Author of the publication

Ensemble Strategy Based on Deep Reinforcement Learning for Portfolio Optimization.

, , , and . KSEM (4), volume 14120 of Lecture Notes in Computer Science, page 242-249. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Color perception of diffusion tensor images using hierarchical manifold learning., , and . Pattern Recognit., (2017)Tri-Dexel Model Based Geometric Simulation of Multi-axis Additive Manufacturing., , , , and . ICIRA (3), volume 10464 of Lecture Notes in Computer Science, page 819-830. Springer, (2017)HybridCAM: Tool Path Generation Software for Hybrid Manufacturing., , , , and . ICIRA (3), volume 10464 of Lecture Notes in Computer Science, page 877-889. Springer, (2017)Construction and quantization for a basic sentiment lexicon., , and . FSKD, page 1441-1445. IEEE, (2011)Anomaly Detection Model Based on Hadoop Platform and Weka Interface., and . IMIS, page 84-89. IEEE Computer Society, (2016)Malicious URL detection with feature extraction based on machine learning., , , and . IJHPCN, 12 (2): 166-178 (2018)Reconstructing Complete Human Bodies Using Limited Scans Obtained via Viewpoint Auto-Changing Oriented Toward Rescue Operations., , , , , and . IEEE Trans. Instrum. Meas., (2023)Ensemble Strategy Based on Deep Reinforcement Learning for Portfolio Optimization., , , and . KSEM (4), volume 14120 of Lecture Notes in Computer Science, page 242-249. Springer, (2023)Multi-layer Anomaly Detection for Internet Traffic Based on Data Mining., , and . IMIS, page 277-282. IEEE Computer Society, (2015)A tolerance constrained G2 continuous path smoothing and interpolation method for industrial SCARA robots., , , , and . Robotics Comput. Integr. Manuf., (2020)