TY - JOUR
T1 - Deep-attack over the deep reinforcement learning
AU - Li, Yang
AU - Pan, Quan
AU - Cambria, Erik
N1 - Publisher Copyright:
© 2022 Elsevier B.V.
PY - 2022/8/17
Y1 - 2022/8/17
N2 - Recent adversarial attack developments have made reinforcement learning more vulnerable, and different approaches exist to deploy attacks against it, where the key is how to choose the right timing of the attack. Some work tries to design an attack evaluation function to select critical points that will be attacked if the value is greater than a certain threshold. This approach makes it difficult to find the right place to deploy an attack without considering the long-term impact. In addition, there is a lack of appropriate indicators of assessment during attacks. To make the attacks more intelligent as well as to remedy the existing problems, we propose the reinforcement learning-based attacking framework by considering the effectiveness and stealthy spontaneously, while we also propose a new metric to evaluate the performance of the attack model in these two aspects. Experimental results show the effectiveness of our proposed model and the goodness of our proposed evaluation metric. Furthermore, we validate the transferability of the model, and also its robustness under the adversarial training.
AB - Recent adversarial attack developments have made reinforcement learning more vulnerable, and different approaches exist to deploy attacks against it, where the key is how to choose the right timing of the attack. Some work tries to design an attack evaluation function to select critical points that will be attacked if the value is greater than a certain threshold. This approach makes it difficult to find the right place to deploy an attack without considering the long-term impact. In addition, there is a lack of appropriate indicators of assessment during attacks. To make the attacks more intelligent as well as to remedy the existing problems, we propose the reinforcement learning-based attacking framework by considering the effectiveness and stealthy spontaneously, while we also propose a new metric to evaluate the performance of the attack model in these two aspects. Experimental results show the effectiveness of our proposed model and the goodness of our proposed evaluation metric. Furthermore, we validate the transferability of the model, and also its robustness under the adversarial training.
KW - Adversarial attack
KW - Adversarial training
KW - Deep reinforcement learning
UR - http://www.scopus.com/inward/record.url?scp=85131092700&partnerID=8YFLogxK
U2 - 10.1016/j.knosys.2022.108965
DO - 10.1016/j.knosys.2022.108965
M3 - 文章
AN - SCOPUS:85131092700
SN - 0950-7051
VL - 250
JO - Knowledge-Based Systems
JF - Knowledge-Based Systems
M1 - 108965
ER -