Data poisoning for reinforcement learning has historically focused on ge...
Facial recognition systems are increasingly deployed by private corporat...
In order to make better use of deep reinforcement learning in the creati...
Data Poisoning attacks involve an attacker modifying training data to
ma...
Data poisoning–the process by which an attacker takes control of a model...
In this paper, we explore clean-label poisoning attacks on deep convolut...
Reinforcement learning (RL) is capable of managing wireless,
energy-harv...
Adversarial training, in which a network is trained on adversarial examp...
Neural network training relies on our ability to find "good" minimizers ...
The alternating direction method of multipliers (ADMM) is commonly used ...
Variance reduction (VR) methods boost the performance of stochastic grad...
The increasing complexity of deep learning architectures is resulting in...
Recent interest in the use of L_1 regularization in the use of value
fun...
Recently, Petrik et al. demonstrated that L1Regularized Approximate Line...
Approximate dynamic programming has been used successfully in a large va...