Reinforcement Learning Method

Snooping Attacks on Deep Reinforcement Learning

Authors: Matthew Inkawhich, Yiran Chen, Hai Li | Published: 2019-05-28 | Updated: 2020-01-15
Reinforcement Learning Method
Taxonomy of Attacks
Adversarial Perturbation Techniques

Universal Successor Representations for Transfer Reinforcement Learning

Authors: Chen Ma, Junfeng Wen, Yoshua Bengio | Published: 2018-04-11
Reinforcement Learning Method
Knowledge Transferability

Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning

Authors: Hyrum S. Anderson, Anant Kharkar, Bobby Filar, David Evans, Phil Roth | Published: 2018-01-26 | Updated: 2018-01-30
Reinforcement Learning Method
Adversarial attack
Machine Learning Method

IoT Security Techniques Based on Machine Learning

Authors: Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu | Published: 2018-01-19
IoT Security
Reinforcement Learning Method
Machine Learning Technology