Author of the publication

Damage detection using in-domain and cross-domain transfer learning.

, , and . Neural Comput. Appl., 33 (24): 16921-16936 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Damage detection using in-domain and cross-domain transfer learning., , and . CoRR, (2021)Operator Selection in Adaptive Large Neighborhood Search using Deep Reinforcement Learning., , , and . CoRR, (2022)Learning to Adapt Genetic Algorithms for Multi-Objective Flexible Job Shop Scheduling Problems., , , and . GECCO Companion, page 315-318. ACM, (2023)A Maintenance Planning Framework using Online and Offline Deep Reinforcement Learning., , and . CoRR, (2022)SOA and EDA: A Comparative Study - Similarities, Differences and Conceptual Guidelines on their Usage., , and . ICE-B, page 213-220. SciTePress, (2015)Grouping of Maintenance Actions with Deep Reinforcement Learning and Graph Convolutional Networks., , , and . ICAART (2), page 574-585. SCITEPRESS, (2022)ProcessTransformer: Predictive Business Process Monitoring with Transformer Network., , and . CoRR, (2021)Predictive Maintenance for Infrastructure Asset Management., and . IT Prof., 22 (5): 40-45 (2020)On Out-of-Distribution Detection for Audio with Deep Nearest Neighbors., and . ICASSP, page 1-5. IEEE, (2023)How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements., , , and . ICETE (Selected Papers), volume 990 of Communications in Computer and Information Science, page 81-103. Springer, (2017)