The following publications are possibly variants of this publication:
- SHATTER: Searching Heterogeneous Combat Network Attack Sequences Through Network Embedding and Reinforcement LearningChengyi Zeng, Hongfu Liu, Lina Lu, Jing Chen, Zongtan Zhou. sj, 17(3):4497-4508, September 2023. [doi]
- Designing Medium Access Control Protocol Sequences Through Deep Reinforcement LearningCédric Adjih, Chung Shue Chen, Chetanveer Sharma Gobin, Iman Hmedoush. eucnc 2023: 1-6 [doi]
- Snooping Attacks on Deep Reinforcement LearningMatthew Inkawhich, Yiran Chen, Hai Helen Li. atal 2020: 557-565 [doi]
- Characterizing Attacks on Deep Reinforcement LearningXinlei Pan, Chaowei Xiao, Warren He, Shuang Yang, Jian Peng, Mingjie Sun, Mingyan Liu, Bo Li, Dawn Song. atal 2022: 1010-1018 [doi]
- Sequence-Based Deep Reinforcement Learning for Task Offloading in Mobile Edge Computing: A Comparison StudyXiang-Jie Xiao, Yong Wang, Kezhi Wang, Pei-Qiu Huang. bic-ta 2024: 94-106 [doi]
- Mobile Edge Computing Against Smart Attacks with Deep Reinforcement Learning in Cognitive MIMO IoT SystemsSongyang Ge, Beiling Lu, Liang Xiao, Jie Gong, Xiang Chen 0007, Yun Liu. monet, 25(5):1851-1862, 2020. [doi]