Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fei Fang is active.

Publication


Featured researches published by Fei Fang.


Journal of Artificial Intelligence Research | 2013

Protecting moving targets with multiple mobile resources

Fei Fang; Albert Xin Jiang; Milind Tambe

In recent years, Stackelberg Security Games have been successfully applied to solve resource allocation and scheduling problems in several security domains. However, previous work has mostly assumed that the targets are stationary relative to the defender and the attacker, leading to discrete game models with finite numbers of pure strategies. This paper in contrast focuses on protecting mobile targets that leads to a continuous set of strategies for the players. The problem is motivated by several real-world domains including protecting ferries with escort boats and protecting refugee supply lines. Our contributions include: (i) A new game model for multiple mobile defender resources and moving targets with a discretized strategy space for the defender and a continuous strategy space for the attacker. (ii) An efficient linear-programming-based solution that uses a compact representation for the defenders mixed strategy, while accurately modeling the attackers continuous strategy using a novel sub-interval analysis method. (iii) Discussion and analysis of multiple heuristic methods for equilibrium refinement to improve robustness of defenders mixed strategy. (iv) Discussion of approaches to sample actual defender schedules from the defenders mixed strategy. (iv) Detailed experimental analysis of our algorithms in the ferry protection domain.


european conference on machine learning | 2017

Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test

Shahrzad Gholami; Benjamin J. Ford; Fei Fang; Andrew J. Plumptre; Milind Tambe; Margaret Driciru; Fred Wanyama; Aggrey Rwetsiba; Mustapha Nsubaga; Joshua Mabonga

Worldwide, conservation agencies employ rangers to protect conservation areas from poachers. However, agencies lack the manpower to have rangers effectively patrol these vast areas frequently. While past work has modeled poachers’ behavior so as to aid rangers in planning future patrols, those models’ predictions were not validated by extensive field tests. In this paper, we present a hybrid spatio-temporal model that predicts poaching threat levels and results from a five-month field test of our model in Uganda’s Queen Elizabeth Protected Area (QEPA). To our knowledge, this is the first time that a predictive model has been evaluated through such an extensive field test in this domain. We present two major contributions. First, our hybrid model consists of two components: (i) an ensemble model which can work with the limited data common to this domain and (ii) a spatio-temporal model to boost the ensemble’s predictions when sufficient data are available. When evaluated on real-world historical data from QEPA, our hybrid model achieves significantly better performance than previous approaches with either temporally-aware dynamic Bayesian networks or an ensemble of spatially-aware models. Second, in collaboration with the Wildlife Conservation Society and Uganda Wildlife Authority, we present results from a five-month controlled experiment where rangers patrolled over 450 sq km across QEPA. We demonstrate that our model successfully predicted (1) where snaring activity would occur and (2) where it would not occur; in areas where we predicted a high rate of snaring activity, rangers found more snares and snared animals than in areas of lower predicted activity. These findings demonstrate that (1) our model’s predictions are selective, (2) our model’s superior laboratory performance extends to the real world, and (3) these predictive models can aid rangers in focusing their efforts to prevent wildlife poaching and save animals.


Ai Magazine | 2017

PAWS — A Deployed Game-Theoretic Application to Combat Poaching

Fei Fang; Thanh Hong Nguyen; Rob Pickles; Wai Y. Lam; Gopalasamy Reuben Clements; Bo An; Amandeep Singh; Brian C. Schwedock; Milind Tambe; Andrew Lemieux

Poaching is considered a major driver for the population drop of key species such as tigers, elephants, and rhinos, which can be detrimental to whole ecosystems. While conducting foot patrols is the most commonly used approach in many countries to prevent poaching, such patrols often do not make the best use of the limited patrolling resources.


decision and game theory for security | 2017

Optimal Patrol Planning for Green Security Games with Black-Box Attackers.

Haifeng Xu; Benjamin J. Ford; Fei Fang; Bistra Dilkina; Andrew J. Plumptre; Milind Tambe; Margaret Driciru; Fred Wanyama; Aggrey Rwetsiba; Mustapha Nsubaga; Joshua Mabonga

Motivated by the problem of protecting endangered animals, there has been a surge of interests in optimizing patrol planning for conservation area protection. Previous efforts in these domains have mostly focused on optimizing patrol routes against a specific boundedly rational poacher behavior model that describes poachers’ choices of areas to attack. However, these planning algorithms do not apply to other poaching prediction models, particularly, those complex machine learning models which are recently shown to provide better prediction than traditional bounded-rationality-based models. Moreover, previous patrol planning algorithms do not handle the important concern whereby poachers infer the patrol routes by partially monitoring the rangers’ movements. In this paper, we propose OPERA, a general patrol planning framework that: (1) generates optimal implementable patrolling routes against a black-box attacker which can represent a wide range of poaching prediction models; (2) incorporates entropy maximization to ensure that the generated routes are more unpredictable and robust to poachers’ partial monitoring. Our experiments on a real-world dataset from Uganda’s Queen Elizabeth Protected Area (QEPA) show that OPERA results in better defender utility, more efficient coverage of the area and more unpredictability than benchmark algorithms and the past routes used by rangers at QEPA.


decision and game theory for security | 2017

VIOLA: Video Labeling Application for Security Domains

Elizabeth Bondi; Fei Fang; Debarun Kar; Venil Loyd Noronha; Donnabell Dmello; Milind Tambe; Arvind Iyer; Robert Hannaford

Advances in computational game theory have led to several successfully deployed applications in security domains. These game-theoretic approaches and security applications learn game payoff values or adversary behaviors from annotated input data provided by domain experts and practitioners in the field, or collected through experiments with human subjects. Beyond these traditional methods, unmanned aerial vehicles (UAVs) have become an important surveillance tool used in security domains to collect the required annotated data. However, collecting annotated data from videos taken by UAVs efficiently, and using these data to build datasets that can be used for learning payoffs or adversary behaviors in game-theoretic approaches and security applications, is an under-explored research question. This paper presents VIOLA, a novel labeling application that includes (i) a workload distribution framework to efficiently gather human labels from videos in a secured manner; (ii) a software interface with features designed for labeling videos taken by UAVs in the domain of wildlife security. We also present the evolution of VIOLA and analyze how the changes made in the development process relate to the efficiency of labeling, including when seemingly obvious improvements surprisingly did not lead to increased efficiency. VIOLA enables collecting massive amounts of data with detailed information from challenging security videos such as those collected aboard UAVs for wildlife security. VIOLA will lead to the development of a new generation of game-theoretic approaches for security domains, including approaches that integrate deep learning and game theory for real-time detection and response.


Ibm Journal of Research and Development | 2017

Predicting poaching for wildlife Protection

Fei Fang; Thanh Hong Nguyen; Arunesh Sinha; Shahrzad Gholami; Andrew J. Plumptre; Lucas Joppa; Milind Tambe; Margaret Driciru; Fred Wanyama; Aggrey Rwetsiba; Rob Critchlow; Colin M. Beale

Wildlife species such as tigers and elephants are under the threat of poaching. To combat poaching, conservation agencies (“defenders”) need to 1) anticipate where the poachers are likely to poach and 2) plan effective patrols. We propose an anti-poaching tool CAPTURE (Comprehensive Anti-Poaching tool with Temporal and observation Uncertainty REasoning), which helps the defenders achieve both goals. CAPTURE builds a novel hierarchical model for poacher-patroller interaction. It considers the patrollers imperfect detection of signs of poaching, the complex temporal dependencies in the poachers behaviors, and the defenders lack of knowledge of the number of poachers. Further, CAPTURE uses a new game-theoretic algorithm to compute the optimal patrolling strategies and plan effective patrols. This paper investigates the computational challenges that CAPTURE faces. First, we present a detailed analysis of parameter separation and cell abstraction, two novel approaches used by CAPTURE to efficiently learn the parameters in the hierarchical model. Second, we propose two heuristics—piecewise linear approximation and greedy planning—to speed up the computation of the optimal patrolling strategies. In this paper, we discuss the lessons learned from using CAPTURE to analyze real-world poaching data collected over 12 years in Queen Elizabeth National Park in Uganda.


Sigecom Exchanges | 2016

Green security games: apply game theory to addressing green security challenges

Fei Fang; Thanh Hong Nguyen

In the past decade, game-theoretic applications have been successfully deployed in the real world to address security resource allocation challenges. Inspired by the success, researchers have begun focusing on applying game theory to green security domains such as protection of forests, fish, and wildlife, forming a stream of research on Green Security Games (GSGs). We provide an overview of recent advances in GSGs and list the challenges that remained open for future study.


Ai Magazine | 2013

Reports of the 2013 AAAI Spring Symposium Series

Nitin Agarwal; Sean Andrist; Dan Bohus; Fei Fang; Laurie Fenstermacher; Lalana Kagal; Takashi Kido; Christopher Kiekintveld; William F. Lawless; Huan Liu; Andrew McCallum; Hemant Purohit; Oshani Seneviratne; Keiki Takadama; Gavin Taylor

The Association for the Advancement of Artificial Intelligence was pleased to present the AAAI 2014 Spring Symposium Series, held Monday through Wednesday, March 24–26, 2014. The titles of the eight symposia were Applied Computational Game Theory, Big Data Becomes Personal: Knowledge into Meaning, Formal Verification and Modeling in Human-Machine Systems, Implementing Selves with Safe Motivational Systems and Self-Improvement, The Intersection of Robust Intelligence and Trust in Autonomous Systems, Knowledge Representation and Reasoning in Robotics, Qualitative Representations for Robots, and Social Hacking and Cognitive Security on the Internet and New Media). This report contains summaries of the symposia, written, in most cases, by the cochairs of the symposium.


international joint conference on artificial intelligence | 2018

Stackelberg Security Games: Looking Beyond a Decade of Success.

Arunesh Sinha; Fei Fang; Bo An; Christopher Kiekintveld; Milind Tambe

The Stackelberg Security Game (SSG) model has been immensely influential in security research since it was introduced roughly a decade ago. Furthermore, deployed SSG-based applications are one of most successful examples of game theory applications in the real world. We present a broad survey of recent technical advances in SSG and related literature, and then look to the future by highlighting the new potential applications and open research problems in SSG.


international joint conference on artificial intelligence | 2018

Designing the Game to Play: Optimizing Payoff Structure in Security Games

Zheyuan Ryan Shi; Ziye Tang; Long Tran-Thanh; Rohit Singh; Fei Fang

Effective game-theoretic modeling of defender-attacker behavior is becoming increasingly important. In many domains, the defender functions not only as a player but also the designer of the games payoff structure. We study Stackelberg Security Games where the defender, in addition to allocating defensive resources to protect targets from the attacker, can strategically manipulate the attackers payoff under budget constraints in weighted L^p-norm form regarding the amount of change. Focusing on problems with weighted L^1-norm form constraint, we present (i) a mixed integer linear program-based algorithm with approximation guarantee; (ii) a branch-and-bound based algorithm with improved efficiency achieved by effective pruning; (iii) a polynomial time approximation scheme for a special but practical class of problems. In addition, we show that problems under budget constraints in L^0-norm form and weighted L^\infty-norm form can be solved in polynomial time. We provide an extensive experimental evaluation of our proposed algorithms.

Collaboration


Dive into the Fei Fang's collaboration.

Top Co-Authors

Avatar

Milind Tambe

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Debarun Kar

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Thanh Hong Nguyen

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Bo An

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nicole Sintov

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Arunesh Sinha

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Benjamin J. Ford

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Christopher Kiekintveld

University of Texas at El Paso

View shared research outputs
Top Co-Authors

Avatar

Aggrey Rwetsiba

Uganda Wildlife Authority

View shared research outputs
Researchain Logo
Decentralizing Knowledge