{"id":"https://openalex.org/W3113518017","doi":"https://doi.org/10.1109/mascots50786.2020.9285955","title":"Adversarial Attacks in a Deep Reinforcement Learning based Cluster Scheduler","display_name":"Adversarial Attacks in a Deep Reinforcement Learning based Cluster Scheduler","publication_year":2020,"publication_date":"2020-11-17","ids":{"openalex":"https://openalex.org/W3113518017","doi":"https://doi.org/10.1109/mascots50786.2020.9285955","mag":"3113518017"},"language":"en","primary_location":{"id":"doi:10.1109/mascots50786.2020.9285955","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mascots50786.2020.9285955","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100607395","display_name":"Shao-Jun Zhang","orcid":"https://orcid.org/0000-0003-3284-9546"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Shaojun Zhang","raw_affiliation_strings":["School of Computer Science, The University of Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, The University of Sydney, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100337560","display_name":"Chen Wang","orcid":"https://orcid.org/0000-0002-3119-4763"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chen Wang","raw_affiliation_strings":["CSIRO Data61, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"CSIRO Data61, Sydney, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015993565","display_name":"Albert Y. Zomaya","orcid":"https://orcid.org/0000-0002-3090-1059"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Albert Y. Zomaya","raw_affiliation_strings":["School of Computer Science, The University of Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, The University of Sydney, Australia","institution_ids":["https://openalex.org/I129604602"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100607395"],"corresponding_institution_ids":["https://openalex.org/I129604602"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26061565,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8297674655914307},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7231918573379517},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6587550044059753},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.6456360816955566},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5849319100379944},{"id":"https://openalex.org/keywords/critical-path-method","display_name":"Critical path method","score":0.5281146764755249},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4859539270401001},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43119844794273376},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4146907329559326},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3648347854614258},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25506430864334106},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1863909363746643}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8297674655914307},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7231918573379517},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6587550044059753},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.6456360816955566},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5849319100379944},{"id":"https://openalex.org/C115874739","wikidata":"https://www.wikidata.org/wiki/Q825377","display_name":"Critical path method","level":2,"score":0.5281146764755249},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4859539270401001},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43119844794273376},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4146907329559326},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3648347854614258},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25506430864334106},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1863909363746643},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mascots50786.2020.9285955","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mascots50786.2020.9285955","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W161204238","https://openalex.org/W1945616565","https://openalex.org/W1977251985","https://openalex.org/W1987645871","https://openalex.org/W2079245724","https://openalex.org/W2100550451","https://openalex.org/W2101051966","https://openalex.org/W2104680817","https://openalex.org/W2121863487","https://openalex.org/W2145339207","https://openalex.org/W2149294210","https://openalex.org/W2155467293","https://openalex.org/W2180612164","https://openalex.org/W2461943168","https://openalex.org/W2509009443","https://openalex.org/W2576355797","https://openalex.org/W2594633041","https://openalex.org/W2728471704","https://openalex.org/W2745868649","https://openalex.org/W2773691349","https://openalex.org/W2793855276","https://openalex.org/W2905838702","https://openalex.org/W2963207607","https://openalex.org/W2963575966","https://openalex.org/W2963614114","https://openalex.org/W2963842262","https://openalex.org/W2964173023","https://openalex.org/W2964318098","https://openalex.org/W2964583308","https://openalex.org/W2968986602","https://openalex.org/W2972642116","https://openalex.org/W2982346115","https://openalex.org/W3103836116","https://openalex.org/W3138125150","https://openalex.org/W4214717370","https://openalex.org/W4252214219","https://openalex.org/W4297824641","https://openalex.org/W6728252718","https://openalex.org/W6732337852","https://openalex.org/W6743563064","https://openalex.org/W6746700722","https://openalex.org/W6748448015"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2502115930","https://openalex.org/W2149245348"],"abstract_inverted_index":{"A":[0,89],"scheduler":[1,83,91,119,196],"is":[2,52,127],"essential":[3],"for":[4,58,81,106],"resource":[5,104],"management":[6],"in":[7,19,27,67,71,133],"a":[8,63,77,82,141,192,206,221],"shared":[9],"computer":[10],"cluster,":[11],"particularly":[12],"scheduling":[13,108,153,173],"algorithms":[14,186],"play":[15],"an":[16],"important":[17],"role":[18],"meeting":[20],"service":[21],"level":[22],"objectives":[23],"of":[24,44,46,62,65,102,175,212],"user":[25],"applications":[26],"large":[28],"scale":[29],"clusters":[30],"that":[31,147],"underlie":[32],"cloud":[33,103],"computing.":[34],"Traditional":[35],"cluster":[36],"schedulers":[37],"are":[38,57],"often":[39],"based":[40,185,195],"on":[41,49,202],"empirical":[42],"observations":[43],"patterns":[45,61,95],"jobs":[47,66],"running":[48],"them.":[50],"It":[51],"unclear":[53],"how":[54],"effective":[55],"they":[56],"capturing":[59],"the":[60,87,100,111,118,131,152,172,189,215],"variety":[64],"clouds.":[68],"Recent":[69],"advances":[70],"Deep":[72],"Reinforcement":[73],"Learning":[74],"(DRL)":[75],"promise":[76],"new":[78],"optimization":[79],"framework":[80],"to":[84,123,145,155,169,187,191],"systematically":[85],"address":[86],"problem.":[88],"DRL-based":[90,134],"can":[92,150],"extract":[93],"detailed":[94],"from":[96],"job":[97,167],"features":[98,168],"and":[99,182,208,223],"dynamics":[101],"utilization":[105],"better":[107],"decisions.":[109],"However,":[110],"deep":[112],"neural":[113],"network":[114],"models":[115],"used":[116],"by":[117],"might":[120],"be":[121],"vulnerable":[122],"adversarial":[124],"attacks.":[125],"There":[126],"limited":[128],"research":[129],"investigating":[130],"vulnerability":[132,154],"schedulers.":[135],"In":[136],"this":[137],"paper,":[138],"we":[139],"give":[140],"white-box":[142],"attack":[143,161],"method":[144,162],"show":[146,205],"malicious":[148],"users":[149],"exploit":[151],"benefit":[156],"certain":[157],"jobs.":[158,177],"The":[159],"proposed":[160],"only":[163],"requires":[164],"minor":[165],"perturbations":[166],"significantly":[170],"change":[171],"priority":[174],"these":[176],"We":[178],"implement":[179],"both":[180],"greedy":[181],"critical":[183],"path":[184],"facilitate":[188],"attacks":[190,213,219],"state-of-the-art":[193],"DRL":[194],"called":[197],"Decima.":[198],"Our":[199],"extensive":[200],"experiments":[201],"TPC-H":[203],"workloads":[204],"62%":[207],"66%":[209],"success":[210],"rate":[211],"with":[214],"two":[216],"algorithms.":[217],"Successful":[218],"achieve":[220],"18.6%":[222],"17.5%":[224],"completion":[225],"time":[226],"reduction.":[227]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
