Random Walk Learning and the Pac-Man Attack
Pith reviewed 2026-05-19 02:01 UTC · model grok-4.3
The pith
The Average Crossing algorithm keeps random walk populations bounded and learning convergent under Pac-Man attacks.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Our theoretical analysis establishes that the RW population remains almost surely bounded under AC and RW-based stochastic gradient descent remains convergent under AC, even in the presence of Pac-Man, with a quantifiable deviation from the true optimum.
What carries the argument
Average Crossing (AC) algorithm, a fully decentralized duplication rule triggered when local random walk count exceeds a threshold to offset terminations by malicious nodes.
Load-bearing premise
The analysis depends on a specific probabilistic model of the attack in which malicious nodes terminate random walks upon visit and on the ability to set the duplication threshold in a fully decentralized manner without global coordination.
What would settle it
An observation or experiment showing the random walk population growing unbounded or the learning process diverging when Average Crossing is applied would falsify the central claims.
Figures
read the original abstract
Random walk (RW)-based algorithms have long been popular in distributed systems due to low overheads and scalability, with recent growing applications in decentralized learning. However, their reliance on local interactions makes them inherently vulnerable to malicious behavior. In this work, we investigate an adversarial threat that we term the ``Pac-Man'' attack, in which a malicious node probabilistically terminates any RW that visits it. This stealthy behavior gradually eliminates active RWs from the network, effectively halting the learning process without triggering failure alarms. To counter this threat, we propose the Average Crossing (AC) algorithm--a fully decentralized mechanism for duplicating RWs to prevent RW extinction in the presence of Pac-Man. Our theoretical analysis establishes that (i) the RW population remains almost surely bounded under AC and (ii) RW-based stochastic gradient descent remains convergent under AC, even in the presence of Pac-Man, with a quantifiable deviation from the true optimum. Our extensive empirical results on both synthetic and real-world datasets corroborate our theoretical findings. Furthermore, they uncover a phase transition in the extinction probability as a function of the duplication threshold. We offer theoretical insights by analyzing a simplified variant of the AC, which sheds light on the observed phase transition.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces the 'Pac-Man' attack, in which malicious nodes probabilistically terminate random walks (RWs) visiting them, thereby eroding the active RW population and halting RW-based decentralized learning. To counter this, the authors propose the Average Crossing (AC) algorithm, a fully decentralized duplication mechanism triggered when a local threshold on observed crossings is met. The central theoretical claims are that (i) the RW population remains almost surely bounded under AC despite Pac-Man nodes, and (ii) RW-based stochastic gradient descent converges to a neighborhood of the true optimum with an explicit, quantifiable deviation bound. Empirical evaluations on synthetic graphs and real-world datasets are reported to corroborate the boundedness and convergence claims while revealing a phase transition in extinction probability as a function of the duplication threshold; a simplified AC variant is analyzed to explain the transition.
Significance. If the almost-sure boundedness and convergence results hold under the stated decentralized threshold rule, the work supplies a concrete, attack-specific robustness guarantee for a class of low-overhead distributed learning algorithms. The explicit deviation bound and the identification of a phase transition constitute falsifiable predictions that strengthen the contribution beyond purely empirical defenses. These elements could inform the design of other RW-based protocols in adversarial settings.
major comments (2)
- [§4] §4 (Theoretical Analysis of Boundedness): The almost-sure boundedness claim for the RW population under AC rests on the duplication threshold being chosen from purely local statistics. Standard branching-process or martingale arguments for extinction probability require a uniform lower bound on the duplication rate across nodes. The manuscript does not appear to supply a lemma showing that local threshold selection restores the necessary uniformity or that heterogeneity cannot create subgraphs with effective branching factor <1. This is load-bearing for claim (i).
- [§5] §5 (Convergence of RW-SGD under AC): The quantifiable deviation from the true optimum is stated to be explicit, yet the derivation appears to treat the effective step-size and mixing time after duplication as constants independent of the realized RW population size. If the population bound in §4 is only almost-sure rather than in expectation with explicit moments, the deviation bound may require an additional uniform integrability argument that is not visible in the provided outline.
minor comments (2)
- [Abstract / §5] The abstract and introduction use 'quantifiable deviation' without a forward reference to the precise expression (e.g., the constant multiplying the variance term). Adding an equation number in the abstract or a parenthetical in §5 would improve readability.
- [Empirical Evaluation] Figure captions for the phase-transition plots should explicitly state the number of Monte-Carlo trials and the precise definition of 'extinction' used (e.g., population dropping below 1 for T consecutive steps).
Simulated Author's Rebuttal
We thank the referee for the careful reading and constructive feedback on our manuscript. The comments identify important points in the theoretical analysis that we address below. We outline revisions that will strengthen the presentation without altering the core claims.
read point-by-point responses
-
Referee: [§4] §4 (Theoretical Analysis of Boundedness): The almost-sure boundedness claim for the RW population under AC rests on the duplication threshold being chosen from purely local statistics. Standard branching-process or martingale arguments for extinction probability require a uniform lower bound on the duplication rate across nodes. The manuscript does not appear to supply a lemma showing that local threshold selection restores the necessary uniformity or that heterogeneity cannot create subgraphs with effective branching factor <1. This is load-bearing for claim (i).
Authors: We agree that an explicit argument for uniformity is desirable to make the branching-process comparison fully rigorous. The local threshold rule, by averaging observed crossings, induces a duplication rate that is bounded away from zero uniformly across nodes because the random walk is ergodic on the finite graph; this prevents persistent subcritical subgraphs. To address the referee's concern directly, the revised manuscript will include a new supporting lemma (Lemma 4.2) that couples the heterogeneous process to a homogeneous branching process with branching factor strictly greater than one, using the fact that the threshold is a consistent estimator of the local Pac-Man density. revision: yes
-
Referee: [§5] §5 (Convergence of RW-SGD under AC): The quantifiable deviation from the true optimum is stated to be explicit, yet the derivation appears to treat the effective step-size and mixing time after duplication as constants independent of the realized RW population size. If the population bound in §4 is only almost-sure rather than in expectation with explicit moments, the deviation bound may require an additional uniform integrability argument that is not visible in the provided outline.
Authors: The referee is correct that an almost-sure population bound alone does not automatically yield an explicit, non-random deviation without additional justification. Because the graph is finite, the mixing time is deterministically bounded once the population size is fixed; the almost-sure bound therefore implies a uniform (random but finite) bound on all relevant constants. In the revision we will insert a short uniform-integrability argument (based on the bounded convergence theorem applied to the finite-state Markov chain) immediately after the statement of the almost-sure bound, thereby justifying the interchange of limit and expectation in the deviation expression. revision: yes
Circularity Check
No circularity detected in theoretical derivation chain
full rationale
The paper presents its core results on almost-sure boundedness of the random walk population and convergence of RW-based SGD under the Average Crossing (AC) mechanism as outcomes of a probabilistic analysis of the Pac-Man attack model. The abstract and description frame these as independent theoretical guarantees with a quantifiable deviation, supported by a simplified variant analysis for the observed phase transition. No quoted equations or steps reduce the claims by construction to fitted inputs, self-definitions, or load-bearing self-citations; the duplication threshold is described as a decentralized design choice whose properties are analyzed rather than presupposed to match the result. The derivation chain therefore remains self-contained against external benchmarks.
Axiom & Free-Parameter Ledger
free parameters (1)
- duplication threshold
axioms (1)
- domain assumption Random walks move on a connected network according to standard transition probabilities
invented entities (2)
-
Pac-Man attack
no independent evidence
-
Average Crossing (AC) algorithm
no independent evidence
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
Theorem 1 (Boundedness): lim sup Z_t < ∞ a.s. ... supermartingale M_k = V(Z_{t0+dk})
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
L. Lovász, “Random walks on graphs,”Combinatorics, Paul Erd˝ os is eighty, vol. 2, pp. 1–46, 1993
work page 1993
-
[2]
D. A. Levin and Y . Peres,Markov Chains and Mixing Times. American Mathematical Society, second ed., 2017
work page 2017
-
[3]
A unified theory of decentralized SGD with changing topology and local updates,
A. Koloskova, N. Loizou, S. Boreiri, M. Jaggi, and S. Stich, “A unified theory of decentralized SGD with changing topology and local updates,” inProceedings of the 37th International Conference on Machine Learn- ing, vol. 119, pp. 5381–5393, 2020
work page 2020
-
[4]
The pagerank citation ranking: Bringing order to the web,
L. Page, S. Brin, R. Motwani, and T. Winograd, “The pagerank citation ranking: Bringing order to the web,” technical report, Stanford InfoLab, 1999
work page 1999
-
[5]
F. Fouss, A. Pirotte, J. Renders, and M. Saerens, “Random-walk com- putation of similarities between nodes of a graph with application to collaborative recommendation,”IEEE Transactions on knowledge and data engineering, vol. 19, no. 3, pp. 355–368, 2007
work page 2007
-
[6]
Smartwalk: Enhancing social network security via adaptive random walks,
Y . Liu, S. Ji, and P. Mittal, “Smartwalk: Enhancing social network security via adaptive random walks,” inProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 492–503, 2016
work page 2016
-
[7]
Supervised random walks: predicting and recommending links in social networks,
L. Backstrom and J. Leskovec, “Supervised random walks: predicting and recommending links in social networks,” inProceedings of the fourth ACM international conference on Web search and data mining, pp. 635–644, 2011
work page 2011
-
[8]
Het- erogeneous graph neural network,
C. Zhang, D. Song, C. Huang, A. Swami, and N. Chawla, “Het- erogeneous graph neural network,” inProceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, pp. 793–803, 2019
work page 2019
-
[9]
A simple peer-to-peer algorithm for distributed optimization in sensor networks,
B. Johansson, M. Rabi, and M. Johansson, “A simple peer-to-peer algorithm for distributed optimization in sensor networks,” in46th IEEE Conference on Decision and Control, pp. 4705–4710, 2007
work page 2007
-
[10]
Walk for learning: A random walk approach for federated learning from heterogeneous data,
G. Ayache, V . Dassari, and S. E. Rouayheb, “Walk for learning: A random walk approach for federated learning from heterogeneous data,” IEEE Journal on Selected Areas in Communications, vol. 41, no. 4, pp. 929–940, 2023
work page 2023
-
[11]
Coupled-space attacks against random-walk-based anomaly detection,
Y . Lai, M. Waniek, L. Li, J. Wu, Y . Zhu, T. P. Michalak, T. Rahwan, and K. Zhou, “Coupled-space attacks against random-walk-based anomaly detection,”IEEE Transactions on Information Forensics and Security, vol. 19, pp. 9315–9329, 2024
work page 2024
-
[12]
Enhancing sybil detection via social-activity networks: A random walk approach,
X. Zhang, H. Xie, P. Yi, and J. Lui, “Enhancing sybil detection via social-activity networks: A random walk approach,”IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 2, pp. 1213–1227, 2023
work page 2023
-
[13]
Self-duplicating random walks for resilient decentralized learning on graphs,
M. Egger, G. Ayache, R. Bitar, A. Wachter-Zeh, and S. E. Rouayheb, “Self-duplicating random walks for resilient decentralized learning on graphs,” inGLOBECOM 2024 - 2024 IEEE Global Communications Conference, pp. 2960–2965, 2024
work page 2024
-
[14]
Self-regulating random walks for resilient decentralized learning on graphs,
M. Egger, R. Bitar, G. Ayache, A. Wachter-Zeh, and S. E. Rouayheb, “Self-regulating random walks for resilient decentralized learning on graphs,”arXiv preprint arXiv:2407.11762, 2024. Revised February 10, 2025
-
[15]
On markov chain gradient descent,
T. Sun, Y . Sun, and W. Yin, “On markov chain gradient descent,” Advances in neural information processing systems, vol. 31, 2018
work page 2018
-
[16]
Walkman: A communication-efficient random-walk algorithm for decentralized opti- mization,
X. Mao, K. Yuan, Y . Hu, Y . Gu, A. H. Sayed, and W. Yin, “Walkman: A communication-efficient random-walk algorithm for decentralized opti- mization,”IEEE Transactions on Signal Processing, vol. 68, pp. 2513– 2528, 2020
work page 2020
-
[17]
Implementing fault-tolerant services using the state ma- chine approach: A tutorial,
F. B. Schneider, “Implementing fault-tolerant services using the state ma- chine approach: A tutorial,”ACM Computing Surveys (CSUR), vol. 22, no. 4, pp. 299–319, 1990
work page 1990
-
[18]
L. Lamport, “The part-time parliament,”ACM Transactions on Computer Systems (TOCS), vol. 16, no. 2, pp. 133–169, 1998
work page 1998
-
[19]
The byzantine generals prob- lem,
L. Lamport, R. Shostak, and M. Pease, “The byzantine generals prob- lem,”ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 4, no. 3, pp. 382–401, 1982
work page 1982
-
[20]
A survey of rollback-recovery protocols in message-passing systems,
E. N. Elnozahy, L. Alvisi, Y . Wang, and D. B. Johnson, “A survey of rollback-recovery protocols in message-passing systems,”ACM Comput- ing Surveys (CSUR), vol. 34, no. 3, pp. 375–408, 2002
work page 2002
-
[21]
Unreliable failure detectors for reliable distributed systems,
T. D. Chandra and S. Toueg, “Unreliable failure detectors for reliable distributed systems,”Journal of the ACM (JACM), vol. 43, no. 2, pp. 225–267, 1996
work page 1996
-
[22]
Stochastic gradient descent under markovian sampling schemes,
M. Even, “Stochastic gradient descent under markovian sampling schemes,” inProceedings of the 40th International Conference on Machine Learning, 2023
work page 2023
-
[23]
A randomized incremental subgradient method for distributed optimization in networked systems,
B. Johansson, M. Rabi, and M. Johansson, “A randomized incremental subgradient method for distributed optimization in networked systems,” SIAM Journal on Optimization, vol. 20, no. 3, pp. 1157–1170, 2010
work page 2010
-
[24]
On markov chain gradient descent,
T. Sun, Y . Sun, and W. Yin, “On markov chain gradient descent,” in Proceedings of the 32nd International Conference on Neural Information Processing Systems, pp. 9918–9927, 2018
work page 2018
-
[25]
The mnist database of handwritten digit images for machine learning research,
L. Deng, “The mnist database of handwritten digit images for machine learning research,”IEEE Signal Processing Magazine, vol. 29, no. 6, pp. 141 – 142, 2012
work page 2012
-
[26]
Durrett,Probability: Theory and Examples
R. Durrett,Probability: Theory and Examples. Thomson, Brooks Cole, 2019
work page 2019
-
[27]
Yaglom limits can depend on the starting state,
R. D. Foley and D. R. McDonald, “Yaglom limits can depend on the starting state,”Journal of Applied Probability, vol. 54, no. 3, pp. 726– 734, 2017
work page 2017
- [28]
-
[29]
Billingsley,Probability and Measure
P. Billingsley,Probability and Measure. Wiley Series in Probability and Mathematical Statistics, John Wiley & Sons Inc., 3rd ed., 1995
work page 1995
-
[30]
On quasi-stationary distributions in absorbing discrete-time finite markov chains,
J. N. Darroch and E. Seneta, “On quasi-stationary distributions in absorbing discrete-time finite markov chains,”Journal of Applied Prob- ability, vol. 2, no. 1, pp. 88–100, 1965
work page 1965
-
[31]
S. Boyd and L. Vandenberghe,Convex Optimization. Cambridge University Press, 2004
work page 2004
-
[32]
The entrapment problem in random walk decentralized learning,
Z. Liu, S. Rouayheb, and M. Dwyer, “The entrapment problem in random walk decentralized learning,” inIEEE ISIT, 2024
work page 2024
-
[33]
Expander graphs and their applications,
S. Hoory, N. Linial, and A. Wigderson, “Expander graphs and their applications,”Bulletin of the American Mathematical Society, vol. 43, no. 4, pp. 439–561, 2006
work page 2006
-
[34]
Measuring the Effects of Non-Identical Data Distribution for Federated Visual Classification
T. H. Hsu, H. Qi, and M. Brown, “Measuring the effects of non- identical data distribution for federated visual classification,” 2019. arXiv:1909.06335. APPENDIXA PRELIMINARIES: NOTATIONS, DEFINITIONS,AND ASSUMPTIONS In this Appendix, we introduce the notation, definitions, and assumptions used in the system model and its transition dynamics. Definition 3...
work page internal anchor Pith review Pith/arXiv arXiv 2019
-
[35]
Expression for∆ t(A, z):In this subsection, we first derive a closed-form expression for∆ t(A, z). For simplicity in analysis, conditional on the eventZ t =z, we re-label the active RWs inZ t as[z]without loss of generality. That is, we assign eachj∈ Z t a new index in[z]via a one-to- one mapping. Accordingly, the associated variablesL (u,j) t and H (u,j)...
-
[36]
Proof of Part (a):Since each RW hits the Pac-Man at node1with probability 1 N at every step, and is killed with probabilityζ= 1upon hitting it, then, given the number of active RWsZ t =z, the expected number of RWs that die at timetis z N .(34) From (22) and (34), given the number of active RWsZ t =z, we derive E[Z t+1 |Z t =z] =z 1− 1 N + ∆t(A, z) z ≜zm ...
-
[37]
Proof of Part (b):Now, we re-visit the recursion: E Zt+1 |Z t =z =zm t(A, z), wherem t(A, z)is defined in (35): mt(A, z)≜1− 1 N + ∆t(A, z) z . Lemma 4.If there exists a positive integerα , such that when A⩽α , the following inequality holds: inf t⩾0 inf z∈Z+ ∆t(A, z) z > 1 N .(42) Then, for anyA⩽α , we have Pr (∃t0,∀t⩾t 0, Z t = 0|Z 0 =z 0)<1 for allz 0. ...
-
[38]
Whenζ= 1, the absorbing stateA={1, w}, so ˜πt = [0, πchain,t], whereπ chain;t is a discrete distribution supported on a finite set of sizeN, and lim t→∞ ˜πt = [0, ν(1)]
-
[39]
When0< ζ <1, the absorbing stateA={w}, so˜π t = πchain,t, whereπ chain;t is a discrete distribution supported on a finite set of sizeN+ 1, and lim t→∞ ˜πt =ν (ζ). APPENDIXE THE EFFECTIVE TRANSITION PROBABILITY MATRIXP (ζ) CHAIN In fact, as discussed before, we condense the time interval between the termination of the last RW and the creation of the next R...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.