Adversarial Attacks Against Reinforcement Learning-Based Portfolio Management Strategy

被引:10
作者
Chen, Yu-Ying [1 ]
Chen, Chiao-Ting [2 ]
Sang, Chuan-Yun [1 ]
Yang, Yao-Chun [1 ]
Huang, Szu-Hao [3 ]
机构
[1] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu 30010, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 30010, Taiwan
[3] Natl Chiao Tung Univ, Dept Informat Management & Finance, Hsinchu 30010, Taiwan
关键词
Task analysis; Portfolios; Perturbation methods; Deep learning; Training; Information management; Solid modeling; Reinforcement learning; adversarial attack;
D O I
10.1109/ACCESS.2021.3068768
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many researchers have incorporated deep neural networks (DNNs) with reinforcement learning (RL) in automatic trading systems. However, such methods result in complicated algorithmic trading models with several defects, especially when a DNN model is vulnerable to malicious adversarial samples. Researches have rarely focused on planning for long-term attacks against RL-based trading systems. To neutralize these attacks, researchers must consider generating imperceptible perturbations while simultaneously reducing the number of modified steps. In this research, an adversary is used to attack an RL-based trading agent. First, we propose an extension of the ensemble of the identical independent evaluators (EIIE) method, called enhanced EIIE, in which information on the best bids and asks is incorporated. Enhanced EIIE was demonstrated to produce an authoritative trading agent that yields better portfolio performance relative to that of an EIIE agent. Enhanced EIIE was then applied to the adversarial agent for the agent to learn when and how much to attack (in the form of introducing perturbations).In our experiments, our proposed adversarial attack mechanisms were > 30% more effective at reducing accumulated portfolio value relative to the conventional attack mechanisms of the fast gradient sign method (FSGM) and iterative FSGM, which are currently more commonly researched and adapted to compare and improve.
引用
收藏
页码:50667 / 50685
页数:19
相关论文
共 50 条
  • [21] A Defensive Strategy Against Android Adversarial Malware Attacks
    Atedjio, Fabrice Setephin
    Lienou, Jean-Pierre
    Nelson, Frederica F.
    Shetty, Sachin S.
    Kamhoua, Charles A.
    [J]. IEEE ACCESS, 2024, 12 : 169432 - 169441
  • [22] ENSEMBLE ADVERSARIAL TRAINING BASED DEFENSE AGAINST ADVERSARIAL ATTACKS FOR MACHINE LEARNING-BASED INTRUSION DETECTION SYSTEM
    Haroon, M. S.
    Ali, H. M.
    [J]. NEURAL NETWORK WORLD, 2023, 33 (05) : 317 - 336
  • [23] Adversarial Attacks and Defense in Deep Reinforcement Learning (DRL)-Based Traffic Signal Controllers
    Haydari, Ammar
    Zhang, Michael
    Chuah, Chen-Nee
    [J]. IEEE OPEN JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 2 : 402 - 416
  • [24] Adversarial Attacks on Deep Reinforcement Learning-based Traffic Signal Control Systems with Colluding Vehicles
    Qu, Ao
    Tang, Yihong
    Ma, Wei
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2023, 14 (06)
  • [25] Efficient adversarial attacks detection for deep reinforcement learning-based autonomous planetary landing GNC
    Wang, Ziwei
    Aouf, Nabil
    [J]. ACTA ASTRONAUTICA, 2024, 224 : 37 - 47
  • [26] Reinforcement Learning-Based Multimodal Model for the Stock Investment Portfolio Management Task
    Du, Sha
    Shen, Hailong
    [J]. ELECTRONICS, 2024, 13 (19)
  • [27] Improving Generalization in Reinforcement Learning-Based Trading by Using a Generative Adversarial Market Model
    Kuo, Chia-Hsuan
    Chen, Chiao-Ting
    Lin, Sin-Jing
    Huang, Szu-Hao
    [J]. IEEE ACCESS, 2021, 9 : 50738 - 50754
  • [28] Black-Box Reward Attacks Against Deep Reinforcement Learning Based on Successor Representation
    Cai, Kanting
    Zhu, Xiangbin
    Hu, Zhao-Long
    [J]. IEEE ACCESS, 2022, 10 : 51548 - 51560
  • [29] Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-Based Traffic Congestion Control Systems
    Wang, Yue
    Sarkar, Esha
    Li, Wenqing
    Maniatakos, Michail
    Jabari, Saif Eddin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4772 - 4787
  • [30] RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning
    Fang, Yong
    Huang, Cheng
    Xu, Yijia
    Li, Yang
    [J]. FUTURE INTERNET, 2019, 11 (08)