Research Article

Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning

Algorithm 1

Optimal strategy.
Input: Similarity sample set ;
Output: Optimal strategy ;
1: for : do
2: Calculate similarity with DTW;
3: if then
4:  Continue;
5: else:
6:  ;
7: end for
8: return