{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:45:58Z","timestamp":1770273958954,"version":"3.49.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/iros.2017.8206245","type":"proceedings-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T17:12:59Z","timestamp":1513271579000},"page":"3932-3939","source":"Crossref","is-referenced-by-count":67,"title":["Adversarially Robust Policy Learning: Active construction of physically-plausible perturbations"],"prefix":"10.1109","author":[{"given":"Ajay","family":"Mandlekar","sequence":"first","affiliation":[]},{"given":"Yuke","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Animesh","family":"Garg","sequence":"additional","affiliation":[]},{"given":"Li","family":"Fei-Fei","sequence":"additional","affiliation":[]},{"given":"Silvio","family":"Savarese","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"zhu","year":"2016","journal-title":"Target-driven visual navigation in indoor scenes using deep reinforcement learning"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2017.XIII.048"},{"key":"ref33","author":"schulman","year":"2015","journal-title":"Trust region policy optimization"},{"key":"ref32","author":"rusu","year":"2016","journal-title":"Sim-to-real robot learning from pixels with progressive nets"},{"key":"ref31","author":"rusu","year":"2016","journal-title":"Progressive neural networks"},{"key":"ref30","author":"rajeswaran","year":"2016","journal-title":"Epopt Learning robust neural network policies using model ensembles"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2012.6386109"},{"key":"ref36","first-page":"1633","article-title":"Transfer learning for reinforcement learning domains: A survey","volume":"10","author":"taylor","year":"2009","journal-title":"Journal of Machine Learning Research"},{"key":"ref35","author":"szegedy","year":"2013","journal-title":"Intriguing properties of neural networks"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"ref10","author":"goodfellow","year":"2014","journal-title":"Explaining and Harnessing Adversarial Examples"},{"key":"ref11","author":"green","year":"2012","journal-title":"Linear Robust Control"},{"key":"ref12","author":"grosse","year":"2017","journal-title":"On the (statistical) detection of adversarial examples"},{"key":"ref13","author":"harrison","year":"2017","journal-title":"Adapt zero-shot adaptive policy transfer for stochastic dynamical systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s002110050272"},{"key":"ref15","author":"huang","year":"2017","journal-title":"Adversarial attacks on neural network policies"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913495721"},{"key":"ref17","author":"kurakin","year":"2016","journal-title":"Adversarial examples in the physical world"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2174\/1573399812666160613113556"},{"key":"ref19","author":"levine","year":"2016","journal-title":"Learning hand-eye coordination for robotic grasping with deep learning and large-scale data collection"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1050.0216"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553380"},{"key":"ref27","year":"0","journal-title":"multilateral surgical pattern cutting in 2d orthotropic gauze with deep reinforcement learning policies for tensioning"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62416-7_19"},{"key":"ref6","author":"boyce","year":"2010","journal-title":"The Distance to Uncontrollability via Linear Matrix Inequalities"},{"key":"ref29","author":"papernot","year":"2016","journal-title":"Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref8","author":"gao","year":"2017","journal-title":"Deepmask Masking dnn models for robustness against adversarial samples"},{"key":"ref7","author":"devin","year":"2016","journal-title":"Learning modular neural network policies for multi-task and multi-robot transfer&#x201D;"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"ref9","first-page":"1437","article-title":"A comprehensive survey on safe reinforcement learning","volume":"16","author":"garcia","year":"2015","journal-title":"Journal of Machine Learning Research"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143845"},{"key":"ref20","author":"lillicrap","year":"2015","journal-title":"Continuous control with deep reinforcement learning"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426504"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/S0363012902405339"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref23","article-title":"Asynchronous methods for deep reinforcement learning","author":"mnih","year":"2016","journal-title":"ICML 2016"},{"key":"ref26","article-title":"Deep-fool: a simple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref25","author":"moosavi-dezfooli","year":"2016","journal-title":"Universal adversarial perturbations"}],"event":{"name":"2017 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS)","location":"Vancouver, BC","start":{"date-parts":[[2017,9,24]]},"end":{"date-parts":[[2017,9,28]]}},"container-title":["2017 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119304\/8202121\/08206245.pdf?arnumber=8206245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T16:36:38Z","timestamp":1519835798000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8206245\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/iros.2017.8206245","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}