{"id":"https://openalex.org/W7138278687","doi":"https://doi.org/10.1609/aaai.v40i35.40176","title":"Adversarial Attack on Black-Box Multi-Agent by Adaptive Perturbation","display_name":"Adversarial Attack on Black-Box Multi-Agent by Adaptive Perturbation","publication_year":2026,"publication_date":"2026-03-14","ids":{"openalex":"https://openalex.org/W7138278687","doi":"https://doi.org/10.1609/aaai.v40i35.40176"},"language":null,"primary_location":{"id":"doi:10.1609/aaai.v40i35.40176","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i35.40176","pdf_url":null,"source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1609/aaai.v40i35.40176","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129725402","display_name":"Jianming Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210151178","display_name":"System Simulation (United Kingdom)","ror":"https://ror.org/04gf6zh40","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210151178"]}],"countries":["CN","GB"],"is_corresponding":true,"raw_author_name":"Jianming Chen","raw_affiliation_strings":["Institute of Software Chinese Academy of Sciences, Beijing, China\nScience & Technology on Integrated Information System Laboratory, Beijing, China\nState Key Laboratory of Complex System Modeling and Simulation Technology, Beijing, China\nUniversity of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software Chinese Academy of Sciences, Beijing, China\nScience & Technology on Integrated Information System Laboratory, Beijing, China\nState Key Laboratory of Complex System Modeling and Simulation Technology, Beijing, China\nUniversity of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210151178"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100371596","display_name":"Yawen Wang","orcid":"https://orcid.org/0000-0003-2842-8319"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210151178","display_name":"System Simulation (United Kingdom)","ror":"https://ror.org/04gf6zh40","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210151178"]}],"countries":["CN","GB"],"is_corresponding":false,"raw_author_name":"Yawen Wang","raw_affiliation_strings":["Institute of Software Chinese Academy of Sciences, Beijing, China\nScience & Technology on Integrated Information System Laboratory, Beijing, China\nState Key Laboratory of Complex System Modeling and Simulation Technology, Beijing, China\nUniversity of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software Chinese Academy of Sciences, Beijing, China\nScience & Technology on Integrated Information System Laboratory, Beijing, China\nState Key Laboratory of Complex System Modeling and Simulation Technology, Beijing, China\nUniversity of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210151178"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129658115","display_name":"Junjie Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210151178","display_name":"System Simulation (United Kingdom)","ror":"https://ror.org/04gf6zh40","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210151178"]}],"countries":["CN","GB"],"is_corresponding":false,"raw_author_name":"Junjie Wang","raw_affiliation_strings":["Institute of Software Chinese Academy of Sciences, Beijing, China\nScience & Technology on Integrated Information System Laboratory, Beijing, China\nState Key Laboratory of Complex System Modeling and Simulation Technology, Beijing, China\nUniversity of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software Chinese Academy of Sciences, Beijing, China\nScience & Technology on Integrated Information System Laboratory, Beijing, China\nState Key Laboratory of Complex System Modeling and Simulation Technology, Beijing, China\nUniversity of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210151178"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129655218","display_name":"Xiaofei Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Xiaofei Xie","raw_affiliation_strings":["Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129686846","display_name":"Yuanzhe Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210151178","display_name":"System Simulation (United Kingdom)","ror":"https://ror.org/04gf6zh40","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210151178"]}],"countries":["CN","GB"],"is_corresponding":false,"raw_author_name":"Yuanzhe Hu","raw_affiliation_strings":["Institute of Software Chinese Academy of Sciences, Beijing, China\nScience & Technology on Integrated Information System Laboratory, Beijing, China\nState Key Laboratory of Complex System Modeling and Simulation Technology, Beijing, China\nUniversity of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software Chinese Academy of Sciences, Beijing, China\nScience & Technology on Integrated Information System Laboratory, Beijing, China\nState Key Laboratory of Complex System Modeling and Simulation Technology, Beijing, China\nUniversity of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210151178"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129671679","display_name":"Qing Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210151178","display_name":"System Simulation (United Kingdom)","ror":"https://ror.org/04gf6zh40","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210151178"]}],"countries":["CN","GB"],"is_corresponding":false,"raw_author_name":"Qing Wang","raw_affiliation_strings":["Institute of Software Chinese Academy of Sciences, Beijing, China\nScience & Technology on Integrated Information System Laboratory, Beijing, China\nState Key Laboratory of Complex System Modeling and Simulation Technology, Beijing, China\nUniversity of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software Chinese Academy of Sciences, Beijing, China\nScience & Technology on Integrated Information System Laboratory, Beijing, China\nState Key Laboratory of Complex System Modeling and Simulation Technology, Beijing, China\nUniversity of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210151178"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129687962","display_name":"Fanjiang Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210151178","display_name":"System Simulation (United Kingdom)","ror":"https://ror.org/04gf6zh40","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210151178"]}],"countries":["CN","GB"],"is_corresponding":false,"raw_author_name":"Fanjiang Xu","raw_affiliation_strings":["Institute of Software Chinese Academy of Sciences, Beijing, China\nScience & Technology on Integrated Information System Laboratory, Beijing, China\nState Key Laboratory of Complex System Modeling and Simulation Technology, Beijing, China\nUniversity of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software Chinese Academy of Sciences, Beijing, China\nScience & Technology on Integrated Information System Laboratory, Beijing, China\nState Key Laboratory of Complex System Modeling and Simulation Technology, Beijing, China\nUniversity of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210151178"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5129725402"],"corresponding_institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210151178"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.49036403,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"40","issue":"35","first_page":"29359","last_page":"29367"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.961899995803833,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.961899995803833,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.004900000058114529,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.003599999938160181,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9359999895095825},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4602000117301941},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.4562000036239624},{"id":"https://openalex.org/keywords/perturbation","display_name":"Perturbation (astronomy)","score":0.44929999113082886},{"id":"https://openalex.org/keywords/action-selection","display_name":"Action selection","score":0.4262999892234802},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.3598000109195709},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.3481999933719635}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9359999895095825},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6980000138282776},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4602000117301941},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.4562000036239624},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.44929999113082886},{"id":"https://openalex.org/C166109690","wikidata":"https://www.wikidata.org/wiki/Q4677422","display_name":"Action selection","level":3,"score":0.4262999892234802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4221999943256378},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.3598000109195709},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.3481999933719635},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31150001287460327},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.3010999858379364},{"id":"https://openalex.org/C107464732","wikidata":"https://www.wikidata.org/wiki/Q235781","display_name":"Adaptive control","level":3,"score":0.29840001463890076},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.296999990940094},{"id":"https://openalex.org/C52970973","wikidata":"https://www.wikidata.org/wiki/Q2497134","display_name":"Adaptive system","level":2,"score":0.2743000090122223},{"id":"https://openalex.org/C148220186","wikidata":"https://www.wikidata.org/wiki/Q7111912","display_name":"Outcome (game theory)","level":2,"score":0.2660999894142151},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2619999945163727}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1609/aaai.v40i35.40176","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i35.40176","pdf_url":null,"source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1609/aaai.v40i35.40176","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i35.40176","pdf_url":null,"source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7687484622001648,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Evaluating":[0],"security":[1],"and":[2,42,88,106,134,152,158,181],"reliability":[3],"for":[4,69],"multi-agent":[5,150],"systems":[6],"(MAS)":[7],"is":[8],"urgent":[9],"as":[10,49],"they":[11,50],"become":[12],"increasingly":[13],"prevalent":[14],"in":[15,142,170],"various":[16],"applications.":[17],"As":[18],"an":[19],"evaluation":[20],"technique,":[21],"existing":[22],"adversarial":[23,70,117],"attack":[24,168],"frameworks":[25],"face":[26],"certain":[27],"limitations,":[28],"e.g.,":[29],"impracticality":[30],"due":[31],"to":[32,98,111,120,127,138,183],"the":[33,86,90,99,122,166,178,186],"requirement":[34],"of":[35,45],"white-box":[36,132],"information":[37,133],"or":[38,47,55],"high":[39],"control":[40],"authority,":[41],"a":[43,66],"lack":[44],"stealthiness":[46],"effectiveness":[48,105],"often":[51],"target":[52,123],"all":[53],"agents":[54],"specific":[56],"fixed":[57],"agents.":[58],"To":[59],"address":[60],"these":[61],"issues,":[62],"we":[63],"propose":[64],"AdapAM,":[65],"novel":[67],"framework":[68],"attacks":[71],"on":[72,102],"black-box":[73,143],"MAS.":[74],"AdapAM":[75,126,147,164],"incorporates":[76],"two":[77],"key":[78],"components:":[79],"(1)":[80],"Adaptive":[81],"Selection":[82],"Policy":[83],"simultaneously":[84],"selects":[85],"victim":[87],"determines":[89],"anticipated":[91],"malicious":[92,140],"action":[93,95,141],"(the":[94],"would":[96],"lead":[97],"worst":[100],"impact":[101],"MAS),":[103],"balancing":[104],"stealthiness.":[107,187],"(2)":[108],"Proxy-based":[109],"Perturbation":[110],"Induce":[112],"Malicious":[113],"Action":[114],"utilizes":[115],"generative":[116],"imitation":[118],"learning":[119],"approximate":[121],"MAS,":[124],"allowing":[125],"generate":[128],"perturbed":[129],"observations":[130],"using":[131],"thus":[135],"induce":[136],"victims":[137],"execute":[139],"settings.":[144],"We":[145],"evaluate":[146],"across":[148],"eight":[149],"environments":[151],"compare":[153],"it":[154],"with":[155],"four":[156],"state-of-the-art":[157],"commonly-used":[159],"baselines.":[160],"Results":[161],"demonstrate":[162],"that":[163],"achieves":[165],"best":[167],"performance":[169],"different":[171],"perturbation":[172],"rates.":[173],"Besides,":[174],"AdapAM-generated":[175],"perturbations":[176],"are":[177],"least":[179],"noisy":[180],"hardest":[182],"detect,":[184],"emphasizing":[185]},"counts_by_year":[],"updated_date":"2026-03-20T20:47:17.329874","created_date":"2026-03-18T00:00:00"}
