Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals | part of Game Theory and Machine Learning for Cyber Security | Wiley-IEEE Press books | IEEE Xplore