{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T20:33:10Z","timestamp":1774729990859,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,30]],"date-time":"2021-05-30T00:00:00Z","timestamp":1622332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,30]],"date-time":"2021-05-30T00:00:00Z","timestamp":1622332800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,30]],"date-time":"2021-05-30T00:00:00Z","timestamp":1622332800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,30]]},"DOI":"10.1109\/icra48506.2021.9560940","type":"proceedings-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T20:28:35Z","timestamp":1634675315000},"page":"10656-10662","source":"Crossref","is-referenced-by-count":16,"title":["Secure Planning Against Stealthy Attacks via Model-Free Reinforcement Learning"],"prefix":"10.1109","author":[{"given":"Alper Kamil","family":"Bozkurt","sequence":"first","affiliation":[]},{"given":"Yu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Miroslav","family":"Pajic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20398-5_9"},{"key":"ref38","article-title":"Model-free reinforcement learning for stochastic parity games","author":"hahn","year":"2020","journal-title":"31st International Conference on Concurrency Theory (CONCUR 2020)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-control-060117-104838"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2008.08.008"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2019.8794385"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25540-4_10"},{"key":"ref37","first-page":"395","article-title":"Omega-regular objectives in model-free reinforcement learning","author":"hahn","year":"2019","journal-title":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA40945.2020.9196796"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2016.021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2017.00012"},{"key":"ref10","first-page":"1","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"First Workshop on Secure Control Systems"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44829-2_5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010201"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2898510"},{"key":"ref13","article-title":"ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems","author":"li","year":"2020","journal-title":"arXiv 2003 05631 [cs]"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3323470"},{"key":"ref15","article-title":"A deep learning-based framework for conducting stealthy attacks in industrial control systems","author":"feng","year":"2017","journal-title":"arXiv 1709 06397 [cs]"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.39.10.1953"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"3116","DOI":"10.1109\/ROBOT.2007.363946","article-title":"Where&#x2019;s Waldo? sensor-based temporal logic motion planning","author":"kress-gazit","year":"2007","journal-title":"Proceedings 2007 IEEE International Conference on Robotics and Automation"},{"key":"ref18","first-page":"5025","article-title":"Revising motion planning under linear temporal logic specifications in partially known workspaces","author":"guo","year":"2013","journal-title":"2013 IEEE International Conference on Robotics and Automation"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03427-6_2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2014.6943080"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2607420"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010388"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-8897-9.ch071"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.06.010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47169-3_46"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCS.2014.2364723","article-title":"Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure","volume":"35","author":"smith","year":"2015","journal-title":"IEEE Control Systems Magazine"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2016.7524168"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2744196"},{"key":"ref22","first-page":"114","article-title":"Formally specified monitoring of temporal properties","author":"kim","year":"1999","journal-title":"Proceedings of 11th Euromicro Conference on Real-Time Systems. Euromicro RTS'99"},{"key":"ref21","first-page":"342","article-title":"Synthesizing monitors for safety properties","author":"havelund","year":"2002","journal-title":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50027-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.05.002"},{"key":"ref41","article-title":"CPSL@Duke","year":"2020","journal-title":"CSRL"},{"key":"ref23","author":"bozkurt","year":"2020","journal-title":"Model-free reinforcement learning for stochastic games with linear temporal logic objectives"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MCS.2016.2643239","article-title":"Design and implementation of attack-resilient cyberphysical systems: With a focus on attack-resilient state estimators","volume":"37","author":"pajic","year":"2017","journal-title":"IEEE Control Systems Magazine"},{"key":"ref25","author":"baier","year":"2008","journal-title":"Principles of Model Checking"}],"event":{"name":"2021 IEEE International Conference on Robotics and Automation (ICRA)","location":"Xi'an, China","start":{"date-parts":[[2021,5,30]]},"end":{"date-parts":[[2021,6,5]]}},"container-title":["2021 IEEE International Conference on Robotics and Automation (ICRA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9560720\/9560666\/09560940.pdf?arnumber=9560940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:47:14Z","timestamp":1652183234000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9560940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,30]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/icra48506.2021.9560940","relation":{},"subject":[],"published":{"date-parts":[[2021,5,30]]}}}