Research Article

Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning

Figure 2

Similarity comparison.
(a) Similarity comparison (I)
(b) Similarity comparison (II)