Searched for: subject%3A%22Reinforcement%255C%252BLearning%22
(1 - 8 of 8)
document
Wu, C. (author), Pan, W. (author), Staa, Rick (author), Liu, Jianxing (author), Sun, Guanghui (author), Wu, Ligang (author)
This paper investigates the deep reinforcement learning based secure control problem for cyber–physical systems (CPS) under false data injection attacks. We describe the CPS under attacks as a Markov decision process (MDP), based on which the secure controller design for CPS under attacks is formulated as an action policy learning using data....
journal article 2023
document
Remmerswaal, Mick G.D. (author), Wu, L. (author), Tiran, Sébastien (author), Mentens, Nele (author)
Template attacks (TAs) are one of the most powerful side-channel analysis (SCA) attacks. The success of such attacks relies on the effectiveness of the profiling model in modeling the leakage information. A crucial step for TA is to select relevant features from the measured traces, often called points of interest (POIs), to extract the...
journal article 2023
document
Wu, Chengwei (author), Yao, Weiran (author), Luo, Wensheng (author), Pan, W. (author), Sun, Guanghui (author), Xie, Hui (author), Wu, Ligang (author)
The problem of learning-based control for robots has been extensively studied, whereas the security issue under malicious adversaries has not been paid much attention to. Malicious adversaries can invade intelligent devices and communication networks used in robots, causing incidents, achieving illegal objectives, and even injuring people....
journal article 2023
document
Rijsdijk, Jorai (author), Wu, L. (author), Perin, G. (author)
Deep learning-based side-channel attacks are capable of breaking targets protected with countermeasures. The constant progress in the last few years makes the attacks more powerful, requiring fewer traces to break a target. Unfortunately, to protect against such attacks, we still rely solely on methods developed to protect against generic...
conference paper 2022
document
Wu, Chengwei (author), Yao, Weiran (author), Pan, W. (author), Sun, Guanghui (author), Liu, Jianxing (author), Wu, Ligang (author)
This article investigates the secure control problem for cyber-physical systems when the malicious data are injected into the cyber realm, which directly connects to the actuators. Based on moving target defense (MTD) and reinforcement learning, we propose a novel proactive and reactive defense control scheme. First, the system (A,B) is...
journal article 2021
document
Wu, C. (author), Pan, W. (author), Sun, Guanghui (author), Liu, Jianxing (author), Wu, Ligang (author)
This paper investigates the problem of optimal tracking control for cyber-physical systems (CPS) when the cyber realm is attacked by denial-of-service (DoS) attacks which can prevent the control signal transmitting to the actuator. Attention is focused on how to design the optimal tracking control scheme without using the system dynamics and...
journal article 2021
document
Rijsdijk, J. (author), Wu, L. (author), Perin, G. (author), Picek, S. (author)
Deep learning represents a powerful set of techniques for profiling side-channel analysis. The results in the last few years show that neural network architectures like multilayer perceptron and convolutional neural networks give strong attack performance where it is possible to break targets protected with various coun-termeasures....
journal article 2021
document
Wang, X. (author), Wu, Chaozhong (author), Xue, J. (author), Chen, Z. (author)
To date, automatic driving technology has become a hotspot in academia. It is necessary to provide a personalization of automatic driving decision for each passenger. The purpose of this paper is to propose a self-learning method for personalized driving decisions. First, collect and analyze driving data from different drivers to set learning...
journal article 2020
Searched for: subject%3A%22Reinforcement%255C%252BLearning%22
(1 - 8 of 8)