Return to Article Details Planning for Attacker Entrapment in Adversarial Settings Download Download PDF