Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2615731.2615805acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

Adaptive resource allocation for wildlife protection against illegal poachers

Published: 05 May 2014 Publication History

Abstract

Illegal poaching is an international problem that leads to the extinction of species and the destruction of ecosystems. As evidenced by dangerously dwindling populations of endangered species, existing anti-poaching mechanisms are insufficient. This paper introduces the Protection Assistant for Wildlife Security (PAWS) application - a joint deployment effort done with researchers at Uganda's Queen Elizabeth National Park (QENP) with the goal of improving wildlife ranger patrols. While previous works have deployed applications with a game-theoretic approach (specifically Stackelberg Games) for counter-terrorism, wildlife crime is an important domain that promotes a wide range of new deployments. Additionally, this domain presents new research challenges and opportunities related to learning behavioral models from collected poaching data. In addressing these challenges, our first contribution is a behavioral model extension that captures the heterogeneity of poachers' decision making processes. Second, we provide a novel framework, PAWS-Learn, that incrementally improves the behavioral model of the poacher population with more data. Third, we develop a new algorithm, PAWS-Adapt, that adaptively improves the resource allocation strategy against the learned model of poachers. Fourth, we demonstrate PAWS's potential effectiveness when applied to patrols in QENP, where PAWS will be deployed.

References

[1]
S. Collaboration. http://www.smartconservationsoftware.org/.
[2]
V. Conitzer. Computing game-theoretic solutions and applications to security. In AAAI, pages 2106--2112, 2012.
[3]
Y. Gal, A. Pfeffer, F. Marzo, and B. J. Grosz. Learning social preferences in games. In AAAI, 2004.
[4]
M. Hamisi. Identification and mapping risk areas for zebra poaching: A case of Tarangire National Park, Tanzania. Thesis, ITC, 2008.
[5]
T. Holmern, M. J., and R. E. Local law enforcement and illegal bushmeat hunting outside the serengeti national park, tanzania. Environmental Conservation, 34:55--63, 2007.
[6]
J. Letchford, V. Conitzer, and K. Munagala. Learning and approximating the optimal strategy to commit to. In Proceedings of the 2nd International Symposium on Algorithmic Game Theory, pages 250--262, 2009.
[7]
J. Marecki, G. Tesauro, and R. Segal. Playing repeated stackelberg games with unknown opponents. In AAMAS, pages 821--828, 2012.
[8]
M. Montesh. Rhino poaching: A new form of organised crime. Technical report, College of Law Research and Innovation Committee of the University of South Africa, 2013.
[9]
W. Moreto. To Conserve and Protect: Examining Law Enforcement Ranger Culture and Operations in Queen Elizabeth National Park, Uganda. Thesis, Rutgers, 2013.
[10]
T. H. Nguyen, R. Yang, A. Azaria, S. Kraus, and M. Tambe. Analyzing the effectiveness of adversary modeling in security games. In AAAI, 2013.
[11]
C. of New York. Nypd website- frequently asked questions, 2013.
[12]
Y. Oshrat, R. Lin, and S. Kraus. Facing the challenge of human-agent negotiations via effective general opponent modeling. In AAMAS, pages 377--384, 2009.
[13]
E. Ouko. Where, when, and why are there elephant poaching hotspots in Kenya? Thesis, University of Twente, 2013.
[14]
S. Pires. The Illegal Parrot Trade in the Neo-Tropics: The Relationship between Poaching and Illicit Pet Markets. Thesis, Rutgers, 2012.
[15]
J. Pita, R. John, R. Maheswaran, M. Tambe, and S. Kraus. A robust approach to addressing human adversaries in security games. In ECAI, 2012.
[16]
G. T. I. Secretariat. Global tiger recovery program implementation plan: 2013--14. Report, The World Bank, Washington, D.C., 2013.
[17]
E. Shieh, B. An, R. Yang, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule, and G. Meyer. Protect: A deployed game theoretic system to protect the ports of the united states. In AAMAS, 2012.
[18]
E. J. Stokes. Improving effectiveness of protection efforts in tiger source sites: Developing a framework for law enforcement monitoring using mist. Integrative Zoology, (5):363--377, 2010.
[19]
M. Tambe. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, New York, NY, 2011.
[20]
J. Tsai, S. Rathi, C. Kiekintveld, F. Ordonez, and M. Tambe. Iris - a tool for strategic security allocation in transportation networks. In AAMAS, 2009.
[21]
W. A. Wagenaar. Generation of random sequences by human subjects: A critical survey of the literature. 1972.
[22]
Y. A. Wato, G. M. Wahungu, and M. M. Okello. Correlates of wildlife snaring patterns in tsavo west national park, kenya. Biological Conservation, 132(4):500--509, 2006.
[23]
A. J. Y. Qian, W. Haskell and M. Tambe. Online planning for optimal protector strategies in resource conservation games. In AAMAS, 2014.

Cited By

View all
  • (2024)No-regret learning of nash equilibrium for black-box games via Gaussian processesProceedings of the Fortieth Conference on Uncertainty in Artificial Intelligence10.5555/3702676.3702748(1541-1557)Online publication date: 15-Jul-2024
  • (2023)Two-phase attacks in security gamesProceedings of the Thirty-Ninth Conference on Uncertainty in Artificial Intelligence10.5555/3625834.3625974(1489-1498)Online publication date: 31-Jul-2023
  • (2023)Two-phase Security GamesProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3599120(2910-2912)Online publication date: 30-May-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AAMAS '14: Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems
May 2014
1774 pages
ISBN:9781450327381

Sponsors

  • IFAAMAS

In-Cooperation

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 05 May 2014

Check for updates

Author Tags

  1. application
  2. game theory
  3. human behavior
  4. wildlife protection

Qualifiers

  • Research-article

Conference

AAMAS '14
Sponsor:

Acceptance Rates

AAMAS '14 Paper Acceptance Rate 169 of 709 submissions, 24%;
Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)2
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)No-regret learning of nash equilibrium for black-box games via Gaussian processesProceedings of the Fortieth Conference on Uncertainty in Artificial Intelligence10.5555/3702676.3702748(1541-1557)Online publication date: 15-Jul-2024
  • (2023)Two-phase attacks in security gamesProceedings of the Thirty-Ninth Conference on Uncertainty in Artificial Intelligence10.5555/3625834.3625974(1489-1498)Online publication date: 31-Jul-2023
  • (2023)Two-phase Security GamesProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3599120(2910-2912)Online publication date: 30-May-2023
  • (2022)Scalable distributional robustness in a class of non convex optimization with guaranteesProceedings of the 36th International Conference on Neural Information Processing Systems10.5555/3600270.3601275(13826-13837)Online publication date: 28-Nov-2022
  • (2022)Design-Space Exploration for Decision-Support SoftwareProceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering10.1145/3551349.3559502(1-6)Online publication date: 10-Oct-2022
  • (2020)Learning to play sequential games versus unknown opponentsProceedings of the 34th International Conference on Neural Information Processing Systems10.5555/3495724.3496476(8971-8981)Online publication date: 6-Dec-2020
  • (2019)Deep Fictitious Play for Games with Continuous Action SpacesProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3332004(2042-2044)Online publication date: 8-May-2019
  • (2019)Online Resource Allocation with Matching ConstraintsProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331896(1681-1689)Online publication date: 8-May-2019
  • (2019)Patrol Scheduling Against Adversaries with Varying Attack DurationsProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331819(1179-1188)Online publication date: 8-May-2019
  • (2019)Co-Design as a Means of Fostering Appropriation of Conservation Monitoring Technology by Indigenous CommunitiesProceedings of the 9th International Conference on Communities & Technologies - Transforming Communities10.1145/3328320.3328383(126-130)Online publication date: 3-Jun-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media