2020
DOI: 10.48550/arxiv.2012.00508
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Gaussian Process Based Message Filtering for Robust Multi-Agent Cooperation in the Presence of Adversarial Communication

Abstract: In this paper, we consider the problem of providing robustness to adversarial communication in multi-agent systems. Specifically, we propose a solution towards robust cooperation, which enables the multi-agent system to maintain high performance in the presence of anonymous non-cooperative agents that communicate faulty, misleading or manipulative information. In pursuit of this goal, we propose a communication architecture based on Graph Neural Networks (GNNs), which is amenable to a novel Gaussian Process (G… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…We seek to minimize the probability of error (15) for the decision rule (12) by minimizing the false alarm and missed detection probabilities. Any sequence of 0's and 1's can occur for the detected trust vector t, each yielding a different error probability, so the error probability must be calculated for each possible vector t, along with each possible vector y.…”
Section: A Two Stage Approach Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…We seek to minimize the probability of error (15) for the decision rule (12) by minimizing the false alarm and missed detection probabilities. Any sequence of 0's and 1's can occur for the detected trust vector t, each yielding a different error probability, so the error probability must be calculated for each possible vector t, along with each possible vector y.…”
Section: A Two Stage Approach Algorithmmentioning
confidence: 99%
“…Unfortunately, this computation scales exponentially with the number of robots, N . Furthermore, the true trust vector t and the probabilities of false alarm and missed detection of the malicious robots are unknown, i.e., P FA,M and P MD,M , therefore, they cannot be used in minimizing (15).…”
Section: A Two Stage Approach Algorithmmentioning
confidence: 99%
“…As discussed in Sec. 1, recent works [2,21] are either focusing on attacking specific competitive setting with simple attack method without effective defense or defensing on specific communication method. Our work fill this gap in MACRL.…”
Section: Related Workmentioning
confidence: 99%
“…Besides, the defense methods had not been proposed. Mitchell et al [21] propose a defensive method in MACRL by replacing weights generated by Attention [36] model in MACRL method with weights generated by Gaussian process. However, such method is only restricted to attention-based MACRL method and neglects the scenarios where attacking strategies are learnable.…”
Section: Introductionmentioning
confidence: 99%
“…ture, our method is also applicable to any scenario where multiple images need to be translated into one, such as human image generation [21] from multiple sources. In addition, we believe that our work can be explored in 3D reconstruction settings or in multi-agent communication settings where multiple drones share their image captures from different locations and construct a single coherent image (see [28] for a similar setting).…”
Section: Limitations and Failure Casesmentioning
confidence: 99%