no code implementations • 2 Dec 2021 • Ted Fujimoto, Timothy Doster, Adam Attarian, Jill Brandenberger, Nathan Hodas
We investigate how effective an attacker can be when it only learns from its victim's actions, without access to the victim's reward.
Multi-agent Reinforcement Learning reinforcement-learning +1