Author of the publication

Taking complementary advantages: Improving exploration via double self-imitation learning in procedurally-generated environments.

, , , , , and . Expert Syst. Appl., 238 (Part E): 122145 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Corridor-Scene Classifying Methods for Mobile Robot Based on Multi-Sonar-Sensor Information Fusion., , , , and . Int. J. Inf. Acquis., 4 (1): 15-26 (2007)Vital node searcher: find out critical node measure with deep reinforcement learning., , and . Connect. Sci., 34 (1): 1519-1539 (2022)Human-level moving object recognition from traffic video., , , and . Comput. Sci. Inf. Syst., 12 (2): 787-799 (2015)A Kernel-Based Sarsa( ) Algorithm with Clustering-Based Sample Sparsification., , , , , , and . ICONIP (3), volume 9949 of Lecture Notes in Computer Science, page 211-220. (2016)Hierarchical Reinforcement Learning With Automatic Sub-Goal Identification., , , and . IEEE CAA J. Autom. Sinica, 8 (10): 1686-1696 (2021)Cooperative Target-Surrounding Control of Unmanned Surface Vessels Based on MADDPG., , , , , and . IECON, page 1-6. IEEE, (2023)Signal Recovery Using Neural Networks for DSP Based Infrared Gas Sensor., , , , and . ICNSC, page 1294-1299. IEEE, (2008)Dual Alignment Unsupervised Domain Adaptation for Video-Text Retrieval., , , , and . CVPR, page 18962-18972. IEEE, (2023)Online nonnegative matrix factorization based on kernel machines., and . EUSIPCO, page 2381-2385. IEEE, (2015)Targeted Transferable Attack against Deep Hashing Retrieval., , , , , and . MMAsia, page 48:1-48:7. ACM, (2023)