1. 9.3 Episodic Reinforcement Learning with Expanded State-reward Space
  2. 9.2 Safe Offline Reinforcement Learning with Feasibility-Guided Diffusion Model
  3. 9.0 Deep Reinforcement Learning Empowered Activity-Aware Dynamic Health Monitoring Systems
  4. 8.9 Cooperative Multi-Agent Graph Bandits: UCB Algorithm and Regret Analysis
  5. 8.8 Catastrophic Interference is Mitigated in Naturalistic Power-Law Learning Environments
  6. 8.7 Hierarchical Federated Learning in Multi-hop Cluster-Based VANETs
  7. 8.6 Contrastive Unlearning: A Contrastive Approach to Machine Unlearning
  8. 8.5 Learning Non-myopic Power Allocation in Constrained Scenarios
  9. 8.2 Hacking Predictors Means Hacking Cars: Using Sensitivity Analysis to Identify Trajectory Prediction Vulnerabilities for Autonomous Driving Security
  10. 8.0 Noise Contrastive Estimation-based Matching Framework for Low-resource Security Attack Pattern Recognition