Author of the publication

Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security.

, , and . ACM Conference on Computer and Communications Security, page 1702. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Detection Using Cost-Sensitive Classification, , and . CoRR, (2008)Randomised Bayesian Least-Squares Policy Iteration., , and . CoRR, (2019)Nearly Optimal Exploration-Exploitation Decision Thresholds.. ICANN (1), volume 4131 of Lecture Notes in Computer Science, page 850-859. Springer, (2006)Cost-Minimising Strategies for Data Labelling: Optimal Stopping and Active Learning., and . FoIKS, volume 4932 of Lecture Notes in Computer Science, page 96-111. Springer, (2008)Differential Privacy for Bayesian Inference through Posterior Sampling., , , , and . J. Mach. Learn. Res., (2017)Complexity of Stochastic Branch and Bound Methods for Belief Tree Search in Bayesian Reinforcement Learning.. ICAART (1), page 259-264. INSTICC Press, (2010)Efficient Methods for Near-Optimal Sequential Decision Making under Uncertainty.. Interactive Collaborative Information Systems, volume 281 of Studies in Computational Intelligence, Springer, (2010)Predictive State Representations in Continuous Domains. (2004)VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things., , , , , , , , , and 4 other author(s). Pervasive Mob. Comput., (2018)Adaptive Belief Discretization for POMDP Planning., and . CoRR, (2021)