Author of the publication

Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning.

, , , , , , and . AAAI, page 5883-5891. AAAI Press, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Deep Belief Networks for Precision Mechanism Quality Inspection., , and . IPAS, volume 435 of IFIP Advances in Information and Communication Technology, page 87-93. Springer, (2014)Simplified Fourier Series Based Transistor Open-Circuit Fault Location Method in Voltage-Source Inverter Fed Induction Motor., , , , , and . IEEE Access, (2020)Balancing Humans and Machines: A Study on Integration Scale and Its Impact on Collaborative Performance., , , , , , and . AAAI, page 17628-17636. AAAI Press, (2024)SoFi: Reflection-Augmented Fuzzing for JavaScript Engines., , , , , , , , , and 1 other author(s). CCS, page 2229-2242. ACM, (2021)Continuous Multiagent Control Using Collective Behavior Entropy for Large-Scale Home Energy Management., , , , and . AAAI, page 922-929. AAAI Press, (2020)Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning., , , , , , and . AAAI, page 5883-5891. AAAI Press, (2020)Software Architecture Recovery with Information Fusion., , , , , , and . ESEC/SIGSOFT FSE, page 1535-1547. ACM, (2023)A checkpointing and instant-on mechanism for a embedded system based on non-volatile memories., , , and . ComComAP, page 173-178. IEEE, (2014)Advanced Mathematics Exercise Recommendation Based on Automatic Knowledge Extraction and Multilayer Knowledge Graph., , , , , and . IEEE Trans. Learn. Technol., (2024)Attention-Based CNN-LSTM for Enhanced Perception of Bone Milling States in Surgical Robots., , , , and . IEEE Trans. Instrum. Meas., (2024)