暂无分享,去创建一个
[1] Richard S. Sutton,et al. Integrated Architectures for Learning, Planning, and Reacting Based on Approximating Dynamic Programming , 1990, ML.
[2] Michael L. Littman,et al. Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.
[3] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[4] Yishay Mansour,et al. Policy Gradient Methods for Reinforcement Learning with Function Approximation , 1999, NIPS.
[5] Manuela M. Veloso,et al. Multiagent learning using a variable learning rate , 2002, Artif. Intell..
[6] Peter Dayan,et al. Q-learning , 1992, Machine Learning.
[7] Sajal K. Das,et al. Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[8] Ronald J. Williams,et al. Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning , 2004, Machine Learning.
[9] Xin Xu,et al. A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls , 2005, ICIC.
[10] David K. Y. Yau,et al. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles , 2005, IEEE/ACM Transactions on Networking.
[11] Richard S. Sutton,et al. Learning to predict by the methods of temporal differences , 1988, Machine Learning.
[12] Ross D. Shachter,et al. Influence Diagrams for Team Decision Analysis , 2005, Decis. Anal..
[13] Xin Xu,et al. A Sparse Kernel-Based Least-Squares Temporal Difference Algorithm for Reinforcement Learning , 2006, ICNC.
[14] Xin Xu,et al. A Kernel-Based Reinforcement Learning Approach to Dynamic Behavior Modeling of Intrusion Detection , 2007, ISNN.
[15] Xin Xu,et al. Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning , 2007, PAISI.
[16] Álvaro Herrero,et al. Multiagent Systems for Network Intrusion Detection: A Review , 2009, CISIS.
[17] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[18] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[19] Dipankar Dasgupta,et al. Game theory for cyber security , 2010, CSIIRW '10.
[20] Xin Xu,et al. Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..
[21] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[22] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[23] K. J. Ray Liu,et al. An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.
[24] Sumeet Dua,et al. Data Mining and Machine Learning in Cybersecurity , 2011 .
[25] Eduardo F. Morales,et al. An Introduction to Reinforcement Learning , 2011 .
[26] Ravishankar K. Iyer,et al. Analysis of security data from a large computing organization , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).
[27] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[28] Aditya Trivedi,et al. Anti-jamming in cognitive radio networks using reinforcement learning algorithms , 2012, 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).
[29] Houssam Abbas,et al. Convergence proofs for Simulated Annealing falsification of safety properties , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[30] Sriram Sankaranarayanan,et al. Falsification of temporal properties of hybrid systems using the cross-entropy method , 2012, HSCC '12.
[31] K. J. Ray Liu,et al. Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
[32] Simon M. Lucas,et al. A Survey of Monte Carlo Tree Search Methods , 2012, IEEE Transactions on Computational Intelligence and AI in Games.
[33] Bhagyashree Deokar,et al. Intrusion Detection System using Log Files and Reinforcement Learning , 2012 .
[34] Nor Badrul Anuar,et al. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..
[35] Alex Graves,et al. Playing Atari with Deep Reinforcement Learning , 2013, ArXiv.
[36] Raquel Barco,et al. Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks , 2013, Expert Syst. Appl..
[37] Xi Fang,et al. Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach , 2013, IEEE Transactions on Wireless Communications.
[38] H. T. Kung,et al. Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[39] Adam J. Miller,et al. Cognitive Jamming Game for Dynamically Countering Ad Hoc Cognitive Radio Networks , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[40] Fernando M. V. Ramos,et al. Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.
[41] Shahaboddin Shamshirband,et al. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..
[42] Kleanthis Malialis,et al. Distributed reinforcement learning for network intrusion response , 2014 .
[43] Weihua Zhuang,et al. Spoofing Detection with Reinforcement Learning in Wireless Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[44] R. Bhosale,et al. Cooperative Machine Learning For Intrusion Detection System , 2014 .
[45] Alejandro Betancourt,et al. A fictitious play-based game-theoretical approach to alleviating jamming attacks for cognitive radios , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[46] Liang Xiao,et al. Spoofing Detection with Reinforcement Learning in Wireless Networks , 2014, GLOBECOM 2014.
[47] Zhisheng Hu,et al. Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed , 2014, MTD '14.
[48] Bob Lantz,et al. A Mininet-based Virtual Testbed for Distributed SDN Development , 2015, Comput. Commun. Rev..
[49] Xiaoli Chu,et al. Energy-Efficient Monitoring in Software Defined Wireless Sensor Networks Using Reinforcement Learning: A Prototype , 2015, Int. J. Distributed Sens. Networks.
[50] Yonggang Wen,et al. “ A Survey of Software Defined Networking , 2020 .
[51] Mohsen Guizani,et al. Software-Defined Networking for RSU Clouds in Support of the Internet of Vehicles , 2015, IEEE Internet of Things Journal.
[52] Liang Xiao,et al. Mobile cloud offloading for malware detections with learning , 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[53] Sergey Levine,et al. Trust Region Policy Optimization , 2015, ICML.
[54] Yan Li,et al. Power control with reinforcement learning in cooperative cognitive radio networks against jamming , 2015, The Journal of Supercomputing.
[55] Feten Slimeni,et al. Jamming mitigation in cognitive radio networks using a modified Q-learning algorithm , 2015, 2015 International Conference on Military Communications and Information Systems (ICMCIS).
[56] Daniel Kudenko,et al. Distributed response to network intrusions using multiagent reinforcement learning , 2015, Eng. Appl. Artif. Intell..
[57] Jun Wang,et al. Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[58] Qiang Ni,et al. Application of reinforcement learning for security enhancement in cognitive radio networks , 2015, Appl. Soft Comput..
[59] Lihui Wang,et al. Current status and advancement of cyber-physical systems in manufacturing , 2015 .
[60] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[61] Honglak Lee,et al. Action-Conditional Video Prediction using Deep Networks in Atari Games , 2015, NIPS.
[62] Yuval Tassa,et al. Continuous control with deep reinforcement learning , 2015, ICLR.
[63] Yann LeCun,et al. Deep multi-scale video prediction beyond mean square error , 2015, ICLR.
[64] Roksana Boreli,et al. A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[65] David Silver,et al. Deep Reinforcement Learning with Double Q-Learning , 2015, AAAI.
[66] Ian F. Akyildiz,et al. QoS-Aware Adaptive Routing in Multi-layer Hierarchical Software Defined Networks: A Reinforcement Learning Approach , 2016, 2016 IEEE International Conference on Services Computing (SCC).
[67] Tom Schaul,et al. Dueling Network Architectures for Deep Reinforcement Learning , 2015, ICML.
[68] Alex Graves,et al. Asynchronous Methods for Deep Reinforcement Learning , 2016, ICML.
[69] Rajkumar Buyya,et al. Fog Computing: Helping the Internet of Things Realize Its Potential , 2016, Computer.
[70] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[71] Xiangming Wen,et al. Perceptual spectrum waterfall of pattern shape recognition algorithm , 2016, 2016 18th International Conference on Advanced Communication Technology (ICACT).
[72] Pieter Abbeel,et al. Value Iteration Networks , 2016, NIPS.
[73] Demis Hassabis,et al. Mastering the game of Go with deep neural networks and tree search , 2016, Nature.
[74] Ravishankar K. Iyer,et al. Game Theory with Learning for Cyber Security Monitoring , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).
[75] Jing Liu,et al. A Survey of Game Theoretic Methods for Cyber Security , 2016, 2016 IEEE First International Conference on Data Science in Cyberspace (DSC).
[76] Choong Seon Hong,et al. Congestion prevention mechanism based on Q-leaning for efficient routing in SDN , 2016, 2016 International Conference on Information Networking (ICOIN).
[77] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[78] Tom Schaul,et al. Prioritized Experience Replay , 2015, ICLR.
[79] Sudharman K. Jayaweera,et al. Reinforcement learning based anti-jamming with wideband autonomous cognitive radios , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).
[80] K. Ramachandran,et al. Dynamic Game Theories in Cyber Security , 2016 .
[81] Yunheung Paek,et al. LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems , 2016, ArXiv.
[82] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[83] Jiankun Hu,et al. Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks , 2016, Future Internet.
[84] H. Vincent Poor,et al. Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[85] Arslan Munir,et al. Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks , 2017, MLDM.
[86] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[87] Marc Peter Deisenroth,et al. Deep Reinforcement Learning: A Brief Survey , 2017, IEEE Signal Processing Magazine.
[88] Saeid Nahavandi,et al. System Design Perspective for Human-Level Agents Using Deep Reinforcement Learning: A Survey , 2017, IEEE Access.
[89] Tom Schaul,et al. StarCraft II: A New Challenge for Reinforcement Learning , 2017, ArXiv.
[90] Jean C. Walrand,et al. Knowledge-Defined Networking , 2016, Comput. Commun. Rev..
[91] Kostas E. Psannis,et al. Cognitive Radio Network and Network Service Chaining toward 5G: Challenges and Requirements , 2017, IEEE Communications Magazine.
[92] Xiaojiang Du,et al. Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[93] Hao Xu,et al. Deep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).
[94] Dale Schuurmans,et al. Bridging the Gap Between Value and Policy Based Reinforcement Learning , 2017, NIPS.
[95] Meikang Qiu,et al. Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data , 2017, IEEE Systems Journal.
[96] Bernardi Pranggono,et al. Machine learning based intrusion detection system for software defined networks , 2017, 2017 Seventh International Conference on Emerging Security Technologies (EST).
[97] Razvan Pascanu,et al. Learning model-based planning from scratch , 2017, ArXiv.
[98] Mubashir Husain Rehmani,et al. Network Coding in Cognitive Radio Networks: A Comprehensive Survey , 2017, IEEE Communications Surveys & Tutorials.
[99] Osama A. Mohammed,et al. A Survey on Smart Grid Cyber-Physical System Testbeds , 2017, IEEE Communications Surveys & Tutorials.
[100] Demis Hassabis,et al. Mastering the game of Go without human knowledge , 2017, Nature.
[101] Tom Schaul,et al. Reinforcement Learning with Unsupervised Auxiliary Tasks , 2016, ICLR.
[102] Sudharman K. Jayaweera,et al. Multi-Agent Reinforcement Learning Based Cognitive Anti-Jamming , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[103] Alec Radford,et al. Proximal Policy Optimization Algorithms , 2017, ArXiv.
[104] Marco Wiering,et al. Adversarial Reinforcement Learning in a Cyber Security Simulation , 2017, ICAART.
[105] Sergey Levine,et al. Deep reinforcement learning for robotic manipulation with asynchronous off-policy updates , 2016, 2017 IEEE International Conference on Robotics and Automation (ICRA).
[106] Victor C. M. Leung,et al. Software-Defined Networks with Mobile Edge Computing and Caching for Smart Cities: A Big Data Deep Reinforcement Learning Approach , 2017, IEEE Communications Magazine.
[107] Ali Dehghantanha,et al. Machine learning aided Android malware classification , 2017, Comput. Electr. Eng..
[108] Bo Li,et al. TStarBots: Defeating the Cheating Level Builtin AI in StarCraft II in the Full Game , 2018, ArXiv.
[109] P SomanK.,et al. A short review on Applications of Deep learning for Cyber security , 2018, ArXiv.
[110] Sukumar Mishra,et al. Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks , 2018, Journal of Medical Systems.
[111] Abhishek Gupta,et al. Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks , 2018, ArXiv.
[112] Alexandre M. Bayen,et al. Variance Reduction for Policy Gradient with Action-Dependent Factorized Baselines , 2018, ICLR.
[113] André C. Drummond,et al. A Survey of Random Forest Based Methods for Intrusion Detection Systems , 2018, ACM Comput. Surv..
[114] H. Vincent Poor,et al. A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning , 2018, IEEE Transactions on Information Forensics and Security.
[115] Jianye Hao,et al. Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning , 2018, IEEE Transactions on Software Engineering.
[116] M. Rege. Machine Learning for Cyber Defense and Attack , 2018 .
[117] Walid Saad,et al. Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).
[118] John Yen,et al. Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths , 2018, IEEE Transactions on Information Forensics and Security.
[119] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[120] Xiaoqing Han,et al. Review on the research and practice of deep learning and reinforcement learning in smart grids , 2018, CSEE Journal of Power and Energy Systems.
[121] Chunhua Wang,et al. Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.
[122] Alagan Anpalagan,et al. Anti-Jamming Communications Using Spectrum Waterfall: A Deep Reinforcement Learning Approach , 2017, IEEE Communications Letters.
[123] Paul Jacob,et al. Host Based Intrusion Detection System with Combined CNN/RNN Model , 2018, Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML.
[124] Quanyan Zhu,et al. Game Theory Meets Network Security: A Tutorial , 2018, CCS.
[125] B. Geluvaraj,et al. The Future of Cybersecurity: Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cyberspace , 2018, International Conference on Computer Networks and Communication Technologies.
[126] Shweta Varshney,et al. Variants of LEACH Routing Protocol in WSN: A Comparative Analysis , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
[127] Amir Hussain,et al. Applications of Deep Learning and Reinforcement Learning to Biological Data , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[128] Olexandr Isayev,et al. Deep reinforcement learning for de novo drug design , 2017, Science Advances.
[129] David Isele,et al. Navigating Occluded Intersections with Autonomous Vehicles Using Deep Reinforcement Learning , 2018, 2018 IEEE International Conference on Robotics and Automation (ICRA).
[130] Amaury Lendasse,et al. Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines , 2017, J. Frankl. Inst..
[131] Jianhua Li,et al. Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks , 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[132] Vasisht Duddu,et al. A Survey of Adversarial Machine Learning in Cyber Warfare , 2018, Defence Science Journal.
[133] Razvan Pascanu,et al. Relational Deep Reinforcement Learning , 2018, ArXiv.
[134] D. Malathi,et al. A Survey on Anomaly Based Host Intrusion Detection System , 2018 .
[135] Di Wu,et al. IoT Security Techniques Based on Machine Learning , 2018, ArXiv.
[136] Tao Jiang,et al. Deep Reinforcement Learning for Mobile Edge Caching: Review, New Features, and Open Issues , 2018, IEEE Network.
[137] Saddam Hossen,et al. Analysis of Network Intrusion Detection System with Machine Learning Algorithms (Deep Reinforcement Learning Algorithm) , 2018 .
[138] Joel Z. Leibo,et al. Human-level performance in first-person multiplayer games with population-based deep reinforcement learning , 2018, ArXiv.
[139] S. Biswas. Intrusion Detection Using Machine Learning: A Comparison Study , 2018 .
[140] Hong Zheng,et al. Nonlane-Discipline-Based Car-Following Model for Electric Vehicles in Transportation- Cyber-Physical Systems , 2018, IEEE Transactions on Intelligent Transportation Systems.
[141] Saeid Nahavandi,et al. Deep Reinforcement Learning for Multi-Agent Systems: A Review of Challenges, Solutions and Applications , 2018, ArXiv.
[142] Yu Zhang,et al. Intelligent Cloud Resource Management with Deep Reinforcement Learning , 2018, IEEE Cloud Computing.
[143] Ji Li,et al. DRL-cloud: Deep reinforcement learning-based resource provisioning and task scheduling for cloud service providers , 2018, 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC).
[144] Sateesh K. Peddoju,et al. HIDS: A host based intrusion detection system for cloud computing environment , 2018, Int. J. Syst. Assur. Eng. Manag..
[145] Michele Colajanni,et al. On the effectiveness of machine and deep learning for cyber security , 2018, 2018 10th International Conference on Cyber Conflict (CyCon).
[146] Christopher Leckie,et al. Reinforcement Learning for Autonomous Defence in Software-Defined Networking , 2018, GameSec.
[147] Sergey Levine,et al. Neural Network Dynamics for Model-Based Deep Reinforcement Learning with Model-Free Fine-Tuning , 2017, 2018 IEEE International Conference on Robotics and Automation (ICRA).
[148] Matthew W. Hoffman,et al. Distributed Distributional Deterministic Policy Gradients , 2018, ICLR.
[149] Saeid Nahavandi,et al. A Human Mixed Strategy Approach to Deep Reinforcement Learning , 2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[150] Yonghui Song,et al. A New Deep-Q-Learning-Based Transmission Scheduling Mechanism for the Cognitive Internet of Things , 2018, IEEE Internet of Things Journal.
[151] Jin Chen,et al. Interference-Aware Cooperative Anti-Jamming Distributed Channel Selection in UAV Communication Networks , 2018, Applied Sciences.
[152] Yan Zhang,et al. Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.
[153] Xiang Chen,et al. Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.
[154] Weihua Zhuang,et al. UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning , 2018, IEEE Transactions on Vehicular Technology.
[155] Akbar Siami Namin,et al. Deep Reinforcement Learning for Detecting Malicious Websites , 2019, ArXiv.
[156] Daniel S. Berman,et al. A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..
[157] Zhen Ni,et al. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[158] Saeid Nahavandi,et al. Multi-Agent Deep Reinforcement Learning with Human Strategies , 2018, 2019 IEEE International Conference on Industrial Technology (ICIT).
[159] Meikang Qiu,et al. Reinforcement Learning for Cyber-Physical Systems , 2019 .
[160] Young B. Moon,et al. Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods , 2019, J. Intell. Manuf..
[161] Saeid Nahavandi,et al. A New Tensioning Method using Deep Reinforcement Learning for Surgical Pattern Cutting , 2019, 2019 IEEE International Conference on Industrial Technology (ICIT).
[162] Manuel López Martín,et al. Adversarial environment reinforcement learning algorithm for intrusion detection , 2019, Comput. Networks.
[163] Luliang Jia,et al. A Collaborative Multi-Agent Reinforcement Learning Anti-Jamming Algorithm in Wireless Networks , 2018, IEEE Wireless Communications Letters.
[164] Holger Boche,et al. Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks , 2019, IEEE Transactions on Information Forensics and Security.
[165] Ying-Chang Liang,et al. Applications of Deep Reinforcement Learning in Communications and Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[166] Georgios Kambourakis,et al. Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems , 2019, IEEE Access.
[167] Yi Wang,et al. A Survey of Code Reuse Attack and Defense , 2018 .
[168] Luciano Bononi,et al. Reinforcement Learning-Based Spectrum Management for Cognitive Radio Networks: A Literature Review and Case Study , 2019, Handbook of Cognitive Radio.
[169] Qiang Ye,et al. A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks , 2019, Inf. Fusion.
[170] Tong Lu,et al. On Reinforcement Learning for Full-length Game of StarCraft , 2018, AAAI.
[171] Xiangpeng Xie,et al. Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks , 2019, IEEE Transactions on Cybernetics.
[172] Saeid Nahavandi,et al. Deep Learning for Deepfakes Creation and Detection , 2019, ArXiv.
[173] Li Li,et al. Long memory is important: A test study on deep-learning based car-following model , 2019, Physica A: Statistical Mechanics and its Applications.
[174] Pin Wan,et al. A survey of dynamic spectrum allocation based on reinforcement learning algorithms in cognitive radio networks , 2018, Artif. Intell. Rev..
[175] Jiqiang Liu,et al. Adversarial attack and defense in reinforcement learning-from AI security view , 2019, Cybersecur..
[176] Ying Chen,et al. Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control , 2019, IEEE Transactions on Smart Grid.
[177] Yehuda Afek,et al. Zero-Day Signature Extraction for High-Volume Attacks , 2019, IEEE/ACM Transactions on Networking.
[178] Qian He,et al. Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond , 2019, IEEE Network.
[179] Moitrayee Chatterjee,et al. Detecting Phishing Websites through Deep Reinforcement Learning , 2019, 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC).
[180] Saeid Nahavandi,et al. Manipulating Soft Tissues by Deep Reinforcement Learning for Autonomous Robotic Surgery , 2019, 2019 IEEE International Systems Conference (SysCon).
[181] Jie Zhang,et al. On the Performance of Deep Reinforcement Learning-Based Anti-Jamming Method Confronting Intelligent Jammer , 2019, Applied Sciences.
[182] Yan Huang,et al. A Deep-Reinforcement-Learning-Based Approach to Dynamic eMBB/URLLC Multiplexing in 5G NR , 2020, IEEE Internet of Things Journal.
[183] Xuesong Wang,et al. Approximate Policy-Based Accelerated Deep Reinforcement Learning , 2020, IEEE Transactions on Neural Networks and Learning Systems.
[184] Zhu Han,et al. Trust-Based Social Networks with Computing, Caching and Communications: A Deep Reinforcement Learning Approach , 2020, IEEE Transactions on Network Science and Engineering.
[185] Naren Ramakrishnan,et al. Deep Reinforcement Learning for Sequence-to-Sequence Models , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[186] Lin Zhang,et al. Deep reinforcement learning approach for autonomous vehicle systems for maintaining security and safety using LSTM-GAN , 2020, Veh. Commun..
[187] Saeid Nahavandi,et al. Deep Reinforcement Learning for Multiagent Systems: A Review of Challenges, Solutions, and Applications , 2018, IEEE Transactions on Cybernetics.
[188] Saeid Nahavandi,et al. Deep learning for deepfakes creation and detection: A survey , 2019, Comput. Vis. Image Underst..
[189] Chaoxu Mu,et al. A Learning-Based Solution for an Adversarial Repeated Game in Cyber–Physical Power Systems , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[190] Jintao Li,et al. Data-driven software defined network attack detection : State-of-the-art and perspectives , 2020, Inf. Sci..
[191] Liang Tong,et al. Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning , 2019, AAAI.
[192] Hao Chen,et al. Self-Tuning Sectorization: Deep Reinforcement Learning Meets Broadcast Beam Optimization , 2019, IEEE Transactions on Wireless Communications.
[193] Thanh Thi Nguyen,et al. A Multi-Objective Deep Reinforcement Learning Framework , 2018, Eng. Appl. Artif. Intell..
[194] Lei Ma,et al. Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning , 2020, AAAI.
[195] Manuel López Martín,et al. Application of deep reinforcement learning to intrusion detection for supervised problems , 2020, Expert Syst. Appl..
[196] Song Guo,et al. Green Resource Allocation Based on Deep Reinforcement Learning in Content-Centric IoT , 2018, IEEE Transactions on Emerging Topics in Computing.
[197] Liang Xiao,et al. Reinforcement Learning Based PHY Authentication for VANETs , 2020, IEEE Transactions on Vehicular Technology.
[198] Leon O. Chua,et al. Neuromemristive Circuits for Edge Computing: A Review , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[199] Ling Shi,et al. Deep Reinforcement Learning for Wireless Sensor Scheduling in Cyber-Physical Systems , 2018, Autom..
[200] Juan Ospina,et al. Deep Reinforcement Learning for Cybersecurity Assessment of Wind Integrated Power Systems , 2020, IEEE Access.
[201] Haibo He,et al. Cyber-Attack Recovery Strategy for Smart Grid Based on Deep Reinforcement Learning , 2020, IEEE Transactions on Smart Grid.
[202] Nauman Aslam,et al. An efficient reinforcement learning-based Botnet detection approach , 2020, J. Netw. Comput. Appl..
[203] Giancarlo Fortino,et al. A hybrid deep learning model for efficient intrusion detection in big data environment , 2020, Inf. Sci..
[204] Zhiqiang Pu,et al. Formation Control With Collision Avoidance Through Deep Reinforcement Learning Using Model-Guided Demonstration , 2020, IEEE Transactions on Neural Networks and Learning Systems.
[205] Anastasios Tefas,et al. Price Trailing for Financial Trading Using Deep Reinforcement Learning , 2020, IEEE Transactions on Neural Networks and Learning Systems.
[206] Walid Saad,et al. Interdependence-Aware Game-Theoretic Framework for Secure Intelligent Transportation Systems , 2020, IEEE Internet of Things Journal.
[207] Dinh Thai Hoang,et al. Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning , 2020, IEEE Transactions on Artificial Intelligence.
[208] Quoc Viet Hung Nguyen,et al. Deep Learning for Deepfakes Creation and Detection: A Survey , 2022, SSRN Electronic Journal.