2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021
DOI: 10.1109/iccv48922.2021.00767
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Attacks On Multi-Agent Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 27 publications
0
17
0
Order By: Relevance
“…In [33], an adversarial mesh is put on the rooftop of a vehicle, and mesh poses are optimized to make the vehicle invisible. Besides the above single-agent attack, [36] attacks the V2X perception system by adding adversarial noises to the intermediate features shared by intelligent agents. Different from previous work, we directly attack the agent collaboration choice and vehicle poses to deteriorate the performance of the modern V2X perception system, which ensures the feasibility and plausibility of the generated adversarial examples.…”
Section: Related Workmentioning
confidence: 99%
“…In [33], an adversarial mesh is put on the rooftop of a vehicle, and mesh poses are optimized to make the vehicle invisible. Besides the above single-agent attack, [36] attacks the V2X perception system by adding adversarial noises to the intermediate features shared by intelligent agents. Different from previous work, we directly attack the agent collaboration choice and vehicle poses to deteriorate the performance of the modern V2X perception system, which ensures the feasibility and plausibility of the generated adversarial examples.…”
Section: Related Workmentioning
confidence: 99%
“…Efficient collaboration depends on reliable communication among agents. However, communication is not perfect in practice: i) As the number of vehicles in the network increases, available communication bandwidth for each vehicle is limited; ii) It is hard for vehicles to receive real-time information from other vehicles due to inevitable communication delay; iii) Communication is likely to be interrupted sometimes, resulting in communication drops; iv) V2X communication suffers from attacks [34] and cannot always provide reliable service. Although communication technologies is keep developing and improving quality of communication service, the problems mentioned above will still exist for a long time.…”
Section: Communication Robustnessmentioning
confidence: 99%
“…Communication is important for agents to obtain high rewards, but it can be a double-edged swordit benefits decision making but may make agents vulnerable to perturbations of messages. Communication attacks in MARL has recently attracted increasing attention [3,45,47] with different focuses, as summarized in Section 5. In this paper, we consider a practical and strong threat model where malicious attackers can arbitrarily perturb a subset of communication messages during test time.…”
Section: Problem Formulation: Communication Attacks In Deployment Of ...mentioning
confidence: 99%
“…To achieve robust communication, Mitchell et al [25] adopt a Gaussian Process-based probabilistic model to compute the posterior probabilities that whether each partner is truthful. Tu et al [45] investigate the vulnerability of multi-agent autonomous systems against communication attacks, with a focus on vision tasks. Xue et al [47] propose an algorithm to defend against one adversarial communication message by an anomaly detector and a message reconstructor, which are trained with groundtruth labels and messages.…”
Section: Communication In Marl Communication Is Crucial In Solving Co...mentioning
confidence: 99%
See 1 more Smart Citation