" A Game of Thrones" When Human Behavior Models Compete in Repeated Stackelberg Security Games D Kar, F Fang, F Delle Fave, N Sintov, M Tambe Proceedings of the 2015 international conference on autonomous agents and …, 2015 | 134 | 2015 |
Robust protection of fisheries with compass W Haskell, D Kar, F Fang, M Tambe, S Cheung, E Denicola Proceedings of the AAAI Conference on Artificial Intelligence 28 (2), 2978-2983, 2014 | 109 | 2014 |
Spot poachers in action: Augmenting conservation drones with automatic detection in near real time E Bondi, F Fang, M Hamilton, D Kar, D Dmello, J Choi, R Hannaford, ... Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018 | 92 | 2018 |
Cloudy with a chance of poaching: Adversary behavior modeling and forecasting with real-world poaching data D Kar, B Ford, S Gholami, F Fang, A Plumptre, M Tambe, M Driciru, ... International Conference on Autonomous Agents and Multiagent Systems, 2017 | 83 | 2017 |
Keeping pace with criminals: An extended study of designing patrol allocation against adaptive opportunistic criminals C Zhang, S Gholami, D Kar, A Sinha, M Jain, R Goyal, M Tambe Games 7 (3), 15, 2016 | 79 | 2016 |
From physical security to cybersecurity A Sinha, TH Nguyen, D Kar, M Brown, M Tambe, AX Jiang Journal of Cybersecurity 1 (1), 19-35, 2015 | 77 | 2015 |
Trends and applications in Stackelberg security games D Kar, TH Nguyen, F Fang, M Brown, A Sinha, M Tambe, AX Jiang Handbook of dynamic game theory, 1-47, 2017 | 63 | 2017 |
Learning adversary behavior in security games: A PAC model perspective A Sinha, D Kar, M Tambe arXiv preprint arXiv:1511.00043, 2015 | 46 | 2015 |
Making the most of our regrets: Regret-based solutions to handle payoff uncertainty and elicitation in green security games TH Nguyen, FMD Fave, D Kar, AS Lakshminarayanan, A Yadav, M Tambe, ... Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015 | 46 | 2015 |
Towards a science of security games TH Nguyen, D Kar, M Brown, A Sinha, AX Jiang, M Tambe Mathematical Sciences with Multidisciplinary Applications: In Honor of …, 2016 | 36 | 2016 |
From the lab to the classroom and beyond: extending a game-based research platform for teaching AI to diverse audiences N Sintov, D Kar, T Nguyen, F Fang, K Hoffman, A Lyet, M Tambe Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016 | 28 | 2016 |
Know Your Adversary: Insights for a Better Adversarial Behavioral Model. Y Abbasi, D Kar, ND Sintov, M Tambe, N Ben-Asher, D Morrison, ... CogSci, 2016 | 27 | 2016 |
Classification of Cellular Automata Rules Based on Their Properties PP Choudhury, S Sahoo, SS Hasssan, S Basu, D Ghosh, D Kar, A Ghosh, ... Arxiv preprint arXiv:0905.1769, 2009 | 21 | 2009 |
Feature Weighting and Confidence Based Prediction for Case Based Reasoning Systems D Kar, S Chakraborti, B Ravindran Case-Based Reasoning Research and Development, 211-225, 2012 | 17 | 2012 |
Comparing human behavior models in repeated Stackelberg security games: An extended study D Kar, F Fang, FM Delle Fave, N Sintov, M Tambe, A Lyet Artificial Intelligence 240, 65-103, 2016 | 16 | 2016 |
PAWS: adaptive game-theoretic patrolling for wildlife protection B Ford, D Kar, FM Delle Fave, R Yang, M Tambe Proceedings of the 2014 international conference on Autonomous agents and …, 2014 | 16 | 2014 |
Automatic detection of poachers and wildlife with UAVs E Bondi, F Fang, M Hamilton, D Kar, D Dmello, V Noronha, J Choi, ... Artificial intelligence and conservation 77, 2019 | 15 | 2019 |
Viola: Video labeling application for security domains E Bondi, F Fang, D Kar, V Noronha, D Dmello, M Tambe, A Iyer, ... Decision and Game Theory for Security: 8th International Conference, GameSec …, 2017 | 14 | 2017 |
Keeping it real: Using real-world problems to teach AI to diverse audiences N Sintov, D Kar, T Nguyen, F Fang, K Hoffman, A Lyet, M Tambe AI Magazine 38 (2), 35-47, 2017 | 12 | 2017 |
Handling continuous space security games with neural networks N Kamra, F Fang, D Kar, Y Liu, M Tambe IWAISe: First International Workshop on Artificial Intelligence in Security, 17, 2017 | 8 | 2017 |