Redirigiendo al acceso original de articulo en 19 segundos...
Inicio  /  Information  /  Vol: 11 Par: 6 (2020)  /  Artículo
ARTÍCULO
TITULO

Effectiveness of the Execution and Prevention of Metric-Based Adversarial Attacks on Social Network Data ?

Nikolaus Nova Parulian    
Tiffany Lu    
Shubhanshu Mishra    
Mihai Avram and Jana Diesner    

Resumen

Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality measures. This paper brings insights from research on adversarial attacks on machine learning systems to the domain of social networks by studying strategies by which an adversary can minimally perturb the observed network structure to achieve their target function of modifying the ranking of a target node according to centrality measures. This can represent the attempt of an adversary to boost or demote the degree to which others perceive individual nodes as influential or powerful. We study the impact of adversarial attacks on targets and victims, and identify metric-based security strategies to mitigate such attacks. We conduct a series of controlled experiments on synthetic network data to identify attacks that allow the adversary to achieve their objective with a single move. We then replicate the experiments with empirical network data. We run our experiments on common network topologies and use common centrality measures. We identify a small set of moves that result in the adversary achieving their objective. This set is smaller for decreasing centrality measures than for increasing them. For both synthetic and empirical networks, we observe that larger networks are less prone to adversarial attacks than smaller ones. Adversarial moves have a higher impact on cellular and small-world networks, while random and scale-free networks are harder to perturb. Also, empirical networks are harder to attack than synthetic networks. Using correlation analysis on our experimental results, we identify how combining measures with low correlation can aid in reducing the effectiveness of adversarial moves. Our results also advance the knowledge about the robustness of centrality measures to network perturbations. The notion of changing social network data to yield adversarial outcomes has practical implications, e.g., for information diffusion on social media, influence and power dynamics in social systems, and developing solutions to improving network security.

 Artículos similares

       
 
Lorenz Dingeldein    
While the growth of unmanned aerial vehicle (UAV) usage over the next few years is indisputable, cooperative operation strategies for UAV swarms have gained great interest in the research community. Mission capabilities increase while contingencies can b... ver más
Revista: Aerospace

 
Manli Dai and Zhongyi Jiang    
An improved slime mold algorithm (IMSMA) is presented in this paper for a multiprocessor multitask fair scheduling problem, which aims to reduce the average processing time. An initial population strategy based on Bernoulli mapping reverse learning is pr... ver más
Revista: Algorithms

 
Shaowei Li, Yongchao Wang, Yaoming Zhou, Yuhong Jia, Hanyue Shi, Fan Yang and Chaoyue Zhang    
Multiple unmanned aerial vehicle (multi-UAV) cooperative air combat, which is an important form of future air combat, has high requirements for the autonomy and cooperation of unmanned aerial vehicles. Therefore, it is of great significance to study the ... ver más
Revista: Aerospace

 
Tusharkanti Kumar and Izuru Saizen    
Indigenous knowledge of local environments is crucial for developing innovative and contextual climate change adaptation strategies. Although the significance of community-led efforts based on this knowledge has been well acknowledged, they have not been... ver más
Revista: Water

 
Jiewen Huang and Ying Yang    
Inlight of the extensive utilization of automated machining centers, the operation and maintenance level and efficiency of machining centers require further enhancement. In our work, an anomaly detection model is proposed to detect the operation executio... ver más
Revista: Applied Sciences