Adversarial Attacks on Gaussian Process Bandits

10/16/2021
by   Eric Han, et al.
0

Gaussian processes (GP) are a widely-adopted tool used to sequentially optimize black-box functions, where evaluations are costly and potentially noisy. Recent works on GP bandits have proposed to move beyond random noise and devise algorithms robust to adversarial attacks. In this paper, we study this problem from the attacker's perspective, proposing various adversarial attack methods with differing assumptions on the attacker's strength and prior information. Our goal is to understand adversarial attacks on GP bandits from both a theoretical and practical perspective. We focus primarily on targeted attacks on the popular GP-UCB algorithm and a related elimination-based algorithm, based on adversarially perturbing the function f to produce another function f̃ whose optima are in some region ℛ_ target. Based on our theoretical analysis, we devise both white-box attacks (known f) and black-box attacks (unknown f), with the former including a Subtraction attack and Clipping attack, and the latter including an Aggressive subtraction attack. We demonstrate that adversarial attacks on GP bandits can succeed in forcing the algorithm towards ℛ_ target even with a low attack budget, and we compare our attacks' performance and efficiency on several real and synthetic functions.

READ FULL TEXT

page 2

page 3

page 4

page 5

page 8

page 10

page 12

page 17

research
08/15/2023

A Review of Adversarial Attacks in Computer Vision

Deep neural networks have been widely used in various downstream tasks, ...
research
09/20/2023

PRAT: PRofiling Adversarial aTtacks

Intrinsic susceptibility of deep learning to adversarial examples has le...
research
03/20/2022

Strategic Analysis to defend against Griefing Attack in Lightning Network

Payments routed in Lightning Network are susceptible to a griefing attac...
research
12/10/2021

Efficient Action Poisoning Attacks on Linear Contextual Bandits

Contextual bandit algorithms have many applicants in a variety of scenar...
research
11/02/2021

Meta-Learning the Search Distribution of Black-Box Random Search Based Adversarial Attacks

Adversarial attacks based on randomized search schemes have obtained sta...
research
11/16/2019

Suspicion-Free Adversarial Attacks on Clustering Algorithms

Clustering algorithms are used in a large number of applications and pla...
research
07/03/2023

Efficient Determination of Safety Requirements for Perception Systems

Perception systems operate as a subcomponent of the general autonomy sta...

Please sign up or login with your details

Forgot password? Click here to reset