Author of the publication

Policy Gradient Adaptive Dynamic Programming for Data-Based Optimal Control.

, , , , and . IEEE Trans. Cybern., 47 (10): 3341-3354 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unified Subspace Fitting Framework and Its Performance Analysis for Direct Position Determination in the Presence of Multipath Propagation., , , , and . IEEE Access, (2019)Zipf's Law in Passwords., , and . IACR Cryptology ePrint Archive, (2014)On the Security of an Improved Password Authentication Scheme Based on ECC., and . IACR Cryptology ePrint Archive, (2012)Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards., and . ISC, volume 7807 of Lecture Notes in Computer Science, page 221-237. Springer, (2013)Optimal Task and Energy Scheduling in Dynamic Residential Scenarios., , , , , , and . ISNN (1), volume 7367 of Lecture Notes in Computer Science, page 650-658. Springer, (2012)CSIID: WiFi-based Human Identification via Deep Learning., , , and . ICCSE, page 326-330. IEEE, (2019)Cookie-Proxy: A Scheme to Prevent SSLStrip Attack., , , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 365-372. Springer, (2012)The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing., and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 456-477. Springer, (2015)On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions., and . Comput. Networks, (2014)Evolutionary Game Analysis of Pollutant Abatement with Collective-Risk., , and . IEEM, page 6-13. IEEE, (2019)