Author of the publication

A Method for Deploying Distributed Denial of Service Attack Defense Strategies on Edge Servers Using Reinforcement Learning.

, , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure recharge scheme for blockchain payment channels., , , and . J. Inf. Secur. Appl., (November 2023)IRLM: Inductive Representation Learning Model for Personalized POI Recommendation., , , , , , , and . IEEE Trans. Comput. Soc. Syst., 10 (5): 2827-2836 (October 2023)Cleaning Uncertain Data With Crowdsourcing - A General Model With Diverse Accuracy Rates., , , , , , , , and . IEEE Trans. Knowl. Data Eng., 34 (8): 3629-3642 (2022)Where to: Crowd-Aided Path Selection by Selective Bayesian Network., , , , , and . IEEE Trans. Knowl. Data Eng., 35 (1): 1072-1087 (2023)Embedding High-Level Knowledge into DQNs to Learn Faster and More Safely., , , , , and . AAAI, page 13608-13609. AAAI Press, (2020)Efficient Dialog Policy Learning by Reasoning with Contextual Knowledge., , , , and . AAAI, page 11667-11675. AAAI Press, (2022)Integrating Automated Knowledge Extraction with Large Language Models for Explainable Medical Decision-Making., , , and . BIBM, page 1710-1717. IEEE, (2023)Self-Convinced Prompting: Few-Shot Question Answering with Repeated Introspection., , , , , and . CoRR, (2023)Faster and Safer Training by Embedding High-Level Knowledge into Deep Reinforcement Learning., , , , , and . CoRR, (2019)An enhanced N-point interpolation method to eliminate average precision distortion., , and . Pattern Recognit. Lett., (2022)