Snooping Attacks on Deep Reinforcement Learning Authors: Matthew Inkawhich, Yiran Chen, Hai Li | Published: 2019-05-28 | Updated: 2020-01-15 Reinforcement Learning MethodTaxonomy of AttacksAdversarial Perturbation Techniques 2019.05.28 2025.05.28 Literature Database
Universal Successor Representations for Transfer Reinforcement Learning Authors: Chen Ma, Junfeng Wen, Yoshua Bengio | Published: 2018-04-11 Reinforcement Learning MethodKnowledge Transferability 2018.04.11 2025.05.28 Literature Database
Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning Authors: Hyrum S. Anderson, Anant Kharkar, Bobby Filar, David Evans, Phil Roth | Published: 2018-01-26 | Updated: 2018-01-30 Reinforcement Learning MethodAdversarial attackMachine Learning Method 2018.01.26 2025.05.28 Literature Database
IoT Security Techniques Based on Machine Learning Authors: Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu | Published: 2018-01-19 IoT SecurityReinforcement Learning MethodMachine Learning Technology 2018.01.19 2025.05.28 Literature Database