A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Your Policy Regularizer is Secretly an Adversary
[article]
2022
arXiv
pre-print
Policy regularization methods such as maximum entropy regularization are widely used in reinforcement learning to improve the robustness of a learned policy. ...
In this paper, we show how this robustness arises from hedging against worst-case perturbations of the reward function, which are chosen from a limited set by an imagined adversary. ...
Each policy implicitly hedges against an adversary that perturbs the rewards according to the values and colormap shown. ...
arXiv:2203.12592v4
fatcat:ygvx5hyykvestk65ws7wzknz5y
Page 334 of Army and Navy Chronicle Vol. 7, Issue 21
[page]
1838
Army and Navy Chronicle
Your generous sup- port of him, although a political adversary, has con- tributed to convince the most sceptical.
RUSSIA AND ENGLAND IN THE EAST, Posen, Aug. 28. ...
, the empire of the English in Southern Asia is at an end. ...
Page 1981 of None Vol. 27, Issue 30
[page]
1976
None
Reitan secretly raised their grades and he does not deny it.
But your reporter interviewed student C!
I he grade of student C was raised by Dr. Philip Cl. ...
Republication of any matter herein without express consent of the Editor-in-Chief is strictly forbidden.
Editorial policy is rieterrnined by the Editor-in-Chief.
Guest Opinion
by Arthur J. ...
Page 587 of The Athenaeum Vol. , Issue 920
[page]
1845
The Athenaeum
N° 9207]
THE ATHENAUM
587
to communicate from me to your sovereign, so that no other than he should, if possible, have cognizance of it. It is thus. ...
I should wish that
| all my papers should be presented to you, without
alteration, to the end that it might be apparent that it is not the mere care for your safety which prompts my persecutors. ...
Public attribution of cyber intrusions
2020
Journal of Cybersecurity
The policy challenge is increasingly moving from identifying who is behind a cyber intrusion to finding the adequate policy response, including whether to publicly attribute. ...
Third, such norm shaping has the potential to exert an independent—though limited—deterrent effect, particularly on potential adversaries. ...
In some of the cases observed, all with developed national security policy capabilities, attribution is normalized and folded into the regular national security policy processes demonstrating that at the ...
doi:10.1093/cybsec/tyaa012
dblp:journals/cybersecurity/Egloff20
fatcat:yjumqer6ufhkbdx5uqjjwmpaeu
Cell-Based Roadpricing
[chapter]
2012
Lecture Notes in Computer Science
Some of the cells are secretly marked as check cells. On board equipment contains a secure element that is made aware of these check cells and helps the pricing authorities to monitor the user. ...
This approach is not only original but it also improves upon earlier approaches since it solves issues regarding positioning accuracy, collusion between different users, and the required level of interaction ...
The present scheme can be considered as an enhancement of a scheme developed by him and Eric Verheul in 2008. ...
doi:10.1007/978-3-642-29804-2_7
fatcat:tk6gsav3xncfbhuvgkurvxesaq
A comprehensive taxonomy of security and privacy issues in RFID
2021
Complex & Intelligent Systems
Hence, this paper discusses various possible attacks that can occur on an RFID system, and several security schemes that have been proposed to handle these attacks. ...
AbstractInternet of things (IoT) is made up of many devices like sensors, tags, actuators, mobile devices, and many more. These devices interact with each other without human interaction. ...
Covert channel attack In these types of attacks, the adversary creates unwarranted communication mediums to transmit data secretly. ...
doi:10.1007/s40747-021-00280-6
fatcat:vqaowzxtwrh6hjaio6nmfzjay4
Page 186 of Leslie's Weekly Vol. 50, Issue 1286
[page]
1880
Leslie's Weekly
causes you to lose the esteem of your fellow-men, which may blast your life and even follow your memory beyond the grave, is guilty only of a misdemeanor, and the utmost punishment he can-be made to suf ...
.,” is on every one’s lip and is cited with universal approval, and yet the man who deliberately, maliciously and falsely composes, and secretly dissemi- nates, beyond the power of recall, a libel which ...
Intra-party democracy beyond aggregation
2016
Party Politics
24 adversaries is overdrawn. ...
Such statements signal that even an adversarial style of debate is not seen as violating mutual respect. ...
doi:10.1177/1354068816655563
fatcat:bescuta5onftpknvx23owpni7i
Bandit Algorithms for Precision Medicine
[article]
2021
arXiv
pre-print
This chapter is about bandit algorithms: an area of data science of special relevance to precision medicine. ...
It is not an entirely new idea: physicians from ancient times have recognized that medical treatment needs to consider individual variations in patient characteristics. ...
In an adversarial bandit problem, the adversary secretly chooses reward vectors r := {r t } T t=1 where r t ∈ [0, 1] K corresponds to the rewards over all actions at time t. ...
arXiv:2108.04782v1
fatcat:dni5wyzyerestgs3upuzz776n4
Special procedural measures and respect of human rights
2009
Revue internationale de droit pénal
Such a provision of an adversarial trial nature concerning intelligence information is quite unique in Europe. ...
What is the practice of your country in this field? ...
• the right to a public trial with an audience?; • the right to an oral, fair hearing and adversarial proceedings? • the right to be present at the trial? ...
doi:10.3917/ridp.801.0075
fatcat:qqdg5usaszf5jpdj7amvyqqyxe
Adversaries of Consumption: Consumer Movements, Activism, and Ideology
2004
Journal of Consumer Research
We find activists' collective identity linked to an evangelical identity related to U.S. activism's religious roots. ...
Sorry but I tell it like it is. :) Maurice: Your calling people idiots does not make it so. ...
The adversary is also represented as an obstacle to the general good, preventing the moral goals for which the activist strives. ...
doi:10.1086/425104
fatcat:vy5bmradfrbavfmfdq6amloapm
On protection in federated social computing systems
2014
Proceedings of the 4th ACM conference on Data and application security and privacy - CODASPY '14
An important contribution of this work is that we carefully formulate the conditions under which policy evaluation using SMC does not lead to the leakage of information about the protection states of the ...
We also study the computational problem of statically checking if an access control policy can be evaluated without information leakage. Lastly, we identify useful policy idioms. Definition 8. ...
This approach employs regular SMC rather than PFE. At the centre of the approach is the static analysis of the shared access policies to detect if they are safe. ...
doi:10.1145/2557547.2557555
dblp:conf/codaspy/TarameshlooFM14
fatcat:qrl7z7wrxndxzgs32qyfgdhlaq
Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network
[article]
2016
arXiv
pre-print
After carefully considering the scalability problem in Tor and exhaustively evaluating related works on AS-level adversaries, the author proposes ASmoniTor, which is an autonomous system monitor for mitigating ...
In contrast to prior works, which often released offline packets, including the source code of a modified Tor client and a snapshot of the Internet topology, ASmoniTor is an online system that assists ...
you PC to prevent any claim that may come to you from your ISP or your organization). ...
arXiv:1610.02065v1
fatcat:vqnsgsxnn5botkta56lxkijtiy
Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach
2020
IEEE Access
However, the security of the blockchain system is still a major concern. ...
Blockchain is a technology that ensures data security by verifying database of records established in a decentralized and distributed network. ...
The uncle block is a stale block whose parent is a regular block. A future regular block is also a nephew block if it references the uncle block. ...
doi:10.1109/access.2020.3047365
fatcat:6ofb6os2mfea7alfc3l4hnbqly
« Previous
Showing results 1 — 15 out of 2,354 results