Data Poisoning Attack to X-armed Bandits

Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou*

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

X-armed bandits have achieved the state-of-the-art performance in optimizing unknown stochastic continuous functions, which can model many machine learning tasks, specially in big data-driven personalized recommendation. However, bandit algorithms are vulnerable to adversarial attacks. Existing works mainly focus on attacking multi-armed bandits in discrete setting; nevertheless, the attacks against X-armed bandits in continuous setting have not been well explored. In this paper, we aim to bridge this gap and investigate the robustness problem for the X-armed bandits. Specifically, we consider data poisoning attack and propose an attack algorithm named Confidence Poisoning Attack algorithm, which could hijack the clean tree-based X-armed bandits algorithm, i.e., high confidence tree (HCT) and make it choose the nodes including the arm targeted by the attacker very frequently with a sub-linear attack cost, i.e., O(Tα)(0 <α< 1), where T is the total number of rounds. We evaluate the efficiency of our proposed attack algorithm through theoretical analysis and experiments.

源语言英语
主期刊名Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022
出版商Institute of Electrical and Electronics Engineers Inc.
345-351
页数7
ISBN(电子版)9781665494250
DOI
出版状态已出版 - 2022
活动21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022 - Virtual, Online, 中国
期限: 9 12月 202211 12月 2022

出版系列

姓名Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022

会议

会议21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022
国家/地区中国
Virtual, Online
时期9/12/2211/12/22

指纹

探究 'Data Poisoning Attack to X-armed Bandits' 的科研主题。它们共同构成独一无二的指纹。

引用此