Author of the publication

Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation.

, , , , , , , , , and . IEEE Trans. Green Commun. Netw., 6 (3): 1448-1458 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation., , , , , , , , , and . IEEE Trans. Green Commun. Netw., 6 (3): 1448-1458 (2022)Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence., , , , , , , and . Secur. Commun. Networks, (2020)Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure., , , , , , , and . Secur. Commun. Networks, (2021)Robust Reinforcement Learning via Progressive Task Sequence., , , , and . IJCAI, page 455-463. ijcai.org, (2023)Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks., , , , , , , and . ISSREW, page 214-221. IEEE, (2023)Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory., , , , , , , , and . SRDS, page 299-309. IEEE, (2021)Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples., , , , , , , and . ICPADS, page 430-437. IEEE, (2020)A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning., , , , and . J. Circuits Syst. Comput., 30 (13): 2150229:1-2150229:21 (2021)A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things., , , , , , and . IEEE Trans. Green Commun. Netw., 5 (2): 645-657 (2021)Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack., , , , , , , and . Inscrypt, volume 12612 of Lecture Notes in Computer Science, page 37-52. Springer, (2020)