Skip to main content
. 2021 Nov 23;21(23):7793. doi: 10.3390/s21237793

Figure 4.

Figure 4

The user authentication: Transfer Learning for Reinforcement learning.