Follow
Stephen Adams
Stephen Adams
Research Associate Professor, Virginia Tech
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
Deep learning detecting fraud in credit card transactions
A Roy, J Sun, R Mahoney, L Alonzi, S Adams, P Beling
2018 systems and information engineering design symposium (SIEDS), 129-134, 2018
2942018
Horse race analysis in credit card fraud—deep learning, logistic regression, and Gradient Boosted Tree
G Rushin, C Stancil, M Sun, S Adams, P Beling
2017 systems and information engineering design symposium (SIEDS), 117-121, 2017
1042017
Value-Decomposition Multi-Agent Actor-Critics
J Su, S Adams, P Beling
Proceedings of the AAAI Conference on Artificial Intelligence 35 (13), 11352 …, 2021
962021
Adversarial learning in credit card fraud detection
MF Zeager, A Sridhar, N Fogal, S Adams, DE Brown, PA Beling
2017 Systems and Information Engineering Design Symposium (SIEDS), 112-116, 2017
732017
A survey of inverse reinforcement learning
S Adams, T Cody, PA Beling
Artificial Intelligence Review 55 (6), 4307-4346, 2022
622022
Feature selection for hidden Markov models and hidden semi-Markov models
S Adams, PA Beling, R Cogill
IEEE Access 4, 1642-1657, 2016
602016
A survey of feature selection methods for Gaussian mixture models and hidden Markov models
S Adams, PA Beling
Artificial Intelligence Review 52, 1739-1779, 2019
552019
Deep multi-agent reinforcement learning for multi-level preventive maintenance in manufacturing systems
J Su, J Huang, S Adams, Q Chang, PA Beling
Expert Systems with Applications 192, 116323, 2022
512022
Multi-agent inverse reinforcement learning for certain general-sum stochastic games
X Lin, SC Adams, PA Beling
Journal of Artificial Intelligence Research 66, 473-502, 2019
432019
Selecting system specific cybersecurity attack patterns using topic modeling
S Adams, B Carter, C Fleming, PA Beling
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
352018
A preliminary design-phase security methodology for cyber–physical systems
B Carter, S Adams, G Bakirtzis, T Sherburne, P Beling, B Horowitz, ...
Systems 7 (2), 21, 2019
312019
An ontological metamodel for cyber-physical system safety, security, and resilience coengineering
G Bakirtzis, T Sherburne, S Adams, BM Horowitz, PA Beling, CH Fleming
Software and Systems Modeling 21 (1), 113-137, 2022
302022
Deep reinforcement learning with uncertain data for real-time stormwater system control and flood mitigation
SM Saliba, BD Bowes, S Adams, PA Beling, JL Goodall
Water 12 (11), 3222, 2020
272020
The WEAR methodology for prognostics and health management implementation in manufacturing
S Adams, M Malinowski, G Heddy, B Choo, PA Beling
Journal of Manufacturing Systems 45, 82-96, 2017
272017
Privacy preserving distributed deep learning and its application in credit card fraud detection
Y Wang, S Adams, P Beling, S Greenspan, S Rajagopalan, ...
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
252018
Counterfactual multi-agent reinforcement learning with graph convolution communication
J Su, S Adams, PA Beling
arXiv preprint arXiv:2004.00470, 2020
242020
Social anxiety and dynamic social reinforcement learning in a volatile environment
ML Beltzer, S Adams, PA Beling, BA Teachman
Clinical Psychological Science 7 (6), 1372-1388, 2019
232019
Adaptive Multiscale Prognostics and Health Management for Smart Manufacturing Systems
B Choo, S Adams, J Marvel, BA Weiss, PA Beling
International Journal of Prognostics and Health Management 7 (Special Issue …, 2016
232016
Comparison of Feature Selection and Feature Extraction Techniques for Condition Monitoring of a Hydraulic Actuator
S Adams, R Meekins, PA Beling, K Farinholt, N Brown, S Polter, Q Dong
Annual Conference of the Prognostics and Health Management Society 2017, 2017
222017
Condition Based Monitoring for a Hydraulic Actuator
S Adams, PA Beling, K Farinholt, N Brown, S Polter, Q Dong
Annual Conference of the Prognostics and Health Management Society 2016, 2016
222016
The system can't perform the operation now. Try again later.
Articles 1–20