Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatically determining phishing campaigns using the USCAP methodology., , and . eCrime, page 1-8. IEEE, (2010)Online knowledge validation with prudence analysis in a document management application., , and . Expert Syst. Appl., 38 (9): 10959-10965 (2011)Rapid Anomaly Detection Using Integrated Prudence Analysis (IPA)., , , and . PAKDD (Workshops), volume 11154 of Lecture Notes in Computer Science, page 137-141. Springer, (2018)Human engagement providing evaluative and informative advice for interactive reinforcement learning., , , , and . Neural Comput. Appl., 35 (25): 18215-18230 (September 2023)A Prioritized objective actor-critic method for deep reinforcement learning., , , , and . Neural Comput. Appl., 33 (16): 10335-10349 (2021)Levels of explainable artificial intelligence for human-aligned conversational explanations., , , , , and . CoRR, (2021)Scalar reward is not enough: A response to Silver, Singh, Precup and Sutton (2021)., , , , , , , , , and 2 other author(s). CoRR, (2021)Explainable Deep Reinforcement Learning Using Introspection in a Non-episodic Task., , , and . CoRR, (2021)A Broad-persistent Advising Approach for Deep Interactive Reinforcement Learning in Robotic Environments., , and . CoRR, (2021)Evaluating Human-like Explanations for Robot Actions in Reinforcement Learning Scenarios., , , and . IROS, page 894-901. IEEE, (2022)