Q-Defense: When Q-Learning Comes to Help Proof-of-Work Against the Selfish Mining Attack.
Ali Nikhalat JahromiAli Mohammad SaghiriMohammad Reza MeybodiPublished in: ICAART (1) (2024)
Keyphrases
- cooperative
- multi agent
- web mining
- reinforcement learning
- sequential patterns
- data mining
- ddos attacks
- intrusion detection
- pattern mining
- resource allocation
- function approximation
- text mining
- state space
- defense mechanisms
- network security
- mining algorithm
- data mining methods
- action selection
- learning algorithm
- data mining techniques
- knowledge discovery
- mobile robot
- frequent patterns
- association rule mining
- itemsets
- learning rate
- reinforcement learning algorithms
- dynamic programming