{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:02:54Z","timestamp":1769922174565,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1845969"],"award-info":[{"award-number":["1845969"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,19]]},"DOI":"10.1145\/3450267.3450537","type":"proceedings-article","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T22:09:05Z","timestamp":1617314945000},"page":"87-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Query-based targeted action-space adversarial policies on deep reinforcement learning agents"],"prefix":"10.1145","author":[{"given":"Xian Yeow","family":"Lee","sequence":"first","affiliation":[{"name":"Iowa State University"}]},{"given":"Yasaman","family":"Esfandiari","sequence":"additional","affiliation":[{"name":"Iowa State University"}]},{"given":"Kai Liang","family":"Tan","sequence":"additional","affiliation":[{"name":"Iowa State University"}]},{"given":"Soumik","family":"Sarkar","sequence":"additional","affiliation":[{"name":"Iowa State University"}]}],"member":"320","published-online":{"date-parts":[[2021,5,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"e_1_3_2_1_2_1","unstructured":"Mich\u00e8le Basseville and Igor V Nikiforov. 1993. Detection of abrupt changes: theory and application.  Mich\u00e8le Basseville and Igor V Nikiforov. 1993. Detection of abrupt changes: theory and application."},{"key":"e_1_3_2_1_3_1","volume-title":"Machine Learning and Data Mining in Pattern Recognition","author":"Behzadan Vahid","unstructured":"Vahid Behzadan and Arslan Munir . 2017. Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks . In Machine Learning and Data Mining in Pattern Recognition , Petra Perner (Ed.). Springer International Publishing , Cham , 262--275. Vahid Behzadan and Arslan Munir. 2017. Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks. In Machine Learning and Data Mining in Pattern Recognition, Petra Perner (Ed.). Springer International Publishing, Cham, 262--275."},{"key":"e_1_3_2_1_4_1","volume-title":"Machine Learning and Knowledge Discovery in Databases, Hendrik Blockeel, Kristian Kersting, Siegfried Nijssen, and Filip \u017delezn\u00fd (Eds.)","author":"Biggio Battista","unstructured":"Battista Biggio , Igino Corona , Davide Maiorca , Blaine Nelson , Nedim \u0160rndi\u0107 , Pavel Laskov , Giorgio Giacinto , and Fabio Roli . 2013. Evasion Attacks against Machine Learning at Test Time . In Machine Learning and Knowledge Discovery in Databases, Hendrik Blockeel, Kristian Kersting, Siegfried Nijssen, and Filip \u017delezn\u00fd (Eds.) . Springer Berlin Heidelberg , Berlin, Heidelberg , 387--402. Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim \u0160rndi\u0107, Pavel Laskov, Giorgio Giacinto, and Fabio Roli. 2013. Evasion Attacks against Machine Learning at Test Time. In Machine Learning and Knowledge Discovery in Databases, Hendrik Blockeel, Kristian Kersting, Siegfried Nijssen, and Filip \u017delezn\u00fd (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 387--402."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0027-x"},{"key":"e_1_3_2_1_6_1","volume-title":"AAAI Workshop (2019","author":"Esfandiari Yasaman","year":"2019","unstructured":"Yasaman Esfandiari , Aditya Balu , Keivan Ebrahimi , Umesh Vaidya , Nicola Elia , and Soumik Sarkar . 2019 . A Fast Saddle-Point Dynamical System Approach to Robust Deep Learning . AAAI Workshop (2019 ). https:\/\/arxiv.org\/abs\/1910.08623 Yasaman Esfandiari, Aditya Balu, Keivan Ebrahimi, Umesh Vaidya, Nicola Elia, and Soumik Sarkar. 2019. A Fast Saddle-Point Dynamical System Approach to Robust Deep Learning. AAAI Workshop (2019). https:\/\/arxiv.org\/abs\/1910.08623"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2960636"},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Learning Representations (2019","author":"Gleave Adam","year":"2019","unstructured":"Adam Gleave , Michael Dennis , Cody Wild , Neel Kant , Sergey Levine , and Stuart Russell . 2019 . Adversarial policies: Attacking deep reinforcement learning . International Conference on Learning Representations (2019 ). https:\/\/arxiv.org\/abs\/1905.10615 Adam Gleave, Michael Dennis, Cody Wild, Neel Kant, Sergey Levine, and Stuart Russell. 2019. Adversarial policies: Attacking deep reinforcement learning. International Conference on Learning Representations (2019). https:\/\/arxiv.org\/abs\/1905.10615"},{"key":"e_1_3_2_1_9_1","unstructured":"Ian Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. arXiv:1412.6572  Ian Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. arXiv:1412.6572"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2570003"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42421-020-00020-1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3327546.3327658"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-30164-8_363"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-019-09421-1"},{"key":"e_1_3_2_1_15_1","volume-title":"Adversarial Attacks on Neural Network Policies. ICLR Workshop","author":"Huang Sandy","year":"2017","unstructured":"Sandy Huang , Nicolas Papernot , Ian Goodfellow , Yan Duan , and Pieter Abbeel . 2017 . Adversarial Attacks on Neural Network Policies. ICLR Workshop (2017). https:\/\/arxiv.org\/abs\/1702.02284 Sandy Huang, Nicolas Papernot, Ian Goodfellow, Yan Duan, and Pieter Abbeel. 2017. Adversarial Attacks on Neural Network Policies. ICLR Workshop (2017). https:\/\/arxiv.org\/abs\/1702.02284"},{"key":"e_1_3_2_1_16_1","volume-title":"Ala Al-Fuqaha, Dinh Thai Hoang, and Dusit Niyato.","author":"Ilahi Inaam","year":"2020","unstructured":"Inaam Ilahi , Muhammad Usama , Junaid Qadir , Muhammad Umar Janjua , Ala Al-Fuqaha, Dinh Thai Hoang, and Dusit Niyato. 2020 . Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning . arXiv:2001.09684 Inaam Ilahi, Muhammad Usama, Junaid Qadir, Muhammad Umar Janjua, Ala Al-Fuqaha, Dinh Thai Hoang, and Dusit Niyato. 2020. Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning. arXiv:2001.09684"},{"key":"e_1_3_2_1_17_1","volume-title":"ICLR Workshop","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin , Ian Goodfellow , and Samy Bengio . 2017 . Adversarial examples in the physical world . ICLR Workshop (2017). https:\/\/arxiv.org\/abs\/1607.02533 Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2017. Adversarial examples in the physical world. ICLR Workshop (2017). https:\/\/arxiv.org\/abs\/1607.02533"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1115\/1.4044397"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5887"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.addma.2020.101444"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2585464"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479095"},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Learning Representations.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2018 . Towards Deep Learning Models Resistant to Adversarial Attacks . In International Conference on Learning Representations. Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2017.8206245"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Volodymyr Mnih Koray Kavukcuoglu David Silver Andrei A Rusu Joel Veness Marc G Bellemare Alex Graves Martin Riedmiller Andreas K Fidjeland Georg Ostrovski etal 2015. Human-level control through deep reinforcement learning. nature 518 7540 (2015) 529--533.  Volodymyr Mnih Koray Kavukcuoglu David Silver Andrei A Rusu Joel Veness Marc G Bellemare Alex Graves Martin Riedmiller Andreas K Fidjeland Georg Ostrovski et al. 2015. Human-level control through deep reinforcement learning. nature 518 7540 (2015) 529--533.","DOI":"10.1038\/nature14236"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45541-5_6"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/3237383.3238064"},{"key":"e_1_3_2_1_29_1","volume-title":"Deep reinforcement learning for de novo drug design. Science advances 4, 7","author":"Popova Mariya","year":"2018","unstructured":"Mariya Popova , Olexandr Isayev , and Alexander Tropsha . 2018. Deep reinforcement learning for de novo drug design. Science advances 4, 7 ( 2018 ), eaap7885. Mariya Popova, Olexandr Isayev, and Alexander Tropsha. 2018. Deep reinforcement learning for de novo drug design. Science advances 4, 7 (2018), eaap7885."},{"key":"e_1_3_2_1_30_1","unstructured":"Alex Ray Joshua Achiam and Dario Amodei. 2019. Benchmarking safe exploration in deep reinforcement learning. (2019).  Alex Ray Joshua Achiam and Dario Amodei. 2019. Benchmarking safe exploration in deep reinforcement learning. (2019)."},{"key":"e_1_3_2_1_31_1","unstructured":"Alessio Russo and Alexandre Proutiere. 2019. Optimal attacks on reinforcement learning policies. arXiv:1907.13548  Alessio Russo and Alexandre Proutiere. 2019. Optimal attacks on reinforcement learning policies. arXiv:1907.13548"},{"key":"e_1_3_2_1_32_1","unstructured":"John Schulman Filip Wolski Prafulla Dhariwal Alec Radford and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv:1707.06347  John Schulman Filip Wolski Prafulla Dhariwal Alec Radford and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv:1707.06347"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6047"},{"key":"e_1_3_2_1_34_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2014. Intriguing properties of neural networks. arXiv:1312.6199  Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2014. Intriguing properties of neural networks. arXiv:1312.6199"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9147846"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1115\/DSCC2019-9076"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"6224","author":"Tessler Chen","year":"2019","unstructured":"Chen Tessler , Yonathan Efroni , and Shie Mannor . 2019 . Action Robust Reinforcement Learning and Applications in Continuous Control . In Proceedings of the 36th International Conference on Machine Learning (Proceedings of Machine Learning Research , Vol. 97), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.). PMLR, 6215-- 6224 . http:\/\/proceedings.mlr.press\/v97\/tessler19a.html Chen Tessler, Yonathan Efroni, and Shie Mannor. 2019. Action Robust Reinforcement Learning and Applications in Continuous Control. In Proceedings of the 36th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 97), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.). PMLR, 6215--6224. http:\/\/proceedings.mlr.press\/v97\/tessler19a.html"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2351671"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W50199.2020.00013"}],"event":{"name":"ICCPS '21: ACM\/IEEE 12th International Conference on Cyber-Physical Systems","location":"Nashville Tennessee","acronym":"ICCPS '21","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","IEEE-CS\\TCRT TC on Real-Time Systems"]},"container-title":["Proceedings of the ACM\/IEEE 12th International Conference on Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450267.3450537","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3450267.3450537","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3450267.3450537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:46:58Z","timestamp":1750193218000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450267.3450537"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,19]]},"references-count":40,"alternative-id":["10.1145\/3450267.3450537","10.1145\/3450267"],"URL":"https:\/\/doi.org\/10.1145\/3450267.3450537","relation":{},"subject":[],"published":{"date-parts":[[2021,5,19]]},"assertion":[{"value":"2021-05-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}