Action-Manipulation Attack and Defense to X-Armed Bandits

Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

As a continuous variant of Multi-armed bandits (MAB), X-armed bandits have enriched many applications of online machine learning like personalized recommendation system. However, the attack and defense to the X-armed bandits remain largely unexplored, though the MAB has proved to be vulnerable. In this paper, we aim to bridge this gap and investigate the robustness analysis for the X-armed bandits. Specifically, we consider action-manipulation attack, which is practical but harder than the existing reward-manipulation attack. We propose an attack algorithm based on a lower bound tree (LBT), which can continuously hijack the learner's action by perturbing X-armed bandits' high confidence tree (HCT) construction. As a result, the nodes including the arm targeted by the attacker is selected frequently with a sublinear attack cost. To defend against the LBT attack, we propose a robust version of the HCT algorithm, called RoHCT. We theoretically analyze that the regret of RoHCT is related to the upper bound of the total cost Q and still sublinear to total number of rounds T. We carry out experiments to evaluate the effectiveness of LBT and RoHCT.

Original languageEnglish
Title of host publicationProceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1115-1122
Number of pages8
ISBN (Electronic)9781665494250
DOIs
Publication statusPublished - 2022
Event21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022 - Virtual, Online, China
Duration: 9 Dec 202211 Dec 2022

Publication series

NameProceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022

Conference

Conference21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022
Country/TerritoryChina
CityVirtual, Online
Period9/12/2211/12/22

Keywords

  • action-manipulation attack
  • defense
  • robustness
  • χ-armed bandits

Fingerprint

Dive into the research topics of 'Action-Manipulation Attack and Defense to X-Armed Bandits'. Together they form a unique fingerprint.

Cite this