{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2025:XC643BAUTPUAQLJMXRNFAYIUK6","short_pith_number":"pith:XC643BAU","canonical_record":{"source":{"id":"2502.02844","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2025-02-05T02:59:23Z","cross_cats_sorted":["cs.AI","cs.CR","cs.MA"],"title_canon_sha256":"38a9d8f1c3db2cc7640c08a6f7166587a608dfa70bfee581d9b84c8c0ad126a3","abstract_canon_sha256":"8c050a28faa46fdeb2566f789ec1ddd6dec758fa379061c03e4c83db8fd20152"},"schema_version":"1.0"},"canonical_sha256":"b8bdcd84149be8082d2cbc5a50611457976aa4b8c6124e57600facd61880a7ff","source":{"kind":"arxiv","id":"2502.02844","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2502.02844","created_at":"2026-05-21T01:04:12Z"},{"alias_kind":"arxiv_version","alias_value":"2502.02844v3","created_at":"2026-05-21T01:04:12Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2502.02844","created_at":"2026-05-21T01:04:12Z"},{"alias_kind":"pith_short_12","alias_value":"XC643BAUTPUA","created_at":"2026-05-21T01:04:12Z"},{"alias_kind":"pith_short_16","alias_value":"XC643BAUTPUAQLJM","created_at":"2026-05-21T01:04:12Z"},{"alias_kind":"pith_short_8","alias_value":"XC643BAU","created_at":"2026-05-21T01:04:12Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2025:XC643BAUTPUAQLJMXRNFAYIUK6","target":"record","payload":{"canonical_record":{"source":{"id":"2502.02844","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2025-02-05T02:59:23Z","cross_cats_sorted":["cs.AI","cs.CR","cs.MA"],"title_canon_sha256":"38a9d8f1c3db2cc7640c08a6f7166587a608dfa70bfee581d9b84c8c0ad126a3","abstract_canon_sha256":"8c050a28faa46fdeb2566f789ec1ddd6dec758fa379061c03e4c83db8fd20152"},"schema_version":"1.0"},"canonical_sha256":"b8bdcd84149be8082d2cbc5a50611457976aa4b8c6124e57600facd61880a7ff","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-21T01:04:12.751854Z","signature_b64":"fOtfhvDgksfDpvcXjb57VES7hPkxMd47LV8hs7jDIJF9vzZWAd1Vn0UWjlkr4Tjl8Exe8LzQ12nkyksfAmjMCQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"b8bdcd84149be8082d2cbc5a50611457976aa4b8c6124e57600facd61880a7ff","last_reissued_at":"2026-05-21T01:04:12.750953Z","signature_status":"signed_v1","first_computed_at":"2026-05-21T01:04:12.750953Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2502.02844","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T01:04:12Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"nNRz1k24uuaWjASe9wuPQ9iu/9f5VGKmGPUsVyfVyb6V0Pps4HNXL5YdLUzapku1BpuhUdM+QqiNWphQVH8kAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T11:21:16.743892Z"},"content_sha256":"a3c34b340b6e035f492f94f9775b4d206e838f527d03eddd9699b119b1b5840c","schema_version":"1.0","event_id":"sha256:a3c34b340b6e035f492f94f9775b4d206e838f527d03eddd9699b119b1b5840c"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2025:XC643BAUTPUAQLJMXRNFAYIUK6","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Wolfpack Adversarial Attack for Robust Multi-Agent Reinforcement Learning","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.AI","cs.CR","cs.MA"],"primary_cat":"cs.LG","authors_text":"Jaebak Hwang, Seungyul Han, Sunwoo Lee, Yonghyeon Jo","submitted_at":"2025-02-05T02:59:23Z","abstract_excerpt":"Traditional robust methods in multi-agent reinforcement learning (MARL) often struggle against coordinated adversarial attacks in cooperative scenarios. To address this limitation, we propose the Wolfpack Adversarial Attack framework, inspired by wolf hunting strategies, which targets an initial agent and its assisting agents to disrupt cooperation. Additionally, we introduce the Wolfpack-Adversarial Learning for MARL (WALL) framework, which trains robust MARL policies to defend against the proposed Wolfpack attack by fostering systemwide collaboration. Experimental results underscore the deva"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2502.02844","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2502.02844/integrity.json","findings":[],"available":true,"detectors_run":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T01:04:12Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"rF4MaNWL4IP5etCOWSRntY3zTAS+I5dsoGbfE/5rjx4C3nop0+NTlhSab4WkhOfEmeoanLCgN4y1ZcOp4UzMDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T11:21:16.744416Z"},"content_sha256":"3d6e8d0285e92844ab5f9a7ae76565daeafcc1442a44a3e03668dfddf469c40c","schema_version":"1.0","event_id":"sha256:3d6e8d0285e92844ab5f9a7ae76565daeafcc1442a44a3e03668dfddf469c40c"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/XC643BAUTPUAQLJMXRNFAYIUK6/bundle.json","state_url":"https://pith.science/pith/XC643BAUTPUAQLJMXRNFAYIUK6/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/XC643BAUTPUAQLJMXRNFAYIUK6/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T11:21:16Z","links":{"resolver":"https://pith.science/pith/XC643BAUTPUAQLJMXRNFAYIUK6","bundle":"https://pith.science/pith/XC643BAUTPUAQLJMXRNFAYIUK6/bundle.json","state":"https://pith.science/pith/XC643BAUTPUAQLJMXRNFAYIUK6/state.json","well_known_bundle":"https://pith.science/.well-known/pith/XC643BAUTPUAQLJMXRNFAYIUK6/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2025:XC643BAUTPUAQLJMXRNFAYIUK6","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"8c050a28faa46fdeb2566f789ec1ddd6dec758fa379061c03e4c83db8fd20152","cross_cats_sorted":["cs.AI","cs.CR","cs.MA"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2025-02-05T02:59:23Z","title_canon_sha256":"38a9d8f1c3db2cc7640c08a6f7166587a608dfa70bfee581d9b84c8c0ad126a3"},"schema_version":"1.0","source":{"id":"2502.02844","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2502.02844","created_at":"2026-05-21T01:04:12Z"},{"alias_kind":"arxiv_version","alias_value":"2502.02844v3","created_at":"2026-05-21T01:04:12Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2502.02844","created_at":"2026-05-21T01:04:12Z"},{"alias_kind":"pith_short_12","alias_value":"XC643BAUTPUA","created_at":"2026-05-21T01:04:12Z"},{"alias_kind":"pith_short_16","alias_value":"XC643BAUTPUAQLJM","created_at":"2026-05-21T01:04:12Z"},{"alias_kind":"pith_short_8","alias_value":"XC643BAU","created_at":"2026-05-21T01:04:12Z"}],"graph_snapshots":[{"event_id":"sha256:3d6e8d0285e92844ab5f9a7ae76565daeafcc1442a44a3e03668dfddf469c40c","target":"graph","created_at":"2026-05-21T01:04:12Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[],"endpoint":"/pith/2502.02844/integrity.json","findings":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Traditional robust methods in multi-agent reinforcement learning (MARL) often struggle against coordinated adversarial attacks in cooperative scenarios. To address this limitation, we propose the Wolfpack Adversarial Attack framework, inspired by wolf hunting strategies, which targets an initial agent and its assisting agents to disrupt cooperation. Additionally, we introduce the Wolfpack-Adversarial Learning for MARL (WALL) framework, which trains robust MARL policies to defend against the proposed Wolfpack attack by fostering systemwide collaboration. Experimental results underscore the deva","authors_text":"Jaebak Hwang, Seungyul Han, Sunwoo Lee, Yonghyeon Jo","cross_cats":["cs.AI","cs.CR","cs.MA"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2025-02-05T02:59:23Z","title":"Wolfpack Adversarial Attack for Robust Multi-Agent Reinforcement Learning"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2502.02844","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:a3c34b340b6e035f492f94f9775b4d206e838f527d03eddd9699b119b1b5840c","target":"record","created_at":"2026-05-21T01:04:12Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"8c050a28faa46fdeb2566f789ec1ddd6dec758fa379061c03e4c83db8fd20152","cross_cats_sorted":["cs.AI","cs.CR","cs.MA"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2025-02-05T02:59:23Z","title_canon_sha256":"38a9d8f1c3db2cc7640c08a6f7166587a608dfa70bfee581d9b84c8c0ad126a3"},"schema_version":"1.0","source":{"id":"2502.02844","kind":"arxiv","version":3}},"canonical_sha256":"b8bdcd84149be8082d2cbc5a50611457976aa4b8c6124e57600facd61880a7ff","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"b8bdcd84149be8082d2cbc5a50611457976aa4b8c6124e57600facd61880a7ff","first_computed_at":"2026-05-21T01:04:12.750953Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-21T01:04:12.750953Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"fOtfhvDgksfDpvcXjb57VES7hPkxMd47LV8hs7jDIJF9vzZWAd1Vn0UWjlkr4Tjl8Exe8LzQ12nkyksfAmjMCQ==","signature_status":"signed_v1","signed_at":"2026-05-21T01:04:12.751854Z","signed_message":"canonical_sha256_bytes"},"source_id":"2502.02844","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:a3c34b340b6e035f492f94f9775b4d206e838f527d03eddd9699b119b1b5840c","sha256:3d6e8d0285e92844ab5f9a7ae76565daeafcc1442a44a3e03668dfddf469c40c"],"state_sha256":"4c35c4b389dac597f4669e7375662f44141738d0847bd03643f51a97620b851c"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"gct9+Z+SQ8HqX62C7KS50Rip60Btu0ZluyXpg5H20+FttTMWabgkQKhFRMcZNnfvCym8hTqPc4a8uanLNNSCBg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T11:21:16.746752Z","bundle_sha256":"cf666e972ab7ac9f020bdab0660e63f6b006bf6584c374db10903506a3fadf76"}}