Michael L. Littman,et al. Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.
 Yishay Mansour,et al. Policy Gradient Methods for Reinforcement Learning with Function Approximation , 1999, NIPS.
 Manuela M. Veloso,et al. Multiagent learning using a variable learning rate , 2002, Artif. Intell..
 Sajal K. Das,et al. Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
 Ronald J. Williams. Simple statistical gradient-following algorithms for connectionist reinforcement learning , 2004, Machine Learning.
 David K. Y. Yau,et al. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles , 2005, IEEE/ACM Transactions on Networking.
 Richard S. Sutton,et al. Learning to Predict by the Methods of Temporal Differences , 1988, Machine Learning.
 Xin Xu,et al. A Kernel-Based Reinforcement Learning Approach to Dynamic Behavior Modeling of Intrusion Detection , 2007, ISNN.
 Xin Xu,et al. Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning , 2007, PAISI.
 Álvaro Herrero,et al. Multiagent Systems for Network Intrusion Detection: A Review , 2009, CISIS.
 Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
 Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
 Xin Xu. Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..
 Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
 Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
 K. J. Ray Liu,et al. An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.
 Ravishankar K. Iyer,et al. Analysis of security data from a large computing organization , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).
 Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
 Aditya Trivedi,et al. Anti-jamming in cognitive radio networks using reinforcement learning algorithms , 2012, 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).
 Houssam Abbas,et al. Convergence proofs for Simulated Annealing falsification of safety properties , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
 Sriram Sankaranarayanan,et al. Falsification of temporal properties of hybrid systems using the cross-entropy method , 2012, HSCC '12.
 K. J. Ray Liu,et al. Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
 Bhagyashree Deokar,et al. Intrusion Detection System using Log Files and Reinforcement Learning , 2012 .
 Nor Badrul Anuar,et al. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..
 Raquel Barco,et al. Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks , 2013, Expert Syst. Appl..
 Xi Fang,et al. Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach , 2013, IEEE Transactions on Wireless Communications.
 H. T. Kung,et al. Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
 Adam J. Miller,et al. Cognitive Jamming Game for Dynamically Countering Ad Hoc Cognitive Radio Networks , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
 Fernando M. V. Ramos,et al. Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.
 Shahaboddin Shamshirband,et al. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..
 Weihua Zhuang,et al. Spoofing Detection with Reinforcement Learning in Wireless Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
 R. Bhosale,et al. Cooperative Machine Learning For Intrusion Detection System , 2014 .
 Alejandro Betancourt,et al. A fictitious play-based game-theoretical approach to alleviating jamming attacks for cognitive radios , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
 Liang Xiao,et al. Spoofing Detection with Reinforcement Learning in Wireless Networks , 2014, GLOBECOM 2014.
 Zhisheng Hu,et al. Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed , 2014, MTD '14.
 Bob Lantz,et al. A Mininet-based Virtual Testbed for Distributed SDN Development , 2015, SIGCOMM.
 Xiaoli Chu,et al. Energy-Efficient Monitoring in Software Defined Wireless Sensor Networks Using Reinforcement Learning: A Prototype , 2015, Int. J. Distributed Sens. Networks.
 Mohsen Guizani,et al. Software-Defined Networking for RSU Clouds in Support of the Internet of Vehicles , 2015, IEEE Internet of Things Journal.
 Liang Xiao,et al. Mobile cloud offloading for malware detections with learning , 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
 Yan Li,et al. Power control with reinforcement learning in cooperative cognitive radio networks against jamming , 2015, The Journal of Supercomputing.
 Feten Slimeni,et al. Jamming mitigation in cognitive radio networks using a modified Q-learning algorithm , 2015, 2015 International Conference on Military Communications and Information Systems (ICMCIS).
 Daniel Kudenko,et al. Distributed response to network intrusions using multiagent reinforcement learning , 2015, Eng. Appl. Artif. Intell..
 Jun Wang,et al. Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
 Qiang Ni,et al. Application of reinforcement learning for security enhancement in cognitive radio networks , 2015, Appl. Soft Comput..
 Lihui Wang,et al. Current status and advancement of cyber-physical systems in manufacturing , 2015 .
 Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
 Honglak Lee,et al. Action-Conditional Video Prediction using Deep Networks in Atari Games , 2015, NIPS.
 Yuval Tassa,et al. Continuous control with deep reinforcement learning , 2015, ICLR.
 Yann LeCun,et al. Deep multi-scale video prediction beyond mean square error , 2015, ICLR.
 Roksana Boreli,et al. A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
 David Silver,et al. Deep Reinforcement Learning with Double Q-Learning , 2015, AAAI.
 Ian F. Akyildiz,et al. QoS-Aware Adaptive Routing in Multi-layer Hierarchical Software Defined Networks: A Reinforcement Learning Approach , 2016, 2016 IEEE International Conference on Services Computing (SCC).
 Tom Schaul,et al. Dueling Network Architectures for Deep Reinforcement Learning , 2015, ICML.
 Alex Graves,et al. Asynchronous Methods for Deep Reinforcement Learning , 2016, ICML.
 Rajkumar Buyya,et al. Fog Computing: Helping the Internet of Things Realize Its Potential , 2016, Computer.
 Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
 Xiangming Wen,et al. Perceptual spectrum waterfall of pattern shape recognition algorithm , 2016, 2016 18th International Conference on Advanced Communication Technology (ICACT).
 Demis Hassabis,et al. Mastering the game of Go with deep neural networks and tree search , 2016, Nature.
 Ravishankar K. Iyer,et al. Game Theory with Learning for Cyber Security Monitoring , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).
 Jing Liu,et al. A Survey of Game Theoretic Methods for Cyber Security , 2016, 2016 IEEE First International Conference on Data Science in Cyberspace (DSC).
 Choong Seon Hong,et al. Congestion prevention mechanism based on Q-leaning for efficient routing in SDN , 2016, 2016 International Conference on Information Networking (ICOIN).
 Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
 Sudharman K. Jayaweera,et al. Reinforcement learning based anti-jamming with wideband autonomous cognitive radios , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).
 Jiankun Hu,et al. Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks , 2016, Future Internet.
 H. Vincent Poor,et al. Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
 Arslan Munir,et al. Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks , 2017, MLDM.
 Saeid Nahavandi,et al. System Design Perspective for Human-Level Agents Using Deep Reinforcement Learning: A Survey , 2017, IEEE Access.
 Tom Schaul,et al. StarCraft II: A New Challenge for Reinforcement Learning , 2017, ArXiv.
 Kostas E. Psannis,et al. Cognitive Radio Network and Network Service Chaining toward 5G: Challenges and Requirements , 2017, IEEE Communications Magazine.
 Xiaojiang Du,et al. Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
 Hao Xu,et al. Deep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).
 Dale Schuurmans,et al. Bridging the Gap Between Value and Policy Based Reinforcement Learning , 2017, NIPS.
 Meikang Qiu,et al. Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data , 2017, IEEE Systems Journal.
 Bernardi Pranggono,et al. Machine learning based intrusion detection system for software defined networks , 2017, 2017 Seventh International Conference on Emerging Security Technologies (EST).
 Mubashir Husain Rehmani,et al. Network Coding in Cognitive Radio Networks: A Comprehensive Survey , 2017, IEEE Communications Surveys & Tutorials.
 Osama A. Mohammed,et al. A Survey on Smart Grid Cyber-Physical System Testbeds , 2017, IEEE Communications Surveys & Tutorials.
 Tom Schaul,et al. Reinforcement Learning with Unsupervised Auxiliary Tasks , 2017, ICLR.
 Sudharman K. Jayaweera,et al. Multi-Agent Reinforcement Learning Based Cognitive Anti-Jamming , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
 Marco Wiering,et al. Adversarial Reinforcement Learning in a Cyber Security Simulation , 2017, ICAART.
 Sergey Levine,et al. Deep reinforcement learning for robotic manipulation with asynchronous off-policy updates , 2016, 2017 IEEE International Conference on Robotics and Automation (ICRA).
 Victor C. M. Leung,et al. Software-Defined Networks with Mobile Edge Computing and Caching for Smart Cities: A Big Data Deep Reinforcement Learning Approach , 2017, IEEE Communications Magazine.
 Ali Dehghantanha,et al. Machine learning aided Android malware classification , 2017, Comput. Electr. Eng..
 Bo Li,et al. TStarBots: Defeating the Cheating Level Builtin AI in StarCraft II in the Full Game , 2018, ArXiv.
 P SomanK.,et al. A short review on Applications of Deep learning for Cyber security , 2018, ArXiv.
 Sukumar Mishra,et al. Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks , 2018, Journal of Medical Systems.
 Abhishek Gupta,et al. Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks , 2018, ArXiv.
 Alexandre M. Bayen,et al. Variance Reduction for Policy Gradient with Action-Dependent Factorized Baselines , 2018, ICLR.
 André C. Drummond,et al. A Survey of Random Forest Based Methods for Intrusion Detection Systems , 2018, ACM Comput. Surv..
 H. Vincent Poor,et al. A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning , 2018, IEEE Transactions on Information Forensics and Security.
 Jianye Hao,et al. Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning , 2018, FM.
 Walid Saad,et al. Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).
 John Yen,et al. Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths , 2018, IEEE Transactions on Information Forensics and Security.
 Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
 Chunhua Wang,et al. Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.
 Alagan Anpalagan,et al. Anti-Jamming Communications Using Spectrum Waterfall: A Deep Reinforcement Learning Approach , 2018, IEEE Communications Letters.
 Paul Jacob,et al. Host Based Intrusion Detection System with Combined CNN/RNN Model , 2018, Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML.
 Shweta Varshney,et al. Variants of LEACH Routing Protocol in WSN: A Comparative Analysis , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
 Amir Hussain,et al. Applications of Deep Learning and Reinforcement Learning to Biological Data , 2018, IEEE Transactions on Neural Networks and Learning Systems.
 Olexandr Isayev,et al. Deep reinforcement learning for de novo drug design , 2018, Science Advances.
 David Isele,et al. Navigating Occluded Intersections with Autonomous Vehicles Using Deep Reinforcement Learning , 2017, 2018 IEEE International Conference on Robotics and Automation (ICRA).
 Amaury Lendasse,et al. Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines , 2018, J. Frankl. Inst..
 Jianhua Li,et al. Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks , 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
 D. Malathi,et al. A Survey on Anomaly Based Host Intrusion Detection System , 2018 .
 Tao Jiang,et al. Deep Reinforcement Learning for Mobile Edge Caching: Review, New Features, and Open Issues , 2018, IEEE Network.
 Hong Zheng,et al. Nonlane-Discipline-Based Car-Following Model for Electric Vehicles in Transportation- Cyber-Physical Systems , 2018, IEEE Transactions on Intelligent Transportation Systems.
 Yu Zhang,et al. Intelligent Cloud Resource Management with Deep Reinforcement Learning , 2018, IEEE Cloud Computing.
 DRL-cloud: Deep reinforcement learning-based resource provisioning and task scheduling for cloud service providers , 2018, 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC).
 Sateesh K. Peddoju,et al. HIDS: A host based intrusion detection system for cloud computing environment , 2018, Int. J. Syst. Assur. Eng. Manag..
 Michele Colajanni,et al. On the effectiveness of machine and deep learning for cyber security , 2018, 2018 10th International Conference on Cyber Conflict (CyCon).
 Christopher Leckie,et al. Reinforcement Learning for Autonomous Defence in Software-Defined Networking , 2018, GameSec.
 Sergey Levine,et al. Neural Network Dynamics for Model-Based Deep Reinforcement Learning with Model-Free Fine-Tuning , 2017, 2018 IEEE International Conference on Robotics and Automation (ICRA).
 Matthew W. Hoffman,et al. Distributed Distributional Deterministic Policy Gradients , 2018, ICLR.
 Saeid Nahavandi,et al. A Human Mixed Strategy Approach to Deep Reinforcement Learning , 2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
 Yonghui Song,et al. A New Deep-Q-Learning-Based Transmission Scheduling Mechanism for the Cognitive Internet of Things , 2018, IEEE Internet of Things Journal.
 Xiang Chen,et al. Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.
 Weihua Zhuang,et al. UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning , 2018, IEEE Transactions on Vehicular Technology.
 Akbar Siami Namin,et al. Deep Reinforcement Learning for Detecting Malicious Websites , 2019, ArXiv.
 Daniel S. Berman,et al. A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..
 Zhen Ni,et al. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution , 2019, IEEE Transactions on Neural Networks and Learning Systems.
 Saeid Nahavandi,et al. Multi-Agent Deep Reinforcement Learning with Human Strategies , 2019, 2019 IEEE International Conference on Industrial Technology (ICIT).
 Young B. Moon,et al. Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods , 2019, J. Intell. Manuf..
 Saeid Nahavandi,et al. A New Tensioning Method using Deep Reinforcement Learning for Surgical Pattern Cutting , 2019, 2019 IEEE International Conference on Industrial Technology (ICIT).
 Manuel López Martín,et al. Adversarial environment reinforcement learning algorithm for intrusion detection , 2019, Comput. Networks.
 Luliang Jia,et al. A Collaborative Multi-Agent Reinforcement Learning Anti-Jamming Algorithm in Wireless Networks , 2019, IEEE Wireless Communications Letters.
 Holger Boche,et al. Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks , 2019, IEEE Transactions on Information Forensics and Security.
 Ying-Chang Liang,et al. Applications of Deep Reinforcement Learning in Communications and Networking: A Survey , 2019, IEEE Communications Surveys & Tutorials.
 Georgios Kambourakis,et al. Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems , 2019, IEEE Access.
 Luciano Bononi,et al. Reinforcement Learning-Based Spectrum Management for Cognitive Radio Networks: A Literature Review and Case Study , 2019, Handbook of Cognitive Radio.
 Qiang Ye,et al. A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks , 2019, Inf. Fusion.
 Tong Lu,et al. On Reinforcement Learning for Full-length Game of StarCraft , 2019, AAAI.
 Xiangpeng Xie,et al. Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks , 2019, IEEE Transactions on Cybernetics.
 Saeid Nahavandi,et al. Deep Learning for Deepfakes Creation and Detection , 2019, ArXiv.
 Li Li,et al. Long memory is important: A test study on deep-learning based car-following model , 2019 .
 Pin Wan,et al. A survey of dynamic spectrum allocation based on reinforcement learning algorithms in cognitive radio networks , 2019, Artif. Intell. Rev..
 Jiqiang Liu,et al. Adversarial attack and defense in reinforcement learning-from AI security view , 2019, Cybersecur..
 Ying Chen,et al. Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control , 2019, IEEE Transactions on Smart Grid.
 Yehuda Afek,et al. Zero-Day Signature Extraction for High-Volume Attacks , 2019, IEEE/ACM Transactions on Networking.
 Qian He,et al. Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond , 2019, IEEE Network.
 Moitrayee Chatterjee,et al. Detecting Phishing Websites through Deep Reinforcement Learning , 2019, 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC).
 Saeid Nahavandi,et al. Manipulating Soft Tissues by Deep Reinforcement Learning for Autonomous Robotic Surgery , 2019, 2019 IEEE International Systems Conference (SysCon).
 Yan Huang,et al. A Deep-Reinforcement-Learning-Based Approach to Dynamic eMBB/URLLC Multiplexing in 5G NR , 2020, IEEE Internet of Things Journal.
 Xuesong Wang,et al. Approximate Policy-Based Accelerated Deep Reinforcement Learning , 2020, IEEE Transactions on Neural Networks and Learning Systems.
 Zhu Han,et al. Trust-Based Social Networks with Computing, Caching and Communications: A Deep Reinforcement Learning Approach , 2020, IEEE Transactions on Network Science and Engineering.
 Naren Ramakrishnan,et al. Deep Reinforcement Learning for Sequence-to-Sequence Models , 2020, IEEE Transactions on Neural Networks and Learning Systems.
 Lin Zhang,et al. Deep reinforcement learning approach for autonomous vehicle systems for maintaining security and safety using LSTM-GAN , 2020, Veh. Commun..
 Saeid Nahavandi,et al. Deep Reinforcement Learning for Multiagent Systems: A Review of Challenges, Solutions, and Applications , 2020, IEEE Transactions on Cybernetics.
 Saeid Nahavandi,et al. Deep Learning for Deepfakes Creation and Detection: A Survey , 2019 .
 Chaoxu Mu,et al. A Learning-Based Solution for an Adversarial Repeated Game in Cyber–Physical Power Systems , 2020, IEEE Transactions on Neural Networks and Learning Systems.
 Jintao Li,et al. Data-driven software defined network attack detection : State-of-the-art and perspectives , 2020, Inf. Sci..
 Liang Tong,et al. Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning , 2020, AAAI.
 Hao Chen,et al. Self-Tuning Sectorization: Deep Reinforcement Learning Meets Broadcast Beam Optimization , 2020, IEEE Transactions on Wireless Communications.
 Thanh Thi Nguyen. A Multi-Objective Deep Reinforcement Learning Framework , 2020, Eng. Appl. Artif. Intell..
 Lei Ma,et al. Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning , 2020, AAAI.
 Manuel López Martín,et al. Application of deep reinforcement learning to intrusion detection for supervised problems , 2020, Expert Syst. Appl..
 Song Guo,et al. Green Resource Allocation Based on Deep Reinforcement Learning in Content-Centric IoT , 2020, IEEE Transactions on Emerging Topics in Computing.
 Liang Xiao,et al. Reinforcement Learning Based PHY Authentication for VANETs , 2020, IEEE Transactions on Vehicular Technology.
 Leon O. Chua,et al. Neuromemristive Circuits for Edge Computing: A Review , 2020, IEEE Transactions on Neural Networks and Learning Systems.
 Ling Shi,et al. Deep Reinforcement Learning for Wireless Sensor Scheduling in Cyber-Physical Systems , 2020, Autom..
 Juan Ospina,et al. Deep Reinforcement Learning for Cybersecurity Assessment of Wind Integrated Power Systems , 2020, IEEE Access.
 Haibo He,et al. Cyber-Attack Recovery Strategy for Smart Grid Based on Deep Reinforcement Learning , 2020, IEEE Transactions on Smart Grid.
 Nauman Aslam,et al. An efficient reinforcement learning-based Botnet detection approach , 2020, J. Netw. Comput. Appl..
 Giancarlo Fortino,et al. A hybrid deep learning model for efficient intrusion detection in big data environment , 2020, Inf. Sci..
 Zhiqiang Pu,et al. Formation Control With Collision Avoidance Through Deep Reinforcement Learning Using Model-Guided Demonstration. , 2020, IEEE transactions on neural networks and learning systems.
 Anastasios Tefas,et al. Price Trailing for Financial Trading Using Deep Reinforcement Learning. , 2020, IEEE transactions on neural networks and learning systems.
 Walid Saad,et al. Interdependence-Aware Game-Theoretic Framework for Secure Intelligent Transportation Systems , 2020, IEEE Internet of Things Journal.
 Dinh Thai Hoang,et al. Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning , 2021, IEEE Transactions on Artificial Intelligence.
 Quoc Viet Hung Nguyen,et al. Deep Learning for Deepfakes Creation and Detection: A Survey , 2022, SSRN Electronic Journal.