Author of the publication

Analysis of Fleet Modularity in an Artificial Intelligence-Based Attacker-Defender Game.

, and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transfer Learning in Remote Sensing Images with Generative Adversarial Networks., , , , , and . ICIS, page 124-129. IEEE, (2019)Computational scratch assay - A new frontier for image analysis: Preliminary study of multi-cellular segmentation., and . GlobalSIP, page 186-190. IEEE, (2017)Text-driven Prompt Generation for Vision-Language Models in Federated Learning., , , , , , and . CoRR, (2023)Domain Generalization of 3D Object Detection by Density-Resampling., , and . CoRR, (2023)An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain., , , , , and . Secur. Commun. Networks, (2022)Inspire creativity with ORIBA: Transform Artists' Original Characters into Chatbots through Large Language Model., , , and . UbiComp/ISWC Adjunct, page 78-82. ACM, (2023)Cranial Implant Prediction by Learning an Ensemble of Slice-Based Skull Completion Networks., , and . AutoImplant@MICCAI, volume 13123 of Lecture Notes in Computer Science, page 95-104. Springer, (2021)A Lightweight Dynamic Gesture Recognition Network with Spatio-Temporal Attention., , and . ICARM, page 149-154. IEEE, (2023)DDDM: A Brain-Inspired Framework for Robust Classification., , , and . IJCAI, page 2867-2873. ijcai.org, (2022)FastLogAD: Log Anomaly Detection with Mask-Guided Pseudo Anomaly Generation and Discrimination., , and . CoRR, (2024)