Author of the publication

Exploring unknown environments: motivated developmental learning for autonomous navigation of mobile robots.

, , and . Intell. Serv. Robotics, 17 (2): 197-219 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks., , , and . Inf. Sci., (2022)Modeling the Travel Mode Choice for Outpatient Trips Before and After Bike-Sharing in Beijing., , , , , and . ITSC, page 242-247. IEEE, (2018)Spatial-Temporal Correlation Prediction Modeling of Origin-Destination Passenger Flow Under Urban Rail Transit Emergency Conditions., , , , , and . IEEE Access, (2019)A heterogeneous user authentication and key establishment for mobile client-server environment., , , , and . Wireless Networks, 26 (2): 913-924 (2020)DOBC Based Fully Probability Design for Stochastic System With the Multiplicative Noise., and . IEEE Access, (2020)MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks., , , and . CoRR, (2023)Toward Early and Accurate Network Intrusion Detection Using Graph Embedding., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Cryptographic Reverse Firewalls for Identity-Based Encryption., , , and . FCS, volume 1105 of Communications in Computer and Information Science, page 36-52. Springer, (2019)Secure and Achievable Heterogeneous Access Control Scheme for Wireless Body Area Networks., and . FCS, volume 879 of Communications in Computer and Information Science, page 190-198. Springer, (2018)Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph., , , and . CSSE, page 1-9. ACM, (2020)