
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning
Inaam Ilahi, Muhammad Usama, Junaid Qadir, et al.
IEEE Transactions on Artificial Intelligence (2021) Vol. 3, Iss. 2, pp. 90-109
Open Access | Times Cited: 95
Inaam Ilahi, Muhammad Usama, Junaid Qadir, et al.
IEEE Transactions on Artificial Intelligence (2021) Vol. 3, Iss. 2, pp. 90-109
Open Access | Times Cited: 95
Showing 26-50 of 95 citing articles:
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
Linkang Du, Min Chen, Mingyang Sun, et al.
(2024)
Open Access | Times Cited: 2
Linkang Du, Min Chen, Mingyang Sun, et al.
(2024)
Open Access | Times Cited: 2
Multi-agent Reinforcement Learning-based Passenger Spoofing Attack on Mobility-as-a-Service
Kai-Fung Chu, Weisi Guo
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 6, pp. 5565-5581
Open Access | Times Cited: 2
Kai-Fung Chu, Weisi Guo
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 6, pp. 5565-5581
Open Access | Times Cited: 2
Multiagent Reinforcement Learning: Methods, Trustworthiness, Applications in Intelligent Vehicles, and Challenges
Ziyuan Zhou, Guanjun Liu, Ying Tang
IEEE Transactions on Intelligent Vehicles (2024), pp. 1-23
Closed Access | Times Cited: 2
Ziyuan Zhou, Guanjun Liu, Ying Tang
IEEE Transactions on Intelligent Vehicles (2024), pp. 1-23
Closed Access | Times Cited: 2
Adversarial robustness of deep reinforcement learning-based intrusion detection
Mohamed Amine Merzouk, Christopher Neal, Joséphine Delas, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 6, pp. 3625-3651
Closed Access | Times Cited: 2
Mohamed Amine Merzouk, Christopher Neal, Joséphine Delas, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 6, pp. 3625-3651
Closed Access | Times Cited: 2
Robust Adversarial Reinforcement Learning with Dissipation Inequation Constraint
Peng Zhai, Jie Luo, Zhiyan Dong, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2022) Vol. 36, Iss. 5, pp. 5431-5439
Open Access | Times Cited: 11
Peng Zhai, Jie Luo, Zhiyan Dong, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2022) Vol. 36, Iss. 5, pp. 5431-5439
Open Access | Times Cited: 11
Securing AES Designs Against Power Analysis Attacks: A Survey
Thockchom Birjit Singha, Roy Paily, Shaik Rafi Ahamed
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 16, pp. 14332-14356
Closed Access | Times Cited: 6
Thockchom Birjit Singha, Roy Paily, Shaik Rafi Ahamed
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 16, pp. 14332-14356
Closed Access | Times Cited: 6
Multi-Agent Reinforcement Learning: Methods, Applications, Visionary Prospects, and Challenges
Ziyuan Zhou, Guanjun Liu, Ying Tang
arXiv (Cornell University) (2023)
Open Access | Times Cited: 6
Ziyuan Zhou, Guanjun Liu, Ying Tang
arXiv (Cornell University) (2023)
Open Access | Times Cited: 6
Explainable Machine Learning (XML) for Multimedia-Based Healthcare Systems: Opportunities, Challenges, Ethical and Future Prospects
Joseph Bamidele Awotunde, Agbotiname Lucky Imoize, Abidemi Emmanuel Adeniyi, et al.
Springer eBooks (2023), pp. 21-46
Closed Access | Times Cited: 6
Joseph Bamidele Awotunde, Agbotiname Lucky Imoize, Abidemi Emmanuel Adeniyi, et al.
Springer eBooks (2023), pp. 21-46
Closed Access | Times Cited: 6
Proximal Policy Optimization with Advantage Reuse Competition
Yuhu Cheng, Qingbang Guo, Xuesong Wang
IEEE Transactions on Artificial Intelligence (2024) Vol. 5, Iss. 8, pp. 3915-3925
Closed Access | Times Cited: 1
Yuhu Cheng, Qingbang Guo, Xuesong Wang
IEEE Transactions on Artificial Intelligence (2024) Vol. 5, Iss. 8, pp. 3915-3925
Closed Access | Times Cited: 1
A simulation and experimentation architecture for resilient cooperative multiagent reinforcement learning models operating in contested and dynamic environments
Ishan Honhaga, Claudia Szabo
SIMULATION (2024) Vol. 100, Iss. 6, pp. 563-579
Open Access | Times Cited: 1
Ishan Honhaga, Claudia Szabo
SIMULATION (2024) Vol. 100, Iss. 6, pp. 563-579
Open Access | Times Cited: 1
Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities
Ahmed Mohamed Ahmed, Thanh Thi Nguyen, Mohamed Abdelrazek, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 23, pp. 14341-14360
Closed Access | Times Cited: 1
Ahmed Mohamed Ahmed, Thanh Thi Nguyen, Mohamed Abdelrazek, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 23, pp. 14341-14360
Closed Access | Times Cited: 1
Securing Machine Learning: Understanding Adversarial Attacks and Bias Mitigation
Archit Lakhani, Neyah Rohit
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 2316-2342
Open Access | Times Cited: 1
Archit Lakhani, Neyah Rohit
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 2316-2342
Open Access | Times Cited: 1
SpecGuard: Specification Aware Recovery for Robotic Autonomous Vehicles from Physical Attacks
Pritam Dash, Ethan Chan, Karthik Pattabiraman
(2024), pp. 1849-1863
Open Access | Times Cited: 1
Pritam Dash, Ethan Chan, Karthik Pattabiraman
(2024), pp. 1849-1863
Open Access | Times Cited: 1
Robust Opponent Modeling via Adversarial Ensemble Reinforcement Learning
Macheng Shen, Jonathan P. How
Proceedings of the International Conference on Automated Planning and Scheduling (2021) Vol. 31, pp. 578-587
Open Access | Times Cited: 11
Macheng Shen, Jonathan P. How
Proceedings of the International Conference on Automated Planning and Scheduling (2021) Vol. 31, pp. 578-587
Open Access | Times Cited: 11
Robust Multi-Agent Coordination via Evolutionary Generation of Auxiliary Adversarial Attackers
Lei Yuan, Ziqian Zhang, Ke Xue, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 10, pp. 11753-11762
Open Access | Times Cited: 4
Lei Yuan, Ziqian Zhang, Ke Xue, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 10, pp. 11753-11762
Open Access | Times Cited: 4
Targeted Adversarial Attacks on Deep Reinforcement Learning Policies via Model Checking
Dennis Gross, Thiago Simão, Nils Jansen, et al.
Proceedings of the 14th International Conference on Agents and Artificial Intelligence (2023), pp. 501-508
Open Access | Times Cited: 3
Dennis Gross, Thiago Simão, Nils Jansen, et al.
Proceedings of the 14th International Conference on Agents and Artificial Intelligence (2023), pp. 501-508
Open Access | Times Cited: 3
Attention-Based Multiagent Graph Reinforcement Learning for Service Restoration
Bangji Fan, Xinghua Liu, Gaoxi Xiao, et al.
IEEE Transactions on Artificial Intelligence (2023) Vol. 5, Iss. 5, pp. 2163-2178
Closed Access | Times Cited: 3
Bangji Fan, Xinghua Liu, Gaoxi Xiao, et al.
IEEE Transactions on Artificial Intelligence (2023) Vol. 5, Iss. 5, pp. 2163-2178
Closed Access | Times Cited: 3
Robustness Testing for Multi-Agent Reinforcement Learning: State Perturbations on Critical Agents
Ziyuan Zhou, Guanjun Liu
Frontiers in artificial intelligence and applications (2023)
Open Access | Times Cited: 3
Ziyuan Zhou, Guanjun Liu
Frontiers in artificial intelligence and applications (2023)
Open Access | Times Cited: 3
Neural Network Verification in Control
Michael Everett
2021 60th IEEE Conference on Decision and Control (CDC) (2021), pp. 6326-6340
Open Access | Times Cited: 8
Michael Everett
2021 60th IEEE Conference on Decision and Control (CDC) (2021), pp. 6326-6340
Open Access | Times Cited: 8
Robotic Learning From Advisory and Adversarial Interactions Using a Soft Wrist
Masashi Hamaya, Kazutoshi Tanaka, Yoshiya Shibata, et al.
IEEE Robotics and Automation Letters (2021) Vol. 6, Iss. 2, pp. 3878-3885
Open Access | Times Cited: 7
Masashi Hamaya, Kazutoshi Tanaka, Yoshiya Shibata, et al.
IEEE Robotics and Automation Letters (2021) Vol. 6, Iss. 2, pp. 3878-3885
Open Access | Times Cited: 7
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study
Johannes F. Loevenich, Jonas Bode, Tobias Hürten, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2022), pp. 986-992
Closed Access | Times Cited: 5
Johannes F. Loevenich, Jonas Bode, Tobias Hürten, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2022), pp. 986-992
Closed Access | Times Cited: 5
Robotic Control in Adversarial and Sparse Reward Environments: A Robust Goal-Conditioned Reinforcement Learning Approach
Xiangkun He, Chen Lv
(2023)
Open Access | Times Cited: 2
Xiangkun He, Chen Lv
(2023)
Open Access | Times Cited: 2
Adversarial attacks on cooperative multi-agent deep reinforcement learning: a dynamic group-based adversarial example transferability method
Lixia Zan, Xiangbin Zhu, Zhao-Long Hu
Complex & Intelligent Systems (2023) Vol. 9, Iss. 6, pp. 7439-7450
Open Access | Times Cited: 2
Lixia Zan, Xiangbin Zhu, Zhao-Long Hu
Complex & Intelligent Systems (2023) Vol. 9, Iss. 6, pp. 7439-7450
Open Access | Times Cited: 2
Deep Learning of Sensor Data in Cybersecurity of Robotic Systems: Overview and Case Study Results
Wojciech Szynkiewicz, Ewa Niewiadomska‐Szynkiewicz, Kamila Lis
Electronics (2023) Vol. 12, Iss. 19, pp. 4146-4146
Open Access | Times Cited: 2
Wojciech Szynkiewicz, Ewa Niewiadomska‐Szynkiewicz, Kamila Lis
Electronics (2023) Vol. 12, Iss. 19, pp. 4146-4146
Open Access | Times Cited: 2
Policy Poisoning Attacks on Transfer Learning Enabled Resource Allocation for Network Slicing
Shavbo Salehi, Hao Zhou, Medhat Elsayed, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2023)
Closed Access | Times Cited: 2
Shavbo Salehi, Hao Zhou, Medhat Elsayed, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2023)
Closed Access | Times Cited: 2