Author of the publication

Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning.

, , , , , , and . AAAI, page 5883-5891. AAAI Press, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing., , , , , and . IEEE Trans. Cloud Comput., 11 (1): 822-838 (January 2023)Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems., , and . IEEE Internet Things J., 8 (12): 9706-9716 (2021)Weighted Pseudo-θ-Almost Periodic Sequence and Finite-Time Guaranteed Cost Control for Discrete-Space and Discrete-Time Stochastic Genetic Regulatory Networks with Time Delays., , and . Axioms, 12 (7): 682 (July 2023)Exponential stability and synchronisation of fuzzy Mittag-Leffler discrete-time Cohen-Grossberg neural networks with time delays., , and . Int. J. Syst. Sci., 53 (11): 2318-2340 (2022)Shape-Sensitive Feature Extraction for Large-Aspect-Ratio Object Detection., , , , , and . IEEE Geosci. Remote. Sens. Lett., (2024)Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks., , and . HASP@MICRO, page 6:1-6:9. ACM, (2020)Deep Semantic Edge for Cell Counting and Localization in Time-Lapse Microscopy Images., and . PRCV (3), volume 13021 of Lecture Notes in Computer Science, page 337-349. Springer, (2021)SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View., , , , , and . EuroS&P, page 1082-1100. IEEE, (2023)Automatic Transformation Search Against Deep Leakage From Gradients., , , , , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 45 (9): 10650-10668 (September 2023)CloudMonatt: an architecture for security health monitoring and attestation of virtual machines in cloud computing., and . ISCA, page 362-374. ACM, (2015)