Reinforcement Learning Algorithm

MERLIN — Malware Evasion with Reinforcement LearnINg

Authors: Tony Quertier, Benjamin Marais, Stéphane Morucci, Bertrand Fournel | Published: 2022-03-24 | Updated: 2022-03-30
Privacy Protection
Reinforcement Learning Algorithm
Defense Method

Privacy-Preserving Reinforcement Learning Beyond Expectation

Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran | Published: 2022-03-18
Privacy Assessment
Risk Assessment Method
Reinforcement Learning Algorithm

Vulnerability-Aware Poisoning Mechanism for Online RL with Unknown Dynamics

Authors: Yanchao Sun, Da Huo, Furong Huang | Published: 2020-09-02 | Updated: 2022-02-15
Reinforcement Learning Algorithm
Adversarial attack
Optimization Strategy

On $\ell_p$-norm Robustness of Ensemble Stumps and Trees

Authors: Yihan Wang, Huan Zhang, Hongge Chen, Duane Boning, Cho-Jui Hsieh | Published: 2020-08-20 | Updated: 2020-09-29
Robustness Verification Method
Reinforcement Learning Algorithm
Computational Complexity

Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy

Authors: Xinghua Qu, Zhu Sun, Yew-Soon Ong, Abhishek Gupta, Pengfei Wei | Published: 2019-11-10 | Updated: 2020-10-29
Reinforcement Learning Algorithm
Reinforcement Learning Attack
Adversarial attack

Node Injection Attacks on Graphs via Reinforcement Learning

Authors: Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, Vasant Honavar | Published: 2019-09-14
Node Injection Attack
Poisoning
Reinforcement Learning Algorithm

Deep Reinforcement Learning for Detecting Malicious Websites

Authors: Moitrayee Chatterjee, Akbar Siami Namin | Published: 2019-05-22
Phishing
Poisoning
Reinforcement Learning Algorithm

Resilient Monotone Sequential Maximization

Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16
Resource Consumption Analysis
Reinforcement Learning Algorithm
Machine Learning Method

Models and Framework for Adversarial Attacks on Complex Adaptive Systems

Authors: Vahid Behzadan, Arslan Munir | Published: 2017-09-13
Reinforcement Learning Algorithm
Attack Detection
Vulnerability Analysis