From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Android malware detection through generative adversarial networks., , , , , и . Trans. Emerg. Telecommun. Technol., (2022)Adversarial Deep Reinforcement Learning for Improving the Robustness of Multi-agent Autonomous Driving Policies., и . APSEC, стр. 61-70. IEEE, (2022)ReMAV: Reward Modeling of Autonomous Vehicles for Finding Likely Failure Events., и . CoRR, (2023)Adversarial Deep Reinforcement Learning for Trustworthy Autonomous Driving Policies., и . CoRR, (2021)Evaluating the Robustness of Deep Reinforcement Learning for Autonomous Policies in a Multi-Agent Urban Driving Environment., и . QRS, стр. 785-796. IEEE, (2022)DeepOrder: Deep Learning for Test Case Prioritization in Continuous Integration Testing., , и . ICSME, стр. 525-534. IEEE, (2021)Function Identification in Android Binaries with Deep Learning., и . CANDAR, стр. 92-101. IEEE, (2019)Evaluating the Robustness of Deep Reinforcement Learning for Autonomous and Adversarial Policies in a Multi-agent Urban Driving Environment., и . CoRR, (2021)Opening the software engineering toolbox for the assessment of trustworthy AI., , , , , , , , , и . NeHuAI@ECAI, том 2659 из CEUR Workshop Proceedings, стр. 67-70. CEUR-WS.org, (2020)