1. Introduction
A fundamental challenge in UAV swarm coordination—dynamic multi-agent task allocation where two opposing teams pursue conflicting objectives in an adversarial contest—is the semantic-numerical gap: top-level task objectives aimed at achieving victory must be decomposed and translated into low-level executable commands in real time [
1]. However, existing approaches either rely on pure optimization or pure learning, but both suffer from the lack of semantic understanding and environmental feedback, leading to poor adaptability in dynamic competitive environments. This raises the core question: How can we bridge the semantic-numerical gap in UAV task allocation without sacrificing real-time performance and execution guarantees?
Conventional heuristics and optimization solvers suffer from severe processing delays as multi-agent networks scale, eliminating the real-time adaptability required for effective autonomous operation [
2,
3,
4]. Meanwhile, large language models (LLMs) demonstrate strong performance in macro-strategy and zero-shot reasoning [
5,
6], but deploying vanilla LLMs in dynamic adversarial environments is risky. These models rely heavily on offline prompts without stable reinforcement learning feedback loops, preventing them from improving through environmental interaction [
7]. Furthermore, standalone LLMs cannot guarantee executable outputs under rigid operational constraints [
8,
9,
10].
To solve the above problems, we combined large language models and the Advantage Actor Critic (A2C) algorithm, and named this new hierarchical model A2C-LLM. The A2C-LLM model simplifies the problem’s complexity by discarding conventional continuous control models and transforming the macro allocation problem into a simple Markov Decision Process (MDP). The Actor in our A2C-LLM is based on a 1.5 billion parameter model. After fine-tuning this model using specific scenarios and formatting, we found that this model learned to translate complex scenario conditions into clear coordination instructions. At the same time, we also employed a Critic model to generate value functions in real time. Having created this loop, we then feed the results from this single episode into our LLM. This single-step training process is a full cycle of reinforcement learning, covering everything from initial observation to policy updates. In this single-step setting, the advantage estimation simplifies to the temporal difference (TD) error
. Additionally, in order to stabilize our training in a non-stationary environment, we also employed KL regularization [
11].
To assess policy stability along with the rates of task completion and perfect win rate, we conducted detailed simulations using representative multi-agent adversarial scenarios. We evaluated our framework against a variety of baselines, namely, REINFORCE-LLM [
12], Hungarian algorithm [
13], Random, Frozen-LLM, and PURE-A2C [
14,
15]. For ablation, we considered reinforced constraints [
16] and fine-tuned LLM [
17]. We evaluated our model for various critical aspects, namely, convergence, scalability, robustness, and its sensitivity towards different adversarial capabilities. We observed that our approach outperformed all other baselines for most of the settings. We observed faster convergence for our model and better scalability and robustness, even for stronger opponents.
To address this question, we propose A2C-LLM based on three key insights. First, single-step macro allocation reduces decision complexity while maintaining tactical coherence, enabling efficient high-level reasoning. Second, TD advantage with structured constraints allows reinforcement learning to operate with execution guarantees, ensuring output feasibility. Third, LLM-in-the-loop RL leverages semantic prior knowledge for sample-efficient adaptation to dynamic environments.
These insights lead to four technical contributions. (1) We develop an embedded LLM simulation framework that integrates physics-based multi-agent simulation with reward feedback loops for continuous learning and validation. (2) We design a unified text decision interface with structured state templates that decouple high-level macro allocation from low-level reactive control, using constrained decoding and feasibility repair to bridge semantic reasoning and physical execution, and validate the effectiveness through experiments. (3) We propose the A2C-LLM architecture with strict single-step decision formulation, where the LLM serves as Actor paired with a lightweight Critic for value estimation, employing TD advantage learning and KL regularization for stable convergence. (4) We conduct systematic evaluation through multi-dimensional experiments and ablation studies, and the results demonstrate that this method exhibits superior robustness: a 25.7% relative improvement in perfect win rate over the second-ranked REINFORCE-LLM method, and a 9.8% relative improvement in task completion rate over the second-ranked Hungarian method.
2. Related Work
Multi-agent actor-critic methods have been developed for mixed cooperative–competitive environments [
18]. Multi-objective task allocation has been modeled using MRTA or Dec-POMDPs formalisms [
19,
20], with major difficulties from non-stationarity and partial observability. Compared to optimization methods requiring accurate priors [
21,
22], RL enables cooperative decision-making through environment interaction [
23].
A3C/A2C methods enhance policy improvement stability through parallel sampling and advantage estimation [
24]. Barros employed SAC for UAV target tracking and obstacle avoidance [
25], while Koch applied RL to attitude control and path planning [
26]. Multi-agent Actor-Critic extensions have been used for UAV task allocation, cooperative tasks, and competitive contexts [
19,
20,
27,
28,
29]. However, pure MARL methods remain limited by sample inefficiency and weak semantic prior utilization [
30,
31].
In addition to RL-based methods, bio-inspired swarm planning approaches have demonstrated effective coordination and task allocation for UAV swarms. Wang and Zhang [
32] proposed a bionic wolf pack method that models the behavioral characteristics of wolf packs for dynamic task allocation with load balancing and coverage search. Xu et al. [
33] developed a bio-inspired reinforcement learning framework that exploits collective milling structures and chiral dynamics to enable distributed active swarms to capture and merge targets. Fan et al. [
34] combined pigeon flock leadership mechanisms with flocking algorithms for UAV swarm formation control and obstacle avoidance. In parallel, cross-domain collaborative methods have advanced multi-agent coordination across heterogeneous platforms. Dong et al. [
35] proposed a hierarchical heterogeneous multi-agent framework that integrates UAVs, USVs, and UUVs via multi-policy reinforcement learning for underwater target searching. Hu et al. [
36] developed a distributed guiding-vector-field controller for heterogeneous UAV-USV coordinated navigation with lightweight virtual-coordinate communication, validated through real-lake experiments. These developments in bio-inspired and cross-domain coordination provide a broader context for the present work, which explores the integration of LLM-based semantic reasoning into UAV swarm task allocation.
Recently, LLMs have shown promise in robotics and autonomous systems [
37,
38], providing global guidance for UAV swarm control [
39,
40]. However, their rapid adaptability in competitive environments remains limited. LLM-MARL integration has been explored: Zhu [
41] for semantic region decomposition, Xu [
42] for emergency networking with intrinsic rewards, and Zhou [
43] combining LLM global understanding with Q-learning for mFSTSP. Unlike these approaches, we propose an LLM-in-the-loop RL framework where the LLM provides semantic task allocation via single-step decisions, with A2C architecture providing environmental feedback through a Critic network for incremental learning, and constrained decoding ensuring action executability.
3. Problem Formulation and System Framework
In this section, we first formalize the task allocation problem as a single-step Markov Decision Process (MDP). Then, we present the overall A2C-LLM framework that operates in a closed-loop manner. Finally, we describe the environment modeling, including the key entities and their interactions.
3.1. Single-Step MDP Formalization
We model the high-level allocation window as a single-step MDP (horizon 1). Each decision window has length
. At the beginning of the window
t, the agent receives the state
and outputs a mixed action
. The environment runs in a closed loop over
and returns a scalar reward
at the end of the window, with the episode terminating immediately (done = 1). This setup is equivalent to a contextual bandit where cross-step effects are folded into the within-window reward distribution
. The objective is to maximize the expected reward
:
where
is the window-level state distribution induced by the closed-loop simulator.
Data are collected in episode-level batches, with each episode containing exactly one single-step cycle. Due to the nature of our single-step decision process (horizon = 1, done = 1), the advantage estimation simplifies to the first-order temporal difference (TD) error:
This TD error serves as an advantage for policy gradient updates. The learnable baseline and in-batch advantage normalization help decrease gradient variance across different scenarios. KL regularization and constrained decoding with feasibility terms further stabilize training while allowing exploration, as evidenced by smoother learning curves in our experiments.
In contrast to the REINFORCE-LLM variants, where the importance-weighted
is used with Monte Carlo returns without a baseline, the use of the learnable baseline
and the in-batch normalization helps to decrease the variance of the gradients for different scenarios. The KL regularization and the constrained decoding and feasibility terms also make the policy less susceptible to drift and output format problems while still allowing for exploration. The results from our experiments also show smoother learning curves. The insensitivity to reward weights and temperature is discussed from an architectural perspective in
Section 5.6.
The choice of a single-step MDP formulation is grounded in a deliberate trade-off that substitutes temporal credit assignment with comprehensive state-space coverage.
In a conventional multi-step adversarial engagement, the decision-maker must sequentially react to evolving adversarial dynamics. Our approach re-conceptualizes this problem: instead of modeling a single longitudinal match, we treat each randomly generated episode as an independent sample from the distribution of all possible adversarial fragments—from opening-phase full-force deployments, through attritional mid-phase engagements, to endgame mop-up operations. By extensively randomizing red-blue force ratios, initial position distributions, and red-team capability configurations during training, the model traverses the entire state space of the adversarial scenario. A model capable of making optimal macro-allocation decisions for any such fragment is functionally equivalent to a decision-maker that makes correct decisions at every step of a continuous timeline. One does not train a chess player to play every full match from start to finish; one trains an endgame master who can solve any board position.
This formulation carries an indispensable practical benefit: embedding the LLM in a full multi-step engagement—where inference and feedback would be required at every decision step—would cause per-episode training time to grow linearly with the number of steps, rendering large-scale iterative training computationally prohibitive. The single-step design compresses each episode into one independent contextual decision, making reinforcement learning with LLM-in-the-loop practically achievable without sacrificing representational completeness.
In summary, the single-step MDP is not a neglect of long-term planning, but an equivalent realization achieved by substituting temporal reasoning with state-space coverage under given computational constraints.
In the current framework, the decision window length
is fixed across all training episodes. The specific value was determined through multiple trial runs to ensure that, in typical scenarios, the majority of capture and guard tasks can close within the window, thereby providing meaningful reward signals for the Critic. Adaptive adjustment of
—for instance, triggering a new planning cycle dynamically based on situational changes—is discussed as a future direction in
Section 7.
3.2. Overall A2C-LLM Framework
In this paper, we propose A2C-LLM, an episodic decision-making pipeline for task allocation in multi-target capture, with its architecture depicted in
Figure 1. The system operates in a closed loop of state extraction, policy reasoning, command grounding, online feedback, and incremental adaptation.
The simulation environment employs a structured state template to extract information from multiple sources, including target sets, friendly platforms, Red Team Information, and environmental constraints. These situational elements are represented as standardized text-symbol hybrid inputs. The task allocation problem is formalized as an MDP with triplet (), where aggregates situational elements at time t, represents cluster-level tasking actions (capture/guard/standby), and is a composite return including capture effectiveness, target loss, and format compliance.
The A2C-LLM agent consists of two main components. The LLM serves as the Actor, generating structured task directives that are format-correct, resource-feasible, and directly executable. The lightweight Critic estimates state values and provides TD advantage for policy updates, with KL regularization ensuring stability. LoRA enables efficient online adaptation by injecting environmental feedback into the policy head. Command grounding transforms high-level semantics into executable control directives, decoupled from low-level controllers. Catchers, i.e., the Blue Team, use proportional navigation (PN) [
44] for tracking, while runners, i.e., the Red Team, employ artificial potential fields (APFs) [
45] for evasion. This architecture forms a closed loop for stable and scalable cooperative decision-making.
3.3. Environment Modeling
In this study, we formulate a competitive capture contest scenario. The Blue Team serves as the catchers, while the Red Team acts as the runners. The objective of the Blue Team is to capture all Red Team UAVs, whereas the Red Team aims to reach the protected zones (scoring zones) before being captured. This setup creates a dynamic adversarial environment where both teams employ strategic maneuvers to achieve their respective goals.
In this study, air-based UAV coordination is formulated as a competitive multi-UAV task assignment and capture problem. A global right-handed Cartesian frame O-XYZ is used to describe the 3D workspace. The target set is , where the position of is . To encode target importance, a weight set is assigned with and ; if is captured by the Red Team, the incurred score loss equals . The catcher UAVs (Blue Team) form the set with positions , and the runner UAVs (Red Team) form the set with positions . The Euclidean distance between and at time t is . Adversarial coordination is realized through an assignment function , where I denotes capture, D denotes guard, and S denotes standby. When , a specific target is designated via Capture, and tracks and pursues under proportional navigation guidance to meet real-time requirements. When , a guard location and the scoring zone are specified via Guard, where . The UAV establishes a detection zone of radius m around ; once any runner enters this zone, i.e., , the task switches automatically to capture, and prioritizes the nearest opponent, , then executes Capture. When , the UAV holds its current position or proceeds to a designated rally point until a new command is issued.
4. Semantic-Numerical Interface Design
To bridge the semantic-numerical gap, where LLMs excel in natural language while traditional A2C only accepts numerical inputs, this paper constructs a multimodal information encoding and instruction conversion mechanism. Through the structured state template, the original scene numerical values are normalized into a stable semantic text , and a numerical vector is generated simultaneously. Via the Hierarchical Conversion Bridge (Text Control Instruction Conversion Mechanism), the constrained JSON semantic instruction output by the model and its matching parameter are mapped to underlying control commands, achieving an executable and auditable one-step decision-making closed loop.
To suppress large-model hallucinations and ensure feasibility within the window, we introduce enhanced constraints and constrained decoding at both the prompting and decoding levels. Combined with feasibility repair and the corresponding penalty term
, it thus supports the efficient training and stable deployment of A2C-LLM in the cooperation of UAV swarms, as illustrated in
Figure 2.
4.1. Structured State Template
To accommodate sensor integration in real-world applications, this study designs a hierarchically parameterized structured state template. It further refines the multi-modal operational information into four categories of standardized texts, namely:
Spatial Information, e.g., “Arena spatial range: x-axis , y-axis , z-axis ”;
Scoring Zone Encoding, e.g., “Zone A is located at (x,y,z), with importance p, and assigned guard UAVs: [n1,n2]”;
Own UAV Status, e.g., “UAV D1 is located at (x,y,z), task status is X, and the set of executable actions is Y”;
Red Team Information, e.g., “Red Team E1 is located at (x,y,z), speed is v, direction points to Zone B, and capability level is high”.
The template constructs a logical framework of the four-layer structure, including spatial definition, target description, opponent situation, and resource status, and uniformly employs the Python parameterized format. The “format_scenario_description()” function is used to dynamically input real-time data, where the synchronous generation of semantic text and numerical vector can be realized. During the generation process, integrated vocabulary standardization, fixed field order, unit and dimension unification, numerical precision cropping, ID system, and resource allocation are adopted. This ensures the certainty from the same input to the same output, achieves the systematic transformation from complex environments into LLM-friendly expressions, and conforms to the one-step decision window in time.
The formal representation is
where
aggregates the original numerical stream, and
is a deterministic template encoder. In implementation, the format_scenario_description() function, while outputting
, returns the field-aligned
, and provides length truncation and outlier cropping strategies to ensure readability, interpretability, and stable support for downstream A2C-LLM training.
4.2. Text Control Instruction Conversion Mechanism
The instruction conversion pipeline consists of four sequential operations: parsing, canonicalization, feasibility projection, and control mapping. First, the parse function converts raw model outputs into structured candidate instructions. The canon function then performs key alignment and value range normalization, supplementing default fields and correcting non-standard values. The
operator projects normalized instructions onto the feasible set
, performing minimal modification repairs when necessary. Finally,
maps the feasible instruction to the low-level control signal
u. The unified conversion framework is expressed as:
When
triggers a repair operation, the repair mark is recorded and included in the format penalty coefficient
calculation. For task_format inputs, the restricted JSON Schema validates, projects, and maps the instruction. The format discrimination rule is:
For json_format inputs, key alignment is achieved through the field alias mapping table, with default parameter values supplemented according to Schema requirements. For text_format inputs, key information slot extraction and structured reconstruction are completed based on predefined rule templates and domain-restricted vocabularies. If the reconstruction result exceeds the feasibility constraint domain or extraction fails, a high-weight penalty is triggered, and the system falls back to a preset safe instruction (e.g., “maintain current attitude and standby state”).
To ensure timeliness and traceability within the decision window, the conversion of
is performed immediately at the window start. This ensures the generated control instruction
u is directly executable, and the operation process remains auditable. Algorithm 1 summarizes the instruction conversion pipeline, implementing function
from Equation (15). It takes raw model output, current state, and constraints as inputs, producing an executable command and violation flags for cost calculation (Equation (4)). The procedure includes format discrimination (Equation (3)), parsing, canonicalization, multi-criteria validation (schema, value ranges, logical conflicts), and entity resolution, culminating in the
projection operation. If the instruction remains infeasible after repair, it falls back to a safe default.
| Algorithm 1 Post-process-and-Project for Executable Command Generation |
Require: Model output, state s, constraints Ensure: Executable command , violation flags
- 1:
fmt ← DetectFormat(output) - 2:
cmd ← Canonicalize(Parse(output,fmt)) - 3:
flags ← {schema, range, conflict, unknown, repair, violation} ← 0 - 4:
flags[schema] ← 0 if SchemaOK(cmd) else 1 - 5:
cmd, e ← ClipRanges(cmd,s); flags[range] ∨= e - 6:
cmd, c ← ResolveConflicts(cmd,s); flags[conflict] ∨= c - 7:
cmd, u ← FixUnknownEntities(cmd,s); flags[unknown] ∨= u - 8:
cmd, r ← ProjectToF(cmd,,s); flags[repair] ∨= r - 9:
if not ok then - 10:
cmd ← SafeHold() - 11:
flags[violation] ← 1 - 12:
end if - 13:
return , flags
|
4.3. Hallucination Mitigation and Feasibility Projection
In order to decrease the occurrence of structural hallucinations and OOB outputs without changing the timing of the one-step MDP, we propose the following single closed loop: constraint on the input side, repair on the output side, and an auditable record. At the beginning of the window, a controlled prompt will be generated according to the current state S. In this prompt, the Schema, key name whitelist, and range (ID list, speed, altitude, track, executable actions) are all specified. It is also necessary that “only entities already present are referenced from Stext, and no new IDs/fields shall be created” and that some minimal examples are provided to help the model understand the format and boundaries. Moreover, we allow the model to be exposed to a relatively low temperature and an appropriate upper limit on the length to help the model generate “only structured JSON instructions and avoid free text”.
The constrained decoding mechanism operates through a five-layer post-processing cascade. First, the raw LLM output undergoes format detection to identify whether it conforms to the expected JSON schema, Python code block, or other structured formats. Second, direct JSON parsing is attempted for outputs beginning with valid JSON markers. Third, if the output is wrapped in Python code block markers, the inner dictionary structure is extracted and evaluated. Fourth, for partially corrupted outputs, brace matching is employed to extract any valid dictionary-like structures. Fifth, if all parsing attempts fail, a severe format penalty is applied, and the system falls back to a safe default action. Once successfully parsed, the output undergoes multi-stage validation, including schema verification, numerical range clipping for coordinates and velocities, logical consistency checks for mutually exclusive actions, and entity validity confirmation. For instructions violating feasibility constraints, minimal modification repair is applied through the projection operator
. Unrepairable instructions trigger a fallback to the safe “Hold/Standby” command with associated violation costs. The entire process labels repairs and violation events and converts them into format cost items: let
then
Each weight is non-negative and clipped and normalized to the same magnitude scale as the reward function. If unrepairable, a high weight is additionally imposed. To achieve traceability and comparability, the system saves the format branch, flag, pre-and post-projection differences, rollback reasons, constraint version number, and random seed at each step. The field order and unit dimensions are fixed, and a stable algorithm is used for sorting. Thus, the complete closed loop of “front-end suppression → back-end repair → cost feedback” is embedded in Equations (15), (3) and (4).
It should be noted that the format-level constraints described above target only the structural well-formedness of the output, including schema completeness, member-assignment uniqueness, and red-team coverage feasibility. The model retains full degrees of freedom in all core decision dimensions—including but not limited to target selection for capture tasks, force allocation across multiple scoring zones, and switching among the three task types of capture, guard, and standby. None of these decisions is constrained by handcrafted rules; they are optimized solely through task rewards returned by the environment.
We note that the structured state representation and the LLM’s semantic reasoning capability are mutually constitutive in A2C-LLM: the state template translates raw numerical data into natural language precisely so that the LLM can exercise semantic understanding. PURE-A2C, operating on numerical vectors alone, cannot access this semantic dimension. The performance gap between the two should therefore be understood as arising from the integrated effect of representation and reasoning, rather than from either component in isolation.
5. The A2C-LLM Architecture
5.1. Overall Architecture Design
The A2C-LLM architecture proposed in this paper (
Figure 3), on the basis of maintaining the core advantages of the traditional Actor-Critic framework, deeply integrates the advanced reasoning ability of LLMs with the value estimation mechanism of reinforcement learning. The overall architecture consists of four core components: a policy network (Actor) with an LLM fine-tuned based on LoRA as the core, a value network (Critic) implemented using an independent multi-layer perceptron, a state encoder responsible for processing multi-source heterogeneous information, and a cooperative training mechanism that supports the joint optimization of heterogeneous components.
The core design concepts of this architecture are reflected in three aspects. First, by using a hybrid architecture mode, the complex reasoning ability of the pre-trained large model is combined with the mature advantages of traditional reinforcement learning algorithms in value estimation, thus ensuring the quality of decision-making while significantly reducing the complexity of end-to-end training. Second, a modular design strategy is adopted so that each component can be trained and optimized independently, effectively avoiding the numerical instability and computational complexity problems during the gradient propagation of the large model. Finally, in view of the characteristics of the UAV adversarial scenario, such as a long decision-making time window and a greater focus on episode-level global strategy optimization, a single-step decision-making mode is adopted. At each decision-making moment, a complete coordinated allocation plan is directly generated, rather than a step-by-step action sequence, which is more in line with tactical cognition and actual needs. In this single-step setting, we use the TD advantage defined in Equation (
2), while structured violations and repair events are converted into the format cost in Equation (14) and incorporated into the reward signal, forming a closed loop of policy generation, parsing and projection, execution, return feedback, and cost evaluation. A2C is adopted here as a simple and stable baseline; its combination with KL regularization provides update stability comparable to PPO’s clipped objective while avoiding the latter’s multi-epoch computational overhead.
5.2. State Encoder
Considering that the value network requires frequent calculations, a state encoder is adopted as a key component in the A2C-LLM architecture, serving as a bridge connecting the environment and the decision-making module. Through word embedding and multi-layer linear transformation, it compresses high-dimensional operational scenario texts into dense low-dimensional state vectors, providing a unified input for the value network. Its responsibility is to map the mixed state
into a fixed-length representation
for the value network to use; the action parsing and feasibility projection follow Equations (3), (4), and the subsequent reward functions. To maintain consistency with the policy branch, first, the tokenizer of the Actor is reused to map
into an embedding matrix
, and (adaptive) average pooling is used to obtain the text aggregation vector
; then, the numerical features
are normalized by z-score and concatenated with
, and a fusion representation is obtained through a small MLP:
By default settings, the weights of the embedding layer and the base are kept frozen to control the scale of trainable parameters. The encoder and the value network are jointly trained end-to-end through the value loss. During training, gradients are not backpropagated to the policy branch, thus achieving branch decoupling and stable optimization. In this setting, the encoded representation is directly used to estimate and compute the advantage . It should be emphasized that pooling and fusion only belong to the Encoder-to-Critic path and are independent of the generation computation graph of the Actor.
5.3. Design of LLM Policy Network (Actor)
Serving as the core network, the policy network introduces the pre-trained DeepSeek-R1-Distill-Qwen-1.5B as the base to realize the design of the LLM. During the entire model training process, only LoRA is used to perform efficient fine-tuning on it. The policy adopts the conventional autoregressive distribution modeling:
In the training phase of the model, to take into account both the stability and controllability of the language model in actual training, we adopt advantage weighting and incorporate the reference policy KL regularization and the entropy term:
Among them, is the frozen pre-training policy. The term is used to suppress the policy drift caused by online updates, and the entropy term is used to maintain an appropriate level of exploration. To avoid overfitting to the prompt segment, log, , and the entropy are calculated only in the generation segment, and teacher-forcing is adopted to evaluate the alignment probability.
5.4. Design of Value Network (Critic)
As an evaluation component in the A2C-LLM architecture, the value network is responsible for quantifying the value of the current operational situation. Unlike the policy network, which adopts the complex architecture of a large-scale language model, to avoid gradient coupling with the large language model, we implement the value network using a lightweight multi-layer perceptron (MLP). Since value estimation is essentially a regression task, compared with the complexity of policy generation, the lightweight architecture can significantly reduce training costs. Eventually, the total number of parameters of this network can be as low as . Compared with the number of parameters of the base LLM in the policy network (about 1.5B), this approach enables the value network to quickly respond to policy updates and provide timely value feedback. Since the state encoder compresses scenarios of any scale into a fixed-length vector and the Critic only needs to estimate a single scalar value, this lightweight architecture provides sufficient capacity for the task. The experimental results further corroborate this design, where A2C-LLM maintains stable performance at larger scales.
Serving as the baseline for advantage calculation, the input of the value network is the fused representation
output by the state encoder. After being mapped through a two-layer fully connected network with ReLU activation, the state value
is obtained. The encoder parameters
and the value network parameters
are jointly optimized by minimizing the mean squared error between the predicted value and the observed reward. In our MDP formulation, the return reduces to the immediate reward
r, yielding the value loss:
During training, only is used to update and , while isolating their gradients from the LoRA parameters of the Actor. The advantage , after being standardized within each batch, is used for the Actor’s update, and the gradient backpropagation to the Critic is stopped to avoid mutual interference.
5.5. Inter-Network Coordination and Optimization Mechanism
The inter-network coordination mechanism enables collaborative updates of the policy network, value network, and state encoder while ensuring stable end-to-end training under this MDP setup. We introduce a multi-optimizer approach with branch decoupling: the policy branch updates only the LoRA parameters , while the value branch jointly optimizes the lightweight MLP parameters and the encoder parameters . Training follows a value-priority approach where, for each batch, the encoder first computes and the Critic estimates without gradient flow to the Actor. The value loss drives the joint optimization of and , while the Actor loss updates using the standardized advantage . This design ensures that gradients do not cross between branches, maintaining training stability.
5.6. Reward Design
The reward function employs a multi-level design, integrating task effects, stability, and format constraints.
The approach of this paper is a decoupling approach of upper-layer text representation and lower-layer numerical execution. The state space is defined as a structured scene mixed-state text on a single path and contains information such as operational boundaries, attributes of targets and incoming aircraft, opponent situation assessment, formation/binding relationships, historical assignments, and key timings. The information is then structured into parseable text in a fixed template form and then tokenized and embedded into a fixed-length form.
The action space represents high-level mixed actions with a strict JSON schema. Based on elements such as ‘task type, participating units, action objects, and key positions’, it defines core fields for tasks, members, target1_id, capture_point, and waypoints. After parsing and verification by the executor, it is transformed into numerical commands executable by the environment for task accomplishment, e.g., capture, guard, and patrol. However, it is worth noting that the upper layer only sends position/path parameter values. Key parameters of the controller, e.g., PN navigation constants, maximum acceleration, and safety radius, are uniformly set by the environment and not included in the high-level actions.
The reward function employs a multi-level design, integrating task effects, stability, and format constraints.
Table 1 summarizes the key symbols used in this section.
The real task completion rate is defined as:
where
denotes the set of all runner UAVs (Red Team), and
represents the subset of runners that are successfully captured. The capture reward scales linearly:
with default
. For zone guard, let
denote the set of captured scoring zones. The target protection reward is:
where
is the importance weight of target
, and
. Default values:
,
. The format and stability penalty aggregates all constraint violations:
where
is the set of violation types (parsing failure:
, illegal action:
, missing fields:
to
, etc.). The total reward is:
On the reduced sensitivity to reward weights. The stability observed across scenarios with a single set of reward weights can be understood through three architectural properties. First, the additive structure Equation (15) ensures each component contributes independently, avoiding nonlinear interactions when individual coefficients are scaled. Second, the KL regularization term in Equation (9) constrains policy drift under varying gradient magnitudes. Third, constrained decoding provides a hard feasibility boundary that prevents format violations from materializing, rendering penalty terms largely invariant to their specific numerical values. A systematic empirical ablation is deferred to future work.
5.7. Training Process
This section presents the end-to-end training process under this decision window (Algorithm 2). First, the input state is encoded. The Actor generates candidate outputs under a unified template, which are then parsed and subjected to feasibility checks to be converted into actionable moves, with corresponding reward feedback obtained. Subsequently, this feedback is used to construct advantages, and a parameter update is completed following the sequence of “updating the value first, then the policy”. On the policy side, logarithmic probabilities and regularization terms are calculated solely based on the generated content; the parsing and feasibility check modules do not propagate gradients backward.
| Algorithm 2 A2C-LLM Training Loop |
- 1:
for batch do - 2:
for state do - 3:
Enc(s,) - 4:
Actor.gen(s,,constrained=True) - 5:
Parse(y) - 6:
Env(a) - 7:
Critic(h,) - 8:
norm(detach(), mask=ok) - 9:
MSE(V[ok],r[ok]) - 10:
Update using - 11:
mean(logprob(), mask=“gen”) - 12:
kl ← KLLogProb(logprob(s,y), mask=“gen”) - 13:
actor_loss(,A,kl) - 14:
Update using - 15:
end for - 16:
end for
|
6. Experiments and Results
6.1. Experimental Setup
The experiments in this chapter are carried out based on a unified self-developed simulation platform and a set of predefined evaluation metrics. The comparative algorithms are diverse and span a wide range of approaches, from heuristic-based ones to those based on deep learning technology and from model-free ones to those based on large models. The opponent capabilities are classified along two aspects: intrinsic performance and the ability to avoid obstacles. The experiments are carried out based on a shared set of random seeds. The average values and the
confidence interval of four key metrics are adopted in the experiments. The entire environmental configurations, the classification of capabilities, and the comparative and ablation experiments are presented in
Table 2 (setup and evaluation protocol overview, panels A–D).
6.2. Basic Performance Experiments
The basic performance of each method was initially evaluated in a normal environment. Unless otherwise stated, all experiments in this chapter were carried out in accordance with
Table 2. The scenario was set as “12v7” and the opponent capability was set to “low” in the experiments. The basic group contains a range of approaches from rule-based ones to DRL and those based on large models. The experimental results show that A2C-LLM has initially proven its effectiveness. It not only has the capacity to efficiently detect and capture opponents but also has good stability in guarding scoring zones. As can be seen in the confidence interval column in
Table 3, the confidence interval of A2C-LLM does not overlap with those of other algorithms. This shows a significant advantage in its performance. Other strategies, such as RANDOM, a random-based strategy, are almost useless in guard capabilities. At the same time, the overall performance of PURE-A2C was not good. This again emphasizes the importance of choosing a good strategy for the agent. Although Hungarian achieved a relatively high value in each of the metrics, its confidence interval was still overlapping. This means that its performance may fluctuate greatly in different environments. Adopting the 12v7 configuration as the controlled baseline ensures fair comparisons among different methods. Subsequent sections present experimental results scaled up to 40v30, and further verify the model’s robustness under random combined configurations of scale, capability and speed.
6.3. Scenario Complexity Scaling Experiments
To characterize the impact of increasing scale on performance and identify inflection points, we fixed the opponent capability level and other scenario parameters, and only scaled the number of Blue Team/Red Team UAVs proportionally. For all methods, the training/inference decoding budgets and hyperparameters were kept consistent except for the scenario scale.
As illustrated in
Figure 4, with the gradual expansion of scenario scale across five levels (8v6, 16v12, 24v18, 32v24, and 40v30), the task completion rate of A2C-LLM remains above
at all scales. In contrast, the performance of REINFORCE-LLM drops sharply as the scale increases, declining by nearly
from 16v12 to 40v30. The poor performance of PURE-A2C is mainly attributed to the fact that this model was only trained in the 12v7 scenario. When applied to more complex test environments, it fails to adapt to the new dimensions, thus being unable to maintain the desired operational effectiveness.
The experimental results show that our A2C-LLM approach can take full advantage of the generality of LLMs and the strength of A2C in RL. This can help our approach to tackle complex scenarios in a stable way, thus maintaining efficient allocation and improving the task completion rate. When confronted with complex scenarios, the REINFORCE approach cannot enjoy the advantage of A2C in evaluating the values, which may cause instability and performance deterioration in complex scenarios. The poor performance of the PURE-A2C approach indicates the dimensional mismatch between the training environment and the test environment. This again shows the effectiveness of using the idea of combining reinforcement learning and LLMs in addressing the problem of adaptability.
6.4. Sensitivity Experiment on Opponent Capabilities
To validate the sensitivity of the proposed approach with respect to the changes in the capability of the opponent, experiments were conducted with a fixed density of 12v7, adjusting the parameters of the opponents to match the capability as depicted in
Table 2. The experiments were designed to validate the extent to which the performance of each method deteriorates as the capability of the opponents improves, as well as the extent to which the relative performance of each method changes as this happens. Regarding the control logic, the Blue Team UAVs use the proportional navigation method for capturing the opponents, while the Red Team UAVs use the potential field method for evading the opponents. Therefore, the low-level maneuver effectiveness is not directly affected by changes in opponent speed and capability. Therefore, the primary aim of the experiments was to validate the effectiveness of the proposed method, i.e., A2C-LLM, as it adapts and becomes more effective at task allocation with respect to the changes in the capability of the enemies.
Based on the results depicted in
Figure 5, it can be noted that the proposed method, i.e., A2C-LLM, adapts well with respect to the changes in the capability of the opponents and becomes more effective at task allocation, as depicted by the high rate of captures. It can also be noted from the results that the REINFORCE-LLM and PURE-A2C methods perform poorly as the capability and speed of the opponents increase, and fail to capture the opponents. The Hungarian method performs well for scenarios with low and medium difficulty levels, but performs poorly as the difficulty level increases. The Average Relative Decline Percentage (ARDP) values, as depicted in the figure, also validate the effectiveness of each method with respect to the changes in the capability of the opponents. The proposed method, i.e., A2C-LLM, performs the best with respect to stability and adaptability for changing scenarios with an ARDP of
, while the Hungarian method performs better than the others with an ARDP of
, which indicates fair stability and adaptability. These results further verify the importance of integrating large models in reinforcement learning, particularly when addressing tasks that require adaptation to dynamic changes.
6.5. Multi-Dimensional Robustness Verification
The multi-dimensional robustness verification experiment is intended for verifying how each of the algorithms resists extreme uncertainty. In this case, the UAV swarm coordination system is subject to a highly unpredictable and intricate environment. At the beginning of each round, we randomly set up the scale, capability, and speed configurations and then test all of the algorithms on the same 100 random rounds (paired setting).
The results of this experiment are shown in
Figure 6 and demonstrate that the application of the A2C-LLM approach provides robust and flexible decision-making. This is because it optimizes the policy and the value function simultaneously and therefore reduces variance and makes policy updates more stable and efficient in adapting to dynamic and intricate environments. The application of LLM improves the algorithm’s capacity to understand complex information and its flexibility in adapting to diverse and dynamic situations in the environment.
6.6. Analysis Experiment on Learning Convergence and Efficiency
This study aims to examine the convergence of learning and the efficiency of the proposed reinforcement learning-based A2C-LLM in UAV swarm coordination scenarios. In this study, binning with light smoothing is implemented with a smoothing parameter set to 0.85 and bin_size set to 20, meaning we will average the results every 20 episodes.
If we examine the general trend in
Figure 7, A2C-LLM exhibits the best convergence behavior, entering rapid convergence at episode 350 and stabilizing around episode 400. Its final task completion rate is
, outperforming REINFORCE-LLM (
) by
. PURE-A2C, despite using the same A2C architecture, shows minimal improvement even after 16,000 episodes, with task completion rate increasing only 0.03 from the initial 0.58. This demonstrates that PURE-A2C, relying on numerical vector inputs, lacks the state representation enabled by LLM-based semantic understanding, and therefore fails to adapt to the dynamic adversarial scenario, unable to learn effective coordination strategies even with extensive training. In contrast, A2C-LLM achieves superior sample efficiency: converging in 1600 episodes what PURE-A2C fails to achieve in 16,000. The variance of A2C-LLM (0.0222) is also much lower than REINFORCE-LLM (0.1406), verifying better training stability.
The learning curve of A2C-LLM shows two-stage characteristics: accelerated convergence (episodes 1–400) and stable optimization (episodes 401–1600). During accelerated convergence, the pre-trained language model provides prior knowledge enabling rapid strategy optimization through environmental feedback. During stable optimization, performance converges with continuous fine-tuning. PURE-A2C shows flat learning curves even after 16,000 episodes, completely failing to adapt to the scenario changes and lacking effective convergence due to the absence of LLM-based semantic understanding. REINFORCE-LLM benefits from semantic understanding but exhibits high variance and insufficient stability due to the algorithm’s inherent characteristics.
Based on the systematic research on learning convergence and efficiency analysis, the excellence of the A2C-LLM method in the learning process of reinforcement learning is verified completely. It can be seen from the experimental results that not only does the introduction of LLMs improve the performance of decision-making in the end, but more importantly, it fundamentally improves the learning mechanism of the algorithm, which can significantly improve the speed of convergence and the efficiency and stability of the learning process.
6.7. Ablation Study
To evaluate the contributions of key components, we conduct ablation studies on two core modules introduced in
Section 4.3: AugPrompt (controlled prompt generation with task instructions and format constraints) and AugParse (output format validation and feasibility projection with penalty feedback). AugPrompt corresponds to the structured state templates and constrained decoding mechanisms that provide semantic prior knowledge to the LLM, while AugParse corresponds to the post-processing pipeline that validates output feasibility and applies format penalties. The ablation groups include Full (= A2C − LLM), −AugPrompt, and −AugParse. The standard 24v16 environment (24 Blue Team UAVs vs. 16 Red Team UAVs) is adopted, with opponent capability and speed configured at medium levels.
Table 4 shows that Both Enabled achieves the highest task completion rate (93.62%) and perfect command compliance (100%), while AugParse Only yields a slightly higher perfect-win rate (36.0% vs. 34.0%). The two configurations are complementary: AugParse Only delivers marginally better zero-loss performance, whereas Both Enabled eliminates unexecutable outputs entirely. We select Both Enabled as the full configuration because, in deployment, even a single parse failure forces a fallback to the safe standby command, which can trigger cascading failures—a risk that outweighs a 2% difference in perfect-win rate. The 0.33 percentage point difference in task completion rate between Both Enabled and AugParse Only falls within the 95% confidence interval and is therefore not statistically significant. Notably, the deployment-critical value of full command compliance is further corroborated by the stress-test findings in
Section 6.10: under strategy-level adversary variation, A2C-LLM maintains a 52.0% perfect-win rate—outperforming the Hungarian baseline by 42.0 percentage points—yet still exhibits a 4% risk of catastrophic failure (zero captures). This observation reinforces the importance of eliminating parse-triggered fallback entirely, as even a single unexecutable output can cascade into mission loss.
6.8. Case Studies and Qualitative Analysis
Numbers alone cannot fully capture A2C-LLM’s underlying allocation logic. We pulled two distinct simulation scenarios directly from our multi-dimensional robustness tests to show exactly how the system behaves. We map these critical capture assignments using 3D process visualization.
- (1)
Case Scenario 1: Analysis of a Complete Success Case
Figure 8a plots the initial approaching runners. Red Team UAVs E2 and E3 immediately approach our highest-value zone (Target A, importance weight 0.5). We positioned Blue Team UAVs 1 through 5 around this exact location. Concurrently, opposing units E4, E5, and E6 move toward Target D, a strictly lower-priority zone. Faced with this specific data snapshot, A2C-LLM generated the response matrix detailed in
Figure 8b. To guard our critical zone, UAVs 1 and 2 are assigned to capture E2. Considering that E3 is far away, only UAV 3 is assigned to capture E3. In addition, to ensure the safety of the critical zone, UAVs 4 and 5 are assigned to local guard tasks. Meanwhile, as E3 is found to be close to target D, UAV 13 is called in to assist in capturing E3. The remaining UAVs 8, 9, 10, and 11 each take on guard tasks for four target points, while UAV 17 remains on standby.
From the capture results shown in
Figure 8c, at Step 21, E3 is successfully captured by the nearby deployed UAV 13, and E2 is successfully captured by UAV 2. In this round of tasks, all Red Team UAVs are captured by their corresponding assigned capture UAVs.
- (2)
Case Scenario 2: Analysis of a Failure Case
In the failure case analysis, we selected Seed 8772, which had the lowest task completion rate (only ) in the multi-dimensional robustness verification experiment. After analysis, the following conclusions can be drawn.
In this scenario, there are 26 guard UAVs and 20 opposing UAVs. As shown in
Figure 8d, although 7 opposing UAVs are escaping toward the most critical target A, due to the limitation of the number of guard UAVs, the model only assigns UAVs 1 and 2 to E1 for group guard. When the model detects that the number of guard UAVs is insufficient, it directly allocates capture tasks in a one-to-one (per UAV) manner. In addition, since target C is approached the least frequently, the guard UAVs configured for it are directly assigned guard tasks due to the low volume of tasks. However, the Red Team UAVs in this task are randomly configured with the highest level of speed and capability. As a result, only UAV 6 successfully completes the capture of E14 at Step 47 (
Figure 8e), while the other UAVs fail to complete their capture tasks. At Step 39, UAV 14, which is performing a guard task, detects an approaching opponent and switches from guard mode to capture mode (
Figure 8f).
6.9. Engineering Feasibility Analysis
We evaluate the deployment feasibility of A2C-LLM from three dimensions: inference latency, training cost, and model footprint. End-to-end latency benchmarks are conducted across four scenario scales (4v3, 8v6, 12v7, 24v18), with five random seeds per scale and two GPU warm-up runs, on the same hardware configuration as in
Section 6.1. Three standard inference-time optimizations are applied to the LLM—LoRA weight merging, output length limiting, and greedy decoding—which collectively increase generation throughput from approximately 22 tok/s to a maximum of approximately 65 tok/s without requiring model retraining. The Hungarian algorithm and PURE-A2C are evaluated under identical conditions for comparison. Results are presented in
Table 5.
Table 5 reveals that the parsing overhead of A2C-LLM remains at only 18–55 ms across all scales, on the same order of magnitude as Hungarian and PURE-A2C, demonstrating that the constrained decoding and feasibility projection pipeline does not constitute a meaningful computational bottleneck. The total latency of A2C-LLM is dominated entirely by LLM autoregressive generation, which accounts for over 99.8% of the total latency, with the optimized total latency ranging from 11.7 to 19.1 s. At the 24v18 scale, the latency is 18.5 s, slightly lower than 19.1 s at 12v7, and the variance is substantially reduced, owing to greedy decoding eliminating the long-tail output phenomenon observed under sampling. Regarding training cost, complete training requires 1600 episodes. The single-step MDP formulation is essential to training feasibility: a multi-step temporal formulation would cause per-episode training time to scale linearly with the number of simulation steps, imposing prohibitive computational cost for LLM-based reinforcement learning requiring thousands of iterations. Under the current single-step design, total training time is approximately 78 h. In terms of model footprint, the LLM backbone occupies approximately 4 GB of GPU memory during FP16 inference. Hungarian and PURE-A2C achieve latency below 50 ms, but their task completion rates and perfect-win rates are substantially inferior to A2C-LLM (see
Section 6.2), illustrating a deliberate performance-versus-latency trade-off at the macro-allocation level.
It is worth noting that all latency measurements were obtained on a single consumer-grade desktop equipped with an NVIDIA GPU offering 504 GB/s memory bandwidth, as detailed in
Table 2. On this hardware, the 1.5B-parameter model achieves a single inference latency of 11.7–19.1 s across all tested scales, while the parsing pipeline contributes only 18–55 ms. This confirms that the inference cost is dominated by autoregressive generation rather than constraint enforcement. Three standard inference-time optimizations—LoRA weight merging, output length limiting, and greedy decoding—collectively increase generation throughput from approximately 22 tok/s to a maximum of 65 tok/s without retraining, demonstrating that substantial headroom exists even within the current hardware envelope.
Theoretically, the dominant latency factor is the memory bandwidth available for reading model weights during token generation. The present hardware provides 504 GB/s; upgrading to a device with 1555 GB/s or higher memory bandwidth would proportionally reduce the weight-transfer time. Combined with post-training quantization to reduce model size and thus the total data volume per token, and dedicated inference engines that optimize memory access patterns, the end-to-end inference latency could be compressed to an estimated 7 s or below. This estimate is conservative in that it accounts only for bandwidth scaling and quantization effects, without assuming architectural changes to the model or the inference pipeline.
In summary, the current latency figures reflect the hardware configuration under which they were measured, and multiple avenues exist for further reduction—hardware upgrades to increase memory bandwidth, post-training quantization to reduce model size and per-token data transfer volume, and dedicated inference engines to optimize memory access patterns—all of which can collectively reduce latency by several times.
6.10. Robustness Under Strategy-Level Adversary Variation
The preceding opponent capability sensitivity experiments (
Section 6.4) varied the Red Team’s physical parameters to alter adversarial pressure, while the multi-dimensional robustness experiments (
Section 6.5) randomized scale, capability, and speed configurations. To further examine the robustness of the Blue Team when the Red Team exhibits some degree of intelligent top-level strategic variation, we introduce a Red Team strategy selector with basic situational awareness.
At the beginning of each episode, the Red Team evaluates the defensive intensity around each scoring zone and adaptively selects an attack mode accordingly, with tactical options including concentrated penetration, divided penetration with diversion, decoy and redirect, and uniform dispersion. To preliminarily simulate the perception uncertainty that may arise in real-world environments, top-level noise is randomly injected with a 5% probability—Red Team UAVs suddenly appear near the target point, and the Blue Team must complete deployment within an extremely compressed decision window. The low-level APF maneuver controller remains unchanged, with top-level target assignment reconducted only at the start of each episode or upon the capture of the first target. All Blue Team models are evaluated via inference only, without retraining.
The experiment was conducted under the 12v7 low-capability condition, with a total of 50 episodes. Four algorithms—A2C-LLM, REINFORCE-LLM, A2C_FineTune, and Hungarian—were compared pairwise on an identical set of random seeds (consistent with
Section 6.2). The results are shown in
Table 6.
Under this strategy selector, A2C-LLM achieved a 52.0% perfect-win rate, outperforming the Hungarian baseline by 42.0 percentage points (Welch t-test, ), with non-overlapping 95% confidence intervals. All three LLM-based algorithms significantly surpassed the Hungarian baseline in perfect-win rate. The three LLM algorithms exhibited a performance gradient of A2C-LLM > A2C_FineTune > REINFORCE-LLM, corresponding to the differences in training intensity among online RL, supervised fine-tuning, and pure REINFORCE, although the gaps among the LLM algorithms have not yet reached statistical significance (95% confidence intervals overlap).
It should be candidly noted that LLM-based algorithms introduce a 2–14% risk of catastrophic failure (i.e., episodes with zero captures), with A2C_FineTune exhibiting the highest rate (14%), A2C-LLM at 4%, and the Hungarian baseline experiencing no complete mission loss. This reveals a trade-off: LLM semantic reasoning brings a higher decision-making ceiling but also occasional unstable outputs, whereas static methods have a lower ceiling but more controllable behavioral bounds. In the current framework, constrained decoding and feasibility projection mechanisms have already reduced this risk to a relatively low level, and further improving reliability through output validation and fallback strategies represents a clear direction for improvement. Future optimization can proceed along two paths: technically, continuing to enhance the model’s inference stability and decision maturity; and engineering-wise, exploring a combined solution with A2C-LLM serving as the primary policy and a static algorithm providing the fallback.
Overall, the above results demonstrate that the semantic understanding capability of A2C-LLM can sustain decision advantages when the opponent’s strategic behavior pattern varies, whereas the degradation of static assignment methods is more pronounced. It should be noted that although the current Red Team strategy incorporates a situation-aware selector, its core remains rule-based. Systematic extension toward learning-based Red Team modeling has been identified as a future work direction.
7. Future Work
This work establishes a foundational framework for integrating LLMs with reinforcement learning in dynamic adversarial environments. The following directions merit further investigation:
From single-shot decision to event-triggered replanning. The current framework adopts a single macro-decision per episode, which has demonstrated excellent performance across randomized adversarial scenarios. For extreme cases involving abrupt shifts in tactical situations, the approach can be optimized to an event-triggered LLM replanning mechanism—for instance, asynchronously triggering a new planning cycle when blue-team UAV losses exceed a threshold or when a high-value zone is breached—thereby further enhancing adaptability to severe dynamic changes. This extension will also necessitate addressing the credit assignment problem across multiple decision steps, where the current global Critic can be evolved into per-agent value functions or counterfactual baselines within a centralized-training-decentralized-execution framework.
Hierarchical and batched deployment strategy. To meet the real-time control demands of larger-scale swarms, a batched UAV dispatching architecture can be designed: the LLM generates task allocation plans for a ready-to-deploy batch, which begins execution immediately, while asynchronously triggering a new planning cycle for subsequent batches based on evolving situational conditions. This creates temporal overlap between planning and execution, thereby decoupling LLM inference latency from task execution in engineering deployments.
Inference efficiency optimization. The current 1.5B-parameter model achieves inference latency on the order of tens of seconds after standard engineering optimizations. Through model quantization, inference engine upgrades, and speculative decoding, this latency can be further compressed to the order of seconds to meet the requirements of deployment scenarios with higher real-time demands.
Red-team behavior modeling. The current red-team UAVs maneuver using artificial potential fields, without explicit opponent strategy modeling. Incorporating opponent intent recognition and belief-state reasoning can equip the LLM policy with more complete competitive reasoning capabilities. During the revision period, the preliminary exploration of a rule-based top-level strategy selector was conducted, where the Red Team adaptively chooses from tactical templates according to defensive posture. Initial results suggest that the LLM-based approach retains robustness advantages under varying opponent strategies, while systematic integration of learning-based Red Team modeling remains a direction for future work.
Validation under partial observability and noisy conditions. A preliminary close-proximity stress test—where Red Team UAVs appear within 250 m of scoring zones as a top-level equivalent of sensing uncertainty—has been conducted. The current validation is conducted under idealized simulation conditions. Verifying the robustness of the framework under sensor noise, communication delays, and partial observability is a necessary step toward practical deployment. In parallel, extending the simulation platform to incorporate higher-fidelity physical models—including 6-DoF aerodynamics, actuator constraints, and environmental disturbances—constitutes another important step toward bridging the gap between the present proof-of-concept and real-world deployment readiness.
8. Conclusions
This work proposes the A2C-LLM architecture to address the semantic-numerical gap in UAV swarm task allocation for multi-agent adversarial coordination scenarios. By integrating LLM semantic understanding with RL feedback through a lateral state-space coverage paradigm that compresses temporal reasoning into single-step contextual decisions with structured feasibility constraints, the proposed method achieves superior robustness in multi-dimensional robustness experiments, delivering a 25.7% relative improvement in perfect-win rate over the second-ranked REINFORCE-LLM and a 9.8% relative improvement in task completion rate over the second-ranked Hungarian method. Systematic experiments and ablation studies validate the effectiveness of key components, including prompt augmentation and parsing augmentation.
The key insight is that combining foundation models with principled RL training—rather than using either alone—provides a viable pathway for deploying AI systems in reliability-critical autonomous applications. This approach addresses the fundamental tension between semantic flexibility and execution guarantees that has limited prior methods.
The current validation relies on simulation with idealized state information and simplified dynamics. Real-world deployment would introduce sensor noise, communication delays, and partial observability that are not fully captured in the present experiments. Future research directions, including those outlined in the Future Work section, aim to mature the framework for deployment in next-generation autonomous UAV systems.
Author Contributions
J.B.: conceptualization, methodology, writing—original draft, data curation. Y.Z.: funding acquisition, supervision, resources. R.Z.: writing—review and editing. P.Z.: visualization, validation, formal analysis. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the Science and Technology Plan Project of Xizang Autonomous Region, grant number XZ202502ZY0061. The APC was funded by the Science and Technology Plan Project of Xizang Autonomous Region, grant number XZ202502ZY0061.
Data Availability Statement
The data presented in this study are available from the corresponding author upon reasonable request. The simulation code and trained models are not publicly available due to project restrictions.
DURC Statement
Current research is limited to the resilient cooperative control algorithms for UAV swarms, which are beneficial for civilian applications, including swarm task allocation, low-altitude delivery, and entertainment games, and do not pose a threat to public health or national security. Authors acknowledge the dual-use potential of the research involving autonomous coordination algorithms for UAV swarms and confirm that all necessary precautions have been taken to prevent potential misuse. As an ethical responsibility, authors strictly adhere to relevant national and international laws about DURC. Authors advocate for responsible deployment, ethical considerations, regulatory compliance, and transparent reporting to mitigate misuse risks and foster beneficial outcomes.
Conflicts of Interest
The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.
References
- Yang, M.; Shan, S.; Zhang, W. Decision-making and confrontation in close-range air combat based on reinforcement learning. Chin. J. Aeronaut. 2025, 38, 103526. [Google Scholar] [CrossRef]
- Kang, H.; Joung, J.; Kim, J.; Kang, J.; Cho, Y.S. Protect Your Sky: A Survey of Counter Unmanned Aerial Vehicle Systems. IEEE Access 2020, 8, 168671–168710. [Google Scholar] [CrossRef]
- Ou, H.; Wu, D.; Wang, S.; Wang, J.; Wang, J.; Huang, Y. The Research on the Efficiency of UAV Swarm Anti-UAV Swarm Operations. In Man-Machine-Environment System Engineering: Proceedings of the 21st International Conference on MMESE; Long, S., Dhillon, B.S., Eds.; Lecture Notes in Electrical Engineering; Springer: Singapore, 2022; Volume 800, pp. 341–346. [Google Scholar] [CrossRef]
- Ariante, G.; Del Core, G. Unmanned Aircraft Systems (UASs): Current State, Emerging Technologies, and Future Trends. Drones 2025, 9, 59. [Google Scholar] [CrossRef]
- Tian, Y.; Lin, F.; Li, Y.; Zhang, T.; Zhang, Q.; Fu, X.; Huang, J.; Dai, X.; Wang, Y.; Tian, C.; et al. UAVs Meet LLMs: Overviews and Perspectives Toward Agentic Low-Altitude Mobility. arXiv 2025, arXiv:2501.02341. [Google Scholar] [CrossRef]
- Zhao, W.; Li, L.; Zhan, H.; Wang, Y.; Fu, Y. Applying Large Language Model to a Control System for Multi-Robot Task Assignment. Drones 2024, 8, 728. [Google Scholar] [CrossRef]
- Tagliabue, A.; Kondo, K.; Zhao, T.; Peterson, M.; Tewari, C.T.; How, J.P. REAL: Resilience and Adaptation using Large Language Models on Autonomous Aerial Robots. arXiv 2023, arXiv:2311.01403. [Google Scholar] [CrossRef]
- Cui, J.; Liu, G.; Wang, H.; Yu, Y.; Yang, J. TPML: Task Planning for Multi-UAV System with Large Language Models. In 2024 IEEE 18th International Conference on Control & Automation (ICCA); IEEE: Reykjavik, Iceland, 2024; pp. 886–891. [Google Scholar] [CrossRef]
- Shinn, N.; Cassano, F.; Gopinath, A.; Narasimhan, K.; Yao, S. Reflexion: Language Agents with Verbal Reinforcement Learning. Adv. Neural Inf. Process. Syst. 2023, 36, 8634–8652. [Google Scholar]
- Yao, S.; Zhao, J.; Yu, D.; Du, N.; Shafran, I.; Narasimhan, K.; Cao, Y. Tree of Thoughts: Deliberate Problem Solving with Large Language Models. Adv. Neural Inf. Process. Syst. 2023, 36, 11809–11822. [Google Scholar]
- Schulman, J.; Wolski, F.; Dhariwal, P.; Radford, A.; Klimov, O. Proximal Policy Optimization Algorithms. arXiv 2017, arXiv:1707.06347. [Google Scholar] [CrossRef]
- Wen, M.; Wan, Z.; Wang, J.; Zhang, W.; Wen, Y. Reinforcing LLM Agents via Policy Optimization with Action Decomposition. Adv. Neural Inf. Process. Syst. 2024, 37, 103774–103805. [Google Scholar]
- Kuhn, H.W. The Hungarian method for the assignment problem. Nav. Res. Logist. 1955, 2, 83–97. [Google Scholar] [CrossRef]
- Ahn, M.; Brohan, A.; Brown, N.; Chebotar, Y.; Cortes, O.; David, B.; Finn, C.; Fu, C.; Gopalakrishnan, K.; Hausman, K.; et al. Do As I Can, Not As I Say: Grounding Language in Robotic Affordances. arXiv 2022, arXiv:2204.01691. [Google Scholar] [CrossRef]
- Mnih, V.; Badia, A.P.; Mirza, M.; Graves, A.; Lillicrap, T.; Harley, T.; Silver, D.; Kavukcuoglu, K. Asynchronous Methods for Deep Reinforcement Learning. In International Conference on Machine Learning; PMLR: London, UK, 2016. [Google Scholar]
- Scholak, T.; Schucher, N.; Bahdanau, D. PICARD: Parsing Incrementally for Constrained Auto-Regressive Decoding from Language Models. arXiv 2021, arXiv:2109.05093. [Google Scholar] [CrossRef]
- Hu, E.J.; Shen, Y.; Wallis, P.; Allen-Zhu, Z.; Li, Y.; Wang, S.; Wang, L.; Chen, W. LoRA: Low-Rank Adaptation of Large Language Models. arXiv 2021, arXiv:2106.09685. [Google Scholar] [CrossRef]
- Lowe, R.; Wu, Y.; Tamar, A.; Harb, J.; Abbeel, P.; Mordatch, I. Multi-Agent Actor-Critic for Mixed Cooperative-Competitive Environments. arXiv 2020, arXiv:1706.02275. [Google Scholar] [CrossRef]
- Liu, D.; Dou, L.; Zhang, R.; Zhang, X.; Zong, Q. Multi-agent reinforcement learning-based coordinated dynamic task allocation for heterogenous uavs. IEEE Trans. Veh. Technol. 2023, 72, 4372–4383. [Google Scholar] [CrossRef]
- Alam, M.M.; Trina, S.A.; Hossain, T.; Mahmood, S.; Ahmed, M.S.; Arafat, M.Y. Variations in Multi-Agent Actor–Critic Frameworks for Joint Optimizations in UAV Swarm Networks: Recent Evolution, Challenges, and Directions. Drones 2025, 9, 153. [Google Scholar] [CrossRef]
- Li, G.; Lyu, Y.; Yang, D.; Jin, H.; Zhao, J.; Zhou, H. Research on the Design of Maneuver Library and Control Algorithm for Air Combat Decision-Making. In Advances in Guidance, Navigation and Control; Yan, L., Duan, H., Deng, Y., Eds.; Lecture Notes in Electrical Engineering; Springer Nature: Singapore, 2025; Volume 1351, pp. 86–96. [Google Scholar] [CrossRef]
- Liu, H.; Jin, J.; Liu, K.; Zhang, J.; Niu, Y. Research on UAV Air Combat Maneuver Decision Based on Decision Tree CART Algorithm. In Proceedings of 2022 International Conference on Autonomous Unmanned Systems (ICAUS 2022); Fu, W., Gu, M., Niu, Y., Eds.; Lecture Notes in Electrical Engineering; Springer Nature: Singapore, 2023; Volume 1010, pp. 2638–2650. [Google Scholar] [CrossRef]
- Hu, K.; Xu, K.; Xia, Q.; Li, M.; Song, Z.; Song, L.; Sun, N. An overview: Attention mechanisms in multi-agent reinforcement learning. Neurocomputing 2024, 598, 128015. [Google Scholar] [CrossRef]
- Shao, K.; Zhao, D.; Zhu, Y.; Zhang, Q. Visual Navigation with Actor-Critic Deep Reinforcement Learning. In 2018 International Joint Conference on Neural Networks (IJCNN); IEEE: Rio de Janeiro, Brazil, 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Barros, G.M.; Colombini, E.L. Using Soft Actor-Critic for Low-Level UAV Control. arXiv 2020, arXiv:2010.02293. [Google Scholar] [CrossRef]
- Koch, W.; Mancuso, R.; West, R.; Bestavros, A. Reinforcement Learning for UAV Attitude Control. arXiv 2018, arXiv:1804.04154. [Google Scholar] [CrossRef]
- Li, S.; Jia, Y.; Yang, F.; Qin, Q.; Gao, H.; Zhou, Y. Collaborative Decision-Making Method for Multi-UAV Based on Multiagent Reinforcement Learning. IEEE Access 2022, 10, 91385–91396. [Google Scholar] [CrossRef]
- Wang, B.; Li, S.; Gao, X.; Xie, T. Weighted mean field reinforcement learning for large-scale UAV swarm confrontation. Appl. Intell. 2022, 53, 5274–5289. [Google Scholar] [CrossRef]
- Nian, X.; Li, M.; Wang, H.; Gong, Y.; Xiong, H. Large-scale UAV swarm confrontation based on hierarchical attention actor-critic algorithm. Appl. Intell. 2024, 54, 3279–3294. [Google Scholar] [CrossRef]
- Yue, L.; Yang, R.; Zuo, J.; Zhang, Y.; Li, Q.; Zhang, Y. Unmanned Aerial Vehicle Swarm Cooperative Decision-Making for SEAD Mission: A Hierarchical Multiagent Reinforcement Learning Approach. IEEE Access 2022, 10, 92177–92191. [Google Scholar] [CrossRef]
- Chi, P.; Wei, J.; Wu, K.; Di, B.; Wang, Y. A Bio-Inspired Decision-Making Method of UAV Swarm for Attack-Defense Confrontation via Multi-Agent Reinforcement Learning. Biomimetics 2023, 8, 222. [Google Scholar] [CrossRef]
- Wang, Z.; Zhang, J. A task allocation algorithm for a swarm of unmanned aerial vehicles based on bionic wolf pack method. Knowl.-Based Syst. 2022, 250, 109072. [Google Scholar] [CrossRef]
- Xu, K.; Li, Y.; Sun, J.; Du, S.; Di, X.; Yang, Y.; Li, B. Targets capture by distributed active swarms via bio-inspired reinforcement learning. Sci. China Phys. Mech. Astron. 2025, 68, 218711. [Google Scholar] [CrossRef]
- Fan, R.; Wang, J.; Han, W.; Xu, B. UAV Swarm Control Based on Hybrid Bionic Swarm Intelligence. Guid. Navig. Control 2023, 3, 2350008. [Google Scholar] [CrossRef]
- Dong, S.; Liu, M.; Dong, S.; Zheng, R.; Wei, P. Hierarchical Heterogeneous Multi-Agent Cross-Domain Search Method Based on Deep Reinforcement Learning. IEEE Trans. Intell. Transp. Syst. 2024, 25, 18882–18898. [Google Scholar] [CrossRef]
- Hu, B.-B.; Zhang, H.-T.; Liu, B.; Ding, J.; Xu, Y.; Luo, C.; Cao, H. Coordinated Navigation Control of Cross-Domain Unmanned Systems via Guiding Vector Fields. IEEE Trans. Control Syst. Technol. 2024, 32, 550–563. [Google Scholar] [CrossRef]
- Mialon, G.; Dessì, R.; Lomeli, M.; Nalmpantis, C.; Pasunuru, R.; Raileanu, R.; Rozière, B.; Schick, T.; Dwivedi-Yu, J.; Celikyilmaz, A.; et al. Augmented Language Models: A Survey. arXiv 2023, arXiv:2302.07842. [Google Scholar] [CrossRef]
- Yin, S.; Fu, C.; Zhao, S.; Li, K.; Sun, X.; Xu, T.; Chen, E. A survey on multimodal large language models. Natl. Sci. Rev. 2024, 11, nwae403. [Google Scholar] [CrossRef]
- Javaid, S.; Saeed, N.; He, B. Large Language Models for UAVs: Current State and Pathways to the Future. arXiv 2024, arXiv:2405.01745. [Google Scholar] [CrossRef]
- Chen, G.; Yu, X.; Ling, N.; Zhong, L. TypeFly: Flying Drones with Large Language Model. arXiv 2024, arXiv:2312.14950. [Google Scholar] [CrossRef]
- Zhu, F.; Huang, F.; Yu, Y.; Liu, G.; Huang, T. Task Offloading with LLM-Enhanced Multi-Agent Reinforcement Learning in UAV-Assisted Edge Computing. Sensors 2024, 25, 175. [Google Scholar] [CrossRef]
- Xu, Y.; Jian, Z.; Zha, J.; Chen, X. Poster Abstract: Emergency Networking Using UAVs: A Reinforcement Learning Approach with Large Language Model. In 2024 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN); IEEE: Hong Kong, China, 2024; pp. 281–282. [Google Scholar] [CrossRef]
- Zhou, Q.; Wu, J.; Zhu, M.; Zhou, Y.; Xiao, F.; Zhang, Y. LLM-QL: A LLM-Enhanced Q-Learning Approach for Scheduling Multiple Parallel Drones. IEEE Trans. Knowl. Data Eng. 2025, 37, 5393–5406. [Google Scholar] [CrossRef]
- Murtaugh, S.A.; Criel, H.E. Fundamentals of proportional navigation. IEEE Spectr. 1966, 3, 75–85. [Google Scholar] [CrossRef]
- Sun, J.; Tang, J.; Lao, S. Collision Avoidance for Cooperative UAVs with Optimized Artificial Potential Field Algorithm. IEEE Access 2017, 5, 18382–18390. [Google Scholar] [CrossRef]
Figure 1.
Overall architecture of A2C-LLM a dynamic closed-loop framework for multi-target capture task allocation.
Figure 1.
Overall architecture of A2C-LLM a dynamic closed-loop framework for multi-target capture task allocation.
Figure 2.
Multimodal information encoding and instruction conversion mechanism.
Figure 2.
Multimodal information encoding and instruction conversion mechanism.
Figure 3.
Architecture of the A2C-LLM Model. Among them, for the data and arrows: blue represents forward inference for decision-making, green represents data storage and algorithmic processing, red represents loss and gradient calculation, and yellow represents parameter optimization and update.
Figure 3.
Architecture of the A2C-LLM Model. Among them, for the data and arrows: blue represents forward inference for decision-making, green represents data storage and algorithmic processing, red represents loss and gradient calculation, and yellow represents parameter optimization and update.
Figure 4.
Task completion rate across scenario scales (mean CI). The gray shaded area indicates the 95% confidence interval.
Figure 4.
Task completion rate across scenario scales (mean CI). The gray shaded area indicates the 95% confidence interval.
Figure 5.
Sensitivity to opponent capability on a 3 × 3 grid of opponent_speed × opponent_ability. Color denotes mean task completion rate (%) with a shared 0– scale; models are evaluated under identical settings (learning methods trained at the Standard level).
Figure 5.
Sensitivity to opponent capability on a 3 × 3 grid of opponent_speed × opponent_ability. Color denotes mean task completion rate (%) with a shared 0– scale; models are evaluated under identical settings (learning methods trained at the Standard level).
Figure 6.
Baseline algorithm performance on 100 random episodes. Bars show sample means over 100 paired random episodes where scale, ability, and speed are resampled each episode. Error bars denote confidence intervals via episode-level bootstrap ().
Figure 6.
Baseline algorithm performance on 100 random episodes. Bars show sample means over 100 paired random episodes where scale, ability, and speed are resampled each episode. Error bars denote confidence intervals via episode-level bootstrap ().
Figure 7.
Reward convergence curves during training. A2C-LLM and REINFORCE-LLM trained for 1600 episodes; PURE-A2C trained for 16,000 episodes (mapped to 0–1600 interval for comparison). Binning and smoothing applied (smooth = 0.85, bin-size = 20).
Figure 7.
Reward convergence curves during training. A2C-LLM and REINFORCE-LLM trained for 1600 episodes; PURE-A2C trained for 16,000 episodes (mapped to 0–1600 interval for comparison). Binning and smoothing applied (smooth = 0.85, bin-size = 20).
Figure 8.
The 3D visual simulation of the case scenario. Blue circles denote catcher UAVs, red triangles denote Runner UAVs, and yellow stars denote scoring zones.
Figure 8.
The 3D visual simulation of the case scenario. Blue circles denote catcher UAVs, red triangles denote Runner UAVs, and yellow stars denote scoring zones.
Table 1.
Key symbols for reward function and state-action interface.
Table 1.
Key symbols for reward function and state-action interface.
| Symbol | Definition |
|---|
| Set of high-value targets |
| Set of catcher UAVs (Blue Team) |
| Set of runner UAVs (Red Team) |
| Subset of successfully captured runners |
| Set of captured scoring zones |
| Importance weight of target |
| , normalization benchmark |
| Task completion rate, |
| Capture reward coefficient (default 15) |
| Target loss penalty (default ) |
| Perfect guard bonus (default ) |
| Format and stability penalty |
| Mixed state representation |
| Mixed action representation |
Table 2.
Experimental setup and evaluation protocol.
Table 2.
Experimental setup and evaluation protocol.
| Panel A: Environment and Platform |
| Module | Configuration |
| Software/Environment | Python 3.8; PyTorch 2.0.0; 3D Cartesian world (); velocity/acceleration/angular-rate constraints. |
| UAV Parameters | Blue Team UAV: m/s, m/s2; Red Team UAV: varies with capability level. |
| Model | DeepSeek-R1-Distill-Qwen-1.5B; LoRA (, , dropout = 0.1); 7 target modules. |
| Hardware | Intel i7-14700KF; 32 GB RAM; NVIDIA RTX 4070 Ti. |
| Training | LR , batch size 2, update freq 2 episodes, 1600 episodes. |
| Panel B: Adversary Capability Tiers |
| Tier | Capture Radius | Maneuver Mult. | Turn-rate Mult. | Perception Range | Repulsion Range |
| Weak | 10 | 1.0 | 0.5 | 0 | 0 |
| Medium | 5 | 1.25 | 0.8 | 100 | 30 |
| Strong | 3 | 2.0 | 1.2 | 200 | 80 |
| Panel C: Baselines and Ablations |
| ID | Method | Description |
| A | A2C_LLM | Proposed: LLM fine-tuning + A2C with single-step advantage. |
| B | A2C_FineTune | LLM fine-tuning only, no RL. |
| C | Pure_A2C | Vanilla A2C with numeric state input. |
| D | REINFORCE_LLM | LLM + REINFORCE. |
| E | Hungarian | Rule-based assignment (Hungarian algorithm). |
| F | Random | Random policy (lower bound). |
| G | Frozen_LLM | Frozen LLM (no fine-tuning) + rule constraints. |
| Panel D: Metrics and Evaluation Protocol |
| Symbol | Name | Definition | Reporting |
| Task completion rate (%) | Captured / total runners; averaged. | Mean [95% CI] |
| Perfect-win rate (%) | Fraction of zero-loss episodes. | Same |
| Key-zone guard (%) | Weighted sum of guarded zones. | Same |
| Completion rate (%) | Parseable and executable outputs. | Same |
Table 3.
Basic performance results (12v7 scenario, weak enemy).
Table 3.
Basic performance results (12v7 scenario, weak enemy).
| Metric | A2C-LLM | REINFORCE | FineTune | Hungarian | Random | Frozen | PURE-A2C |
|---|
| (%) | 98.00 | 86.57 | 87.00 | 94.57 | 56.86 | 18.57 | 60.96 |
| | [96.9, 99.1] | [83.0, 90.2] | [83.0, 91.0] | [93.1, 96.0] | [52.4, 61.3] | [11.1, 26.0] | [57.5, 64.4] |
| (%) | 97.20 | 83.80 | 83.20 | 92.40 | 29.00 | 64.70 | 35.10 |
| | [95.6, 98.8] | [79.2, 88.4] | [78.1, 88.4] | [90.4, 94.4] | [23.4, 34.6] | [55.5, 73.9] | [27.9, 42.3] |
| (%) | 87.00 | 43.00 | 49.00 | 63.00 | 1.00 | 11.00 | 3.00 |
| | [80.3, 93.7] | [33.1, 52.9] | [39.0, 59.0] | [53.4, 72.6] | [−1.0, 3.0] | [4.8, 17.2] | [−0.4, 6.4] |
| (%) | 100.00 | 100.00 | 99.00 | 100.00 | 100.00 | 57.00 | 100.00 |
Table 4.
Ablation study results (24v16 scenario, medium opponent).
Table 4.
Ablation study results (24v16 scenario, medium opponent).
| Group | (%) | (%) | (%) | (%) |
|---|
| No AugPrompt and No AugParse | 88.62 | 65.8 | 22.0 | 99.0 |
| AugPrompt Only | 65.25 | 34.3 | 7.0 | 100.0 |
| AugParse Only | 93.31 | 81.3 | 36.0 | 99.0 |
| Both Enabled (Full) | 93.62 | 80.1 | 34.0 | 100.0 |
Table 5.
End-to-end inference latency and one-shot success rate across scenario scales.
Table 5.
End-to-end inference latency and one-shot success rate across scenario scales.
| Method | Scale | (s) | (ms) | (s) | One-Shot |
|---|
| A2C-LLM | 4v3 | | | | 100% |
| 8v6 | | | | 100% |
| 12v7 | | | | 100% |
| 24v18 | | | | 100% |
| Hungarian | 4v3 | 0.002 | 10.4 | 0.013 | 100% |
| 24v18 | 0.009 | 37.5 | 0.046 | 100% |
| PURE-A2C | 4v3 | 0.012 | 12.2 | 0.024 | 100% |
| 24v18 | 0.012 | 34.4 | 0.047 | 100% |
Table 6.
Performance under strategy-level adversary variation (12v7, low capability, 50 episodes).
Table 6.
Performance under strategy-level adversary variation (12v7, low capability, 50 episodes).
| Method | Perfect-Win Rate (%) | Task Completion Rate (%) |
|---|
| A2C-LLM | 52.0 [37.7, 66.3] | 87.1 [81.0, 93.3] |
| A2C_FineTune | 40.0 [25.9, 54.1] | 76.0 [66.5, 85.5] |
| REINFORCE-LLM | 26.0 [13.4, 38.6] | 82.9 [78.2, 87.5] |
| Hungarian | 10.0 [1.4, 18.6] | 77.7 [74.4, 81.0] |
| Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |