Adversarial Attacks Against Reinforcement Learning-Based Portfolio Management Strategy

被引:9
|
作者
Chen, Yu-Ying [1 ]
Chen, Chiao-Ting [2 ]
Sang, Chuan-Yun [1 ]
Yang, Yao-Chun [1 ]
Huang, Szu-Hao [3 ]
机构
[1] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu 30010, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 30010, Taiwan
[3] Natl Chiao Tung Univ, Dept Informat Management & Finance, Hsinchu 30010, Taiwan
关键词
Task analysis; Portfolios; Perturbation methods; Deep learning; Training; Information management; Solid modeling; Reinforcement learning; adversarial attack;
D O I
10.1109/ACCESS.2021.3068768
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many researchers have incorporated deep neural networks (DNNs) with reinforcement learning (RL) in automatic trading systems. However, such methods result in complicated algorithmic trading models with several defects, especially when a DNN model is vulnerable to malicious adversarial samples. Researches have rarely focused on planning for long-term attacks against RL-based trading systems. To neutralize these attacks, researchers must consider generating imperceptible perturbations while simultaneously reducing the number of modified steps. In this research, an adversary is used to attack an RL-based trading agent. First, we propose an extension of the ensemble of the identical independent evaluators (EIIE) method, called enhanced EIIE, in which information on the best bids and asks is incorporated. Enhanced EIIE was demonstrated to produce an authoritative trading agent that yields better portfolio performance relative to that of an EIIE agent. Enhanced EIIE was then applied to the adversarial agent for the agent to learn when and how much to attack (in the form of introducing perturbations).In our experiments, our proposed adversarial attack mechanisms were > 30% more effective at reducing accumulated portfolio value relative to the conventional attack mechanisms of the fast gradient sign method (FSGM) and iterative FSGM, which are currently more commonly researched and adapted to compare and improve.
引用
收藏
页码:50667 / 50685
页数:19
相关论文
共 50 条
  • [41] Learning-Based Robust Anomaly Detection in the Presence of Adversarial Attacks
    Zhong, Chen
    Gursoy, M. Cenk
    Velipasalar, Senem
    2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 1206 - 1211
  • [42] Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems
    Newaz, A. K. M. Iqtidar
    Haque, Nur Imtiazul
    Sikder, Amit Kumar
    Rahman, Mohammad Ashiqur
    Uluagac, A. Selcuk
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [43] Enhanced Adversarial Strategically-Timed Attacks Against Deep Reinforcement Learning
    Yang, Chao-Han Huck
    Qi, Jun
    Chen, Pin-Yu
    Ouyang, Yi
    Hung, I-Te Danny
    Lee, Chin-Hui
    Ma, Xiaoli
    ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2020, 2020-May : 3407 - 3411
  • [44] Forming Adversarial Example Attacks Against Deep Neural Networks With Reinforcement Learning
    Akers, Matthew
    Barton, Armon
    COMPUTER, 2024, 57 (01) : 88 - 99
  • [45] Defense Strategies Against Adversarial Jamming Attacks via Deep Reinforcement Learning
    Wang, Feng
    Zhong, Chen
    Gursoy, M. Cenk
    Velipasalar, Senem
    2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, : 336 - 341
  • [46] ENHANCED ADVERSARIAL STRATEGICALLY-TIMED ATTACKS AGAINST DEEP REINFORCEMENT LEARNING
    Yang, Chao-Han Huck
    Qi, Jun
    Chen, Pin-Yu
    Ouyang, Yi
    Hung, I-Te Danny
    Lee, Chin-Hui
    Ma, Xiaoli
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 3407 - 3411
  • [47] Reinforcement learning-based portfolio optimization with deterministic state transition
    Song, Guangle
    Zhao, Tianlong
    Ma, Xiang
    Lin, Peiguang
    Cui, Chaoran
    INFORMATION SCIENCES, 2025, 690
  • [48] Reinforcement Learning-Based Cooperative Adversarial Algorithm for UAV Cluster
    Li, Yan
    Gao, Yanlong
    Dai, Xunhua
    Nian, Xiaohong
    Wang, Haibo
    Xiong, HongYun
    PROCEEDINGS OF 2022 INTERNATIONAL CONFERENCE ON AUTONOMOUS UNMANNED SYSTEMS, ICAUS 2022, 2023, 1010 : 1129 - 1138
  • [49] Adversarial robustness of deep reinforcement learning-based intrusion detection
    Merzouk, Mohamed Amine
    Neal, Christopher
    Delas, Josephine
    Yaich, Reda
    Boulahia-Cuppens, Nora
    Cuppens, Frederic
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (06) : 3625 - 3651
  • [50] Meta-Reinforcement Learning-Based Transferable Scheduling Strategy for Energy Management
    Xiong, Luolin
    Tang, Yang
    Liu, Chensheng
    Mao, Shuai
    Meng, Ke
    Dong, Zhaoyang
    Qian, Feng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 70 (04) : 1685 - 1695