Author of the publication

Using Risk Dominance Strategy in Poker.

, , , , and . J. Inf. Hiding Multim. Signal Process., 5 (3): 555-566 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vehicle-Road Environment Perception Under Low-Visibility Condition Based on Polarization Features via Deep Learning., , , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (10): 17873-17886 (2022)Self-Attention-Masking Semantic Decomposition and Segmentation for Facial Attribute Manipulation., , , , , and . IEEE Access, (2020)An ISAR and Visible Image Fusion Algorithm Based on Adaptive Guided Multi-Layer Side Window Box Filter Decomposition., , , , , , , , and . Remote. Sens., 15 (11): 2784 (2023)A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (3): 73-96 (2020)Robust semi-supervised spatial picture fuzzy clustering with local membership and KL-divergence for image segmentation., and . Int. J. Mach. Learn. Cybern., 13 (4): 963-987 (2022)Detection of Colorectal Polyps Based on Deep Learning., , , , and . ICBBT, page 190-195. ACM, (2021)LwDeepStack: A lightweight DeepStack based on knowledge distillation., , , , , and . ICDIS, page 435-441. IEEE, (2022)Sustainable Development of Industrial Clusters Based on the Theories of Life Circle., , and . ICEE, page 4679-4682. IEEE Computer Society, (2010)Reinforced Vision-and-Language Navigation Based on Historical BERT., , , , , , , and . ICSI (2), volume 13969 of Lecture Notes in Computer Science, page 427-438. Springer, (2023)Solving Six-Player Games via Online Situation Estimation., , , , , , and . ICTAI, page 1795-1799. IEEE, (2019)