Security in multiagent systems by policy randomization

Praveen Paruchuri, Milind Tambe, Fernando Ordóñez, Sarit Kraus

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

46 Scopus citations


Security in multiagent systems is commonly defined as the ability of the system to deal with intentional threats from other agents. This paper focuses on domains where such intentional threats are caused by unseen adversaries whose actions or payoffs are unknown. In such domains, action randomization can effectively deteriorate an adversary's capability to predict and exploit an agent/agent team's actions. Unfortunately, little attention has been paid to intentional randomization of agents' policies in single-agent or decentralized (PO)MDPs without significantly sacrificing rewards or breaking down coordination. This paper provides two key contributions to remedy this situation. First, it provides three novel algorithms, one based on a non-linear program and two based on linear programs (LP), to randomize single-agent policies, while attaining a certain level of expected reward. Second, it provides Rolling Down Randomization (RDR), a new algorithm that efficiently generates randomized policies for decentralized POMDPs via the single-agent LP method.

Original languageEnglish
Title of host publicationProceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems
Number of pages8
StatePublished - 2006
EventFifth International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS - Hakodate, Japan
Duration: 8 May 200612 May 2006

Publication series

NameProceedings of the International Conference on Autonomous Agents


ConferenceFifth International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS


  • Decentralized POMDP
  • MDP
  • Safety and security in agent systems
  • Teamwork


Dive into the research topics of 'Security in multiagent systems by policy randomization'. Together they form a unique fingerprint.

Cite this