How Vulnerable is My Learned Policy? 

Adversarial Attacks on Modern Behavior Cloning Algorithms