Artificial Intelligence-based Attack and Countermeasure Agents: Who wins? An Invited Paper
暂无分享,去创建一个
[1] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[2] Girraj Sharma,et al. Cluster-based distributed cooperative spectrum sensing over Nakagami fading using diversity reception , 2019, IET Networks.
[3] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[4] Matthew Hutson. Hackers easily fool artificial intelligences. , 2018, Science.
[5] Danny Kopec,et al. Artificial Intelligence in the 21st Century , 2012 .
[6] Roman V Yampolskiy. Predicting future AI failures from historic examples , 2019, foresight.
[7] Samuel Greengard,et al. Cybersecurity gets smart , 2016, Commun. ACM.
[8] Roman V. Yampolskiy,et al. Artificial Intelligence Safety and Cybersecurity: a Timeline of AI Failures , 2016, ArXiv.
[9] Michael L. Littman,et al. Reinforcement learning improves behaviour from evaluative feedback , 2015, Nature.
[10] Si Chen,et al. NSAC: A Novel Clustering Protocol in Cognitive Radio Sensor Networks for Internet of Things , 2019, IEEE Internet of Things Journal.
[11] Alex S. Wilner,et al. Cybersecurity and its discontents: Artificial intelligence, the Internet of Things, and digital misinformation , 2018, International Journal: Canada's Journal of Global Policy Analysis.
[12] Robert D. Atkinson. AI Superpowers: China, Silicon Valley, and the New World Order , 2018 .
[13] Mee Hong Ling,et al. Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks , 2019, 2019 International Conference on Information Networking (ICOIN).
[14] Leïla Azouz Saïdane,et al. Cluster-based scheduling for cognitive radio sensor networks , 2019, J. Ambient Intell. Humaniz. Comput..
[15] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..