Author of the publication

Guest Editors' Introduction: Special Section on Learning, Games, and Security.

, , and . IEEE Trans. Dependable Secur. Comput., 9 (4): 449-450 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nearly Optimal Exploration-Exploitation Decision Thresholds.. ICANN (1), volume 4131 of Lecture Notes in Computer Science, page 850-859. Springer, (2006)Randomised Bayesian Least-Squares Policy Iteration., , and . CoRR, (2019)Cost-Minimising Strategies for Data Labelling: Optimal Stopping and Active Learning., and . FoIKS, volume 4932 of Lecture Notes in Computer Science, page 96-111. Springer, (2008)Intrusion Detection Using Cost-Sensitive Classification, , and . CoRR, (2008)Complexity of Stochastic Branch and Bound Methods for Belief Tree Search in Bayesian Reinforcement Learning.. ICAART (1), page 259-264. INSTICC Press, (2010)Efficient Methods for Near-Optimal Sequential Decision Making under Uncertainty.. Interactive Collaborative Information Systems, volume 281 of Studies in Computational Intelligence, Springer, (2010)Predictive State Representations in Continuous Domains. (2004)Differential Privacy for Bayesian Inference through Posterior Sampling., , , , and . J. Mach. Learn. Res., (2017)VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things., , , , , , , , , and 4 other author(s). Pervasive Mob. Comput., (2018)Decision Making Under Uncertainty and Reinforcement Learning - Theory and Algorithms, and . Intelligent Systems Reference Library Springer, (2022)