Provably efficient black-box action poisoning attacks against reinforcement learning

G Liu, L Lai - Advances in Neural Information Processing …, 2021 - proceedings.neurips.cc
Due to the broad range of applications of reinforcement learning (RL), understanding the
effects of adversarial attacks against RL model is essential for the safe applications of this …

Adversarial attacks on linear contextual bandits

E Garcelon, B Roziere, L Meunier… - Advances in …, 2020 - proceedings.neurips.cc
Contextual bandit algorithms are applied in a wide range of domains, from advertising to
recommender systems, from clinical trials to education. In many of these domains, malicious …

Bandit-based data poisoning attack against federated learning for autonomous driving models

S Wang, Q Li, Z Cui, J Hou, C Huang - Expert Systems with Applications, 2023 - Elsevier
Abstract In Internet of Things (IoT) applications, federated learning is commonly used for
distributedly training models in a privacy-preserving manner. Recently, federated learning is …

Reward poisoning attacks on offline multi-agent reinforcement learning

Y Wu, J McMahan, X Zhu, Q **e - … of the aaai conference on artificial …, 2023 - ojs.aaai.org
In offline multi-agent reinforcement learning (MARL), agents estimate policies from a given
dataset. We study reward-poisoning attacks in this setting where an exogenous attacker …

Conservative exploration in reinforcement learning

E Garcelon, M Ghavamzadeh… - International …, 2020 - proceedings.mlr.press
While learning in an unknown Markov Decision Process (MDP), an agent should trade off
exploration to discover new information about the MDP, and exploitation of the current …

Byzantine-resilient decentralized multi-armed bandits

J Zhu, A Koppel, A Velasquez, J Liu - arxiv preprint arxiv:2310.07320, 2023 - arxiv.org
In decentralized cooperative multi-armed bandits (MAB), each agent observes a distinct
stream of rewards, and seeks to exchange information with others to select a sequence of …

When are linear stochastic bandits attackable?

H Wang, H Xu, H Wang - International Conference on …, 2022 - proceedings.mlr.press
We study adversarial attacks on linear stochastic bandits: by manipulating the rewards, an
adversary aims to control the behaviour of the bandit algorithm. Perhaps surprisingly, we first …

Exploring the training robustness of distributional reinforcement learning against noisy state observations

K Sun, Y Zhao, S Jui, L Kong - Joint European Conference on Machine …, 2023 - Springer
In real scenarios, state observations that an agent observes may contain measurement
errors or adversarial noises, misleading the agent to take suboptimal actions or even …

Action-manipulation attacks against stochastic bandits: Attacks and defense

G Liu, L Lai - IEEE Transactions on Signal Processing, 2020 - ieeexplore.ieee.org
Due to the broad range of applications of stochastic multi-armed bandit model,
understanding the effects of adversarial attacks and designing bandit algorithms robust to …

[HTML][HTML] Multi-armed bandit problem with online clustering as side information

A Dzhoha, I Rozora - Journal of Computational and Applied Mathematics, 2023 - Elsevier
We consider the sequential resource allocation problem under the multi-armed bandit model
in the non-stationary stochastic environment. Motivated by many real applications, where …