{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:21:49Z","timestamp":1730276509685,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T00:00:00Z","timestamp":1614816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T00:00:00Z","timestamp":1614816000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T00:00:00Z","timestamp":1614816000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,4]]},"DOI":"10.1109\/isr50024.2021.9419509","type":"proceedings-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T22:54:16Z","timestamp":1620687256000},"page":"177-181","source":"Crossref","is-referenced-by-count":1,"title":["Adversarial Black-Box Attacks on Vision-based Deep Reinforcement Learning Agents"],"prefix":"10.1109","author":[{"given":"Atanas","family":"Tanev","sequence":"first","affiliation":[]},{"given":"Svetlana","family":"Pavlitskaya","sequence":"additional","affiliation":[]},{"given":"Joan","family":"Sigloch","sequence":"additional","affiliation":[]},{"given":"Arne","family":"Roennau","sequence":"additional","affiliation":[]},{"given":"Ruediger","family":"Dillmann","sequence":"additional","affiliation":[]},{"given":"J. Marius","family":"Zollner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Adversarial patch","volume":"abs 1712 9665","author":"brown","year":"2017","journal-title":"CoRR"},{"journal-title":"AAAI Conference on Artificial Intelligence (AAAI-I9) - Workshops","article-title":"DPATCH: an adversarial patch attack on object detectors","year":"2019","author":"liu","key":"ref11"},{"journal-title":"International Conference on Intelligent Transportation Systems (ITSC)","article-title":"Feasibility and suppression of adversarial patch attacks on end-to-end vehicle control","year":"2020","author":"pavlitskaya","key":"ref12"},{"key":"ref13","article-title":"Characterizing attacks on deep reinforcement learning","volume":"abs 1907 9470","author":"xiao","year":"2019","journal-title":"CoRR"},{"journal-title":"Intelligent Autonomous Systems (IAS)","article-title":"Efficient, collaborative screw assembly in a shared workspace","year":"2018","author":"julg","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1090.001.0001"},{"key":"ref16","article-title":"Proximal policy optimization algorithms","volume":"abs 1707 6347","author":"schulman","year":"2017","journal-title":"CoRR"},{"journal-title":"Proc of the International Conference on Machine Learning (ICML)","article-title":"Soft actor-critic: Off-policy maximum entropy deep reinforcement learning with a stochastic actor","year":"2018","author":"haarnoja","key":"ref17"},{"key":"ref4","article-title":"Multi-goal reinforcement learning: Challenging robotics environments and request for research","volume":"abs 1802 9464","author":"plappert","year":"2018","journal-title":"CoRR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2018.8593986"},{"journal-title":"International Conference on Learning Representations (ICLR)","article-title":"Delving into adversarial attacks on deep policies","year":"2017","author":"kos","key":"ref6"},{"journal-title":"International Conference on Learning Representations (ICLR)","article-title":"Adversarial attacks on neural network policies","year":"2017","author":"huang","key":"ref5"},{"key":"ref8","article-title":"Playing atari with deep reinforcement learning","volume":"abs 1312 5602","author":"mnih","year":"2013","journal-title":"CoRR"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/525"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1177\/0278364919887447"},{"journal-title":"The Journal of Machine Learning Research","article-title":"End-to-end training of deep visuomotor policies","year":"2016","author":"levine","key":"ref1"},{"key":"ref9","article-title":"Targeted attacks on deep reinforcement learning agents through adversarial observations","volume":"abs 1905 12282","author":"hussenot","year":"2019","journal-title":"CoRR"}],"event":{"name":"2021 IEEE International Conference on Intelligence and Safety for Robotics (ISR)","start":{"date-parts":[[2021,3,4]]},"location":"Tokoname, Japan","end":{"date-parts":[[2021,3,6]]}},"container-title":["2021 IEEE International Conference on Intelligence and Safety for Robotics (ISR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9419481\/9419375\/09419509.pdf?arnumber=9419509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:41:18Z","timestamp":1652197278000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9419509\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,4]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/isr50024.2021.9419509","relation":{},"subject":[],"published":{"date-parts":[[2021,3,4]]}}}