{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:18Z","timestamp":1756271418323,"version":"3.44.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130128","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"612-618","source":"Crossref","is-referenced-by-count":0,"title":["Securing DRL-Based Traffic Signal Control Against Experience Replay Manipulation Attacks"],"prefix":"10.1109","author":[{"given":"Myria","family":"Bouhaddi","sequence":"first","affiliation":[{"name":"Universit&#x00E9; du Qu&#x00E9;bec en Outaouais,Computer Security Research Laboratory,Quebec,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62416-7_19"},{"key":"ref2","article-title":"End to end learning for self-driving cars","author":"Bojarski","year":"2016","journal-title":"arXiv preprint arXiv:1604.07316"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224960"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSR61664.2024.10679438"},{"article-title":"Sunil Ojha, Anjali Shahapure, and Shweta Rajesh Jahagirdar. Cyber threats and its mitigation to intelligent transportation system","year":"2024","author":"Dewangan","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2023.100167"},{"key":"ref7","article-title":"Online robustness training for deep reinforcement learning","author":"Fischer","year":"2019","journal-title":"arXiv preprint arXiv:1911.00887"},{"key":"ref8","article-title":"Generative adversarial nets","volume":"27","author":"Goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01554-1_9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/OJITS.2021.3118972"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122581"},{"issue":"1","key":"ref12","first-page":"1","article-title":"Deep learning adversarial attacks and defenses in autonomous vehicles: a systematic literature review from a safety perspective","volume":"58","author":"Dawod","year":"2025","journal-title":"Artificial Intelligence Review"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3111139"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108033"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2977378"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218663"},{"volume-title":"Game-theoretic robust reinforcement learning handles temporallycoupled perturbations","year":"2023","author":"Liang","key":"ref17"},{"key":"ref18","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv preprint arXiv:1706.06083"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.58806\/ijirme.2024.v3i7n10"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3640312"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref22","first-page":"2817","article-title":"Robust adversarial reinforcement learning","volume-title":"Proceedings of the 34th International Conference on Machine Learning","volume":"70","author":"Pinto"},{"key":"ref23","article-title":"Robust deep reinforcement learning through adversarial attacks and training: A survey","author":"Schott","year":"2024","journal-title":"arXiv preprint arXiv:2403.00420"},{"key":"ref24","first-page":"8707","article-title":"Deep reinforcement learning with robust and smooth policy","volume-title":"International Conference on Machine Learning","author":"Shen"},{"key":"ref25","first-page":"6215","article-title":"Action robust reinforcement learning and applications in continuous control","volume-title":"International Conference on Machine Learning","author":"Tessler"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00125"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3203871"},{"volume-title":"Mis-spoke or mis-lead: Achieving robustness in multi-agent communicative reinforcement learning","year":"2021","author":"Xue","key":"ref28"},{"key":"ref29","article-title":"Romfac: A robust mean-field actor-critic reinforcement learning against adversarial perturbations on states","author":"Zhou","year":"2022","journal-title":"arXiv preprint arXiv:2205.07229"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130128.pdf?arnumber=11130128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:52:47Z","timestamp":1756270367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130128","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}