In order to characterize complex higher-order interactions among variabl...
While ensuring stability for linear systems is well understood, it remai...
In this paper, we trialled different methods of data preparation for
Con...
Autonomous cyber and cyber-physical systems need to perform decision-mak...
The inputs and preferences of human users are important considerations i...
Multi-agent Markov Decision Processes (MMDPs) arise in a variety of
appl...
A cyber-physical system (CPS) is expected to be resilient to more than o...
This paper studies the synthesis of control policies for an agent that h...
Advanced Persistent Threats (APTs) are stealthy customized attacks by
in...
Reinforcement learning has been successful in training autonomous agents...
This paper studies the satisfaction of a class of temporal properties fo...
This paper augments the reward received by a reinforcement learning agen...
Increasingly large trip demands have strained urban transportation capac...
This paper studies the synthesis of control policies for an agent that h...
Advanced Persistent Threats (APTs) infiltrate cyber systems and compromi...
Cyber-physical systems are conducting increasingly complex tasks, which ...
This paper presents a new masquerade attack called the cloaking attack a...
Due to the growth of video data on Internet, automatic video analysis ha...
In this paper we use group, action and orbit to understand how evolution...
Schemata theory, Markov chains, and statistical mechanics have been used...
Portfolio managers are typically constrained by turnover limits, minimum...