{"id":"https://openalex.org/W4317928053","doi":"https://doi.org/10.1109/milcom55135.2022.10017788","title":"Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study","display_name":"Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study","publication_year":2022,"publication_date":"2022-11-28","ids":{"openalex":"https://openalex.org/W4317928053","doi":"https://doi.org/10.1109/milcom55135.2022.10017788"},"language":"en","primary_location":{"id":"doi:10.1109/milcom55135.2022.10017788","is_oa":true,"landing_page_url":"https://doi.org/10.1109/milcom55135.2022.10017788","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/milcom55135.2022.10017788","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044449306","display_name":"Johannes F. Loevenich","orcid":"https://orcid.org/0000-0002-8149-1600"},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Johannes F. Loevenich","raw_affiliation_strings":["Communication Systems (KOM), Fraunhofer FKIE,Bonn,Germany","Communication Systems (KOM), Fraunhofer FKIE, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Communication Systems (KOM), Fraunhofer FKIE,Bonn,Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"Communication Systems (KOM), Fraunhofer FKIE, Bonn, Germany","institution_ids":["https://openalex.org/I4210166245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060299659","display_name":"Jonas Bode","orcid":null},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]},{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jonas Bode","raw_affiliation_strings":["Communication Systems (KOM), Fraunhofer FKIE,Bonn,Germany","Communication Systems (KOM), Fraunhofer FKIE, Bonn, Germany","Institute of Computer Science 4, University of Bonn, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Communication Systems (KOM), Fraunhofer FKIE,Bonn,Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"Communication Systems (KOM), Fraunhofer FKIE, Bonn, Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"Institute of Computer Science 4, University of Bonn, Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001496560","display_name":"Tobias H\u00fcrten","orcid":"https://orcid.org/0009-0005-2121-0810"},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Tobias Hurten","raw_affiliation_strings":["Communication Systems (KOM), Fraunhofer FKIE,Bonn,Germany","Communication Systems (KOM), Fraunhofer FKIE, Bonn, Germany","Institute of Computer Science 4, University of Bonn, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Communication Systems (KOM), Fraunhofer FKIE,Bonn,Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"Communication Systems (KOM), Fraunhofer FKIE, Bonn, Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"Institute of Computer Science 4, University of Bonn, Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083355222","display_name":"Luca Liberto","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Luca Liberto","raw_affiliation_strings":["Communication Systems (KOM), Fraunhofer FKIE,Bonn,Germany","Institute of Computer Science 4, University of Bonn, Bonn, Germany","Communication Systems (KOM), Fraunhofer FKIE, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Communication Systems (KOM), Fraunhofer FKIE,Bonn,Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"Institute of Computer Science 4, University of Bonn, Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]},{"raw_affiliation_string":"Communication Systems (KOM), Fraunhofer FKIE, Bonn, Germany","institution_ids":["https://openalex.org/I4210166245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032041847","display_name":"Florian Spelter","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Florian Spelter","raw_affiliation_strings":["Communication Systems (KOM), Fraunhofer FKIE,Bonn,Germany","Institute of Computer Science 4, University of Bonn, Bonn, Germany","Communication Systems (KOM), Fraunhofer FKIE, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Communication Systems (KOM), Fraunhofer FKIE,Bonn,Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"Institute of Computer Science 4, University of Bonn, Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]},{"raw_affiliation_string":"Communication Systems (KOM), Fraunhofer FKIE, Bonn, Germany","institution_ids":["https://openalex.org/I4210166245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037683366","display_name":"Paulo H. L. Rettore","orcid":"https://orcid.org/0000-0002-5491-7274"},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Paulo H. L. Rettore","raw_affiliation_strings":["Communication Systems (KOM), Fraunhofer FKIE,Bonn,Germany","Communication Systems (KOM), Fraunhofer FKIE, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Communication Systems (KOM), Fraunhofer FKIE,Bonn,Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"Communication Systems (KOM), Fraunhofer FKIE, Bonn, Germany","institution_ids":["https://openalex.org/I4210166245"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091404899","display_name":"Roberto Rigolin F. Lopes","orcid":"https://orcid.org/0000-0002-0114-5610"},"institutions":[{"id":"https://openalex.org/I4210123028","display_name":"Thales (Germany)","ror":"https://ror.org/031xjr712","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210123028","https://openalex.org/I4210140930"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Roberto Rigolin F. Lopes","raw_affiliation_strings":["Secure Communications &#x0026; Information (SIX), Thales Deutschland,Ditzingen,Germany"],"affiliations":[{"raw_affiliation_string":"Secure Communications &#x0026; Information (SIX), Thales Deutschland,Ditzingen,Germany","institution_ids":["https://openalex.org/I4210123028"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5044449306"],"corresponding_institution_ids":["https://openalex.org/I4210166245"],"apc_list":null,"apc_paid":null,"fwci":1.5591,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.85396466,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"986","last_page":"992"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8525302410125732},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7876895666122437},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7811702489852905},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7323889136314392},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6417875289916992},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6251116394996643},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5483140349388123},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.5282610654830933},{"id":"https://openalex.org/keywords/interdiction","display_name":"Interdiction","score":0.42235293984413147},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2720043659210205},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19483038783073425}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8525302410125732},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7876895666122437},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7811702489852905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7323889136314392},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6417875289916992},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6251116394996643},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5483140349388123},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.5282610654830933},{"id":"https://openalex.org/C124119293","wikidata":"https://www.wikidata.org/wiki/Q6046081","display_name":"Interdiction","level":2,"score":0.42235293984413147},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2720043659210205},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19483038783073425},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/milcom55135.2022.10017788","is_oa":true,"landing_page_url":"https://doi.org/10.1109/milcom55135.2022.10017788","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/445088","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/445088","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":{"id":"doi:10.1109/milcom55135.2022.10017788","is_oa":true,"landing_page_url":"https://doi.org/10.1109/milcom55135.2022.10017788","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2773525213","https://openalex.org/W2914584698","https://openalex.org/W2941205169","https://openalex.org/W2949103145","https://openalex.org/W3011295242","https://openalex.org/W3039012799","https://openalex.org/W3082778152","https://openalex.org/W3100478228","https://openalex.org/W3114491006","https://openalex.org/W3120275486","https://openalex.org/W3190896305","https://openalex.org/W3200885897","https://openalex.org/W4206294250","https://openalex.org/W4224225791","https://openalex.org/W4296707631","https://openalex.org/W4296906804","https://openalex.org/W4298857966","https://openalex.org/W6637967152","https://openalex.org/W6692846177","https://openalex.org/W6747027214","https://openalex.org/W6788140797"],"related_works":["https://openalex.org/W2011893084","https://openalex.org/W878290859","https://openalex.org/W3129432682","https://openalex.org/W2043774727","https://openalex.org/W325242609","https://openalex.org/W2092143804","https://openalex.org/W21922278","https://openalex.org/W4353003365","https://openalex.org/W1481188117","https://openalex.org/W1538437077"],"abstract_inverted_index":{"Dynamic":[0],"changes":[1],"caused":[2],"by":[3],"conditions":[4],"such":[5,34,53],"as":[6],"challenging":[7],"terrain":[8],"or":[9],"hostile":[10],"encounters":[11],"force":[12],"tactical":[13,45,124],"networks":[14],"to":[15,79,82,91,98,115,136],"be":[16,80],"highly":[17],"adaptable.":[18],"To":[19],"tackle":[20],"this":[21],"problem,":[22],"new":[23],"proposals":[24,122],"implement":[25],"Reinforcement":[26],"Learning":[27],"(RL)":[28],"based":[29],"solutions":[30],"for":[31,44,107,123],"routing":[32],"in":[33,139],"complex":[35,112],"environments.":[36],"As":[37],"high":[38,100],"security":[39],"is":[40],"another":[41],"crucial":[42],"demand":[43],"networks,":[46],"we":[47,74,86,103],"examine":[48],"the":[49,56,76,88,95,105,117,131],"vulnerability":[50],"of":[51,60,70,119,133],"one":[52],"solution":[54,78],"against":[55],"novel":[57],"attack":[58,72,113],"vector":[59],"adversarial":[61],"attacks":[62,90],"specifically":[63],"targeting":[64],"RL":[65,121],"algorithms.":[66],"Utilizing":[67],"a":[68,99],"suite":[69],"varying":[71],"methods,":[73],"find":[75],"targeted":[77],"vulnerable":[81,140],"multiple":[83],"attacks.":[84],"Further,":[85],"found":[87],"best":[89],"exploit":[92],"knowledge":[93],"about":[94],"victim":[96],"agent":[97],"degree.":[101],"Lastly,":[102],"outline":[104],"need":[106],"additional":[108],"research":[109],"exploring":[110],"more":[111],"strategies":[114],"expose":[116],"vulnerabilities":[118],"other":[120],"networks.":[125],"This":[126],"investigation":[127],"may":[128],"also":[129],"ignite":[130],"design/implementation":[132],"defensive":[134],"measures":[135],"increase":[137],"robustness":[138],"systems.":[141]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
