Action-Manipulation Attack and Defense to X-Armed Bandits

Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou*

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

As a continuous variant of Multi-armed bandits (MAB), X-armed bandits have enriched many applications of online machine learning like personalized recommendation system. However, the attack and defense to the X-armed bandits remain largely unexplored, though the MAB has proved to be vulnerable. In this paper, we aim to bridge this gap and investigate the robustness analysis for the X-armed bandits. Specifically, we consider action-manipulation attack, which is practical but harder than the existing reward-manipulation attack. We propose an attack algorithm based on a lower bound tree (LBT), which can continuously hijack the learner's action by perturbing X-armed bandits' high confidence tree (HCT) construction. As a result, the nodes including the arm targeted by the attacker is selected frequently with a sublinear attack cost. To defend against the LBT attack, we propose a robust version of the HCT algorithm, called RoHCT. We theoretically analyze that the regret of RoHCT is related to the upper bound of the total cost Q and still sublinear to total number of rounds T. We carry out experiments to evaluate the effectiveness of LBT and RoHCT.

源语言英语
主期刊名Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022
出版商Institute of Electrical and Electronics Engineers Inc.
1115-1122
页数8
ISBN(电子版)9781665494250
DOI
出版状态已出版 - 2022
活动21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022 - Virtual, Online, 中国
期限: 9 12月 202211 12月 2022

出版系列

姓名Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022

会议

会议21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022
国家/地区中国
Virtual, Online
时期9/12/2211/12/22

指纹

探究 'Action-Manipulation Attack and Defense to X-Armed Bandits' 的科研主题。它们共同构成独一无二的指纹。

引用此