019

Computational sustainability: computing for a better world and a sustainable future.
Commun. ACM, 2019

Dynamic Trip-Vehicle Dispatch with Scheduled and On-Demand Requests.
Proceedings of the Thirty-Fifth Conference on Uncertainty in Artificial Intelligence, 2019

A Robot's Expressive Language Affects Human Strategy and Perceptions in a Competitive Game.
Proceedings of the 28th IEEE International Conference on Robot and Human Interactive Communication, 2019

Correlation in Extensive-Form Games: Saddle-Point Formulation and Benchmarks.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Efficient Regret Minimization Algorithm for Extensive-Form Correlated Equilibrium.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Modeling observability in adaptive systems to defend against advanced persistent threats.
Proceedings of the 17th ACM-IEEE International Conference on Formal Methods and Models for System Design, 2019

Integrating Learning with Game Theory for Societal Challenges.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Cyber Camouflage Games for Strategic Deception.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

DeepFP for Finding Nash Equilibrium in Continuous Action Spaces.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Cooperative communication between two transiently powered sensors by reinforcement learning: work-in-progress.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis Companion, 2019

Deep Fictitious Play for Games with Continuous Action Spaces.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Optimal Trip-Vehicle Dispatch with Multi-Type Requests.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Using Game Theory in Real Time in the Real World: A Conservation Case Study.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Broken Signals in Security Games: Coordinating Patrollers and Sensors in the Real World.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Deep Reinforcement Learning for Green Security Games with Real-Time Information.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Large Scale Learning of Agent Rationality in Two-Player Zero-Sum Games.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Robust Multi-Agent Reinforcement Learning via Minimax Deep Deterministic Policy Gradient.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

On the Inducibility of Stackelberg Equilibrium for Security Games.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Narrative Collage of Image Collections by Scene Graph Recombination.
IEEE Trans. Vis. Comput. Graph., 2018

The Impact of Humanoid Affect Expression on Human Behavior in a Game-Theoretic Setting.
CoRR, 2018

Exploiting Data and Human Knowledge for Predicting Wildlife Poaching.
CoRR, 2018

Stackelberg Security Games: Looking Beyond a Decade of Success.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Designing the Game to Play: Optimizing Payoff Structure in Security Games.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

What Game Are We Playing? End-to-end Learning in Normal and Extensive Form Games.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Exploiting Data and Human Knowledge for Predicting Wildlife Poaching.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

AirSim-W: A Simulation Environment for Wildlife Conservation with UAVs.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

Deceiving Cyber Adversaries: A Game Theoretic Approach.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Inducible Equilibrium for Security Games.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Deep Reinforcement Learning for Green Security Game with Online Information.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Policy Learning for Continuous Space Security Games Using Neural Networks.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Evaluation of Predictive Models for Wildlife Poaching Activity through Controlled Field Test in Uganda.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

SPOT Poachers in Action: Augmenting Conservation Drones With Automatic Detection in Near Real Time.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Predicting poaching for wildlife Protection.
IBM J. Res. Dev., 2017

Video Labeling for Automatic Video Surveillance in Security Domains.
CoRR, 2017

Keeping it Real: Using Real-World Problems to Teach AI to Diverse Audiences.
AI Mag., 2017

PAWS - A Deployed Game-Theoretic Application to Combat Poaching.
AI Mag., 2017

Reports on the 2017 AAAI Spring Symposium Series.
AI Mag., 2017

Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Optimal Patrol Planning for Green Security Games with Black-Box Attackers.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

VIOLA: Video Labeling Application for Security Domains.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Optimizing Peer Teaching to Enhance Team Performance.
Proceedings of the Autonomous Agents and Multiagent Systems, 2017

Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
An Analytical Framework for Multilayer Partial Frequency Reuse Scheme Design in Mobile Communication Systems.
IEEE Trans. Veh. Technol., 2016

Green security games: apply game theory to addressing green security challenges.
SIGecom Exch., 2016

A Fast Adaptive Control Algorithm for Slotted ALOHA.
J. Commun., 2016

Comparing human behavior models in repeated Stackelberg security games: An extended study.
Artif. Intell., 2016

Three Strategies to Success: Learning Adversary Models in Security Games.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Combining Graph Contraction and Strategy Generation for Green Security Games.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Error Analysis of English-Chinese Machine Translation.
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2016

Abstraction Methods for Solving Graph-Based Security Games.
Proceedings of the Autonomous Agents and Multiagent Systems - AAMAS 2016 Workshops, - Visionary Papers, 2016

From the Lab to the Classroom and Beyond: Extending a Game-Based Research Platform for Teaching AI to Diverse Audiences.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Deploying PAWS to Combat Poaching: Game-Theoretic Patrolling in Areas with Complex Terrain (Demonstration).
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Performance Analysis of IEEE 802.11 DCF Based on OFDM.
J. Commun., 2015

Reports on the 2015 AAAI Spring Symposium Series.
AI Mag., 2015

When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

"A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Defender Strategies In Domains Involving Frequent Adversary Interaction.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Effectiveness of Probability Perception Modeling and Defender Strategy Generation Algorithms in Repeated Stackelberg Games: An Initial Report.
Proceedings of the Computational Sustainability, 2015

2014
Research on Stability Control Algorithm of Slotted ALOHA.
J. Commun., 2014

Toward multi-layer partial frequency reuse in future mobile communication systems.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Robust Protection of Fisheries with COmPASS.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Protecting Moving Targets with Multiple Mobile Resources.
J. Artif. Intell. Res., 2013

Automatic marker detection from X-ray images.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Optimal patrol strategy for protecting moving targets with multiple mobile resources.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
Expanding Approach to Information Retrieval Using Semantic Similarity Analysis Based on WordNet and Wikipedia.
Int. J. Softw. Eng. Knowl. Eng., 2012

Designing better strategies against human adversaries in network security games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Challenges in Patrolling to Maximize Pristine Forest Area (Position Paper).
Proceedings of the Game Theory for Security, 2012

Patrol Strategies to Maximize Pristine Forest Area.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
XKFitler: A Keyword Filter on XML Stream.
Int. J. Inf. Retr. Res., 2011

A CMOS broadband precise programmable gain amplifier with bandwidth extension technique.
Proceedings of the IEEE Asian Solid-State Circuits Conference, 2011

2009
SKeyword: Ontology-driven Semantic Keyword Search for Heterogeneous XML Data Sources.
Proceedings of the 2009 International Conference on Internet Computing, 2009

2006
FootPrinter3: phylogenetic footprinting in partially alignable sequences.
Nucleic Acids Res., 2006


  Loading...