{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:58:51Z","timestamp":1775627931112,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00013","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"47-54","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Agent Behavior Cloning for Modeling Realistic Adversaries in Air Combat Simulations"],"prefix":"10.1109","author":[{"given":"Andreas","family":"Strand","sequence":"first","affiliation":[{"name":"FFI &#x2013; Norwegian Defence Research Establishment,Norway"}]},{"given":"Karsten","family":"Brathen","sequence":"additional","affiliation":[{"name":"FFI &#x2013; Norwegian Defence Research Establishment,Norway"}]},{"given":"Martin","family":"Asprusten","sequence":"additional","affiliation":[{"name":"FFI &#x2013; Norwegian Defence Research Establishment,Norway"}]},{"given":"Patrick","family":"Gorton","sequence":"additional","affiliation":[{"name":"FFI &#x2013; Norwegian Defence Research Establishment,Norway"}]}],"member":"263","reference":[{"key":"ref1","first-page":"200826","article-title":"Computer generated forces","author":"Dompke","year":"2003","journal-title":"NC3A, The Hague, The Netherlands, Tech. Rep"},{"key":"ref2","first-page":"2637","article-title":"Modeling CGF behavior with machine learning techniques: Requirements and future directions","volume-title":"I\/ITSEC","author":"Toubman","year":"2015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/aer.2022.8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tnn.1998.712192"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2022.3222143"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2010.2091955"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2024.3395626"},{"key":"ref8","first-page":"627","article-title":"A reduction of imitation learning and structured prediction to no-regret online learning","volume-title":"AISTATS","volume":"15","author":"Ross"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.31096\/wua9999-wp_0551_box_5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WSC60868.2023.10408232"},{"issue":"1","key":"ref12","first-page":"27","article-title":"Automated intelligent pilots for combat flight simulation","volume":"20","author":"Jones","year":"1999","journal-title":"AI Mag"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3563811"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3580279"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS51884.2021.9476700"},{"key":"ref16","first-page":"1861","article-title":"Soft actor-critic","volume-title":"ICML","volume":"80","author":"Haarnoja"},{"key":"ref17","article-title":"ACE program\u2019s AI agents transition from simulation to live flight","year":"2023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4172\/2167-0374.1000144"},{"issue":"75","key":"ref19","first-page":"12","article-title":"Not so grand challenge (NSGC)","author":"Perry","year":"2024","journal-title":"AFRL Fight\u2019s On!"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA58977.2023.00153"},{"key":"ref21","first-page":"06347","article-title":"Proximal policy optimization algorithms","volume":"1707","author":"Schulman","year":"2017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5220\/0011306600003274"},{"key":"ref23","first-page":"305","article-title":"ALVINN: An autonomous land vehicle in a neural network","volume-title":"NIPS","volume":"1","author":"Pomerleau"},{"key":"ref24","first-page":"10441","article-title":"Trainable automated forces","volume-title":"I\/ITSEC","author":"Abbott"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS54217.2022.9836131"},{"key":"ref26","article-title":"VBS4 product brochure","year":"2024"},{"key":"ref27","first-page":"1995","article-title":"Coordinated multi-agent imitation learning","volume-title":"ICML","volume":"70","author":"Le"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28929-8"},{"key":"ref29","first-page":"9876","article-title":"ROMA: Multi-agent reinforcement learning with emergent roles","volume-title":"ICML","volume":"119","author":"Wang"},{"issue":"32","key":"ref30","first-page":"1","article-title":"Heterogeneous-agent reinforcement learning","volume-title":"JMLR","volume":"25","author":"Zhong"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1561\/9781680834116"},{"key":"ref32","article-title":"On the efficiency of transfer learning in a fighter pilot behavior modelling context","volume-title":"Master\u2019s thesis, Dept. Math., KTH","author":"Sandstr\u00f6m","year":"2021"},{"key":"ref33","volume-title":"Deep learning","author":"Goodfellow","year":"2016"},{"issue":"10","key":"ref34","article-title":"VR-Forces capabilities","volume":"4","year":"2021","journal-title":"ST Engineering, Cambridge, MA, Tech. Rep"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2514\/6.2009-5699"},{"key":"ref36","article-title":"The FlightGear manual","author":"Basler","year":"2010"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.32565\/aarms.2021.2.4"},{"key":"ref38","volume-title":"Fighter combat","author":"Shaw","year":"1985"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2022.104096"},{"key":"ref40","first-page":"11972","article-title":"imitation: Clean imitation learning implementations","volume":"2211","author":"Gleave","year":"2022"},{"issue":"268","key":"ref41","first-page":"1","article-title":"Stable-baselines3","volume-title":"JMLR","volume":"22","author":"Raffin"},{"key":"ref42","article-title":"What matters for on-policy deep actor-critic methods?","volume-title":"ICLR","author":"Andrychowicz"},{"key":"ref43","article-title":"Adam: A method for stochastic optimization","volume-title":"ICLR","author":"Kingma"},{"key":"ref44","article-title":"Decoupled weight decay regularization","volume-title":"ICLR","author":"Loshchilov"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330701"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3567186"},{"key":"ref47","first-page":"2923","article-title":"Hierarchical imitation and reinforcement learning","volume-title":"ICML","volume":"80","author":"Le"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471344.pdf?arnumber=11471344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:19:19Z","timestamp":1775625559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471344\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00013","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}