1 |
孟光磊, 周铭哲, 朴海音, 等. 基于协同战术识别的双机编队威胁评估方法[J]. 系统工程与电子技术, 2020, 42(10): 2285-2293.
|
|
MENG Guanglei, ZHOU Mingzhe, PIAO Haiyin, et al. Threat Assessment Method of Dual-Aircraft Formation Based on Cooperative Tactical Recognition[J]. Systems Engineering and Electronics, 2020, 42(10): 2285-2293.
|
2 |
STEINBERG A N, BOWMAN C L. Rethinking the JDL Data Fusion Levels[J]. Nssdf Jhapl, 2004, 38: 39.
|
3 |
LLINAS J, BOWMAN C, ROGOVA G, et al. Revisiting the JDL Data Fusion Model II[R]. [S.l.]: Space and Naval Warfare Systems Command San Diego Ca, 2004.
|
4 |
STEINBERG A N, BOWMAN C L, WHITE F E. Revisions to the JDL DATA FUSION MODEL[C]∥Proceedings Volume 3719, Sensor Fusion: Architectures, Algorithms, and Applications III. Bellingham, WA, USA: SPIE, 1999: 430-441.
|
5 |
STEINBERG A N, BOWMAN C L. Revisions to the JDL Data Fusion Model[C]∥LIGGINS M E, HALL D L, LLINAS J. Handbook of Multisensor Data Fusion: Theory and Practice. 2nd ed. Boca Raton: CRC Press, 2009: 65-88.
|
6 |
OKELLO N, THORNS G. Threat Assessment Using Bayesian Networks[C]∥Sixth International Conference of Information Fusion, 2003. Proceedings of the. Piscataway, NJ, USA: IEEE, 2003: 1102-1109.
|
7 |
STOVER J A, HALL D L, GIBSON R E. A Fuzzy-Logic Architecture for Autonomous Multisensor Data Fusion[J]. IEEE Transactions on Industrial Electronics, 1996, 43(3): 403-410.
|
8 |
QU Changwen, HE You. A Method of Threat Assessment Using Multiple Attribute Decision Making[C]∥6th International Conference on Signal Processing, 2002. Piscataway, NJ, USA: IEEE, 2002: 1091-1095.
|
9 |
LOONEY C G, LIANG L R. Cognitive Situation and Threat Assessments of Ground Battlespaces[J]. Information Fusion, 2003, 4(4): 297-308.
|
10 |
GONSALVES P, CUNNINGHAM R, TON N, et al. Intelligent Threat Assessment Processor (ITAP) Using Genetic Algorithms and Fuzzy Logic[C]∥Proceedings of the Third International Conference on Information Fusion. Piscataway, NJ, USA: IEEE, 2000: THB 1/18 -THB 1/24.
|
11 |
GONSALVES P G, BURGE J E, HARPER K A. Architecture for Genetic Algorithm-Based Threat Assessment[C]∥Sixth International Conference of Information Fusion, 2003. Proceedings of the Piscataway, NJ, USA: IEEE, 2003: 965-971.
|
12 |
Szepesvári C. Algorithms for Reinforcement Learning[C]∥BRACHMAN R, ROSSI F, STONE P. Synthesis Lectures on Artificial Intelligence and Machine Learning. Cham: Springer Cham, 2010: 1-103.
|
13 |
SUTTON R S, BARTO A G. Reinforcement Learning: an Introduction[M]. 2nd ed. Cambridge: The MIT Press, 2018.
|
14 |
KUMAR A, ZHOU A, TUCKER G, et al. Conservative Q-Learning for Offline Reinforcement Learning[C]∥Proceedings of the 34th International Conference on Neural Information Processing Systems. Red Hook, NY, USA: Curran Associates Inc., 2020: 1179-1191.
|
15 |
BOTVINICK M, RITTER S, WANG J X, et al. Reinforcement Learning, Fast and Slow[J]. Trends in Cognitive Sciences, 2019, 23(5): 408-422.
|
16 |
DULAC-ARNOLD G, LEVINE N, MANKOWITZ D J, et al. Challenges of Real-World Reinforcement Learning: Definitions, Benchmarks and Analysis[J]. Machine Learning, 2021, 110(9): 2419-2468.
|
17 |
VAN HASSELT H, GUEZ A, SILVER D. Deep Reinforcement Learning with Double Q-Learning[C]∥Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence. Palo Alto, CA, USA: AAAI Press, 2016: 2094-2100.
|
18 |
ZHANG Qiang, HU Junhua, FENG Jinfu, et al. Air Multi-target Threat Assessment Method Based on Improved GGIFSS[J]. Journal of Intelligent & Fuzzy Systems, 2019, 36(5): 4127-4139.
|
19 |
ZHU Chonghao, ZHANG Ananjing, LIU Yang, et al. Comparison of GA-BP and PSO-BP Neural Network Models with Initial BP Model for Rainfall-Induced Landslides Risk Assessment in Regional Scale: A Case Study in Sichuan, China[J]. Natural Hazards, 2020, 100(1): 173-204.
|