Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1903.06638
Cited By
TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents
1 March 2019
Panagiota Kiourti
Kacper Wardega
Susmit Jha
Wenchao Li
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents"
13 / 13 papers shown
Title
SleeperNets: Universal Backdoor Poisoning Attacks Against Reinforcement Learning Agents
Ethan Rathbun
Christopher Amato
Alina Oprea
OffRL
AAML
46
4
0
30 May 2024
Recover Triggered States: Protect Model Against Backdoor Attack in Reinforcement Learning
Hao Chen
Chen Gong
Yizhen Wang
Xinwen Hou
AAML
28
1
0
01 Apr 2023
Efficient Reward Poisoning Attacks on Online Deep Reinforcement Learning
Yinglun Xu
Qi Zeng
Gagandeep Singh
AAML
40
6
0
30 May 2022
Deep-Attack over the Deep Reinforcement Learning
Yang Li
Quanbiao Pan
Min Zhang
AAML
32
13
0
02 May 2022
Neighboring Backdoor Attacks on Graph Convolutional Network
Liang Chen
Qibiao Peng
Jintang Li
Yang Liu
Jiawei Chen
Yong Li
Zibin Zheng
GNN
AAML
32
11
0
17 Jan 2022
Execute Order 66: Targeted Data Poisoning for Reinforcement Learning
Harrison Foley
Liam H. Fowl
Tom Goldstein
Gavin Taylor
AAML
23
9
0
03 Jan 2022
TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Esha Sarkar
Michail Maniatakos
32
3
0
14 Aug 2021
Topological Detection of Trojaned Neural Networks
Songzhu Zheng
Yikai Zhang
H. Wagner
Mayank Goswami
Chao Chen
AAML
32
40
0
11 Jun 2021
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors
Ren Pang
Zheng-Wei Zhang
Xiangshan Gao
Zhaohan Xi
S. Ji
Peng Cheng
Xiapu Luo
Ting Wang
AAML
29
31
0
16 Dec 2020
Backdoor Learning: A Survey
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
AAML
45
592
0
17 Jul 2020
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems
Yue Wang
Esha Sarkar
Wenqing Li
Michail Maniatakos
Saif Eddin Jabari
AAML
28
60
0
17 Mar 2020
The TrojAI Software Framework: An OpenSource tool for Embedding Trojans into Deep Learning Models
Kiran Karra
C. Ashcraft
Neil Fendley
19
35
0
13 Mar 2020
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
326
5,849
0
08 Jul 2016
1