Deep Reinforcement Learning for Cyber Security

The scale of Internet-connected systems has increased considerably, and these systems are being exposed to cyberattacks more than ever. The complexity and dynamics of cyberattacks require protecting mechanisms to be responsive, adaptive, and scalable. Machine learning, or more specifically deep reinforcement learning (DRL), methods have been proposed widely to address these issues. By incorporating deep learning into traditional RL, DRL is highly capable of solving complex, dynamic, and especially high-dimensional cyber defense problems. This article presents a survey of DRL approaches developed for cyber security. We touch on different vital aspects, including DRL-based security methods for cyber-physical systems, autonomous intrusion detection techniques, and multiagent DRL-based game theory simulations for defense strategies against cyberattacks. Extensive discussions and future research directions on DRL-based cyber security are also given. We expect that this comprehensive review provides the foundations for and facilitates future studies on exploring the potential of emerging DRL to cope with increasingly complex cyber security problems.

[1]  Richard S. Sutton,et al.  Integrated Architectures for Learning, Planning, and Reacting Based on Approximating Dynamic Programming , 1990, ML.

[2]  Michael L. Littman,et al.  Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.

[3]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[4]  Yishay Mansour,et al.  Policy Gradient Methods for Reinforcement Learning with Function Approximation , 1999, NIPS.

[5]  Manuela M. Veloso,et al.  Multiagent learning using a variable learning rate , 2002, Artif. Intell..

[6]  Peter Dayan,et al.  Q-learning , 1992, Machine Learning.

[7]  Sajal K. Das,et al.  Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[8]  Ronald J. Williams,et al.  Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning , 2004, Machine Learning.

[9]  Xin Xu,et al.  A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls , 2005, ICIC.

[10]  David K. Y. Yau,et al.  Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles , 2005, IEEE/ACM Transactions on Networking.

[11]  Richard S. Sutton,et al.  Learning to predict by the methods of temporal differences , 1988, Machine Learning.

[12]  Ross D. Shachter,et al.  Influence Diagrams for Team Decision Analysis , 2005, Decis. Anal..

[13]  Xin Xu,et al.  A Sparse Kernel-Based Least-Squares Temporal Difference Algorithm for Reinforcement Learning , 2006, ICNC.

[14]  Xin Xu,et al.  A Kernel-Based Reinforcement Learning Approach to Dynamic Behavior Modeling of Intrusion Detection , 2007, ISNN.

[15]  Xin Xu,et al.  Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning , 2007, PAISI.

[16]  Álvaro Herrero,et al.  Multiagent Systems for Network Intrusion Detection: A Review , 2009, CISIS.

[17]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[18]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[19]  Dipankar Dasgupta,et al.  Game theory for cyber security , 2010, CSIIRW '10.

[20]  Xin Xu,et al.  Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..

[21]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[22]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[23]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[24]  Sumeet Dua,et al.  Data Mining and Machine Learning in Cybersecurity , 2011 .

[25]  Eduardo F. Morales,et al.  An Introduction to Reinforcement Learning , 2011 .

[26]  Ravishankar K. Iyer,et al.  Analysis of security data from a large computing organization , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).

[27]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[28]  Aditya Trivedi,et al.  Anti-jamming in cognitive radio networks using reinforcement learning algorithms , 2012, 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).

[29]  Houssam Abbas,et al.  Convergence proofs for Simulated Annealing falsification of safety properties , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[30]  Sriram Sankaranarayanan,et al.  Falsification of temporal properties of hybrid systems using the cross-entropy method , 2012, HSCC '12.

[31]  K. J. Ray Liu,et al.  Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[32]  Simon M. Lucas,et al.  A Survey of Monte Carlo Tree Search Methods , 2012, IEEE Transactions on Computational Intelligence and AI in Games.

[33]  Bhagyashree Deokar,et al.  Intrusion Detection System using Log Files and Reinforcement Learning , 2012 .

[34]  Nor Badrul Anuar,et al.  An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..

[35]  Alex Graves,et al.  Playing Atari with Deep Reinforcement Learning , 2013, ArXiv.

[36]  Raquel Barco,et al.  Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks , 2013, Expert Syst. Appl..

[37]  Xi Fang,et al.  Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach , 2013, IEEE Transactions on Wireless Communications.

[38]  H. T. Kung,et al.  Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[39]  Adam J. Miller,et al.  Cognitive Jamming Game for Dynamically Countering Ad Hoc Cognitive Radio Networks , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[40]  Fernando M. V. Ramos,et al.  Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.

[41]  Shahaboddin Shamshirband,et al.  Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..

[42]  Kleanthis Malialis,et al.  Distributed reinforcement learning for network intrusion response , 2014 .

[43]  Weihua Zhuang,et al.  Spoofing Detection with Reinforcement Learning in Wireless Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[44]  R. Bhosale,et al.  Cooperative Machine Learning For Intrusion Detection System , 2014 .

[45]  Alejandro Betancourt,et al.  A fictitious play-based game-theoretical approach to alleviating jamming attacks for cognitive radios , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[46]  Liang Xiao,et al.  Spoofing Detection with Reinforcement Learning in Wireless Networks , 2014, GLOBECOM 2014.

[47]  Zhisheng Hu,et al.  Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed , 2014, MTD '14.

[48]  Bob Lantz,et al.  A Mininet-based Virtual Testbed for Distributed SDN Development , 2015, Comput. Commun. Rev..

[49]  Xiaoli Chu,et al.  Energy-Efficient Monitoring in Software Defined Wireless Sensor Networks Using Reinforcement Learning: A Prototype , 2015, Int. J. Distributed Sens. Networks.

[50]  Yonggang Wen,et al.  “ A Survey of Software Defined Networking , 2020 .

[51]  Mohsen Guizani,et al.  Software-Defined Networking for RSU Clouds in Support of the Internet of Vehicles , 2015, IEEE Internet of Things Journal.

[52]  Liang Xiao,et al.  Mobile cloud offloading for malware detections with learning , 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[53]  Sergey Levine,et al.  Trust Region Policy Optimization , 2015, ICML.

[54]  Yan Li,et al.  Power control with reinforcement learning in cooperative cognitive radio networks against jamming , 2015, The Journal of Supercomputing.

[55]  Feten Slimeni,et al.  Jamming mitigation in cognitive radio networks using a modified Q-learning algorithm , 2015, 2015 International Conference on Military Communications and Information Systems (ICMCIS).

[56]  Daniel Kudenko,et al.  Distributed response to network intrusions using multiagent reinforcement learning , 2015, Eng. Appl. Artif. Intell..

[57]  Jun Wang,et al.  Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[58]  Qiang Ni,et al.  Application of reinforcement learning for security enhancement in cognitive radio networks , 2015, Appl. Soft Comput..

[59]  Lihui Wang,et al.  Current status and advancement of cyber-physical systems in manufacturing , 2015 .

[60]  Shane Legg,et al.  Human-level control through deep reinforcement learning , 2015, Nature.

[61]  Honglak Lee,et al.  Action-Conditional Video Prediction using Deep Networks in Atari Games , 2015, NIPS.

[62]  Yuval Tassa,et al.  Continuous control with deep reinforcement learning , 2015, ICLR.

[63]  Yann LeCun,et al.  Deep multi-scale video prediction beyond mean square error , 2015, ICLR.

[64]  Roksana Boreli,et al.  A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[65]  David Silver,et al.  Deep Reinforcement Learning with Double Q-Learning , 2015, AAAI.

[66]  Ian F. Akyildiz,et al.  QoS-Aware Adaptive Routing in Multi-layer Hierarchical Software Defined Networks: A Reinforcement Learning Approach , 2016, 2016 IEEE International Conference on Services Computing (SCC).

[67]  Tom Schaul,et al.  Dueling Network Architectures for Deep Reinforcement Learning , 2015, ICML.

[68]  Alex Graves,et al.  Asynchronous Methods for Deep Reinforcement Learning , 2016, ICML.

[69]  Rajkumar Buyya,et al.  Fog Computing: Helping the Internet of Things Realize Its Potential , 2016, Computer.

[70]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[71]  Xiangming Wen,et al.  Perceptual spectrum waterfall of pattern shape recognition algorithm , 2016, 2016 18th International Conference on Advanced Communication Technology (ICACT).

[72]  Pieter Abbeel,et al.  Value Iteration Networks , 2016, NIPS.

[73]  Demis Hassabis,et al.  Mastering the game of Go with deep neural networks and tree search , 2016, Nature.

[74]  Ravishankar K. Iyer,et al.  Game Theory with Learning for Cyber Security Monitoring , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).

[75]  Jing Liu,et al.  A Survey of Game Theoretic Methods for Cyber Security , 2016, 2016 IEEE First International Conference on Data Science in Cyberspace (DSC).

[76]  Choong Seon Hong,et al.  Congestion prevention mechanism based on Q-leaning for efficient routing in SDN , 2016, 2016 International Conference on Information Networking (ICOIN).

[77]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[78]  Tom Schaul,et al.  Prioritized Experience Replay , 2015, ICLR.

[79]  Sudharman K. Jayaweera,et al.  Reinforcement learning based anti-jamming with wideband autonomous cognitive radios , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).

[80]  K. Ramachandran,et al.  Dynamic Game Theories in Cyber Security , 2016 .

[81]  Yunheung Paek,et al.  LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems , 2016, ArXiv.

[82]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[83]  Jiankun Hu,et al.  Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks , 2016, Future Internet.

[84]  H. Vincent Poor,et al.  Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[85]  Arslan Munir,et al.  Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks , 2017, MLDM.

[86]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[87]  Marc Peter Deisenroth,et al.  Deep Reinforcement Learning: A Brief Survey , 2017, IEEE Signal Processing Magazine.

[88]  Saeid Nahavandi,et al.  System Design Perspective for Human-Level Agents Using Deep Reinforcement Learning: A Survey , 2017, IEEE Access.

[89]  Tom Schaul,et al.  StarCraft II: A New Challenge for Reinforcement Learning , 2017, ArXiv.

[90]  Jean C. Walrand,et al.  Knowledge-Defined Networking , 2016, Comput. Commun. Rev..

[91]  Kostas E. Psannis,et al.  Cognitive Radio Network and Network Service Chaining toward 5G: Challenges and Requirements , 2017, IEEE Communications Magazine.

[92]  Xiaojiang Du,et al.  Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[93]  Hao Xu,et al.  Deep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).

[94]  Dale Schuurmans,et al.  Bridging the Gap Between Value and Policy Based Reinforcement Learning , 2017, NIPS.

[95]  Meikang Qiu,et al.  Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data , 2017, IEEE Systems Journal.

[96]  Bernardi Pranggono,et al.  Machine learning based intrusion detection system for software defined networks , 2017, 2017 Seventh International Conference on Emerging Security Technologies (EST).

[97]  Razvan Pascanu,et al.  Learning model-based planning from scratch , 2017, ArXiv.

[98]  Mubashir Husain Rehmani,et al.  Network Coding in Cognitive Radio Networks: A Comprehensive Survey , 2017, IEEE Communications Surveys & Tutorials.

[99]  Osama A. Mohammed,et al.  A Survey on Smart Grid Cyber-Physical System Testbeds , 2017, IEEE Communications Surveys & Tutorials.

[100]  Demis Hassabis,et al.  Mastering the game of Go without human knowledge , 2017, Nature.

[101]  Tom Schaul,et al.  Reinforcement Learning with Unsupervised Auxiliary Tasks , 2016, ICLR.

[102]  Sudharman K. Jayaweera,et al.  Multi-Agent Reinforcement Learning Based Cognitive Anti-Jamming , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[103]  Alec Radford,et al.  Proximal Policy Optimization Algorithms , 2017, ArXiv.

[104]  Marco Wiering,et al.  Adversarial Reinforcement Learning in a Cyber Security Simulation , 2017, ICAART.

[105]  Sergey Levine,et al.  Deep reinforcement learning for robotic manipulation with asynchronous off-policy updates , 2016, 2017 IEEE International Conference on Robotics and Automation (ICRA).

[106]  Victor C. M. Leung,et al.  Software-Defined Networks with Mobile Edge Computing and Caching for Smart Cities: A Big Data Deep Reinforcement Learning Approach , 2017, IEEE Communications Magazine.

[107]  Ali Dehghantanha,et al.  Machine learning aided Android malware classification , 2017, Comput. Electr. Eng..

[108]  Bo Li,et al.  TStarBots: Defeating the Cheating Level Builtin AI in StarCraft II in the Full Game , 2018, ArXiv.

[109]  P SomanK.,et al.  A short review on Applications of Deep learning for Cyber security , 2018, ArXiv.

[110]  Sukumar Mishra,et al.  Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks , 2018, Journal of Medical Systems.

[111]  Abhishek Gupta,et al.  Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks , 2018, ArXiv.

[112]  Alexandre M. Bayen,et al.  Variance Reduction for Policy Gradient with Action-Dependent Factorized Baselines , 2018, ICLR.

[113]  André C. Drummond,et al.  A Survey of Random Forest Based Methods for Intrusion Detection Systems , 2018, ACM Comput. Surv..

[114]  H. Vincent Poor,et al.  A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning , 2018, IEEE Transactions on Information Forensics and Security.

[115]  Jianye Hao,et al.  Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning , 2018, IEEE Transactions on Software Engineering.

[116]  M. Rege Machine Learning for Cyber Defense and Attack , 2018 .

[117]  Walid Saad,et al.  Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).

[118]  John Yen,et al.  Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths , 2018, IEEE Transactions on Information Forensics and Security.

[119]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[120]  Xiaoqing Han,et al.  Review on the research and practice of deep learning and reinforcement learning in smart grids , 2018, CSEE Journal of Power and Energy Systems.

[121]  Chunhua Wang,et al.  Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.

[122]  Alagan Anpalagan,et al.  Anti-Jamming Communications Using Spectrum Waterfall: A Deep Reinforcement Learning Approach , 2017, IEEE Communications Letters.

[123]  Paul Jacob,et al.  Host Based Intrusion Detection System with Combined CNN/RNN Model , 2018, Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML.

[124]  Quanyan Zhu,et al.  Game Theory Meets Network Security: A Tutorial , 2018, CCS.

[125]  B. Geluvaraj,et al.  The Future of Cybersecurity: Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cyberspace , 2018, International Conference on Computer Networks and Communication Technologies.

[126]  Shweta Varshney,et al.  Variants of LEACH Routing Protocol in WSN: A Comparative Analysis , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).

[127]  Amir Hussain,et al.  Applications of Deep Learning and Reinforcement Learning to Biological Data , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[128]  Olexandr Isayev,et al.  Deep reinforcement learning for de novo drug design , 2017, Science Advances.

[129]  David Isele,et al.  Navigating Occluded Intersections with Autonomous Vehicles Using Deep Reinforcement Learning , 2018, 2018 IEEE International Conference on Robotics and Automation (ICRA).

[130]  Amaury Lendasse,et al.  Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines , 2017, J. Frankl. Inst..

[131]  Jianhua Li,et al.  Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks , 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[132]  Vasisht Duddu,et al.  A Survey of Adversarial Machine Learning in Cyber Warfare , 2018, Defence Science Journal.

[133]  Razvan Pascanu,et al.  Relational Deep Reinforcement Learning , 2018, ArXiv.

[134]  D. Malathi,et al.  A Survey on Anomaly Based Host Intrusion Detection System , 2018 .

[135]  Di Wu,et al.  IoT Security Techniques Based on Machine Learning , 2018, ArXiv.

[136]  Tao Jiang,et al.  Deep Reinforcement Learning for Mobile Edge Caching: Review, New Features, and Open Issues , 2018, IEEE Network.

[137]  Saddam Hossen,et al.  Analysis of Network Intrusion Detection System with Machine Learning Algorithms (Deep Reinforcement Learning Algorithm) , 2018 .

[138]  Joel Z. Leibo,et al.  Human-level performance in first-person multiplayer games with population-based deep reinforcement learning , 2018, ArXiv.

[139]  S. Biswas Intrusion Detection Using Machine Learning: A Comparison Study , 2018 .

[140]  Hong Zheng,et al.  Nonlane-Discipline-Based Car-Following Model for Electric Vehicles in Transportation- Cyber-Physical Systems , 2018, IEEE Transactions on Intelligent Transportation Systems.

[141]  Saeid Nahavandi,et al.  Deep Reinforcement Learning for Multi-Agent Systems: A Review of Challenges, Solutions and Applications , 2018, ArXiv.

[142]  Yu Zhang,et al.  Intelligent Cloud Resource Management with Deep Reinforcement Learning , 2018, IEEE Cloud Computing.

[143]  Ji Li,et al.  DRL-cloud: Deep reinforcement learning-based resource provisioning and task scheduling for cloud service providers , 2018, 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC).

[144]  Sateesh K. Peddoju,et al.  HIDS: A host based intrusion detection system for cloud computing environment , 2018, Int. J. Syst. Assur. Eng. Manag..

[145]  Michele Colajanni,et al.  On the effectiveness of machine and deep learning for cyber security , 2018, 2018 10th International Conference on Cyber Conflict (CyCon).

[146]  Christopher Leckie,et al.  Reinforcement Learning for Autonomous Defence in Software-Defined Networking , 2018, GameSec.

[147]  Sergey Levine,et al.  Neural Network Dynamics for Model-Based Deep Reinforcement Learning with Model-Free Fine-Tuning , 2017, 2018 IEEE International Conference on Robotics and Automation (ICRA).

[148]  Matthew W. Hoffman,et al.  Distributed Distributional Deterministic Policy Gradients , 2018, ICLR.

[149]  Saeid Nahavandi,et al.  A Human Mixed Strategy Approach to Deep Reinforcement Learning , 2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[150]  Yonghui Song,et al.  A New Deep-Q-Learning-Based Transmission Scheduling Mechanism for the Cognitive Internet of Things , 2018, IEEE Internet of Things Journal.

[151]  Jin Chen,et al.  Interference-Aware Cooperative Anti-Jamming Distributed Channel Selection in UAV Communication Networks , 2018, Applied Sciences.

[152]  Yan Zhang,et al.  Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.

[153]  Xiang Chen,et al.  Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.

[154]  Weihua Zhuang,et al.  UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning , 2018, IEEE Transactions on Vehicular Technology.

[155]  Akbar Siami Namin,et al.  Deep Reinforcement Learning for Detecting Malicious Websites , 2019, ArXiv.

[156]  Daniel S. Berman,et al.  A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..

[157]  Zhen Ni,et al.  A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[158]  Saeid Nahavandi,et al.  Multi-Agent Deep Reinforcement Learning with Human Strategies , 2018, 2019 IEEE International Conference on Industrial Technology (ICIT).

[159]  Meikang Qiu,et al.  Reinforcement Learning for Cyber-Physical Systems , 2019 .

[160]  Young B. Moon,et al.  Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods , 2019, J. Intell. Manuf..

[161]  Saeid Nahavandi,et al.  A New Tensioning Method using Deep Reinforcement Learning for Surgical Pattern Cutting , 2019, 2019 IEEE International Conference on Industrial Technology (ICIT).

[162]  Manuel López Martín,et al.  Adversarial environment reinforcement learning algorithm for intrusion detection , 2019, Comput. Networks.

[163]  Luliang Jia,et al.  A Collaborative Multi-Agent Reinforcement Learning Anti-Jamming Algorithm in Wireless Networks , 2018, IEEE Wireless Communications Letters.

[164]  Holger Boche,et al.  Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks , 2019, IEEE Transactions on Information Forensics and Security.

[165]  Ying-Chang Liang,et al.  Applications of Deep Reinforcement Learning in Communications and Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[166]  Georgios Kambourakis,et al.  Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems , 2019, IEEE Access.

[167]  Yi Wang,et al.  A Survey of Code Reuse Attack and Defense , 2018 .

[168]  Luciano Bononi,et al.  Reinforcement Learning-Based Spectrum Management for Cognitive Radio Networks: A Literature Review and Case Study , 2019, Handbook of Cognitive Radio.

[169]  Qiang Ye,et al.  A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks , 2019, Inf. Fusion.

[170]  Tong Lu,et al.  On Reinforcement Learning for Full-length Game of StarCraft , 2018, AAAI.

[171]  Xiangpeng Xie,et al.  Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks , 2019, IEEE Transactions on Cybernetics.

[172]  Saeid Nahavandi,et al.  Deep Learning for Deepfakes Creation and Detection , 2019, ArXiv.

[173]  Li Li,et al.  Long memory is important: A test study on deep-learning based car-following model , 2019, Physica A: Statistical Mechanics and its Applications.

[174]  Pin Wan,et al.  A survey of dynamic spectrum allocation based on reinforcement learning algorithms in cognitive radio networks , 2018, Artif. Intell. Rev..

[175]  Jiqiang Liu,et al.  Adversarial attack and defense in reinforcement learning-from AI security view , 2019, Cybersecur..

[176]  Ying Chen,et al.  Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control , 2019, IEEE Transactions on Smart Grid.

[177]  Yehuda Afek,et al.  Zero-Day Signature Extraction for High-Volume Attacks , 2019, IEEE/ACM Transactions on Networking.

[178]  Qian He,et al.  Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond , 2019, IEEE Network.

[179]  Moitrayee Chatterjee,et al.  Detecting Phishing Websites through Deep Reinforcement Learning , 2019, 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC).

[180]  Saeid Nahavandi,et al.  Manipulating Soft Tissues by Deep Reinforcement Learning for Autonomous Robotic Surgery , 2019, 2019 IEEE International Systems Conference (SysCon).

[181]  Jie Zhang,et al.  On the Performance of Deep Reinforcement Learning-Based Anti-Jamming Method Confronting Intelligent Jammer , 2019, Applied Sciences.

[182]  Yan Huang,et al.  A Deep-Reinforcement-Learning-Based Approach to Dynamic eMBB/URLLC Multiplexing in 5G NR , 2020, IEEE Internet of Things Journal.

[183]  Xuesong Wang,et al.  Approximate Policy-Based Accelerated Deep Reinforcement Learning , 2020, IEEE Transactions on Neural Networks and Learning Systems.

[184]  Zhu Han,et al.  Trust-Based Social Networks with Computing, Caching and Communications: A Deep Reinforcement Learning Approach , 2020, IEEE Transactions on Network Science and Engineering.

[185]  Naren Ramakrishnan,et al.  Deep Reinforcement Learning for Sequence-to-Sequence Models , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[186]  Lin Zhang,et al.  Deep reinforcement learning approach for autonomous vehicle systems for maintaining security and safety using LSTM-GAN , 2020, Veh. Commun..

[187]  Saeid Nahavandi,et al.  Deep Reinforcement Learning for Multiagent Systems: A Review of Challenges, Solutions, and Applications , 2018, IEEE Transactions on Cybernetics.

[188]  Saeid Nahavandi,et al.  Deep learning for deepfakes creation and detection: A survey , 2019, Comput. Vis. Image Underst..

[189]  Chaoxu Mu,et al.  A Learning-Based Solution for an Adversarial Repeated Game in Cyber–Physical Power Systems , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[190]  Jintao Li,et al.  Data-driven software defined network attack detection : State-of-the-art and perspectives , 2020, Inf. Sci..

[191]  Liang Tong,et al.  Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning , 2019, AAAI.

[192]  Hao Chen,et al.  Self-Tuning Sectorization: Deep Reinforcement Learning Meets Broadcast Beam Optimization , 2019, IEEE Transactions on Wireless Communications.

[193]  Thanh Thi Nguyen,et al.  A Multi-Objective Deep Reinforcement Learning Framework , 2018, Eng. Appl. Artif. Intell..

[194]  Lei Ma,et al.  Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning , 2020, AAAI.

[195]  Manuel López Martín,et al.  Application of deep reinforcement learning to intrusion detection for supervised problems , 2020, Expert Syst. Appl..

[196]  Song Guo,et al.  Green Resource Allocation Based on Deep Reinforcement Learning in Content-Centric IoT , 2018, IEEE Transactions on Emerging Topics in Computing.

[197]  Liang Xiao,et al.  Reinforcement Learning Based PHY Authentication for VANETs , 2020, IEEE Transactions on Vehicular Technology.

[198]  Leon O. Chua,et al.  Neuromemristive Circuits for Edge Computing: A Review , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[199]  Ling Shi,et al.  Deep Reinforcement Learning for Wireless Sensor Scheduling in Cyber-Physical Systems , 2018, Autom..

[200]  Juan Ospina,et al.  Deep Reinforcement Learning for Cybersecurity Assessment of Wind Integrated Power Systems , 2020, IEEE Access.

[201]  Haibo He,et al.  Cyber-Attack Recovery Strategy for Smart Grid Based on Deep Reinforcement Learning , 2020, IEEE Transactions on Smart Grid.

[202]  Nauman Aslam,et al.  An efficient reinforcement learning-based Botnet detection approach , 2020, J. Netw. Comput. Appl..

[203]  Giancarlo Fortino,et al.  A hybrid deep learning model for efficient intrusion detection in big data environment , 2020, Inf. Sci..

[204]  Zhiqiang Pu,et al.  Formation Control With Collision Avoidance Through Deep Reinforcement Learning Using Model-Guided Demonstration , 2020, IEEE Transactions on Neural Networks and Learning Systems.

[205]  Anastasios Tefas,et al.  Price Trailing for Financial Trading Using Deep Reinforcement Learning , 2020, IEEE Transactions on Neural Networks and Learning Systems.

[206]  Walid Saad,et al.  Interdependence-Aware Game-Theoretic Framework for Secure Intelligent Transportation Systems , 2020, IEEE Internet of Things Journal.

[207]  Dinh Thai Hoang,et al.  Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning , 2020, IEEE Transactions on Artificial Intelligence.

[208]  Quoc Viet Hung Nguyen,et al.  Deep Learning for Deepfakes Creation and Detection: A Survey , 2022, SSRN Electronic Journal.