暂无分享,去创建一个
Nurali Virani | Naresh Iyer | Johan Reimann | Zhaoyuan Yang | Nurali Virani | N. Iyer | Johan Reimann | Zhaoyuan Yang
[1] Ming-Yu Liu,et al. Tactics of Adversarial Attack on Deep Reinforcement Learning Agents , 2017, IJCAI.
[2] Jeffrey L. Elman,et al. Finding Structure in Time , 1990, Cogn. Sci..
[3] Wen-Chuan Lee,et al. Trojaning Attack on Neural Networks , 2018, NDSS.
[4] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[5] Bram Bakker,et al. Reinforcement Learning with Long Short-Term Memory , 2001, NIPS.
[6] Tom Schaul,et al. Reinforcement Learning with Unsupervised Auxiliary Tasks , 2016, ICLR.
[7] Guillaume Lample,et al. Playing FPS Games with Deep Reinforcement Learning , 2016, AAAI.
[8] Brendan Dolan-Gavitt,et al. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain , 2017, ArXiv.
[9] Dawn Xiaodong Song,et al. Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning , 2017, ArXiv.
[10] Jürgen Schmidhuber,et al. Learning Precise Timing with LSTM Recurrent Networks , 2003, J. Mach. Learn. Res..
[11] Razvan Pascanu,et al. Overcoming catastrophic forgetting in neural networks , 2016, Proceedings of the National Academy of Sciences.
[12] Sandy H. Huang,et al. Adversarial Attacks on Neural Network Policies , 2017, ICLR.
[13] Ankur Srivastava,et al. Neural Trojans , 2017, 2017 IEEE International Conference on Computer Design (ICCD).
[14] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[15] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[16] Peter Stone,et al. Deep Recurrent Q-Learning for Partially Observable MDPs , 2015, AAAI Fall Symposia.
[17] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[18] Alex Graves,et al. Asynchronous Methods for Deep Reinforcement Learning , 2016, ICML.
[19] Leslie Pack Kaelbling,et al. Acting Optimally in Partially Observable Stochastic Domains , 1994, AAAI.
[20] Brendan Dolan-Gavitt,et al. Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks , 2018, RAID.
[21] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[22] Sergey Levine,et al. Trust Region Policy Optimization , 2015, ICML.
[23] Alec Radford,et al. Proximal Policy Optimization Algorithms , 2017, ArXiv.