From post

Performance optimization of criminal network hidden link prediction model with deep reinforcement learning.

, , и . J. King Saud Univ. Comput. Inf. Sci., 33 (10): 1202-1210 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Smart Home Automation Using Intelligent Electricity Dispatch., , , , , , и . IEEE Access, (2021)A Survey on Continuous Object Tracking and Boundary Detection Schemes in IoT Assisted Wireless Sensor Networks., , , , , , , и . IEEE Access, (2021)Using Dual Attention BiLSTM to Predict Vehicle Lane Changing Maneuvers on Highway Dataset., , , , и . Syst., 11 (4): 196 (апреля 2023)Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs)., , , , и . Comput. Commun., (2020)Anonymity Assurance Using Efficient Pseudonym Consumption in Internet of Vehicles., , , , , , и . Sensors, 23 (11): 5217 (2023)Smart Wireless Sensor Technology for Healthcare Monitoring System Using Cognitive Radio Networks., , , , , , и . Sensors, 23 (13): 6104 (июля 2023)A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework., , , , и . Open Comput. Sci., 12 (1): 364-377 (2022)IoT Wireless Intrusion Detection and Network Traffic Analysis., , , , и . Comput. Syst. Sci. Eng., 40 (3): 865-879 (2022)Cyber Security and Privacy Issues in Industrial Internet of Things., , и . Comput. Syst. Sci. Eng., 37 (3): 361-380 (2021)FSE2R: An Improved Collision-Avoidance-based Energy Efficient Route Selection Protocol in USN., , , , , и . Comput. Syst. Sci. Eng., 44 (3): 2225-2242 (2023)