{"id":22659,"date":"2023-10-11T11:41:33","date_gmt":"2023-10-11T09:41:33","guid":{"rendered":"https:\/\/www.itspy.cz\/thesis\/application-of-reinforcement-learning-to-creating-adversarial-malware-samples\/"},"modified":"2023-10-11T11:41:33","modified_gmt":"2023-10-11T09:41:33","slug":"application-of-reinforcement-learning-to-creating-adversarial-malware-samples","status":"publish","type":"thesis","link":"https:\/\/www.itspy.cz\/en\/thesis\/application-of-reinforcement-learning-to-creating-adversarial-malware-samples\/","title":{"rendered":"Application of Reinforcement Learning to Creating Adversarial Malware Samples"},"content":{"rendered":"","protected":false},"featured_media":20895,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"university":[45,284],"thesis-year":[350],"class_list":["post-22659","thesis","type-thesis","status-publish","has-post-thumbnail","hentry","thesis-year-350"],"acf":{"autor":"Matou\u0161 Koz\u00e1k","portret":"","vedouci":"Martin Jure\u010dek"},"_links":{"self":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/22659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis"}],"about":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/types\/thesis"}],"version-history":[{"count":0,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/22659\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media\/20895"}],"wp:attachment":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media?parent=22659"}],"wp:term":[{"taxonomy":"university","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/university?post=22659"},{"taxonomy":"thesis-year","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis-year?post=22659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}