Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved algorithm on rule-based reasoning systems modeled by fuzzy Petri nets., , , and . FUZZ-IEEE, page 1204-1209. IEEE, (2002)An improved fusion algorithm based on RBF neural network and its application in data mining., , , and . ICNC-FSKD, page 1592-1597. IEEE, (2017)SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection., , , , , , and . ISC, volume 14411 of Lecture Notes in Computer Science, page 59-78. Springer, (2023)Analyzing the Effectiveness of Adversary Modeling in Security Games., , , , and . AAAI, page 718-724. AAAI Press, (2013)DRSDetector: Detecting Gambling Websites by Multi-level Feature Fusion., , , and . ISCC, page 1441-1447. IEEE, (2023)Teamwork and Coordination under Model Uncertainty in DEC-POMDPs., , , , and . Interactive Decision Theory and Game Theory, volume WS-10-03 of AAAI Technical Report, AAAI, (2010)Enhanced Cognitive Training using Virtual Reality: Examining a Memory Task Modified for Use in Virtual Environments., , and . AIVR, page 1-8. ACM, (2021)Architecture Design of Hybrid Networking in Power Wireless Private Network., , , , , and . HP3C, page 135-139. ACM, (2020)Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach., , , and . IJCAI, page 404-410. IJCAI/AAAI, (2013)Andorra-I: A Parallel Prolog System that Transparently Exploits both And- and Or-Parallelism., , and . PPoPP, page 83-93. ACM, (1991)