Adversarial Attacks Against Reinforcement Learning-Based Portfolio Management Strategy

被引:9
|
作者
Chen, Yu-Ying [1 ]
Chen, Chiao-Ting [2 ]
Sang, Chuan-Yun [1 ]
Yang, Yao-Chun [1 ]
Huang, Szu-Hao [3 ]
机构
[1] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu 30010, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 30010, Taiwan
[3] Natl Chiao Tung Univ, Dept Informat Management & Finance, Hsinchu 30010, Taiwan
关键词
Task analysis; Portfolios; Perturbation methods; Deep learning; Training; Information management; Solid modeling; Reinforcement learning; adversarial attack;
D O I
10.1109/ACCESS.2021.3068768
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many researchers have incorporated deep neural networks (DNNs) with reinforcement learning (RL) in automatic trading systems. However, such methods result in complicated algorithmic trading models with several defects, especially when a DNN model is vulnerable to malicious adversarial samples. Researches have rarely focused on planning for long-term attacks against RL-based trading systems. To neutralize these attacks, researchers must consider generating imperceptible perturbations while simultaneously reducing the number of modified steps. In this research, an adversary is used to attack an RL-based trading agent. First, we propose an extension of the ensemble of the identical independent evaluators (EIIE) method, called enhanced EIIE, in which information on the best bids and asks is incorporated. Enhanced EIIE was demonstrated to produce an authoritative trading agent that yields better portfolio performance relative to that of an EIIE agent. Enhanced EIIE was then applied to the adversarial agent for the agent to learn when and how much to attack (in the form of introducing perturbations).In our experiments, our proposed adversarial attack mechanisms were > 30% more effective at reducing accumulated portfolio value relative to the conventional attack mechanisms of the fast gradient sign method (FSGM) and iterative FSGM, which are currently more commonly researched and adapted to compare and improve.
引用
收藏
页码:50667 / 50685
页数:19
相关论文
共 50 条
  • [31] RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning
    Fang, Yong
    Huang, Cheng
    Xu, Yijia
    Li, Yang
    FUTURE INTERNET, 2019, 11 (08)
  • [32] Adversarial Attacks in a Deep Reinforcement Learning based Cluster Scheduler
    Zhang, Shaojun
    Wang, Chen
    Zomaya, Albert Y.
    2020 IEEE 28TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS 2020), 2020, : 1 - 8
  • [33] XSS adversarial example attacks based on deep reinforcement learning
    Chen, Li
    Tang, Cong
    He, Junjiang
    Zhao, Hui
    Lan, Xiaolong
    Li, Tao
    COMPUTERS & SECURITY, 2022, 120
  • [34] Mercury: A Deep Reinforcement Learning-Based Investment Portfolio Strategy for Risk-Return Balance
    Bai, Zeng-Liang
    Zhao, Ya-Ning
    Zhou, Zhi-Gang
    Li, Wen-Qin
    Gao, Yang-Yang
    Tang, Ying
    Dai, Long-Zheng
    Dong, Yi-You
    IEEE ACCESS, 2023, 11 : 78353 - 78362
  • [35] Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms
    Zhang, Chaoyun
    Costa-Perez, Xavier
    Patras, Paul
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (03) : 1294 - 1311
  • [36] Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers
    Kim, Brian
    Sagduyu, Yalin E.
    Davaslioglu, Kemal
    Erpek, Tugba
    Ulukus, Sennur
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (06) : 3868 - 3880
  • [37] A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks
    Shaukat, Kamran
    Luo, Suhuai
    Varadharajan, Vijay
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2022, 116
  • [38] SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks
    Chen, Lingwei
    Hou, Shifu
    Ye, Yanfang
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 362 - 372
  • [39] Portfolio management based on a reinforcement learning framework
    Wu Junfeng
    Li Yaoming
    Tan Wenqing
    Chen Yun
    JOURNAL OF FORECASTING, 2024, 43 (07) : 2792 - 2808
  • [40] Adversarial Attacks on Deep Learning-Based UAV Navigation Systems
    Mynuddin, Mohammed
    Khan, Sultan Uddin
    Mahmoud, Nabil Mahmoud
    Alsharif, Ahmad
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,