{"id":"https://openalex.org/W3080580959","doi":"https://doi.org/10.1145/3394486.3403089","title":"Malicious Attacks against Deep Reinforcement Learning Interpretations","display_name":"Malicious Attacks against Deep Reinforcement Learning Interpretations","publication_year":2020,"publication_date":"2020-08-20","ids":{"openalex":"https://openalex.org/W3080580959","doi":"https://doi.org/10.1145/3394486.3403089","mag":"3080580959"},"language":"en","primary_location":{"id":"doi:10.1145/3394486.3403089","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3394486.3403089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016035883","display_name":"Mengdi Huai","orcid":"https://orcid.org/0000-0001-6368-5973"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mengdi Huai","raw_affiliation_strings":["University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021218766","display_name":"Jianhui Sun","orcid":"https://orcid.org/0000-0003-0032-3646"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jianhui Sun","raw_affiliation_strings":["University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067853952","display_name":"Renqin Cai","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Renqin Cai","raw_affiliation_strings":["University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032616889","display_name":"Liuyi Yao","orcid":"https://orcid.org/0000-0003-3828-796X"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Liuyi Yao","raw_affiliation_strings":["State University of New York at Buffalo, Buffalo, NY, USA"],"affiliations":[{"raw_affiliation_string":"State University of New York at Buffalo, Buffalo, NY, USA","institution_ids":["https://openalex.org/I63190737"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013588572","display_name":"Aidong Zhang","orcid":"https://orcid.org/0000-0001-9723-3246"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aidong Zhang","raw_affiliation_strings":["University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5016035883"],"corresponding_institution_ids":["https://openalex.org/I51556381"],"apc_list":null,"apc_paid":null,"fwci":2.2535,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.90419959,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"472","last_page":"482"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.9329000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10217","display_name":"Cardiac electrophysiology and arrhythmias","score":0.902899980545044,"subfield":{"id":"https://openalex.org/subfields/2705","display_name":"Cardiology and Cardiovascular Medicine"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.825009822845459},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7550095319747925},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6854769587516785},{"id":"https://openalex.org/keywords/interpretation","display_name":"Interpretation (philosophy)","score":0.6535035967826843},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.59619140625},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5859413146972656},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.44880300760269165},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.41550925374031067},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4113360047340393},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3755839169025421},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3551993668079376}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.825009822845459},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7550095319747925},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6854769587516785},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.6535035967826843},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.59619140625},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5859413146972656},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.44880300760269165},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.41550925374031067},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4113360047340393},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3755839169025421},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3551993668079376},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3394486.3403089","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3394486.3403089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W41554520","https://openalex.org/W2121863487","https://openalex.org/W2145339207","https://openalex.org/W2173564293","https://openalex.org/W2270696664","https://openalex.org/W2489939061","https://openalex.org/W2766047647","https://openalex.org/W2788102893","https://openalex.org/W2809622771","https://openalex.org/W2891612330","https://openalex.org/W2891830784","https://openalex.org/W2914831223","https://openalex.org/W2947234734","https://openalex.org/W2949608212","https://openalex.org/W2962755762","https://openalex.org/W2962843949","https://openalex.org/W3000716014","https://openalex.org/W3022179901"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W4283221438","https://openalex.org/W2900159906","https://openalex.org/W4384648009","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4380352238","https://openalex.org/W3126470649","https://openalex.org/W2930249865"],"abstract_inverted_index":{"The":[0],"past":[1],"years":[2],"have":[3,49],"witnessed":[4],"the":[5,25,32,76,91,102,121,130,134,148,160,167,179,195,198],"rapid":[6],"development":[7],"of":[8,17,27,35,90,93,106,123,133,162,197],"deep":[9,18,28],"reinforcement":[10,21],"learning":[11,19,22],"(DRL),":[12],"which":[13,147],"is":[14,97],"a":[15,65],"combination":[16],"and":[20,38,67,79,104,140,171,190],"(RL).":[23],"However,":[24,52],"adoption":[26],"neural":[29],"networks":[30],"makes":[31],"decision-making":[33],"process":[34],"DRL":[36,48,77,110,124,138,163,203],"opaque":[37],"lacking":[39],"transparency.":[40],"Motivated":[41],"by":[42],"this,":[43],"various":[44],"interpretation":[45,54,125,164],"methods":[46,55,165],"for":[47],"been":[50],"proposed.":[51],"those":[53],"make":[56],"an":[57,142,173],"implicit":[58],"assumption":[59],"that":[60],"they":[61],"are":[62],"performed":[63],"in":[64,116],"reliable":[66],"secure":[68],"environment.":[69],"In":[70,88,156],"practice,":[71],"sequential":[72],"agent-environment":[73],"interactions":[74],"expose":[75],"algorithms":[78],"their":[80],"corresponding":[81],"downstream":[82],"interpretations":[83],"to":[84,166,176,193],"extra":[85],"adversarial":[86,135,150],"risk.":[87],"spite":[89],"prevalence":[92],"malicious":[94,107,200],"attacks,":[95,170],"there":[96],"no":[98],"existing":[99],"work":[100],"studying":[101],"possibility":[103],"feasibility":[105],"attacks":[108,136,201],"against":[109,137,202],"interpretations.":[111,204],"To":[112],"bridge":[113],"this":[114,117],"gap,":[115],"paper,":[118],"we":[119,128,158,185],"investigate":[120],"vulnerability":[122,161],"methods.":[126],"Specifically,":[127],"introduce":[129],"first":[131],"study":[132,159],"interpretations,":[139],"propose":[141],"optimization":[143],"framework":[144,175],"based":[145],"on":[146],"optimal":[149],"attack":[151],"strategy":[152],"can":[153],"be":[154],"derived.":[155],"addition,":[157],"model":[168,181],"poisoning":[169,182],"present":[172],"algorithmic":[174],"rigorously":[177],"formulate":[178],"proposed":[180,199],"attack.":[183],"Finally,":[184],"conduct":[186],"both":[187],"theoretical":[188],"analysis":[189],"extensive":[191],"experiments":[192],"validate":[194],"effectiveness":[196]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
