Author of the publication

Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence.

, , , , , , , , and . IJCNN, page 1-8. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning., , , , and . IEEE Trans. Inf. Forensics Secur., 11 (3): 556-570 (2016)Evading Anomaly Detection through Variance Injection Attacks on PCA., , , , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 394-395. Springer, (2008)Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks., and . CoRR, (2017)Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security., , and . CCS, page 1555. ACM, (2014)E-Storm: Replication-Based State Management in Distributed Stream Processing Systems., , , , and . ICPP, page 571-580. IEEE Computer Society, (2017)Securing Cyber-Physical Systems: Physics-Enhanced Adversarial Learning for Autonomous Platoons., , , and . ECML/PKDD (3), volume 13715 of Lecture Notes in Computer Science, page 269-285. Springer, (2022)Hard to Forget: Poisoning Attacks on Certified Machine Unlearning., , and . AAAI, page 7691-7700. AAAI Press, (2022)Enhancing the Antidote: Improved Pointwise Certifications against Poisoning Attacks., , , , and . AAAI, page 8861-8869. AAAI Press, (2023)Geometric & Topological Representations of Maximum Classes with Applications to Sample Compression., and . COLT, page 299-310. Omnipress, (2008)Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems., , , and . SP, page 473-488. IEEE, (2022)