From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Source location privacy against laptop-class attacks in sensor networks., , , , и . SecureComm, стр. 5. ACM, (2008)Learning-based Control of Unknown Linear Systems with Thompson Sampling., , и . CoRR, (2017)Probabilistic Cooperative Location Estimation in Wireless Networks., , , , , и . WCNC, стр. 1-6. IEEE, (2010)Learning Latent State Spaces for Planning through Reward Prediction., , , и . CoRR, (2019)Multi-level trajectory modeling for video copy detection., , , , , и . ICASSP, стр. 2378-2381. IEEE, (2010)Distributed cooperative location estimation (D-COOLEST) in wireless environments., , , , , и . ICT, стр. 872-878. IEEE, (2010)Boosted Exemplar Learning for human action recognition., , , , и . ICCV Workshops, стр. 538-545. IEEE Computer Society, (2009)Training a Resilient Q-network against Observational Interference., , , и . AAAI, стр. 8814-8822. AAAI Press, (2022)Enhanced Adversarial Strategically-Timed Attacks Against Deep Reinforcement Learning., , , , , , и . ICASSP, стр. 3407-3411. IEEE, (2020)Control of unknown linear systems with Thompson sampling., , и . Allerton, стр. 1198-1205. IEEE, (2017)