Author of the publication

An Information Fusion Approach to Intelligent Traffic Signal Control Using the Joint Methods of Multiagent Reinforcement Learning and Artificial Intelligence of Things.

, , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (7): 9335-9345 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Reducing Implicit Privacy Disclosure in Spatial-Temporal Big Data Publishing., , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1112-1117. IEEE, (2018)Full Recognition of Massive Products Based on Property Set., , , and . BigData Congress, page 294-301. IEEE Computer Society, (2013)Predicting Short-Term Electricity Demand by Combining the Advantages of ARMA and XGBoost in Fog Computing Environment., , , and . Wirel. Commun. Mob. Comput., (2018)Research on Primary Frequency Regulation Control Strategy of Wind-thermal Power Coordination., , , , , , and . IEEE Access, (2019)ViCrypt to the Rescue: Real-time, Machine-Learning-driven Video-QoE Monitoring for Encrypted Streaming Traffic, , , , and . IEEE Transactions on Network and Service Management, 17 (4): 2007 - 2023 (December 2020)Features that Matter: Feature Selection for On-line Stalling Prediction in Encrypted Video Streaming, , , , and . 2nd International Workshop on Network Intelligence (NI), Paris, France, (April 2019)Pretraining Chinese BERT for Detecting Word Insertion and Deletion Errors., , , , , , and . CoRR, (2022)ViCrypt to the Rescue: Real-Time, Machine-Learning-Driven Video-QoE Monitoring for Encrypted Streaming Traffic., , , , and . IEEE Trans. Netw. Serv. Manag., 17 (4): 2007-2023 (2020)Routing in optical transport networks with deep reinforcement learning., , , , , , and . JOCN, 11 (11): 547-558 (2019)KG2Code: Correct Code Examples Mining Service Based on Knowledge Graph for Fixing API Misuses., , , , and . ICSOC, volume 13121 of Lecture Notes in Computer Science, page 875-882. Springer, (2021)