Abstract: Machine learning malware detectors are vulnerable to adversarial EXEmples, i.e., carefully-crafted Windows programs tailored to evade detection. Unlike other adversarial problems, attacks in ...
Abstract: This paper proposes an ascent phase trajectory planning method for combined-cycle reusable launch vehicles (CRLV) based on the DDPG algorithm. First, the motion model and flight constraint ...