Sample-efficient multi-agent reinforcement learning with masked reconstruction
Deep reinforcement learning (DRL) is a powerful approach that combines reinforcement
learning (RL) and deep learning to address complex decision-making problems in high …
learning (RL) and deep learning to address complex decision-making problems in high …
Multi-agent reinforcement learning with approximate model learning for competitive games
We propose a method for learning multi-agent policies to compete against multiple
opponents. The method consists of recurrent neural network-based actor-critic networks and …
opponents. The method consists of recurrent neural network-based actor-critic networks and …
Agent-based modeling for distributed decision support in an IoT network
An increasing number of emerging applications, eg, Internet of Things (IoT), vehicular
communications, augmented reality, and the growing complexity due to the interoperability …
communications, augmented reality, and the growing complexity due to the interoperability …
Continuous patrolling in uncertain environment with the UAV swarm
X Zhou, W Wang, T Wang, X Li, T **g - PloS one, 2018 - journals.plos.org
The research about unmanned aerial vehicle (UAV) swarm has developed rapidly in recent
years, especially the UAV swarm with sensors which is becoming common means of …
years, especially the UAV swarm with sensors which is becoming common means of …
Semantic agent-based service middleware and simulation for smart cities
With the development of Machine-to-Machine (M2M) technology, a variety of embedded and
mobile devices is integrated to interact via the platform of the Internet of Things, especially in …
mobile devices is integrated to interact via the platform of the Internet of Things, especially in …
Fortified network security perception: A decentralized multiagent coordination perspective
M Liu, L Ma, C Li, R Li - 2020 IEEE 3rd International …, 2020 - ieeexplore.ieee.org
The essence of network security is the asymmetric online confrontation with the partial
observable cyber threats, which requires the defense ability against unexpected security …
observable cyber threats, which requires the defense ability against unexpected security …
Allocation algorithm of CPS communication resources based on cooperative game
J Zhao, Q Dong - Computer communications, 2020 - Elsevier
In order to improve the communication rate of the cyber–physical fusion system, and at the
same time guarantee the quality of system demand of each user, a CPS (Cyber–Physical …
same time guarantee the quality of system demand of each user, a CPS (Cyber–Physical …
Practical k-agents search algorithm towards information retrieval in complex networks
Spanking information retrieval in large-scale Web and network has attracted increasing
interest in the research community, many typical approaches have been recalled such as …
interest in the research community, many typical approaches have been recalled such as …
Agent-based modelling approach for distributed decision support in an iot network
An increasing number of emerging applications, eg, internet of things, vehicular
communications, augmented reality, and the growing complexity due to the interoperability …
communications, augmented reality, and the growing complexity due to the interoperability …
Semantical obstacle representation model for fast UAV path planning
Unmanned aerial vehicles (UAVs) path planning has received significant attention from both
military and academia domains, current researches are more focus on how to implement …
military and academia domains, current researches are more focus on how to implement …