Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Francesco Maria Delle Fave is active.

Publication


Featured researches published by Francesco Maria Delle Fave.


Journal of Artificial Intelligence Research | 2014

Game-theoretic security patrolling with dynamic execution uncertainty and a case study on a real transit system

Francesco Maria Delle Fave; Albert Xin Jiang; Zhengyu Yin; Chao Zhang; Milind Tambe; Sarit Kraus; John P. Sullivan

Attacker-Defender Stackelberg security games (SSGs) have emerged as an important research area in multi-agent systems. However, existing SSGs models yield fixed, static, schedules which fail in dynamic domains where defenders face execution uncertainty, i.e., in domains where defenders may face unanticipated disruptions of their schedules. A concrete example is an application involving checking fares on trains, where a defenders schedule is frequently interrupted by fare evaders, making static schedules useless. To address this shortcoming, this paper provides four main contributions. First, we present a novel general Bayesian Stackelberg game model for security resource allocation in dynamic uncertain domains. In this new model, execution uncertainty is handled by using a Markov decision process (MDP) for generating defender policies. Second, we study the problem of computing a Stackelberg equilibrium for this game and exploit problem structure to reduce it to a polynomial-sized optimization problem. Shifting to evaluation, our third contribution shows, in simulation, that our MDP-based policies overcome the failures of previous SSG algorithms. In so doing, we can now build a complete system, that enables handling of schedule interruptions and, consequently, to conduct some of the first controlled experiments on SSGs in the field. Hence, as our final contribution, we present results from a real-world experiment on Metro trains in Los Angeles validating our MDP-based model, and most importantly, concretely measuring the benefits of SSGs for security resource allocation.


decision and game theory for security | 2015

Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games

Benjamin J. Ford; Thanh Hong Nguyen; Milind Tambe; Nicole Sintov; Francesco Maria Delle Fave

Interdicting the flow of illegal goods (such as drugs and ivory) is a major security concern for many countries. The massive scale of these networks, however, forces defenders to make judicious use of their limited resources. While existing solutions model this problem as a Network Security Game (NSG), they do not consider humans’ bounded rationality. Previous human behavior modeling works in Security Games, however, make use of large training datasets that are unrealistic in real-world situations; the ability to effectively test many models is constrained by the time-consuming and complex nature of field deployments. In addition, there is an implicit assumption in these works that a model’s prediction accuracy strongly correlates with the performance of its corresponding defender strategy (referred to as predictive reliability). If the assumption of predictive reliability does not hold, then this could lead to substantial losses for the defender. In the following paper, we (1) first demonstrate that predictive reliability is indeed strong for previous Stackelberg Security Game experiments. We also run our own set of human subject experiments in such a way that models are restricted to learning on dataset sizes representative of real-world constraints. In the analysis on that data, we demonstrate that (2) predictive reliability is extremely weak for NSGs. Following that discovery, however, we identify (3) key factors that influence predictive reliability results: the training set’s exposed attack surface and graph structure.


International Workshop on Engineering Multi-Agent Systems | 2014

Security Games in the Field: Deployments on a Transit System

Francesco Maria Delle Fave; Matthew Brown; Chao Zhang; Eric Anyung Shieh; Albert Xin Jiang; Heather Rosoff; Milind Tambe; John P. Sullivan

This paper proposes the Multi-Operation Patrol Scheduling System (MOPSS), a new system to generate patrols for transit system. MOPSS is based on five contributions. First, MOPSS is the first system to use three fundamentally different adversary models for the threats of fare evasion, terrorism and crime, generating three significantly different types of patrol schedule. Second, to handle uncertain interruptions in the execution of patrol schedules, MOPSS uses Markov decision processes (MDPs) in its scheduling. Third, MOPSS is the first system to account for joint activities between multiple resources, by employing the well known SMART security game model that tackles coordination between defender’s resources. Fourth, we are also the first to deploy a new Opportunistic Security Game model, where the adversary, a criminal, makes opportunistic decisions on when and where to commit crimes. Our fifth, and most important, contribution is the evaluation of MOPSS via real-world deployments, providing data from security games in the field.


Sigecom Exchanges | 2013

Planning and learning in security games

Francesco Maria Delle Fave; Yundi Qian; Albert Xin Jiang; Matthew Brown; Milind Tambe

We present two new critical domains where security games are applied to generate randomized patrol schedules. For each setting, we present the current research that we have produced. We then propose two new challenges to build accurate schedules that can be deployed effectively in the real world. The first is a planning challenge. Current schedules cannot handle interruptions. Thus, more expressive models, that allow for reasoning over stochastic actions, are needed. The second is a learning challenge. In several security domains, data can be used to extract information about both the environment and the attacker. This information can then be used to improve the defenders strategies.


adaptive agents and multi-agents systems | 2015

A Game of Thrones: When Human Behavior Models Compete in Repeated Stackelberg Security Games

Debarun Kar; Fei Fang; Francesco Maria Delle Fave; Nicole Sintov; Milind Tambe


national conference on artificial intelligence | 2016

Assumed density filtering methods for learning Bayesian neural networks

Soumya Ghosh; Francesco Maria Delle Fave; Jonathan S. Yedidia


adaptive agents and multi-agents systems | 2013

Game-theoretic patrol strategies for transit systems: the TRUSTS system and its mobile app

Samantha Luber; Zhengyu Yin; Francesco Maria Delle Fave; Albert Xin Jiang; Milind Tambe; John P. Sullivan


Artificial Intelligence | 2016

Comparing human behavior models in repeated Stackelberg security games: An extended study☆

Debarun Kar; Fei Fang; Francesco Maria Delle Fave; Nicole Sintov; Milind Tambe; Arnaud Lyet


adaptive agents and multi agents systems | 2014

PAWS: adaptive game-theoretic patrolling for wildlife protection

Benjamin J. Ford; Debarun Kar; Francesco Maria Delle Fave; Rong Yang; Milind Tambe


Autonomous Agents and Multi-Agent Systems | 2015

Efficient solutions for joint activity based security games: fast algorithms, results and a field experiment on a transit system

Francesco Maria Delle Fave; Eric Anyung Shieh; Manish Jain; Albert Xin Jiang; Heather Rosoff; Milind Tambe; John P. Sullivan

Collaboration


Dive into the Francesco Maria Delle Fave's collaboration.

Top Co-Authors

Avatar

Milind Tambe

University of Southern California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Debarun Kar

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Nicole Sintov

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Fei Fang

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Chao Zhang

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Eric Anyung Shieh

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Heather Rosoff

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Matthew Brown

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Benjamin J. Ford

University of Southern California

View shared research outputs
Researchain Logo
Decentralizing Knowledge