Skip to main content

Showing 1–14 of 14 results for author: Rabinovich, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.02652  [pdf, other

    cs.LG cs.AI cs.CR

    Adaptive Discounting of Training Time Attacks

    Authors: Ridhima Bector, Abhay Aradhya, Chai Quek, Zinovi Rabinovich

    Abstract: Among the most insidious attacks on Reinforcement Learning (RL) solutions are training-time attacks (TTAs) that create loopholes and backdoors in the learned behaviour. Not limited to a simple disruption, constructive TTAs (C-TTAs) are now available, where the attacker forces a specific, target behaviour upon a training RL agent (victim). However, even state-of-the-art C-TTAs focus on target behav… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

    Comments: 19 pages, 7 figures

  2. arXiv:2304.12151  [pdf, other

    cs.LG cs.CR

    Policy Resilience to Environment Poisoning Attacks on Reinforcement Learning

    Authors: Hang Xu, Xinghua Qu, Zinovi Rabinovich

    Abstract: This paper investigates policy resilience to training-environment poisoning attacks on reinforcement learning (RL) policies, with the goal of recovering the deployment performance of a poisoned RL policy. Due to the fact that the policy resilience is an add-on concern to RL algorithms, it should be resource-efficient, time-conserving, and widely applicable without compromising the performance of R… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

  3. arXiv:2302.03429  [pdf, other

    cs.AI cs.LG cs.MA

    Towards Skilled Population Curriculum for Multi-Agent Reinforcement Learning

    Authors: Rundong Wang, Longtao Zheng, Wei Qiu, Bowei He, Bo An, Zinovi Rabinovich, Yu**g Hu, Yingfeng Chen, Tangjie Lv, Changjie Fan

    Abstract: Recent advances in multi-agent reinforcement learning (MARL) allow agents to coordinate their behaviors in complex environments. However, common MARL algorithms still suffer from scalability and sparse reward issues. One promising approach to resolving them is automatic curriculum learning (ACL). ACL involves a student (curriculum learner) training on tasks of increasing difficulty controlled by a… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

  4. arXiv:2205.13718  [pdf, other

    cs.MA cs.AI cs.LG

    Off-Beat Multi-Agent Reinforcement Learning

    Authors: Wei Qiu, Weixun Wang, Rundong Wang, Bo An, Yu**g Hu, Svetlana Obraztsova, Zinovi Rabinovich, Jianye Hao, Yingfeng Chen, Changjie Fan

    Abstract: We investigate model-free multi-agent reinforcement learning (MARL) in environments where off-beat actions are prevalent, i.e., all actions have pre-set execution durations. During execution durations, the environment changes are influenced by, but not synchronised with, action execution. Such a setting is ubiquitous in many real-world problems. However, most MARL methods assume actions are execut… ▽ More

    Submitted 18 June, 2022; v1 submitted 26 May, 2022; originally announced May 2022.

    Comments: Fix typos

  5. arXiv:2108.03803  [pdf, other

    cs.LG cs.MA

    Mis-spoke or mis-lead: Achieving Robustness in Multi-Agent Communicative Reinforcement Learning

    Authors: Wanqi Xue, Wei Qiu, Bo An, Zinovi Rabinovich, Svetlana Obraztsova, Chai Kiat Yeo

    Abstract: Recent studies in multi-agent communicative reinforcement learning (MACRL) have demonstrated that multi-agent coordination can be greatly improved by allowing communication between agents. Meanwhile, adversarial machine learning (ML) has shown that ML models are vulnerable to attacks. Despite the increasing concern about the robustness of ML algorithms, how to achieve robust communication in multi… ▽ More

    Submitted 26 January, 2022; v1 submitted 9 August, 2021; originally announced August 2021.

    Comments: Published as a conference paper in AAMAS 2022

  6. arXiv:2102.08159  [pdf, other

    cs.LG cs.MA

    RMIX: Learning Risk-Sensitive Policies for Cooperative Reinforcement Learning Agents

    Authors: Wei Qiu, Xinrun Wang, Runsheng Yu, Xu He, Rundong Wang, Bo An, Svetlana Obraztsova, Zinovi Rabinovich

    Abstract: Current value-based multi-agent reinforcement learning methods optimize individual Q values to guide individuals' behaviours via centralized training with decentralized execution (CTDE). However, such expected, i.e., risk-neutral, Q value is not sufficient even with CTDE due to the randomness of rewards and the uncertainty in environments, which causes the failure of these methods to train coordin… ▽ More

    Submitted 22 March, 2021; v1 submitted 16 February, 2021; originally announced February 2021.

    Comments: ICLR 2021 submission version: https://openreview.net/forum?id=1EVb8XRBDNr

  7. arXiv:1911.12472  [pdf, other

    cs.GT

    Manipulating Elections by Selecting Issues

    Authors: Jasper Lu, David Kai Zhang, Zinovi Rabinovich, Svetlana Obraztsova, Yevgeniy Vorobeychik

    Abstract: Constructive election control considers the problem of an adversary who seeks to sway the outcome of an electoral process in order to ensure that their favored candidate wins. We consider the computational problem of constructive election control via issue selection. In this problem, a party decides which political issues to focus on to ensure victory for the favored candidate. We also consider a… ▽ More

    Submitted 27 November, 2019; originally announced November 2019.

    Comments: Published at AAMAS 2019

  8. arXiv:1911.06992  [pdf, other

    cs.AI cs.MA

    Learning Efficient Multi-agent Communication: An Information Bottleneck Approach

    Authors: Rundong Wang, Xu He, Runsheng Yu, Wei Qiu, Bo An, Zinovi Rabinovich

    Abstract: We consider the problem of the limited-bandwidth communication for multi-agent reinforcement learning, where agents cooperate with the assistance of a communication protocol and a scheduler. The protocol and scheduler jointly determine which agent is communicating what message and to whom. Under the limited bandwidth constraint, a communication protocol is required to generate informative messages… ▽ More

    Submitted 23 June, 2020; v1 submitted 16 November, 2019; originally announced November 2019.

    Comments: ICML 2020

  9. arXiv:1906.07071  [pdf, ps, other

    cs.GT cs.MA

    Protecting Elections by Recounting Ballots

    Authors: Edith Elkind, Jiarui Gan, Svetlana Obraztsova, Zinovi Rabinovich, Alexandros A. Voudouris

    Abstract: Complexity of voting manipulation is a prominent topic in computational social choice. In this work, we consider a two-stage voting manipulation scenario. First, a malicious party (an attacker) attempts to manipulate the election outcome in favor of a preferred candidate by changing the vote counts in some of the voting districts. Afterwards, another party (a defender), which cares about the voter… ▽ More

    Submitted 17 June, 2019; originally announced June 2019.

  10. New Algorithms for Functional Distributed Constraint Optimization Problems

    Authors: Khoi D. Hoang, William Yeoh, Makoto Yokoo, Zinovi Rabinovich

    Abstract: The Distributed Constraint Optimization Problem (DCOP) formulation is a powerful tool to model multi-agent coordination problems that are distributed by nature. The formulation is suitable for problems where variables are discrete and constraint utilities are represented in tabular form. However, many real-world applications have variables that are continuous and tabular forms thus cannot accurate… ▽ More

    Submitted 30 May, 2019; originally announced May 2019.

    Journal ref: Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems, 2020

  11. Reaching Consensus Under a Deadline

    Authors: Marina Bannikova, Lihi Dery, Svetlana Obraztsova, Zinovi Rabinovich, Jeffrey S. Rosenschein

    Abstract: Committee decisions are complicated by a deadline, e.g., the next start of a budget, or the beginning of a semester. In committee hiring decisions, it may be that if no candidate is supported by a strong majority, the default is to hire no one - an option that may cost dearly. As a result, committee members might prefer to agree on a reasonable, if not necessarily the best, candidate, to avoid unf… ▽ More

    Submitted 26 January, 2021; v1 submitted 17 May, 2019; originally announced May 2019.

    Journal ref: Autonomous Agents and Multi-Agent Systems, 35(1), 1-42 (2021)

  12. Lie on the Fly: Strategic Voting in an Iterative Preference Elicitation Process

    Authors: Lihi Dery, Svetlana Obraztsova, Zinovi Rabinovich, Meir Kalech

    Abstract: A voting center is in charge of collecting and aggregating voter preferences. In an iterative process, the center sends comparison queries to voters, requesting them to submit their preference between two items. Voters might discuss the candidates among themselves, figuring out during the elicitation process which candidates stand a chance of winning and which do not. Consequently, strategic voter… ▽ More

    Submitted 13 May, 2019; originally announced May 2019.

  13. arXiv:1903.02917  [pdf, ps, other

    cs.GT

    Imitative Follower Deception in Stackelberg Games

    Authors: Jiarui Gan, Haifeng Xu, Qingyu Guo, Long Tran-Thanh, Zinovi Rabinovich, Michael Wooldridge

    Abstract: Information uncertainty is one of the major challenges facing applications of game theory. In the context of Stackelberg games, various approaches have been proposed to deal with the leader's incomplete knowledge about the follower's payoffs, typically by gathering information from the leader's interaction with the follower. Unfortunately, these approaches rely crucially on the assumption that the… ▽ More

    Submitted 20 May, 2019; v1 submitted 7 March, 2019; originally announced March 2019.

  14. arXiv:1504.06058  [pdf, other

    cs.GT cs.AI

    Security Games with Information Leakage: Modeling and Computation

    Authors: Haifeng Xu, Albert X. Jiang, Arunesh Sinha, Zinovi Rabinovich, Shaddin Dughmi, Milind Tambe

    Abstract: Most models of Stackelberg security games assume that the attacker only knows the defender's mixed strategy, but is not able to observe (even partially) the instantiated pure strategy. Such partial observation of the deployed pure strategy -- an issue we refer to as information leakage -- is a significant concern in practical applications. While previous research on patrolling games has considered… ▽ More

    Submitted 4 May, 2015; v1 submitted 23 April, 2015; originally announced April 2015.