2021
DOI: 10.48550/arxiv.2106.07798
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Poisoning Deep Reinforcement Learning Agents with In-Distribution Triggers

Chace Ashcraft,
Kiran Karra

Abstract: In this paper, we propose a new data poisoning attack and apply it to deep reinforcement learning agents. Our attack centers on what we call in-distribution triggers, which are triggers native to the data distributions the model will be trained on and deployed in. We outline a simple procedure for embedding these, and other, triggers in deep reinforcement learning agents following a multi-task learning paradigm, and demonstrate in three common reinforcement learning environments. We believe that this work has … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
(20 reference statements)
0
1
0
Order By: Relevance
“…reinforcement learning [3,6,10,52,73,81,88,114,138,172,191,204], and unsupervised clustering [17,18,41,89,140] or anomaly detection [43,140] algorithms. Furthermore, notable examples of poisoning attacks and defenses have also been shown in computer-security applications dealing with ML, including spam filtering [13,46,57,125,132], network traffic analysis [140], and malware detection [133,146,161], audio [1,90,106,109,192] and video analysis [166,208],…”
Section: Poisoning Attacks and Defenses In Other Domainsmentioning
confidence: 99%
“…reinforcement learning [3,6,10,52,73,81,88,114,138,172,191,204], and unsupervised clustering [17,18,41,89,140] or anomaly detection [43,140] algorithms. Furthermore, notable examples of poisoning attacks and defenses have also been shown in computer-security applications dealing with ML, including spam filtering [13,46,57,125,132], network traffic analysis [140], and malware detection [133,146,161], audio [1,90,106,109,192] and video analysis [166,208],…”
Section: Poisoning Attacks and Defenses In Other Domainsmentioning
confidence: 99%