MERLIN — Malware Evasion with Reinforcement LearnINg Authors: Tony Quertier, Benjamin Marais, Stéphane Morucci, Bertrand Fournel | Published: 2022-03-24 | Updated: 2022-03-30 Privacy ProtectionReinforcement Learning AlgorithmDefense Method 2022.03.24 2025.05.28 Literature Database
Privacy-Preserving Reinforcement Learning Beyond Expectation Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran | Published: 2022-03-18 Privacy AssessmentRisk Assessment MethodReinforcement Learning Algorithm 2022.03.18 2025.05.28 Literature Database
Vulnerability-Aware Poisoning Mechanism for Online RL with Unknown Dynamics Authors: Yanchao Sun, Da Huo, Furong Huang | Published: 2020-09-02 | Updated: 2022-02-15 Reinforcement Learning AlgorithmAdversarial attackOptimization Strategy 2020.09.02 2025.05.28 Literature Database
On $\ell_p$-norm Robustness of Ensemble Stumps and Trees Authors: Yihan Wang, Huan Zhang, Hongge Chen, Duane Boning, Cho-Jui Hsieh | Published: 2020-08-20 | Updated: 2020-09-29 Robustness Verification MethodReinforcement Learning AlgorithmComputational Complexity 2020.08.20 2025.05.28 Literature Database
Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy Authors: Xinghua Qu, Zhu Sun, Yew-Soon Ong, Abhishek Gupta, Pengfei Wei | Published: 2019-11-10 | Updated: 2020-10-29 Reinforcement Learning AlgorithmReinforcement Learning AttackAdversarial attack 2019.11.10 2025.05.28 Literature Database
Node Injection Attacks on Graphs via Reinforcement Learning Authors: Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, Vasant Honavar | Published: 2019-09-14 Node Injection AttackPoisoningReinforcement Learning Algorithm 2019.09.14 2025.05.28 Literature Database
Deep Reinforcement Learning for Detecting Malicious Websites Authors: Moitrayee Chatterjee, Akbar Siami Namin | Published: 2019-05-22 PhishingPoisoningReinforcement Learning Algorithm 2019.05.22 2025.05.28 Literature Database
Resilient Monotone Sequential Maximization Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16 Resource Consumption AnalysisReinforcement Learning AlgorithmMachine Learning Method 2018.03.21 2025.05.28 Literature Database
Models and Framework for Adversarial Attacks on Complex Adaptive Systems Authors: Vahid Behzadan, Arslan Munir | Published: 2017-09-13 Reinforcement Learning AlgorithmAttack DetectionVulnerability Analysis 2017.09.13 2025.05.28 Literature Database