iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/DSC.2018.00125
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:09:18Z","timestamp":1730214558525,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/dsc.2018.00125","type":"proceedings-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T22:09:50Z","timestamp":1532038190000},"page":"773-780","source":"Crossref","is-referenced-by-count":14,"title":["A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding"],"prefix":"10.1109","author":[{"given":"Yingxiao","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Wenjia","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Jiqiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"55","article-title":"Implementation of human following mission by using fuzzy head motion control and q-learning wheel motion control for home service robot","author":"deng","year":"2014","journal-title":"International Conference on Fuzzy Theory and Its Applications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2006.10.009"},{"journal-title":"Q-learning for optimal control of continuous-time systems","year":"2014","author":"luo","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2012.2227719"},{"key":"ref14","article-title":"An improved q-learning algorithm for path-planning of a mobile robot","volume":"51","author":"das","year":"2012","journal-title":"International Journal of Computer Applications"},{"journal-title":"Learning from delayed rewards","year":"1989","author":"watkins","key":"ref15"},{"journal-title":"Delving into transferable adversarial examples and black-box attacks","year":"2016","author":"liu","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSCI.2008.017590"},{"key":"ref18","first-page":"1","article-title":"The delphi technique: making sense of consensus","volume":"12","author":"hsu","year":"2007","journal-title":"Practical Assessment Research & Evaluation"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7439(87)80084-9"},{"journal-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref4"},{"journal-title":"Berkeley released AI system challenge report","year":"2017","author":"ren","key":"ref3"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"2014","author":"goodfellow","key":"ref6"},{"journal-title":"Adversarial examples in the physical world","year":"2016","author":"kurakin","key":"ref5"},{"journal-title":"Playing atari with deep reinforcement learning","year":"2013","author":"mnih","key":"ref8"},{"key":"ref7","first-page":"513","article-title":"Hidden voice commands","author":"carlini","year":"2016","journal-title":"USENIX Security Symposium"},{"journal-title":"Achieving human parity in conversational speech recognition","year":"2016","author":"xiong","key":"ref2"},{"key":"ref1","first-page":"770","article-title":"Deep residual learning for image recognition","author":"he","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2143\/AST.36.2.2017933"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00158-003-0368-6"}],"event":{"name":"2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)","start":{"date-parts":[[2018,6,18]]},"location":"Guangzhou","end":{"date-parts":[[2018,6,21]]}},"container-title":["2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411555\/8411822\/08411946.pdf?arnumber=8411946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,11]],"date-time":"2018-12-11T01:31:23Z","timestamp":1544491883000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8411946\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":21,"URL":"http:\/\/dx.doi.org\/10.1109\/dsc.2018.00125","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}