Attack the Messages, Not the Agents: A Multi-round Adaptive Stealthy Tampering Framework for LLM-MAS Authors: Bingyu Yan, Ziyi Zhou, Xiaoming Zhang, Chaozhuo Li, Ruilin Zeng, Yirui Qi, Tianbo Wang, Litian Zhang | Published: 2025-08-05 Reinforcement Learning AttackAttack Action ModelWatermark 2025.08.05 2025.08.07 Literature Database
Adaptive Reward-Poisoning Attacks against Reinforcement Learning Authors: Xuezhou Zhang, Yuzhe Ma, Adish Singla, Xiaojin Zhu | Published: 2020-03-27 | Updated: 2020-06-22 Q-Learning AlgorithmBackdoor AttackReinforcement Learning Attack 2020.03.27 2025.05.28 Literature Database
WITCHcraft: Efficient PGD attacks with random step size Authors: Ping-Yeh Chiang, Jonas Geiping, Micah Goldblum, Tom Goldstein, Renkun Ni, Steven Reich, Ali Shafahi | Published: 2019-11-18 Convergence AnalysisReinforcement Learning AttackAdversarial Attack Methods 2019.11.18 2025.05.28 Literature Database
Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy Authors: Xinghua Qu, Zhu Sun, Yew-Soon Ong, Abhishek Gupta, Pengfei Wei | Published: 2019-11-10 | Updated: 2020-10-29 Reinforcement Learning AlgorithmReinforcement Learning AttackAdversarial attack 2019.11.10 2025.05.28 Literature Database
Multi-task Learning and Catastrophic Forgetting in Continual Reinforcement Learning Authors: João Ribeiro, Francisco S. Melo, João Dias | Published: 2019-09-22 Reinforcement Learning AttackMachine Learning ApplicationMachine Learning Technology 2019.09.22 2025.05.28 Literature Database
Attacking Graph Convolutional Networks via Rewiring Authors: Yao Ma, Suhang Wang, Tyler Derr, Lingfei Wu, Jiliang Tang | Published: 2019-06-10 | Updated: 2019-09-28 Reinforcement Learning AttackAdversarial LearningDeep Reinforcement Learning 2019.06.10 2025.05.28 Literature Database
Online Data Poisoning Attack Authors: Xuezhou Zhang, Xiaojin Zhu, Laurent Lessard | Published: 2019-03-05 | Updated: 2019-05-30 PoisoningReinforcement Learning AttackOptimization Problem 2019.03.05 2025.05.28 Literature Database
Design of intentional backdoors in sequential models Authors: Zhaoyuan Yang, Naresh Iyer, Johan Reimann, Nurali Virani | Published: 2019-02-26 Backdoor AttackReinforcement Learning AttackAdversarial Learning 2019.02.26 2025.05.28 Literature Database
Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence Authors: Yi Han, David Hubczenko, Paul Montague, Olivier De Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah Erfani | Published: 2019-02-25 | Updated: 2020-08-17 Backdoor AttackReinforcement Learning AttackAdversarial Learning 2019.02.25 2025.05.28 Literature Database