Research Article
Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning
| Input: Similarity sample set ; | | Output: Optimal strategy ; | | 1: for : do | | 2: Calculate similarity with DTW; | | 3: if then | | 4: Continue; | | 5: else: | | 6: ; | | 7: end for | | 8: return |
|