Author of the publication

Multi-objective reinforcement learning framework for dynamic flexible job shop scheduling problem with uncertain events.

, , , , , and . Appl. Soft Comput., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new general algebraic method with symbolic computation to construct new exact analytical solution for a (2?+?1)-dimensional cubic nonlinear Schrödinger equation, , and . Chaos, Solitons & Fractals, 32 (3): 1101--1107 (May 2007)Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning., , , , , , and . WISEC, page 1-11. ACM, (2018)Bayesian Receiver Design for Grant-Free NOMA with Message Passing Based Structured Signal Estimation., , , , , and . CoRR, (2020)Dynamic Water Quality Changes in the Main Stream of the Yangtze River from Multi-Source Remote Sensing Data., , and . Remote. Sens., 15 (10): 2526 (2023)Analysis of an k-out-of-n: G system with redundant dependency and repair equipment procurement., , , and . J. Control. Decis., 8 (4): 403-414 (2021)Attention Based Fully Convolutional Network for Speech Emotion Recognition., , , , and . APSIPA, page 1771-1775. IEEE, (2018)MagikCube: Securing Cross-Domain Publish/Subscribe Systems with Enclave., , , and . TrustCom, page 147-154. IEEE, (2021)Scalable Access Control Scheme of Internet of Things Based on Blockchain., and . EUSPN/ICTH, volume 198 of Procedia Computer Science, page 448-453. Elsevier, (2021)Automated Detection of Password Leakage from Public GitHub Repositories., , , and . ICSE, page 175-186. ACM, (2022)Handwritten Chinese Character Generation via Embedding, Decomposition and Discrimination., , and . IJCNN, page 1-7. IEEE, (2023)