Author of the publication

Cooperative attack-defense evolution of large-scale agents: a multi-population high-dimensional mean-field game approach.

, , , and . GECCO Companion, page 89-92. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Full Verifiability for Outsourced Decryption in Attribute Based Encryption., , , and . IEEE Trans. Serv. Comput., 13 (3): 478-487 (2020)Cooperative Source and Channel Coding for Wireless Video Transmission., , and . ICIP, page 713-716. IEEE, (2006)Degrees of freedom region of the MIMO two-transmit, two-receive network with General message sets., and . ISIT, page 1064-1068. IEEE, (2015)A decentralized and personalized spam filter based on social computing., , , and . IWCMC, page 887-894. IEEE, (2014)Coding of Motion Compensation Residuals Using Edge Information., and . ICIP (1), page 89-93. IEEE, (1999)Saliency based objective quality assessment of decoded video affected by packet losses., , , and . ICIP, page 2560-2563. IEEE, (2008)Fast CU partition decision using machine learning for screen content compression., , and . ICIP, page 4972-4976. IEEE, (2015)The Improvement of the Trustworthiness of Android App Stores in China., , , , and . APSEC, page 357-360. IEEE Computer Society, (2016)A perceptual video quality model for mobile platform considering impact of spatial, temporal, and amplitude resolutions., , , and . IVMSP, page 117-122. IEEE, (2011)Green media: the future of wireless multimedia networks Guest Editorial., , , , , , and . IEEE Wirel. Commun., 21 (4): 10-12 (2014)