Abstract: Machine learning malware detectors are vulnerable to adversarial EXEmples, i.e., carefully-crafted Windows programs tailored to evade detection. Unlike other adversarial problems, attacks in ...
Abstract: This paper proposes an ascent phase trajectory planning method for combined-cycle reusable launch vehicles (CRLV) based on the DDPG algorithm. First, the motion model and flight constraint ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results