Research Article
Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning
Input: Similarity sample set ; | Output: Optimal strategy ; | 1: for : do | 2: Calculate similarity with DTW; | 3: if then | 4: Continue; | 5: else: | 6: ; | 7: end for | 8: return |
|