Adversarial Attacks on Reinforcement Learning based Energy Management Systems of Extended Range Electric Delivery Vehicles Authors: Pengyue Wang, Yan Li, Shashi Shekhar, William F. Northrop | Published: 2020-06-01 Energy ManagementAdversarial Attack DetectionDeep Reinforcement Learning 2020.06.01 2025.05.28 Literature Database
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning Authors: Inaam Ilahi, Muhammad Usama, Junaid Qadir, Muhammad Umar Janjua, Ala Al-Fuqaha, Dinh Thai Hoang, Dusit Niyato | Published: 2020-01-27 | Updated: 2021-09-08 Adversarial Attack DetectionFundamentals of Machine LearningDeep Reinforcement Learning 2020.01.27 2025.05.28 Literature Database
Massif: Interactive Interpretation of Adversarial Attacks on Deep Learning Authors: Nilaksh Das, Haekyu Park, Zijie J. Wang, Fred Hohman, Robert Firstman, Emily Rogers, Duen Horng Chau | Published: 2020-01-21 | Updated: 2020-02-16 Adversarial Attack DetectionDeep Reinforcement Learning 2020.01.21 2025.05.28 Literature Database
Pelican: A Deep Residual Network for Network Intrusion Detection Authors: Peilun Wu, Hui Guo, Nour Moustafa | Published: 2020-01-19 | Updated: 2020-05-08 Network Threat DetectionMachine Learning MethodDeep Reinforcement Learning 2020.01.19 2025.05.28 Literature Database
Pseudo Random Number Generation: a Reinforcement Learning approach Authors: Luca Pasqualini, Maurizio Parton | Published: 2019-12-15 Data GenerationReward Mechanism DesignDeep Reinforcement Learning 2019.12.15 2025.05.28 Literature Database
Verification of Neural Network Control Policy Under Persistent Adversarial Perturbation Authors: Yuh-Shyang Wang, Tsui-Wei Weng, Luca Daniel | Published: 2019-08-18 Robustness Improvement MethodAdversarial ExampleDeep Reinforcement Learning 2019.08.18 2025.05.28 Literature Database
Instance Enhancement Batch Normalization: an Adaptive Regulator of Batch Noise Authors: Senwei Liang, Zhongzhan Huang, Mingfu Liang, Haizhao Yang | Published: 2019-08-12 | Updated: 2019-09-18 Training MethodDeep Reinforcement LearningAdaptive Misuse Detection 2019.08.12 2025.05.28 Literature Database
Optimal Attacks on Reinforcement Learning Policies Authors: Alessio Russo, Alexandre Proutiere | Published: 2019-07-31 Privacy Enhancing TechnologyAdversarial TrainingDeep Reinforcement Learning 2019.07.31 2025.05.28 Literature Database
Characterizing Attacks on Deep Reinforcement Learning Authors: Xinlei Pan, Chaowei Xiao, Warren He, Shuang Yang, Jian Peng, Mingjie Sun, Jinfeng Yi, Zijiang Yang, Mingyan Liu, Bo Li, Dawn Song | Published: 2019-07-21 | Updated: 2022-02-16 Adversarial Attack DetectionDeep Reinforcement LearningPhysical attack 2019.07.21 2025.05.28 Literature Database
Deep Reinforcement Learning for Cyber Security Authors: Thanh Thi Nguyen, Vijay Janapa Reddi | Published: 2019-06-13 | Updated: 2021-11-02 Automation of CybersecurityDeep Reinforcement LearningDefense Method 2019.06.13 2025.05.28 Literature Database