Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: McMahan, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.17114  [pdf, other

    cs.LG cs.CR cs.GT

    Inception: Efficiently Computable Misinformation Attacks on Markov Games

    Authors: Jeremy McMahan, Young Wu, Yudong Chen, Xiaojin Zhu, Qiaomin Xie

    Abstract: We study security threats to Markov games due to information asymmetry and misinformation. We consider an attacker player who can spread misinformation about its reward function to influence the robust victim player's behavior. Given a fixed fake reward function, we derive the victim's policy under worst-case rationality and present polynomial-time algorithms to compute the attacker's optimal wors… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: Accepted to Reinforcement Learning Conference (RLC) 2024

  2. arXiv:2406.08847  [pdf, other

    cs.GT cs.DS cs.LG

    Roping in Uncertainty: Robustness and Regularization in Markov Games

    Authors: Jeremy McMahan, Giovanni Artiglio, Qiaomin Xie

    Abstract: We study robust Markov games (RMG) with $s$-rectangular uncertainty. We show a general equivalence between computing a robust Nash equilibrium (RNE) of a $s$-rectangular RMG and computing a Nash equilibrium (NE) of an appropriately constructed regularized MG. The equivalence result yields a planning algorithm for solving $s$-rectangular RMGs, as well as provable robustness guarantees for policies… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: Accepted to ICML 2024

  3. arXiv:2405.14183  [pdf, other

    cs.LG cs.DS

    Deterministic Policies for Constrained Reinforcement Learning in Polynomial-Time

    Authors: Jeremy McMahan

    Abstract: We present a novel algorithm that efficiently computes near-optimal deterministic policies for constrained reinforcement learning (CRL) problems. Our approach combines three key ideas: (1) value-demand augmentation, (2) action-space approximate dynamic programming, and (3) time-space rounding. Under mild reward assumptions, our algorithm constitutes a fully polynomial-time approximation scheme (FP… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  4. Optimal Attack and Defense for Reinforcement Learning

    Authors: Jeremy McMahan, Young Wu, Xiaojin Zhu, Qiaomin Xie

    Abstract: To ensure the usefulness of Reinforcement Learning (RL) in real systems, it is crucial to ensure they are robust to noise and adversarial attacks. In adversarial RL, an external attacker has the power to manipulate the victim agent's interaction with the environment. We study the full class of online manipulation attacks, which include (i) state attacks, (ii) observation attacks (which are a gener… ▽ More

    Submitted 17 June, 2024; v1 submitted 30 November, 2023; originally announced December 2023.

    Journal ref: Proceedings of the AAAI Conference on Artificial Intelligence, 38(13), 14332-14340. 2024

  5. arXiv:2311.05511  [pdf, other

    cs.LG cs.AI cs.DS

    Anytime-Constrained Reinforcement Learning

    Authors: Jeremy McMahan, Xiaojin Zhu

    Abstract: We introduce and study constrained Markov Decision Processes (cMDPs) with anytime constraints. An anytime constraint requires the agent to never violate its budget at any point in time, almost surely. Although Markovian policies are no longer sufficient, we show that there exist optimal deterministic policies augmented with cumulative costs. In fact, we present a fixed-parameter tractable reductio… ▽ More

    Submitted 13 June, 2024; v1 submitted 9 November, 2023; originally announced November 2023.

    Journal ref: Proceedings of The 27th International Conference on Artificial Intelligence and Statistics, PMLR 238:4321-4329, 2024

  6. arXiv:2311.00582  [pdf, other

    cs.GT cs.AI

    Minimally Modifying a Markov Game to Achieve Any Nash Equilibrium and Value

    Authors: Young Wu, Jeremy McMahan, Yiding Chen, Yudong Chen, Xiaojin Zhu, Qiaomin Xie

    Abstract: We study the game modification problem, where a benevolent game designer or a malevolent adversary modifies the reward function of a zero-sum Markov game so that a target deterministic or stochastic policy profile becomes the unique Markov perfect Nash equilibrium and has a value within a target range, in a way that minimizes the modification cost. We characterize the set of policy profiles that c… ▽ More

    Submitted 24 August, 2024; v1 submitted 1 November, 2023; originally announced November 2023.

    Comments: Accepted by ICML 2024 Conference

  7. arXiv:2307.09652  [pdf, other

    cs.GT cs.AI cs.CR cs.MA eess.SY

    VISER: A Tractable Solution Concept for Games with Information Asymmetry

    Authors: Jeremy McMahan, Young Wu, Yudong Chen, Xiaojin Zhu, Qiaomin Xie

    Abstract: Many real-world games suffer from information asymmetry: one player is only aware of their own payoffs while the other player has the full game information. Examples include the critical domain of security games and adversarial multi-agent reinforcement learning. Information asymmetry renders traditional solution concepts such as Strong Stackelberg Equilibrium (SSE) and Robust-Optimization Equilib… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

    Comments: 17 pages, 6 figures

    MSC Class: 91A27 (Primary); 93E20 (Secondary) ACM Class: F.2.1; G.3; I.2.8

  8. arXiv:2306.08041  [pdf, ps, other

    cs.MA cs.AI cs.CR cs.GT cs.LG

    Data Poisoning to Fake a Nash Equilibrium in Markov Games

    Authors: Young Wu, Jeremy McMahan, Xiaojin Zhu, Qiaomin Xie

    Abstract: We characterize offline data poisoning attacks on Multi-Agent Reinforcement Learning (MARL), where an attacker may change a data set in an attempt to install a (potentially fictitious) unique Markov-perfect Nash equilibrium for a two-player zero-sum Markov game. We propose the unique Nash set, namely the set of games, specified by their Q functions, with a specific joint policy being the unique Na… ▽ More

    Submitted 18 June, 2024; v1 submitted 13 June, 2023; originally announced June 2023.

  9. arXiv:2206.01888  [pdf, ps, other

    cs.LG cs.AI cs.CR cs.GT

    Reward Poisoning Attacks on Offline Multi-Agent Reinforcement Learning

    Authors: Young Wu, Jeremy McMahan, Xiaojin Zhu, Qiaomin Xie

    Abstract: In offline multi-agent reinforcement learning (MARL), agents estimate policies from a given dataset. We study reward-poisoning attacks in this setting where an exogenous attacker modifies the rewards in the dataset before the agents see the dataset. The attacker wants to guide each agent into a nefarious target policy while minimizing the $L^p$ norm of the reward modification. Unlike attacks on si… ▽ More

    Submitted 7 March, 2023; v1 submitted 3 June, 2022; originally announced June 2022.

  10. arXiv:2108.12976  [pdf, ps, other

    cs.DS cs.LG

    Approximating Pandora's Box with Correlations

    Authors: Shuchi Chawla, Evangelia Gergatsouli, Jeremy McMahan, Christos Tzamos

    Abstract: We revisit the classic Pandora's Box (PB) problem under correlated distributions on the box values. Recent work of arXiv:1911.01632 obtained constant approximate algorithms for a restricted class of policies for the problem that visit boxes in a fixed order. In this work, we study the complexity of approximating the optimal policy which may adaptively choose which box to visit next based on the va… ▽ More

    Submitted 21 July, 2023; v1 submitted 29 August, 2021; originally announced August 2021.

  11. arXiv:2108.04422  [pdf, other

    cs.DS

    A $D$-competitive algorithm for the Multilevel Aggregation Problem with Deadlines

    Authors: Jeremy McMahan

    Abstract: In this paper, we consider the multi-level aggregation problem with deadlines (MLAPD) previously studied by Bienkowski et al. (2015), Buchbinder et al. (2017), and Azar and Touitou (2019). This is an online problem where the algorithm services requests arriving over time and can save costs by aggregating similar requests. Costs are structured in the form of a rooted tree. This problem has applicat… ▽ More

    Submitted 9 August, 2021; originally announced August 2021.

  12. Pure Tensor Program Rewriting via Access Patterns (Representation Pearl)

    Authors: Gus Henry Smith, Andrew Liu, Steven Lyubomirsky, Scott Davidson, Joseph McMahan, Michael Taylor, Luis Ceze, Zachary Tatlock

    Abstract: Tensor kernels in machine learning (ML) often correspond to pure mathematical expressions, making term rewriting an attractive strategy for optimization and mapping to specialized hardware accelerators. However, existing ML intermediate representations (IRs) tend to either be \textit{pure but high-level}, making low-level rewrites to hardware targets inexpressible, or \textit{low-level but impure}… ▽ More

    Submitted 19 May, 2021; originally announced May 2021.

    Comments: To be published at MAPS 2021