{"id":"https://openalex.org/W7137828285","doi":"https://doi.org/10.48550/arxiv.2603.13940","title":"GroupGuard: A Framework for Modeling and Defending Collusive Attacks in Multi-Agent Systems","display_name":"GroupGuard: A Framework for Modeling and Defending Collusive Attacks in Multi-Agent Systems","publication_year":2026,"publication_date":"2026-03-14","ids":{"openalex":"https://openalex.org/W7137828285","doi":"https://doi.org/10.48550/arxiv.2603.13940"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.13940","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.13940","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.13940","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099623039","display_name":"Yiling Tao","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tao, Yiling","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129724925","display_name":"Xinran Zheng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zheng, Xinran","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129707181","display_name":"Shuo Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Shuo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093751229","display_name":"Meiling Tao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tao, Meiling","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5129686819","display_name":"Xingjun Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Xingjun","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5099623039"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.6747000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.6747000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.052299998700618744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.04129999876022339,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.4449999928474426},{"id":"https://openalex.org/keywords/interactivity","display_name":"Interactivity","score":0.41110000014305115},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.3686999976634979},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.3021000027656555},{"id":"https://openalex.org/keywords/attack-patterns","display_name":"Attack patterns","score":0.2906999886035919},{"id":"https://openalex.org/keywords/multi-agent-system","display_name":"Multi-agent system","score":0.26269999146461487}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6866999864578247},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.614799976348877},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.4449999928474426},{"id":"https://openalex.org/C144430266","wikidata":"https://www.wikidata.org/wiki/Q839721","display_name":"Interactivity","level":2,"score":0.41110000014305115},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.3686999976634979},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.3021000027656555},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.2906999886035919},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2587999999523163},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.25839999318122864},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.2515000104904175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.13940","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.13940","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.13940","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.13940","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5700643062591553}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"While":[0],"large":[1],"language":[2],"model-based":[3],"agents":[4,34],"demonstrate":[5,84],"great":[6],"potential":[7],"in":[8,31],"collaborative":[9,114],"tasks,":[10],"their":[11],"interactivity":[12],"also":[13],"introduces":[14],"security":[15],"vulnerabilities.":[16],"In":[17],"this":[18,45],"paper,":[19],"we":[20,47],"propose":[21],"and":[22,67,72,81,111],"model":[23],"group":[24,86],"collusive":[25,74,87],"attacks,":[26],"a":[27,50,56,117],"highly":[28],"destructive":[29],"threat":[30],"which":[32],"multiple":[33],"coordinate":[35],"via":[36],"sociological":[37],"strategies":[38],"to":[39,70,96,99,109],"mislead":[40],"the":[41,90],"system.":[42],"To":[43],"address":[44],"challenge,":[46],"introduce":[48],"GroupGuard,":[49],"training-free":[51],"defense":[52,58],"framework":[53],"that":[54,85],"employs":[55],"multi-layered":[57],"strategy,":[59],"including":[60],"continuous":[61],"graph-based":[62],"monitoring,":[63],"active":[64],"honeypot":[65],"inducement,":[66],"structural":[68],"pruning,":[69],"identify":[71],"isolate":[73],"agents.":[75],"Experimental":[76],"results":[77],"across":[78],"five":[79],"datasets":[80],"four":[82],"topologies":[83],"attacks":[88],"increase":[89],"attack":[91],"success":[92],"rate":[93],"by":[94],"up":[95],"15\\%":[97],"compared":[98],"individual":[100],"attacks.":[101],"GroupGuard":[102],"consistently":[103],"achieves":[104],"high":[105],"detection":[106],"accuracy":[107],"(up":[108],"88\\%)":[110],"effectively":[112],"restores":[113],"performance,":[115],"providing":[116],"robust":[118],"solution":[119],"for":[120],"securing":[121],"multi-agent":[122],"systems.":[123]},"counts_by_year":[],"updated_date":"2026-03-18T06:31:55.123368","created_date":"2026-03-18T00:00:00"}
