Filters








2,354 Hits in 3.3 sec

Your Policy Regularizer is Secretly an Adversary [article]

Rob Brekelmans, Tim Genewein, Jordi Grau-Moya, Grégoire Delétang, Markus Kunesch, Shane Legg, Pedro Ortega
2022 arXiv   pre-print
Policy regularization methods such as maximum entropy regularization are widely used in reinforcement learning to improve the robustness of a learned policy.  ...  In this paper, we show how this robustness arises from hedging against worst-case perturbations of the reward function, which are chosen from a limited set by an imagined adversary.  ...  Each policy implicitly hedges against an adversary that perturbs the rewards according to the values and colormap shown.  ... 
arXiv:2203.12592v4 fatcat:ygvx5hyykvestk65ws7wzknz5y

Page 334 of Army and Navy Chronicle Vol. 7, Issue 21 [page]

1838 Army and Navy Chronicle  
Your generous sup- port of him, although a political adversary, has con- tributed to convince the most sceptical. RUSSIA AND ENGLAND IN THE EAST, Posen, Aug. 28.  ...  , the empire of the English in Southern Asia is at an end.  ... 

Page 1981 of None Vol. 27, Issue 30 [page]

1976 None  
Reitan secretly raised their grades and he does not deny it. But your reporter interviewed student C! I he grade of student C was raised by Dr. Philip Cl.  ...  Republication of any matter herein without express consent of the Editor-in-Chief is strictly forbidden. Editorial policy is rieterrnined by the Editor-in-Chief. Guest Opinion by Arthur J.  ... 

Page 587 of The Athenaeum Vol. , Issue 920 [page]

1845 The Athenaeum  
N° 9207] THE ATHENAUM 587 to communicate from me to your sovereign, so that no other than he should, if possible, have cognizance of it. It is thus.  ...  I should wish that | all my papers should be presented to you, without alteration, to the end that it might be apparent that it is not the mere care for your safety which prompts my persecutors.  ... 

Public attribution of cyber intrusions

Florian J Egloff
2020 Journal of Cybersecurity  
The policy challenge is increasingly moving from identifying who is behind a cyber intrusion to finding the adequate policy response, including whether to publicly attribute.  ...  Third, such norm shaping has the potential to exert an independent—though limited—deterrent effect, particularly on potential adversaries.  ...  In some of the cases observed, all with developed national security policy capabilities, attribution is normalized and folded into the regular national security policy processes demonstrating that at the  ... 
doi:10.1093/cybsec/tyaa012 dblp:journals/cybersecurity/Egloff20 fatcat:yjumqer6ufhkbdx5uqjjwmpaeu

Cell-Based Roadpricing [chapter]

Flavio D. Garcia, Eric R. Verheul, Bart Jacobs
2012 Lecture Notes in Computer Science  
Some of the cells are secretly marked as check cells. On board equipment contains a secure element that is made aware of these check cells and helps the pricing authorities to monitor the user.  ...  This approach is not only original but it also improves upon earlier approaches since it solves issues regarding positioning accuracy, collusion between different users, and the required level of interaction  ...  The present scheme can be considered as an enhancement of a scheme developed by him and Eric Verheul in 2008.  ... 
doi:10.1007/978-3-642-29804-2_7 fatcat:tk6gsav3xncfbhuvgkurvxesaq

A comprehensive taxonomy of security and privacy issues in RFID

Atul Kumar, Ankit Kumar Jain, Mohit Dua
2021 Complex & Intelligent Systems  
Hence, this paper discusses various possible attacks that can occur on an RFID system, and several security schemes that have been proposed to handle these attacks.  ...  AbstractInternet of things (IoT) is made up of many devices like sensors, tags, actuators, mobile devices, and many more. These devices interact with each other without human interaction.  ...  Covert channel attack In these types of attacks, the adversary creates unwarranted communication mediums to transmit data secretly.  ... 
doi:10.1007/s40747-021-00280-6 fatcat:vqaowzxtwrh6hjaio6nmfzjay4

Page 186 of Leslie's Weekly Vol. 50, Issue 1286 [page]

1880 Leslie's Weekly  
causes you to lose the esteem of your fellow-men, which may blast your life and even follow your memory beyond the grave, is guilty only of a misdemeanor, and the utmost punishment he can-be made to suf  ...  .,” is on every one’s lip and is cited with universal approval, and yet the man who deliberately, maliciously and falsely composes, and secretly dissemi- nates, beyond the power of recall, a libel which  ... 

Intra-party democracy beyond aggregation

Fabio Wolkenstein
2016 Party Politics  
24 adversaries is overdrawn.  ...  Such statements signal that even an adversarial style of debate is not seen as violating mutual respect.  ... 
doi:10.1177/1354068816655563 fatcat:bescuta5onftpknvx23owpni7i

Bandit Algorithms for Precision Medicine [article]

Yangyi Lu, Ziping Xu, Ambuj Tewari
2021 arXiv   pre-print
This chapter is about bandit algorithms: an area of data science of special relevance to precision medicine.  ...  It is not an entirely new idea: physicians from ancient times have recognized that medical treatment needs to consider individual variations in patient characteristics.  ...  In an adversarial bandit problem, the adversary secretly chooses reward vectors r := {r t } T t=1 where r t ∈ [0, 1] K corresponds to the rewards over all actions at time t.  ... 
arXiv:2108.04782v1 fatcat:dni5wyzyerestgs3upuzz776n4

Special procedural measures and respect of human rights

John VERVAELE
2009 Revue internationale de droit pénal  
Such a provision of an adversarial trial nature concerning intelligence information is quite unique in Europe.  ...  What is the practice of your country in this field?  ...  • the right to a public trial with an audience?; • the right to an oral, fair hearing and adversarial proceedings? • the right to be present at the trial?  ... 
doi:10.3917/ridp.801.0075 fatcat:qqdg5usaszf5jpdj7amvyqqyxe

Adversaries of Consumption: Consumer Movements, Activism, and Ideology

Robert V. Kozinets, Jay M. Handelman
2004 Journal of Consumer Research  
We find activists' collective identity linked to an evangelical identity related to U.S. activism's religious roots.  ...  Sorry but I tell it like it is. :) Maurice: Your calling people idiots does not make it so.  ...  The adversary is also represented as an obstacle to the general good, preventing the moral goals for which the activist strives.  ... 
doi:10.1086/425104 fatcat:vy5bmradfrbavfmfdq6amloapm

On protection in federated social computing systems

Ebrahim Tarameshloo, Philip W.L. Fong, Payman Mohassel
2014 Proceedings of the 4th ACM conference on Data and application security and privacy - CODASPY '14  
An important contribution of this work is that we carefully formulate the conditions under which policy evaluation using SMC does not lead to the leakage of information about the protection states of the  ...  We also study the computational problem of statically checking if an access control policy can be evaluated without information leakage. Lastly, we identify useful policy idioms. Definition 8.  ...  This approach employs regular SMC rather than PFE. At the centre of the approach is the static analysis of the shared access policies to detect if they are safe.  ... 
doi:10.1145/2557547.2557555 dblp:conf/codaspy/TarameshlooFM14 fatcat:qrl7z7wrxndxzgs32qyfgdhlaq

Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network [article]

Nguyen Phong Hoang
2016 arXiv   pre-print
After carefully considering the scalability problem in Tor and exhaustively evaluating related works on AS-level adversaries, the author proposes ASmoniTor, which is an autonomous system monitor for mitigating  ...  In contrast to prior works, which often released offline packets, including the source code of a modified Tor client and a snapshot of the Internet topology, ASmoniTor is an online system that assists  ...  you PC to prevent any claim that may come to you from your ISP or your organization).  ... 
arXiv:1610.02065v1 fatcat:vqnsgsxnn5botkta56lxkijtiy

Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach

Kervins Nicolas, Yi Wang, George C. Giakos, Bingyang Wei, Hongda Shen
2020 IEEE Access  
However, the security of the blockchain system is still a major concern.  ...  Blockchain is a technology that ensures data security by verifying database of records established in a decentralized and distributed network.  ...  The uncle block is a stale block whose parent is a regular block. A future regular block is also a nephew block if it references the uncle block.  ... 
doi:10.1109/access.2020.3047365 fatcat:6ofb6os2mfea7alfc3l4hnbqly
« Previous Showing results 1 — 15 out of 2,354 results