ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics Authors: Víctor Mayoral-Vilches, Gelei Deng, Yi Liu, Martin Pinzger, Stefan Rass | Published: 2023-08-04 Q-Learningアルゴリズムペネトレーションテスト適用性機械学習手法 2023.08.04 2025.04.03 文献データベース
Adaptive Reward-Poisoning Attacks against Reinforcement Learning Authors: Xuezhou Zhang, Yuzhe Ma, Adish Singla, Xiaojin Zhu | Published: 2020-03-27 | Updated: 2020-06-22 Q-Learningアルゴリズムバックドア攻撃強化学習攻撃 2020.03.27 2025.04.03 文献データベース
Manipulating Reinforcement Learning: Poisoning Attacks on Cost Signals Authors: Yunhan Huang, Quanyan Zhu | Published: 2020-02-07 | Updated: 2020-07-20 Q-Learningアルゴリズム収束分析敵対的攻撃 2020.02.07 2025.04.03 文献データベース
Personalized and Private Peer-to-Peer Machine Learning Authors: Aurélien Bellet, Rachid Guerraoui, Mahsa Taziki, Marc Tommasi | Published: 2017-05-23 | Updated: 2018-02-19 Q-Learningアルゴリズムプライバシー保護メカニズム差分プライバシー 2017.05.23 2025.04.03 文献データベース