Adversarial Attacks on Cooperative Multi-agent Bandits.
Jinhang ZuoZhiyao ZhangXuchuang WangCheng ChenShuai LiJohn C. S. LuiMohammad HajiesmailiAdam WiermanPublished in: CoRR (2023)
Keyphrases
- cooperative multi agent
- countermeasures
- logic programming
- stochastic systems
- malicious attacks
- multi agent
- traffic analysis
- reinforcement learning
- security protocols
- learning algorithm
- multi armed bandits
- digital image watermarking
- malicious users
- denial of service attacks
- security risks
- security mechanisms
- watermarking scheme
- artificial intelligence
- machine learning
- cryptographic protocols
- image watermarking
- attack detection
- upper bound