kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Decentralized Anomaly Detection in Cooperative Multi-Agent Reinforcement Learning
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-1958-5446
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-9988-9545
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-4876-0223
2023 (English)In: Proceedings of the 32nd International Joint Conference on Artificial Intelligence, IJCAI 2023, International Joint Conferences on Artificial Intelligence , 2023, p. 162-170Conference paper, Published paper (Refereed)
Abstract [en]

We consider the problem of detecting adversarial attacks against cooperative multi-agent reinforcement learning. We propose a decentralized scheme that allows agents to detect the abnormal behavior of one compromised agent. Our approach is based on a recurrent neural network (RNN) trained during cooperative learning to predict the action distribution of other agents based on local observations. The predicted distribution is used for computing a normality score for the agents, which allows the detection of the misbehavior of other agents. To explore the robustness of the proposed detection scheme, we formulate the worst-case attack against our scheme as a constrained reinforcement learning problem. We propose to compute an attack policy via optimizing the corresponding dual function using reinforcement learning. Extensive simulations on various multi-agent benchmarks show the effectiveness of the proposed detection scheme in detecting state of the art attacks and in limiting the impact of undetectable attacks.

Place, publisher, year, edition, pages
International Joint Conferences on Artificial Intelligence , 2023. p. 162-170
National Category
Computer Sciences Control Engineering Computer Systems
Identifiers
URN: urn:nbn:se:kth:diva-337857Scopus ID: 2-s2.0-85170355996OAI: oai:DiVA.org:kth-337857DiVA, id: diva2:1803657
Conference
32nd International Joint Conference on Artificial Intelligence, IJCAI 2023, Macao, China, Aug 19 2023 - Aug 25 2023
Note

Part of ISBN 9781956792034

QC 20231010

Available from: 2023-10-10 Created: 2023-10-10 Last updated: 2023-10-10Bibliographically approved

Open Access in DiVA

No full text in DiVA

Scopus

Authority records

Kazari, KiarashShereen, EzzeldinDán, György

Search in DiVA

By author/editor
Kazari, KiarashShereen, EzzeldinDán, György
By organisation
Network and Systems Engineering
Computer SciencesControl EngineeringComputer Systems

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 88 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf