Table of Contents
Fetching ...

Fully Byzantine-Resilient Distributed Multi-Agent Q-Learning

Haejoon Lee, Dimitra Panagou

Abstract

We study Byzantine-resilient distributed multi-agent reinforcement learning (MARL), where agents must collaboratively learn optimal value functions over a compromised communication network. Existing resilient MARL approaches typically guarantee almost sure convergence only to near-optimal value functions, or require restrictive assumptions to ensure convergence to optimal solution. As a result, agents may fail to learn the optimal policies under these methods. To address this, we propose a novel distributed Q-learning algorithm, under which all agents' value functions converge almost surely to the optimal value functions despite Byzantine edge attacks. The key idea is a redundancy-based filtering mechanism that leverages two-hop neighbor information to validate incoming messages, while preserving bidirectional information flow. We then introduce a new topological condition for the convergence of our algorithm, present a systematic method to construct such networks, and prove that this condition can be verified in polynomial time. We validate our results through simulations, showing that our method converges to the optimal solutions, whereas prior methods fail under Byzantine edge attacks.

Fully Byzantine-Resilient Distributed Multi-Agent Q-Learning

Abstract

We study Byzantine-resilient distributed multi-agent reinforcement learning (MARL), where agents must collaboratively learn optimal value functions over a compromised communication network. Existing resilient MARL approaches typically guarantee almost sure convergence only to near-optimal value functions, or require restrictive assumptions to ensure convergence to optimal solution. As a result, agents may fail to learn the optimal policies under these methods. To address this, we propose a novel distributed Q-learning algorithm, under which all agents' value functions converge almost surely to the optimal value functions despite Byzantine edge attacks. The key idea is a redundancy-based filtering mechanism that leverages two-hop neighbor information to validate incoming messages, while preserving bidirectional information flow. We then introduce a new topological condition for the convergence of our algorithm, present a systematic method to construct such networks, and prove that this condition can be verified in polynomial time. We validate our results through simulations, showing that our method converges to the optimal solutions, whereas prior methods fail under Byzantine edge attacks.

Paper Structure

This paper contains 9 sections, 6 theorems, 15 equations, 3 figures, 1 table, 1 algorithm.

Key Result

Lemma 1

Let $\mathcal{G}(t)=(\mathcal{V}, \mathcal{E}(t))$ be $(r,r')$-redundant at time $t$. Then, its $r$-2-hop graph $\mathcal{G}^{(2)}_{r}(t)=(\mathcal{V}, \mathcal{E}^{(2)}_r(t))$ is connected and undirected at time $t$. $\blacktriangleleft$$\blacktriangleleft$

Figures (3)

  • Figure C1: Visualizations of (a) graph $\mathcal{G}(t)=(\mathcal{V}, \mathcal{E}(t))$ and (b) its $5$-2-hop graph $\mathcal{G}^{(2)}_5(t)=(\mathcal{V}, \mathcal{E}^{(2)}_5(t))$ at time $t$. The edge $(i,j)\in \mathcal{E}^{(2)}_5(t)$, since $|\mathcal{B}_i(t)\cap \mathcal{N}_{j}(t)|\geq 5$.
  • Figure C2: (a) $(1,0)$-redundant graph and (b) its 1-2-hop graph.
  • Figure E1: Performance comparison of our algorithm against the optimal Q-values from the Oracle kar2013QD (no attack) and the Baseline xie2021towards under a $1$-total Byzantine edge attack.

Theorems & Definitions (20)

  • Definition 1: $F$-total Byzantine Edge Attack
  • Remark 1
  • Remark 2
  • Definition 2: $r$-2-hop Graph
  • Definition 3: $(r,r')$-redundant
  • Remark 3
  • Lemma 1
  • proof
  • Lemma 2
  • proof
  • ...and 10 more