{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:42:51Z","timestamp":1730281371669,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:00:00Z","timestamp":1605571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:00:00Z","timestamp":1605571200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:00:00Z","timestamp":1605571200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,17]]},"DOI":"10.1109\/mascots50786.2020.9285955","type":"proceedings-article","created":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T18:22:16Z","timestamp":1608574936000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Attacks in a Deep Reinforcement Learning based Cluster Scheduler"],"prefix":"10.1109","author":[{"given":"Shaojun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Albert Y.","family":"Zomaya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s007780050037"},{"key":"ref32","first-page":"601","article-title":"Stealing machine learning models via prediction apis","author":"tram\u00e8r","year":"0","journal-title":"25th USENIX Security Symposium"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref37","first-page":"3932","article-title":"Adversar- ially robust policy learning: Active construction of physically-plausible perturbations","author":"mandlekar","year":"0","journal-title":"IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS)"},{"journal-title":"http \/\/www tpc org\/tpch\/","article-title":"Tpc-h-2019","year":"0","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1287\/opre.9.3.296"},{"journal-title":"Axiomatic Attribution for Deep Networks","year":"2017","author":"sundararajan","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2018.8297294"},{"key":"ref11","first-page":"705","article-title":"Model-free control for distributed stream data processing using deep reinforcement learning","volume":"11","author":"li","year":"2018","journal-title":"Very Large Data Bases (VLDB)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00201"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342080"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2016.16"},{"key":"ref15","first-page":"2669","article-title":"Safe reinforcement learning via shielding","author":"alshiekh","year":"0","journal-title":"Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence (AAAI)"},{"key":"ref16","article-title":"Towards safe online reinforcement learning in computer systems","author":"mao","year":"0","journal-title":"NeurIPS Machine Learning for Systems Workshop"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"2014","author":"goodfellow","key":"ref17"},{"key":"ref18","article-title":"Epopt: Learning robust neural network policies using model ensembles","author":"rajeswaran","year":"0","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2017.XIII.048"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2019.8834720"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2011.05.005"},{"journal-title":"Reinforcement Learning An Introduction","year":"2018","author":"sutton","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09457-1_7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2004.1303065"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00366-015-0396-z"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"mnih","year":"2015","journal-title":"Nature"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7051-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/71.993206"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/WIOPT.2017.7959912"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2002.1011417"},{"key":"ref20","article-title":"Apache spark","volume":"17","year":"2018","journal-title":"Retrieved January"},{"journal-title":"Apache Hadoop","year":"0","key":"ref22"},{"journal-title":"Apache Storm","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/0117039"},{"journal-title":"Apache TEZ","year":"0","key":"ref23"},{"journal-title":"A Brief Survey of Deep Reinforcement Learning","year":"2017","author":"arulkumaran","key":"ref26"},{"key":"ref25","first-page":"81","article-title":"Graphene: Packing and dependency-aware scheduling for data-parallel clusters","author":"grandl","year":"0","journal-title":"2nd USENIX Symposium on Operating Systems Design and Implementation (OSDI)"}],"event":{"name":"2020 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)","start":{"date-parts":[[2020,11,17]]},"location":"Nice, France","end":{"date-parts":[[2020,11,19]]}},"container-title":["2020 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9285930\/9285931\/09285955.pdf?arnumber=9285955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:57:58Z","timestamp":1656439078000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9285955\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,17]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/mascots50786.2020.9285955","relation":{},"subject":[],"published":{"date-parts":[[2020,11,17]]}}}