Game Theory and Multi-Agent Systems to Detect and Respond to Cyber Intrusions in IoT Environments Charles Hutchins
Efficient agent training from Human Preferences and Justifications in safety-critical environments Ilias Kazantzidis
Secure Computing Systems Based on the Stochasticity of RRAM (memristor-based memories) Callum Aitchison
Machine-Learning based Hierarchical Modulation based Cooperative Non-Orthogonal Multiple Access Harry Horler