{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T20:17:06Z","timestamp":1767212226696,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/snpd.2017.8022767","type":"proceedings-article","created":{"date-parts":[[2017,8,31]],"date-time":"2017-08-31T20:39:37Z","timestamp":1504211977000},"page":"489-494","source":"Crossref","is-referenced-by-count":9,"title":["Developing game AI agent behaving like human by mixing reinforcement learning and supervised learning"],"prefix":"10.1109","author":[{"given":"Shohei","family":"Miyashita","sequence":"first","affiliation":[]},{"given":"Xinyu","family":"Lian","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Takashi","family":"Matsubara","sequence":"additional","affiliation":[]},{"given":"Kuniaki","family":"Uehara","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/TCIAIG.2013.2275162","article-title":"Passing a hide-and-seek third-person turing test","volume":"6","author":"andrew","year":"2014","journal-title":"IEEE Transactions on Computational Intelligence and AI in Games"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1613\/jair.1190","article-title":"Potential-based shaping and q-value initialization are equivalent","volume":"19","author":"wiewiora","year":"2003","journal-title":"J Artif Intell Res (JAIR)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1448"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02490-0_92"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"volodymyr","year":"2015","journal-title":"Nature"},{"key":"ref16","first-page":"1106","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Proceedings of Advances in Neural Information Processing Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.223"},{"journal-title":"Machine Learning","first-page":"293","year":"1992","key":"ref18"},{"key":"ref19","first-page":"315","article-title":"Deep sparse rectifier neural networks","volume":"15","author":"glorot","year":"2011","journal-title":"Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics (AISTATS-11)"},{"key":"ref4","article-title":"A game AI approach to autonomous control of virtual characters","author":"kevin","year":"2011","journal-title":"Interservice\/Industry Training Simulation and Education Conference (I\/ITSEC)"},{"journal-title":"Programming Game AI by Example","year":"2005","author":"buckland","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2212908.2212954"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4018\/jgcms.2012040103"},{"key":"ref8","article-title":"The game imitation: A portable deep learning model for modern gaming AI","author":"chen","year":"2016","journal-title":"Technical Report Stanford University"},{"journal-title":"Reinforcement Learning","year":"1998","author":"sutton","key":"ref7"},{"key":"ref2","article-title":"Creating human-like autonomous players in real-time first person shooter computer games","author":"wang","year":"2009","journal-title":"Technical Report Nanyang Technological University"},{"key":"ref1","first-page":"15","article-title":"Human-level ai's killer application: Interactive computer games","volume":"22","author":"laird","year":"2001","journal-title":"AI Magazine"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1093\/mind\/LIX.236.433"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459469"},{"key":"ref21","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"ArXiv"}],"event":{"name":"2017 18th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","start":{"date-parts":[[2017,6,26]]},"location":"Kanazawa, Japan","end":{"date-parts":[[2017,6,28]]}},"container-title":["2017 18th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013514\/8022642\/08022767.pdf?arnumber=8022767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T00:47:53Z","timestamp":1570063673000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8022767\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/snpd.2017.8022767","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}