{"id":"https://openalex.org/W4214585747","doi":"https://doi.org/10.1109/tifs.2022.3154244","title":"Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems","display_name":"Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4214585747","doi":"https://doi.org/10.1109/tifs.2022.3154244"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3154244","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3154244","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101910767","display_name":"Zijie Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zijie Yang","raw_affiliation_strings":["Department of Computer Science and Technology, Institute of Network Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Institute of Network Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046947918","display_name":"Jiahao Cao","orcid":"https://orcid.org/0000-0001-7139-376X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiahao Cao","raw_affiliation_strings":["Department of Computer Science and Technology, Institute of Network Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Institute of Network Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045206037","display_name":"Zhuotao Liu","orcid":"https://orcid.org/0000-0002-7532-0434"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuotao Liu","raw_affiliation_strings":["Department of Computer Science and Technology, Institute of Network Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Institute of Network Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100404567","display_name":"Xiaoli Zhang","orcid":"https://orcid.org/0000-0002-5255-2216"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoli Zhang","raw_affiliation_strings":["Department of Computer Science and Technology, Institute of Network Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Institute of Network Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026728546","display_name":"Kun Sun","orcid":"https://orcid.org/0000-0003-4152-2107"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kun Sun","raw_affiliation_strings":["Department of Information Sciences and Technology, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Sciences and Technology, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100350165","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-8776-8730"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Department of Computer Science and Technology, Institute of Network Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Institute of Network Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101910767"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.3977,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64935002,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"17","issue":null,"first_page":"1069","last_page":"1082"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8621110320091248},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.790486216545105},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7619889974594116},{"id":"https://openalex.org/keywords/network-congestion","display_name":"Network congestion","score":0.6794666051864624},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.5576580762863159},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.46035143733024597},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4533521234989166},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29263776540756226},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2776722311973572},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0734018087387085}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8621110320091248},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.790486216545105},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7619889974594116},{"id":"https://openalex.org/C195563490","wikidata":"https://www.wikidata.org/wiki/Q180368","display_name":"Network congestion","level":3,"score":0.6794666051864624},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.5576580762863159},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.46035143733024597},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4533521234989166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29263776540756226},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2776722311973572},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0734018087387085},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3154244","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3154244","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8299999833106995,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1724640704","display_name":null,"funder_award_id":"N00014-20-1-2407","funder_id":"https://openalex.org/F4320332923","funder_display_name":"U.S. Navy"},{"id":"https://openalex.org/G1740836469","display_name":null,"funder_award_id":"N00014-18-2893","funder_id":"https://openalex.org/F4320332923","funder_display_name":"U.S. Navy"},{"id":"https://openalex.org/G5792046107","display_name":null,"funder_award_id":"BNR2020RC01013","funder_id":"https://openalex.org/F4320329777","funder_display_name":"Beijing National Research Center For Information Science And Technology"},{"id":"https://openalex.org/G7155321176","display_name":null,"funder_award_id":"62132011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329777","display_name":"Beijing National Research Center For Information Science And Technology","ror":null},{"id":"https://openalex.org/F4320332923","display_name":"U.S. Navy","ror":"https://ror.org/03ar0mv07"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2022844530","https://openalex.org/W2056429635","https://openalex.org/W2062525454","https://openalex.org/W2071314114","https://openalex.org/W2098043728","https://openalex.org/W2101182788","https://openalex.org/W2103701891","https://openalex.org/W2111942706","https://openalex.org/W2164740236","https://openalex.org/W2180612164","https://openalex.org/W2293768274","https://openalex.org/W2408141691","https://openalex.org/W2540285146","https://openalex.org/W2603766943","https://openalex.org/W2616841723","https://openalex.org/W2736601468","https://openalex.org/W2773525213","https://openalex.org/W2801358835","https://openalex.org/W2885268922","https://openalex.org/W2885982708","https://openalex.org/W2941205169","https://openalex.org/W2942465044","https://openalex.org/W2949103145","https://openalex.org/W2957514980","https://openalex.org/W2962755762","https://openalex.org/W2963542245","https://openalex.org/W2966944379","https://openalex.org/W3011120880","https://openalex.org/W3016712945","https://openalex.org/W3103836116","https://openalex.org/W4214717370","https://openalex.org/W4232411329","https://openalex.org/W4248409180","https://openalex.org/W4302386942","https://openalex.org/W6637162671","https://openalex.org/W6638018090","https://openalex.org/W6640425456","https://openalex.org/W6684260611","https://openalex.org/W6714069269","https://openalex.org/W6722479552","https://openalex.org/W6733049761","https://openalex.org/W6737897983","https://openalex.org/W6741002519","https://openalex.org/W6747027214","https://openalex.org/W6750761875","https://openalex.org/W6762728350","https://openalex.org/W6775686901"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4288019534","https://openalex.org/W4310988119"],"abstract_inverted_index":{"Reinforcement":[0],"Learning":[1],"(RL)":[2],"has":[3],"been":[4],"applied":[5],"to":[6,49,86,105,111,134],"solve":[7,126],"decision-making":[8,163],"problems":[9],"in":[10,15,97,149],"computer":[11],"network":[12],"designs,":[13],"especially":[14],"TCP":[16],"congestion":[17,21,67,98,122],"control.":[18],"As":[19],"RL-based":[20,40,66,121],"control":[22,68,99,123],"methods":[23],"enable":[24],"powerful":[25],"learning":[26],"abilities,":[27],"it":[28],"achieves":[29],"competitive":[30],"performance":[31],"and":[32,144,184],"adaptiveness":[33],"advantages":[34],"over":[35],"the":[36,52,71,83,89,94,106,117,127,138,146,160],"traditional":[37],"methods.":[38],"However,":[39],"systems":[41],"suffer":[42],"from":[43],"adversarial":[44,63,73,132,142,157],"attacks":[45,64,74],"that":[46,101,168],"generate":[47],"perturbations":[48,114,148],"significantly":[50],"degrade":[51],"performance.":[53],"In":[54],"this":[55],"paper,":[56],"we":[57,129],"conduct":[58],"a":[59],"comprehensive":[60],"study":[61],"of":[62,137],"against":[65],"systems.":[69],"Unlike":[70],"state-of-the-art":[72],"on":[75],"images":[76],"where":[77],"an":[78,131,150],"attacker":[79,90],"can":[80,171],"easily":[81],"obtain":[82,93],"input":[84,95,118],"states":[85,96,119,136],"introduce":[87],"perturbations,":[88,143],"cannot":[91],"directly":[92],"settings":[100],"are":[102],"only":[103],"available":[104],"agents.":[107],"It":[108],"is":[109],"challenging":[110],"add":[112],"effective":[113],"without":[115],"knowing":[116],"for":[120],"models.":[124],"To":[125],"challenge,":[128],"develop":[130],"attack":[133,158,170],"estimate":[135],"target":[139,161],"agent,":[140],"craft":[141],"apply":[145],"generated":[147],"automated":[151],"fashion.":[152],"We":[153],"evaluate":[154],"how":[155],"our":[156,169],"affects":[159],"agent&#x2019;s":[162],"process.":[164],"Our":[165],"experiments":[166],"illustrate":[167],"effectively":[172],"reduce":[173],"about":[174],"50&#x0025;":[175],"average":[176],"throughput":[177],"while":[178],"increasing":[179],"more":[180],"than":[181],"36x":[182],"latency":[183],"45&#x0025;":[185],"packet":[186],"loss":[187],"rate.":[188]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
