[1] |
Yi ZHOU, Hua GAO, Yongshen TIAN.
Proximal policy optimization algorithm based on clipping optimization and policy guidance
[J]. Journal of Computer Applications, 2024, 44(8): 2334-2341.
|
[2] |
Tian MA, Runtao XI, Jiahao LYU, Yijie ZENG, Jiayi YANG, Jiehui ZHANG.
Mobile robot 3D space path planning method based on deep reinforcement learning
[J]. Journal of Computer Applications, 2024, 44(7): 2055-2064.
|
[3] |
Rui TANG, Chuanlin PANG, Ruizhi ZHANG, Chuan LIU, Shibo YUE.
DDPG-based resource allocation in D2D communication-empowered cellular network
[J]. Journal of Computer Applications, 2024, 44(5): 1562-1569.
|
[4] |
Baoshan YANG, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU.
Analysis of consistency between sensitive behavior and privacy policy of Android applications
[J]. Journal of Computer Applications, 2024, 44(3): 788-796.
|
[5] |
Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI.
Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding
[J]. Journal of Computer Applications, 2024, 44(3): 811-818.
|
[6] |
Jiachen YU, Ye YANG.
Irregular object grasping by soft robotic arm based on clipped proximal policy optimization algorithm
[J]. Journal of Computer Applications, 2024, 44(11): 3629-3638.
|
[7] |
Yu WANG, Zhihui GUAN, Yuanpeng LI.
Distributed UAV cluster pursuit decision-making based on trajectory prediction and MADDPG
[J]. Journal of Computer Applications, 2024, 44(11): 3623-3628.
|
[8] |
Ziteng WANG, Yaxin YU, Zifang XIA, Jiaqi QIAO.
Sparse reward exploration mechanism fusing curiosity and policy distillation
[J]. Journal of Computer Applications, 2023, 43(7): 2082-2090.
|
[9] |
Zhengkai DING, Qiming FU, Jianping CHEN, You LU, Hongjie WU, Nengwei FANG, Bin XING.
Ultra-short-term photovoltaic power prediction by deep reinforcement learning based on attention mechanism
[J]. Journal of Computer Applications, 2023, 43(5): 1647-1654.
|
[10] |
Lin ZHAO, Ke LYU, Jing GUO, Chen HONG, Xiancai XIANG, Jian XUE, Yong WANG.
UAV cluster cooperative combat decision-making method based on deep reinforcement learning
[J]. Journal of Computer Applications, 2023, 43(11): 3641-3646.
|
[11] |
Qing TAN, Hui LI, Haolin WU, Zhuang WANG, Shuchao DENG.
Intrinsic curiosity method based on reward prediction error
[J]. Journal of Computer Applications, 2022, 42(6): 1822-1828.
|
[12] |
Shaobin DENG, Jun ZHU, Xiaofeng ZHOU, Shuai LI, Shurui LIU.
Industrial process control method based on local policy interaction exploration-based deep deterministic policy gradient
[J]. Journal of Computer Applications, 2022, 42(5): 1642-1648.
|
[13] |
Rong ZANG, Li WANG, Tengfei SHI.
Multi‑agent reinforcement learning based on attentional message sharing
[J]. Journal of Computer Applications, 2022, 42(11): 3346-3353.
|
[14] |
CHEN Jiahao, YIN Xinchun.
Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing
[J]. Journal of Computer Applications, 2021, 41(6): 1611-1620.
|
[15] |
GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan.
Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
|