Author of the publication

RL-Chord: CLSTM-Based Melody Harmonization Using Deep Reinforcement Learning

, , , and . IEEE Transactions on Neural Networks and Learning Systems, (2023)
DOI: 10.1109/TNNLS.2023.3248793

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Buffer Data-Driven Adaptation of Mobile Video Streaming Over Heterogeneous Wireless Networks., , , , and . IEEE Internet of Things Journal, 5 (5): 3430-3441 (2018)A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications., , , , , and . IEEE Internet Things J., 4 (5): 1125-1142 (2017)Toward Data Integrity Attacks Against Optimal Power Flow in Smart Grid., , , , , , and . IEEE Internet Things J., 4 (5): 1726-1738 (2017)A Survey on the Edge Computing for the Internet of Things., , , , , , and . IEEE Access, (2018)A novel multitype-users welfare equilibrium based real-time pricing in smart grid., , , , and . Future Gener. Comput. Syst., (2020)Construction of Online Platform Based on the Model of Honesty and Morality Education., , , and . eLEOT, volume 299 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 182-190. Springer, (2019)Latent Dirichlet Allocation Model Training with Differential Privacy., , , , , and . CoRR, (2020)MTT-Mobicast : Maneuvering Target Tracking Mobicast protocol for wireless ad hoc sensor networks., , , and . CIT, page 821-826. IEEE Computer Society, (2008)An Interference Avoidance Multipath Routing protocol based on greedy forwarding in MANETs., , , and . WCNIS, page 483-487. IEEE, (2010)BOR/AC: Bandwidth-aware opportunistic routing with admission control in wireless mesh networks., , , , and . INFOCOM, page 2701-2705. IEEE, (2012)