Data Poisoning Attack to X-armed Bandits

Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

X-armed bandits have achieved the state-of-the-art performance in optimizing unknown stochastic continuous functions, which can model many machine learning tasks, specially in big data-driven personalized recommendation. However, bandit algorithms are vulnerable to adversarial attacks. Existing works mainly focus on attacking multi-armed bandits in discrete setting; nevertheless, the attacks against X-armed bandits in continuous setting have not been well explored. In this paper, we aim to bridge this gap and investigate the robustness problem for the X-armed bandits. Specifically, we consider data poisoning attack and propose an attack algorithm named Confidence Poisoning Attack algorithm, which could hijack the clean tree-based X-armed bandits algorithm, i.e., high confidence tree (HCT) and make it choose the nodes including the arm targeted by the attacker very frequently with a sub-linear attack cost, i.e., O(Tα)(0 <α< 1), where T is the total number of rounds. We evaluate the efficiency of our proposed attack algorithm through theoretical analysis and experiments.

Original languageEnglish
Title of host publicationProceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages345-351
Number of pages7
ISBN (Electronic)9781665494250
DOIs
Publication statusPublished - 2022
Event21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022 - Virtual, Online, China
Duration: 9 Dec 202211 Dec 2022

Publication series

NameProceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022

Conference

Conference21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022
Country/TerritoryChina
CityVirtual, Online
Period9/12/2211/12/22

Keywords

  • X-armed bandits
  • data poisoning attack
  • recommendation system
  • robustness

Fingerprint

Dive into the research topics of 'Data Poisoning Attack to X-armed Bandits'. Together they form a unique fingerprint.

Cite this