{"id":"https://openalex.org/W4385764406","doi":"https://doi.org/10.24963/ijcai.2023/386","title":"Poisoning the Well: Can We Simultaneously Attack a Group of Learning Agents?","display_name":"Poisoning the Well: Can We Simultaneously Attack a Group of Learning Agents?","publication_year":2023,"publication_date":"2023-08-01","ids":{"openalex":"https://openalex.org/W4385764406","doi":"https://doi.org/10.24963/ijcai.2023/386"},"language":"en","primary_location":{"id":"doi:10.24963/ijcai.2023/386","is_oa":true,"landing_page_url":"https://doi.org/10.24963/ijcai.2023/386","pdf_url":"https://www.ijcai.org/proceedings/2023/0386.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.ijcai.org/proceedings/2023/0386.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092629461","display_name":"Ridhima Bector","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Ridhima Bector","raw_affiliation_strings":["Nanyang Technological University"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041457457","display_name":"Hang Xu","orcid":"https://orcid.org/0000-0003-3645-8972"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Hang Xu","raw_affiliation_strings":["Nanyang Technological University"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020988269","display_name":"Abhay M S Aradhya","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Abhay Aradhya","raw_affiliation_strings":["Nanyang Technological University"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063229067","display_name":"Chai Quek","orcid":"https://orcid.org/0000-0002-7313-4339"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chai Quek","raw_affiliation_strings":["Nanyang Technological University"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066651599","display_name":"Zinovi Rabinovich","orcid":"https://orcid.org/0000-0002-1796-8013"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Zinovi Rabinovich","raw_affiliation_strings":["Nanyang Technological University"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5092629461"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":0.1751,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5496562,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"3470","last_page":"3478"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7355019450187683},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.7161768674850464},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6564352512359619},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.5636503100395203},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.530566930770874},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5136658549308777},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4835795760154724},{"id":"https://openalex.org/keywords/constructive","display_name":"Constructive","score":0.43656620383262634},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.35812264680862427},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3236280679702759}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7355019450187683},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.7161768674850464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6564352512359619},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.5636503100395203},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.530566930770874},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5136658549308777},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4835795760154724},{"id":"https://openalex.org/C2778701210","wikidata":"https://www.wikidata.org/wiki/Q28130034","display_name":"Constructive","level":3,"score":0.43656620383262634},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.35812264680862427},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3236280679702759},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.24963/ijcai.2023/386","is_oa":true,"landing_page_url":"https://doi.org/10.24963/ijcai.2023/386","pdf_url":"https://www.ijcai.org/proceedings/2023/0386.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.24963/ijcai.2023/386","is_oa":true,"landing_page_url":"https://doi.org/10.24963/ijcai.2023/386","pdf_url":"https://www.ijcai.org/proceedings/2023/0386.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385764406.pdf"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W1492974543","https://openalex.org/W1554247770","https://openalex.org/W2145339207","https://openalex.org/W2269740302","https://openalex.org/W2560609797","https://openalex.org/W2572659264","https://openalex.org/W2803728337","https://openalex.org/W2920925306","https://openalex.org/W2942465044","https://openalex.org/W2962755762","https://openalex.org/W2962789549","https://openalex.org/W3001548133","https://openalex.org/W3009262485","https://openalex.org/W3013223143","https://openalex.org/W3034222845","https://openalex.org/W3035388736","https://openalex.org/W3037941652","https://openalex.org/W3089522807","https://openalex.org/W3116666954","https://openalex.org/W3169821733","https://openalex.org/W3176864543","https://openalex.org/W3200885897","https://openalex.org/W4296437512","https://openalex.org/W4298857966","https://openalex.org/W4308932355","https://openalex.org/W6727252785","https://openalex.org/W6780396752","https://openalex.org/W6863994431"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2055733372"],"abstract_inverted_index":{"Reinforcement":[0],"Learning's":[1],"(RL)":[2],"ubiquity":[3],"has":[4],"instigated":[5],"research":[6],"on":[7,30,48,99,181,188],"potential":[8],"threats":[9],"to":[10,60,74,85],"its":[11],"training":[12,139],"and":[13,54,80,152,194,218,221],"deployment.":[14],"Many":[15],"works":[16,180],"study":[17],"single-learner":[18],"training-time":[19,46],"attacks":[20,29],"that":[21],"\"pre-programme\"":[22],"behavioral":[23],"triggers":[24],"into":[25],"a":[26,44,49,67,163,189,205],"strategy.":[27],"However,":[28],"collections":[31],"of":[32,51,69,101,144,169,208],"learning":[33,52],"agents":[34,53,79],"remain":[35],"largely":[36],"overlooked.":[37],"We":[38],"remedy":[39],"the":[40,57,61,82,86,128,137,145,173,200,202,214],"situation":[41],"by":[42],"developing":[43],"constructive":[45],"attack":[47,58,65,129,150,203,215],"population":[50,84,158],"additionally":[55],"make":[56],"agnostic":[59],"population's":[62],"size.":[63],"The":[64,154],"constitutes":[66],"sequence":[68],"environment":[70,93,182],"(re)parameterizations":[71],"(poisonings),":[72],"generated":[73],"overcome":[75],"individual":[76,125],"differences":[77],"between":[78],"lead":[81],"entire":[83],"same":[87],"target":[88,209],"behavior":[89,159],"while":[90],"minimizing":[91],"effective":[92],"modulation.":[94],"Our":[95],"method":[96],"is":[97,160,216],"demonstrated":[98],"populations":[100],"independent":[102],"learners":[103,147],"in":[104,157],"\"ghost\"":[105],"environments":[106,118],"(learners":[107],"do":[108],"not":[109],"interact":[110],"or":[111,123],"perceive":[112],"each":[113],"other)":[114],"as":[115,117],"well":[116],"with":[119,122,178],"mutual":[120],"awareness,":[121],"without":[124],"learning.":[126],"From":[127],"perspective,":[130],"we":[131],"pursue":[132],"an":[133],"ultra-blackbox":[134],"setting,":[135],"i.e.,":[136,198,213],"attacker's":[138],"utilizes":[140],"only":[141],"across-policy":[142],"traces":[143],"victim":[146,174],"for":[148],"both":[149],"conditioning":[151],"evaluation.":[153],"resulting":[155],"uncertainty":[156],"managed":[161],"via":[162],"novel":[164],"Wasserstein":[165],"distance-based":[166],"Gaussian":[167],"embedding":[168],"behaviors":[170],"detected":[171],"within":[172],"population.":[175],"To":[176],"align":[177],"prior":[179],"poisoning,":[183],"our":[184],"experiments":[185],"are":[186,223],"based":[187],"3D":[190],"Grid":[191],"World":[192],"domain":[193],"show:":[195],"a)":[196],"feasibility,":[197],"despite":[199],"uncertainty,":[201],"forces":[204],"population-wide":[206],"adoption":[207],"behavior;":[210],"b)":[211],"efficacy,":[212],"size-agnostic":[217],"transferable.":[219],"Code":[220],"Appendices":[222],"available":[224],"at":[225],"\"bit.ly/github-rb-cep\".":[226]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-01-20T17:24:06.736184","created_date":"2025-10-10T00:00:00"}
