Abstract: This work studies the problem of finding optimal distributed resource allocation policies on wireless networks in the existence of an unknown malicious adding-edge attacker, depicted as the ...